From 64d3cdfc86e0c6af4533969116f3abbc8d155b35 Mon Sep 17 00:00:00 2001 From: Benedikt - Desktop Date: Mon, 17 Dec 2018 14:57:24 +0100 Subject: [PATCH] Added info to sql injections introduction to check out the CIA-Traid lesson if unfamiliar with it. --- .../lessonPlans/en/SqlInjection_introduction_content8.adoc | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/webgoat-lessons/sql-injection/src/main/resources/lessonPlans/en/SqlInjection_introduction_content8.adoc b/webgoat-lessons/sql-injection/src/main/resources/lessonPlans/en/SqlInjection_introduction_content8.adoc index 5d96278eb..05d382c40 100644 --- a/webgoat-lessons/sql-injection/src/main/resources/lessonPlans/en/SqlInjection_introduction_content8.adoc +++ b/webgoat-lessons/sql-injection/src/main/resources/lessonPlans/en/SqlInjection_introduction_content8.adoc @@ -1,5 +1,5 @@ == Compromising confidentiality with String SQL Injection -If a system is vulnerable to SQL-Injections it is also easy to compromise aspects of the CIA-Triad. +If a system is vulnerable to SQL-Injections it is also easy to compromise aspects of the CIA-Triad _(if you are unfamiliar with the CIA-Triad check out the CIA-Triad lesson in the general category)_. In the following three lessons, you will learn how to use simple SQL-Injection attacks to compromise each of the three. Per example by using _SQL String Injections_ or _query chaining_. This lesson, we will take a look at *confidentiality*.