Fixed spelling mistakes.

git-svn-id: http://webgoat.googlecode.com/svn/trunk@64 4033779f-a91e-0410-96ef-6bf7bf53c507
This commit is contained in:
esheri3
2007-01-22 18:10:06 +00:00
parent 3ae171c303
commit a90d292239
20 changed files with 44 additions and 37 deletions

View File

@ -9,8 +9,8 @@ How to Create Database Back Door Attacks.
<p>
<b>How the attacks works:</b>
</p>
Database are used usually as a backend for web applications. Also it is used as a media of storage. It can also
be used as a place to store a malacious activity such as a trigger. A trigger is called by the database management
Databases are used usually as a backend for web applications. Also it is used as a media of storage. It can also
be used as a place to store a malicious activity such as a trigger. A trigger is called by the database management
system upon the execution of another database operation like insert, select, update or delete. An attacker for example
can create a trigger that would set his email address instead of every new user's email address.
</div>
@ -20,3 +20,4 @@ can create a trigger that would set his email address instead of every new user'
* You will not be able to actually create one in this lesson because the underlying database engine used with WebGoat doesn't support triggers.<br>
* Your login ID is 101.
<!-- Stop Instructions -->