This exercise explains how you can, from a blind SQL injection, gain access to the administration console. Then in the administration console, how you can run commands on the system.
What you will learn?
Blind SQL injection exploitation using time-based exploitation
Gaining code execution using a PHP webshell