1.Search a vulnerable file upload script. 2.Upload a Shell (C99.php, IT-sec-Shell.php, r57.php) 3.Deface the Site
No comments:
Post a Comment