updated README
This commit is contained in:
@@ -104,18 +104,18 @@ Meltdown
|
||||
|
||||
# 1.3
|
||||
|
||||
## SQL injection
|
||||
|
||||
### Intro A1
|
||||
|
||||
|
||||
- Ziel: Department von Bob Franco herrausfinden
|
||||
|
||||
SELECT department FROM employees WHERE first_name='Bob';
|
||||
|
||||
- SELECT: Spalte auswählen
|
||||
- FROM: Tabelle auswhälen
|
||||
- WHERE: Abfrage -> Spalte "first_name" entspricht "Bob"
|
||||
## HTTP Basics
|
||||
|
||||
- Mit Untersuchen nachgucken
|
||||
- Alternativ ZAP interception
|
||||
- Schritte von HTTP Proxies durchführen
|
||||
|
||||
## HTTP Proxies
|
||||
|
||||
- POST mit GET ersetzen
|
||||
- 'x-request-intercepted:true' einfügen
|
||||
- "doesn't+matter+really" mit "Requests are tampered easily" ersetzen
|
||||
|
||||
(Bild)
|
||||
|
||||
|
||||
|
||||
Reference in New Issue
Block a user