Book

Nice box, thanks.
User: Figure out what happens when you register, read the code and then research about how exploiting it can be done. Once you’re in, look where you can inject something malicious and see if you can look at that through admin.
Root: Pretty much simple, check out what is running and read online on how to exploit it because you have everything you need ready for it.
DM me for any questions