Thomas ButlerinStage 2 SecurityInitial Access via Web Application Vulnerabilities with VoodooIn this post, we will be taking a look at a real-world pentesting scenario. In this scenario, we will identify a vulnerability in the web…Sep 24, 2019Sep 24, 2019