The speakers discuss gaining access to internal IPs and exploiting a web server to gain command line access to the operating system, resulting in access to sensitive customer data.
GoodListen © 2023
About
Privacy Policy
Terms of service
Support
Blog
Search Podcasts
Podcasts