
(Replay) HACKERS: How we GET IN and how to STOP US
The Cyber Threat Perspective
00:00
Chaining Exploits to Server Compromise
Brad describes how SQL injection can lead to DB access, server compromise, credential harvesting, and lateral movement into networks.
Play episode from 19:06
Transcript


