7 steps from Injection to the Admin Access via RDP
Any break-in pursues its own aim, which determines its value. It's up to you to decide whether to deface a site for the latent risqué things lovers or to screw up another root shell. The reality is that any vulnerability in a web application poses a threat to the server. And if you don't confine yourself to the trite and somewhat boring SQL injections so this article is right for you. The victim's address is at input, the admin access via RDP is at output – these are classics of penetration!