refactor: small updates and improvements in HTTP Basic lesson (#2024)
* refactor: cleanup attack result and builder * refactor: solve compiler warnings * feature: improve HTTP basics lesson Closes: #494
This commit is contained in:
@ -4,5 +4,5 @@ input and display it back to the user, illustrating the basics of handling an HT
|
||||
|
||||
== Try It!
|
||||
|
||||
Enter your name in the input field below and press "Go!" to submit. The server will accept the request, reverse the input
|
||||
and display it back to the user, illustrating the basics of handling an HTTP request.
|
||||
Enter your name in the input field below and press "Go!" to submit. Use the Developer Tools to view the HTTP request and response.
|
||||
Can you see the response with the reversed username?
|
||||
|
@ -1,3 +1,4 @@
|
||||
== The Quiz
|
||||
|
||||
What type of HTTP verb does WebGoat use when submitting the form in this lesson? A POST or a GET?
|
||||
What type of HTTP verb does WebGoat use when submitting the form in this assignment? A POST or a GET?
|
||||
And can you find the magic number?
|
||||
|
@ -7,8 +7,7 @@ This lesson presents the basics for understanding the transfer of data between t
|
||||
== Goals
|
||||
|
||||
The user should become familiar with the features of WebGoat by manipulating the above
|
||||
buttons to view hints, show the HTTP request parameters, the HTTP request cookies, and the Java source code. You may also try using
|
||||
link:https://www.zaproxy.org/[OWASP Zed Attack Proxy] for the first time.
|
||||
buttons to view hints, show the HTTP request parameters, the HTTP request cookies, and the Java source code. You can use the default Developer Tools in your browser to view the HTTP request and response.
|
||||
|
||||
=== How HTTP works:
|
||||
|
||||
|
@ -25,8 +25,8 @@
|
||||
<div id="lessonContent">
|
||||
<form accept-charset="UNKNOWN" method="POST" name="form"
|
||||
th:action="@{/#attack/307/100}">
|
||||
Enter Your Name: <input name="person" value="" type="TEXT"/><input
|
||||
name="SUBMIT" value="Go!" type="SUBMIT"/>
|
||||
Enter your name: <input name="person" value="" type="TEXT"/><input
|
||||
name="SUBMIT" value="Go!" type="SUBMIT" class="spacing"/>
|
||||
</form>
|
||||
</div>
|
||||
</form>
|
||||
@ -71,7 +71,7 @@
|
||||
<tr>
|
||||
<td>What is the magic number:</td>
|
||||
<td><input name="magic_answer" value="" type="TEXT" /><input
|
||||
name="SUBMIT" value="Go!" type="SUBMIT" /></td>
|
||||
name="SUBMIT" value="Go!" type="SUBMIT" class="spacing" /></td>
|
||||
<td></td>
|
||||
</tr>
|
||||
</table>
|
||||
|
@ -3,10 +3,10 @@ http-basics.Go!=Go!
|
||||
1.http-basics.title=HTTP Basics
|
||||
|
||||
|
||||
http-basics.hints.http_basics_lesson.1=Type in your name and press 'go'
|
||||
http-basics.hints.http_basic_quiz.1=Turn on Show Parameters or other features
|
||||
http-basics.hints.http_basic_quiz.2=Try to intercept the request with <a href='https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project' title='Link to ZAP'>OWASP ZAP</a>
|
||||
|
||||
http-basics.hints.http_basics_lesson.1=Type in your name and press 'Go'
|
||||
http-basics.hints.http_basic_quiz.1=You can use developer tools in your browser to inspect the HTML source
|
||||
http-basics.hints.http_basic_quiz.2=Search for the form tag in the HTML source
|
||||
http-basics.hints.http_basic_quiz.3=You can submit the form and examine the request payload in the developer tools.
|
||||
|
||||
http-basics.empty=Try again, name cannot be empty.
|
||||
http-basics.reversed=The server has reversed your name: {0}
|
||||
|
@ -1436,3 +1436,7 @@ pre .conum {
|
||||
b.conum * {
|
||||
color: inherit !important
|
||||
}
|
||||
|
||||
.spacing {
|
||||
margin-left: 5px;
|
||||
}
|
||||
|
Reference in New Issue
Block a user