Minor changes to missing internationalization text and startup scripts. Removed internationalization choices for lessons that don't support it
git-svn-id: http://webgoat.googlecode.com/svn/trunk/webgoat@411 4033779f-a91e-0410-96ef-6bf7bf53c507
This commit is contained in:
@ -5,7 +5,6 @@ SolutionVideos=Solution Videos
|
||||
ErrorGenerating=Error generating
|
||||
InvalidData=Invalid Data
|
||||
|
||||
|
||||
#HttpBasics.java
|
||||
EnterYourName=Enter your Name
|
||||
Go!=Go!
|
||||
@ -68,9 +67,6 @@ RemoteAdminFlawHint5=On success you will see new submenu items in the menupoint
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
#PathBasedAccessControl.java
|
||||
CurrentDirectory=Current Directory is:
|
||||
ChooseFileToView=Choose the file to view:
|
||||
@ -99,8 +95,6 @@ PathBasedAccessControlHint3=Try .. in the path
|
||||
PathBasedAccessControlHint4=Try ..\\..\\..\\LICENSE
|
||||
|
||||
|
||||
|
||||
|
||||
#CommandInjection.java
|
||||
Command=Command
|
||||
CommandInjectionRightTrack1=It appears that you are on the right track. Commands that may compromise the operating system have been disabled. The following commands are allowed: netstat -a, dir, ls, ifconfig, and ipconfig.
|
||||
@ -117,18 +111,15 @@ CommandInjectionHint4=Note that the server may enclose the submitted file name w
|
||||
|
||||
|
||||
#NumericSqlInjection.java
|
||||
NumericSqlInjectionSecondStage=Bet you can't do it again! This lesson has detected your successfull attack and has now switched to a defensive mode. Try again to attack a parameterized query.
|
||||
NumericSqlInjectionSecondStage=Bet you can't do it again! This lesson has detected your successful attack and has now switched to a defensive mode. Try again to attack a parameterized query.
|
||||
NoResultsMatched=No results matched. Try Again.
|
||||
NumericSqlInjectionSecondStage2=Now that you have successfully performed an SQL injection, try the same type of attack on a parameterized query.
|
||||
ErrorParsingAsNumber=Error parsing station as a number:
|
||||
SelectYourStation=Select your local weather station:
|
||||
|
||||
SqlNumericInjectionHint1=The application is taking the input from the select box and inserts it at the end of a pre-formed SQL command.
|
||||
SqlNumericInjectionHint2=This is the code for the query being built and issued by WebGoat:<br><br>"SELECT * FROM weather_data WHERE station = " + station
|
||||
SqlNumericInjectionHint3=Compound SQL statements can be made by joining multiple tests with keywords like AND and OR. Try appending a SQL statement that always resolves to true.
|
||||
SqlNumericInjectionHint4=Try to intercept the post request with WebScarab and replace the station with [ 101 OR 1 = 1 ].
|
||||
|
||||
|
||||
|
||||
|
||||
#StringSqlInjection.java
|
||||
@ -140,12 +131,7 @@ SqlStringInjectionHint2=This is the code for the query being built and issued by
|
||||
SqlStringInjectionHint3=Compound SQL statements can be made by joining multiple tests with keywords like AND and OR. Try appending a SQL statement that always resolves to true
|
||||
SqlStringInjectionHint4=Try entering [ smith' OR '1' = '1 ].
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
#LogSpoofing.java
|
||||
LoginFailedForUserName=Login failed for username
|
||||
LoginSucceededForUserName=LOGIN SUCCEEDED FOR USERNAME
|
||||
|
@ -23,6 +23,7 @@ BasicAuthenticationAlmostThere2= Header manipuliert aber Sie sind immernoch als
|
||||
BasicAuthenticationAlmostThere3= eingeloggt. Schauen Sie sich den Request an nachdem Sie die 'basic' Authentisierungsdaten eingetippt haben und die Anfrage abgeschickt haben. Halten Sie sich die Reihenfolge der Ereignisse die bei Basic Authentication eintreten vor Augen.
