Raw-image

  • Published on
    Discovered SQLi to then enumerate the database, authenticate as admin, realize it is vulnerable to some sort of max character length exploit, pivoting from www-data to moshe, then yossi, and finally root.