1. How do people actually exploit SQLi in the wild and get access to these giant companies? Aren't these companies locked down and heavily protected? Do you guys perform SQli by hand or use an automated tool such as sqlmap? How do you usually locate the vulnerabilities in a smart and efficient way?
2 How do you guys actually break into a network and gain access to RDP's or other software? Is it exploits, bruteforcing, or something else? Do you just mass scan and hope you find something good?
2 How do you guys actually break into a network and gain access to RDP's or other software? Is it exploits, bruteforcing, or something else? Do you just mass scan and hope you find something good?