|
||||
BasicAuthenticationReallyClose=Sie sind sehr nahe dran! Durch das <20>ndern des Session Cookie haben Sie den Server dazu gebracht eine neue Session f<>r Sie zu erstellen. Dies hat sie allerdings nicht re-authentisiert. Wenn Sie herausgefunden haben wie Sie den Server dazu zwingen k<>nnen Sie zu re-authentisieren dann authentisieren Sie sich als:<br><br> user name: basic<br> password: basic<br>
|
||||
BasicAuthenticationUseTheHints=Benutzen Sie die Hinweise! Einen nach dem anderen...
|
||||
|
||||
BasicAuthenticationHint1=Basic authentication uses a cookie to pass the credentials. Use a proxy to intercept the request. Look at the cookies.
|
||||
|
||||
BasicAuthenticationHint2=Basic authentication uses Base64 encoding to 'scramble' the " + "user's login credentials.
|
||||
@ -36,7 +37,6 @@ BasicAuthenticationHint8=If the session is invalid and the basic authentication
|
||||
BasicAuthenticationHint9=Intercept the request and corrupt the JSESSIONID and the Authorization header.
|
||||
|
||||
|
||||
|
||||
#WeakAuthenticationCookie.java
|
||||
InvalidCookie=Ung<EFBFBD>ltiger Cookie!
|
||||
IdentityRemembered=Ihre Identit<69>t wurde abgespeichert
|
||||
@ -89,7 +89,6 @@ File=Datei:
|
||||
Dir=Verzeichnis:
|
||||
IsFile= - isFile() (ist eine Datei):
|
||||
Exists= - exists() (existiert):
|
||||
|
||||
PathBasedAccessControlHint1=Most operating systems allow special characters in the path.
|
||||
PathBasedAccessControlHint2=Use a file explorer to find the tomcat\\webapps\\WebGoat\\lesson_plans directory");
|
||||
PathBasedAccessControlHint3=Try .. in the path
|
||||
@ -112,9 +111,9 @@ CommandInjectionHint4=Note that the server may enclose the submitted file name w
|
||||
|
||||
|
||||
#NumericSqlInjection.java
|
||||
SecondStage=Ich wette das k<>nnen Sie nicht wiederholen. Diese Lektion hat nun in einen defensiven Modus gewechselt. Versuchen Sie nun eine parametrisierte Anfrage anzugreifen.
|
||||
NumericSqlInjectionSecondStage=Ich wette das k<>nnen Sie nicht wiederholen. Diese Lektion hat nun in einen defensiven Modus gewechselt. Versuchen Sie nun eine parametrisierte Anfrage anzugreifen.
|
||||
NoResultsMatched=Keine Resultate gefunden. Versuchen Sie es erneut.
|
||||
SecondStage2=Da sie nun erfolgreich eine SQL Injection durchgef<65>hrt haben, versuchen Sie denselben Typ von Angriff auf eine parametrisierte Anfrage.
|
||||
NumericSqlInjectionSecondStage2=Da sie nun erfolgreich eine SQL Injection durchgef<65>hrt haben, versuchen Sie denselben Typ von Angriff auf eine parametrisierte Anfrage.
|
||||
ErrorParsingAsNumber=Fehler beim interpretieren der Wetterstationsnummer als Zahl:
|
||||
SelectYourStation=W<EFBFBD>hlen Sie Ihre lokale Wetterstation aus:
|
||||
SqlNumericInjectionHint1=The application is taking the input from the select box and inserts it at the end of a pre-formed SQL command.
|
||||
@ -155,7 +154,6 @@ MessageList=Nachrichtenliste
|
||||
CouldNotAddMessage=Could not add message to database
|
||||
ErroGeneratingMessageList=Error while getting message list.
|
||||
|
||||
|
||||
#ReflectedXSS.java
|
||||
ReflectedXSSWhoops1=Ups! Sie haben
|
||||
ReflectedXSSWhoops2= anstatt des drei stelligen Codes eingegeben. Bitte versuchen Sie es erneut.
|
||||
|
Reference in New Issue
Block a user