• Virtual Machines
  • Help
    FAQ Difficulty Setting up a Lab Chat
  • Resources
  • About
    About VulnHub Feeds Privacy Policy
  • Submit Machine
  • Contact Us
Back

ninja-sec

  • Name: ninja-sec

Walkthrough(s)
  • 2012/02/16 - Exploiting SQL Injection , bypassing restricted/limited shell then rooting Linux machine

This website uses 'cookies' to give you the best, most relevant experience. Using this website means you're happy with this. You can find out more about the cookies used by clicking this link (or by clicking the 'Privacy Policy' link at the top of any page).
© VulnHub 2012-2025