refactor: small updates and improvements in HTTP Basic lesson (#2024)

* refactor: cleanup attack result and builder

* refactor: solve compiler warnings

* feature: improve HTTP basics lesson

Closes: #494
This commit is contained in:
Nanne Baars
2025-02-18 14:26:21 +01:00
committed by GitHub
parent 00f3538be2
commit c3c520f487
13 changed files with 31 additions and 59 deletions

View File

@ -4,5 +4,5 @@ input and display it back to the user, illustrating the basics of handling an HT
== Try It!
Enter your name in the input field below and press "Go!" to submit. The server will accept the request, reverse the input
and display it back to the user, illustrating the basics of handling an HTTP request.
Enter your name in the input field below and press "Go!" to submit. Use the Developer Tools to view the HTTP request and response.
Can you see the response with the reversed username?

View File

@ -1,3 +1,4 @@
== The Quiz
What type of HTTP verb does WebGoat use when submitting the form in this lesson? A POST or a GET?
What type of HTTP verb does WebGoat use when submitting the form in this assignment? A POST or a GET?
And can you find the magic number?

View File

@ -7,8 +7,7 @@ This lesson presents the basics for understanding the transfer of data between t
== Goals
The user should become familiar with the features of WebGoat by manipulating the above
buttons to view hints, show the HTTP request parameters, the HTTP request cookies, and the Java source code. You may also try using
link:https://www.zaproxy.org/[OWASP Zed Attack Proxy] for the first time.
buttons to view hints, show the HTTP request parameters, the HTTP request cookies, and the Java source code. You can use the default Developer Tools in your browser to view the HTTP request and response.
=== How HTTP works:

View File

@ -25,8 +25,8 @@
<div id="lessonContent">
<form accept-charset="UNKNOWN" method="POST" name="form"
th:action="@{/#attack/307/100}">
Enter Your Name: <input name="person" value="" type="TEXT"/><input
name="SUBMIT" value="Go!" type="SUBMIT"/>
Enter your name: <input name="person" value="" type="TEXT"/><input
name="SUBMIT" value="Go!" type="SUBMIT" class="spacing"/>
</form>
</div>
</form>
@ -71,7 +71,7 @@
<tr>
<td>What is the magic number:</td>
<td><input name="magic_answer" value="" type="TEXT" /><input
name="SUBMIT" value="Go!" type="SUBMIT" /></td>
name="SUBMIT" value="Go!" type="SUBMIT" class="spacing" /></td>
<td></td>
</tr>
</table>

View File

@ -3,10 +3,10 @@ http-basics.Go!=Go!
1.http-basics.title=HTTP Basics
http-basics.hints.http_basics_lesson.1=Type in your name and press 'go'
http-basics.hints.http_basic_quiz.1=Turn on Show Parameters or other features
http-basics.hints.http_basic_quiz.2=Try to intercept the request with <a href='https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project' title='Link to ZAP'>OWASP ZAP</a>
http-basics.hints.http_basics_lesson.1=Type in your name and press 'Go'
http-basics.hints.http_basic_quiz.1=You can use developer tools in your browser to inspect the HTML source
http-basics.hints.http_basic_quiz.2=Search for the form tag in the HTML source
http-basics.hints.http_basic_quiz.3=You can submit the form and examine the request payload in the developer tools.
http-basics.empty=Try again, name cannot be empty.
http-basics.reversed=The server has reversed your name: {0}

View File

@ -1436,3 +1436,7 @@ pre .conum {
b.conum * {
color: inherit !important
}
.spacing {
margin-left: 5px;
}