Minor changes to missing internationalization text and startup scripts. Removed internationalization choices for lessons that don't support it
git-svn-id: http://webgoat.googlecode.com/svn/trunk/webgoat@411 4033779f-a91e-0410-96ef-6bf7bf53c507
This commit is contained in:
@ -5,7 +5,6 @@ SolutionVideos=Solution Videos
|
||||
ErrorGenerating=Error generating
|
||||
InvalidData=Invalid Data
|
||||
|
||||
|
||||
#HttpBasics.java
|
||||
EnterYourName=Enter your Name
|
||||
Go!=Go!
|
||||
@ -68,9 +67,6 @@ RemoteAdminFlawHint5=On success you will see new submenu items in the menupoint
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
#PathBasedAccessControl.java
|
||||
CurrentDirectory=Current Directory is:
|
||||
ChooseFileToView=Choose the file to view:
|
||||
@ -99,8 +95,6 @@ PathBasedAccessControlHint3=Try .. in the path
|
||||
PathBasedAccessControlHint4=Try ..\\..\\..\\LICENSE
|
||||
|
||||
|
||||
|
||||
|
||||
#CommandInjection.java
|
||||
Command=Command
|
||||
CommandInjectionRightTrack1=It appears that you are on the right track. Commands that may compromise the operating system have been disabled. The following commands are allowed: netstat -a, dir, ls, ifconfig, and ipconfig.
|
||||
@ -117,18 +111,15 @@ CommandInjectionHint4=Note that the server may enclose the submitted file name w
|
||||
|
||||
|
||||
#NumericSqlInjection.java
|
||||
NumericSqlInjectionSecondStage=Bet you can't do it again! This lesson has detected your successfull attack and has now switched to a defensive mode. Try again to attack a parameterized query.
|
||||
NumericSqlInjectionSecondStage=Bet you can't do it again! This lesson has detected your successful attack and has now switched to a defensive mode. Try again to attack a parameterized query.
|
||||
NoResultsMatched=No results matched. Try Again.
|
||||
NumericSqlInjectionSecondStage2=Now that you have successfully performed an SQL injection, try the same type of attack on a parameterized query.
|
||||
ErrorParsingAsNumber=Error parsing station as a number:
|
||||
SelectYourStation=Select your local weather station:
|
||||
|
||||
SqlNumericInjectionHint1=The application is taking the input from the select box and inserts it at the end of a pre-formed SQL command.
|
||||
SqlNumericInjectionHint2=This is the code for the query being built and issued by WebGoat:<br><br>"SELECT * FROM weather_data WHERE station = " + station
|
||||
SqlNumericInjectionHint3=Compound SQL statements can be made by joining multiple tests with keywords like AND and OR. Try appending a SQL statement that always resolves to true.
|
||||
SqlNumericInjectionHint4=Try to intercept the post request with WebScarab and replace the station with [ 101 OR 1 = 1 ].
|
||||
|
||||
|
||||
|
||||
|
||||
#StringSqlInjection.java
|
||||
@ -140,12 +131,7 @@ SqlStringInjectionHint2=This is the code for the query being built and issued by
|
||||
SqlStringInjectionHint3=Compound SQL statements can be made by joining multiple tests with keywords like AND and OR. Try appending a SQL statement that always resolves to true
|
||||
SqlStringInjectionHint4=Try entering [ smith' OR '1' = '1 ].
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
#LogSpoofing.java
|
||||
LoginFailedForUserName=Login failed for username
|
||||
LoginSucceededForUserName=LOGIN SUCCEEDED FOR USERNAME
|
||||
|
Reference in New Issue
Block a user