Create directories ru/en/de and copy there plans of lessons. In ru-directory i put english files for translate them in future.
git-svn-id: http://webgoat.googlecode.com/svn/trunk/webgoat@421 4033779f-a91e-0410-96ef-6bf7bf53c507
This commit is contained in:
12
src/main/webapp/lesson_plans/ru/CommandInjection.html
Normal file
12
src/main/webapp/lesson_plans/ru/CommandInjection.html
Normal file
@ -0,0 +1,12 @@
|
||||
<div align="Center">
|
||||
<p><b>Lesson Plan Title:</b> How to Perform Command Injection</p>
|
||||
</div>
|
||||
<p><b>Concept / Topic To Teach:</b></p>
|
||||
<!-- Start Instructions -->
|
||||
Command injection attacks represent a serious threat to any parameter-driven site. The methods behind an attack are easy to learn and the damage caused can range from considerable to complete system compromise. Despite these risks an incredible number of systems on the internet are susceptible to this form of attack.<br/>
|
||||
Not only is it a threat easily instigated, it is also a threat that, with a little common-sense and forethought, can be almost totally prevented. This lesson will show the student several examples of parameter injection.<br/>
|
||||
It is always good practice to sanitize all input data, especially data that will used in OS command, scripts, and database queries.<br/>
|
||||
Try to inject a command to the operating system.
|
||||
<!-- Stop Instructions -->
|
||||
<p><b>General Goal(s):</b></p>
|
||||
The user should be able to execute any command on the hosting OS.
|
Reference in New Issue
Block a user