▸
Terminal Active
root@aiht
:
~
$
Secure
⟁
Operator
Admin Access
EXPLOITATION TOOLS
▸ Automated vulnerability exploitation testing
▸
Select Exploit
⟁
SQL Injection
Test for SQL injection vulnerabilities
⟡
XSS
Cross-Site Scripting detection
⌬
Command Injection
OS command injection testing
⎔
Auth Bypass
Authentication bypass attempts
▸
Configuration
Target URL
Parameter
Custom Payload (Optional)
⟁ EXECUTE EXPLOIT
▸
Terminal Output
exploit_terminal
> OstrixATM v1.0.0
> Exploit module initialized
> Ready for input...
root@aiht
:
~/exploits
$