From f7c8a271aa5309b3c990975c89e5b5312072690b Mon Sep 17 00:00:00 2001 From: Nanne Baars Date: Mon, 9 Sep 2019 13:55:24 +0200 Subject: [PATCH] Fixed small typos --- .../lessonPlans/en/SqlInjection_introduction_content8.adoc | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/webgoat-lessons/sql-injection/src/main/resources/lessonPlans/en/SqlInjection_introduction_content8.adoc b/webgoat-lessons/sql-injection/src/main/resources/lessonPlans/en/SqlInjection_introduction_content8.adoc index a9be7fce0..4ae9d690c 100644 --- a/webgoat-lessons/sql-injection/src/main/resources/lessonPlans/en/SqlInjection_introduction_content8.adoc +++ b/webgoat-lessons/sql-injection/src/main/resources/lessonPlans/en/SqlInjection_introduction_content8.adoc @@ -1,6 +1,6 @@ == Compromising confidentiality with String SQL injection -If a system is vulnerable to SQL injections, aspets of that system's CIA triad can be easily compromoised _(if you are unfamiliar with the CIA triad, check out the CIA triad lesson in the general category)_. -In the following three lessons you will learn how to compromise each aspect of the CIA triad using teachniques like _SQL string injections_ or _query chaining_. +If a system is vulnerable to SQL injections, aspects of that system's CIA triad can be easily compromised _(if you are unfamiliar with the CIA triad, check out the CIA triad lesson in the general category)_. +In the following three lessons you will learn how to compromise each aspect of the CIA triad using techniques like _SQL string injections_ or _query chaining_. In this lesson we will look at *confidentiality*. Confidentiality can be easily compromised by an attacker using SQL injection to read sensitive data like credit card numbers from a database.