Next steps once you’re in a system?

If you were to gain database access to a product, what would your next steps be? Would you cause harm (ie mess things up/delete data)? Would you export data and how would you go about forcing the company to report a data breach? Would you demand payment for documented repro steps on how you gained access?

submitted by /u/Tasty_Lie_6687
[link] [comments]

from hacking: security in practice https://ift.tt/6x314WN

Comments