- Thread Author
- #2
like i think that a dumper it go through the urls and if the database is there it say its vulenerable? i don't know
just something if anyone can explain simply how it know if the url is vulnerable
just something if anyone can explain simply how it know if the url is vulnerable