Back to directory
WRITEUP #5234

Pwning child company to get access to ParentCompany's Slack Team

SQL InjectionDefault credentials
by@Parth_Malhotra(Parth Malhotra)
Program
-
Published
Jul 23, 2019
Added to HackDex
Sep 15, 2022
Read Full Writeuphttps://blog.parthmalhotra.com/pwning-child-company-to-get-access-to-parentcompanys-slack-team/
RELATED WRITEUPS
Directory Traversal, SQL Injection and Server-Side Request Forgery
SQL InjectionPath traversal
Breaking Down Barriers: Exploiting Pre-Auth SQL Injection In WhatsUp Gold - CVE-2024-6670
SQL InjectionReverse engineering
Bypassing airport security via SQL injection
SQL Injection
Hidden in Plain Sight: Uncovering RCE on a Forgotten Axis2 Instance
RCEDefault credentials
World of SELECT-only PostgreSQL Injections: (Ab)using the filesystem
SQL Injection

Built with ❤️ by Shubham Rawat