Log in to the web application yourself, identify the errors, review the logs carefully and then modify the exploit accordingly.
1 Like
Log in to the web application yourself, identify the errors, review the logs carefully and then modify the exploit accordingly.