Rating is available when the video has been rented.
This feature is not available right now. Please try again later.
Uploaded on Jul 12, 2011
Using the victim browser hooked in BeEF as a tunneling proxy, we will see the following scenarios: - browsing the authenticated surface of the hooked domain through the security context of the victim browser; - spidering the hooked domain through the security context of the victim browser; - finding and exploiting SQLi with Burp Pro Scanner + sqlmap (through the victim browser too :-) )