If you were to gain database access to a product, what would your next steps be? Would you cause harm (ie mess things up/delete data)? Would you export data and how would you go about forcing the company to report a data breach? Would you demand payment for documented repro steps on how you gained access?
[link] [comments]
from hacking: security in practice https://ift.tt/6x314WN
Comments
Post a Comment