GITBOOK-74: change request with no subject merged in GitBook

This commit is contained in:
Xalgord 2023-08-15 07:07:47 +00:00 committed by gitbook-bot
parent 67e35f6c14
commit f744fea5a6
No known key found for this signature in database
GPG key ID: 07D2180C7B12D0FF
2 changed files with 8 additions and 2 deletions

View file

@ -19,6 +19,6 @@
* [🔎 Recon Like a Boss](recon-strategies-by-other-hackers/recon-like-a-boss.md)
* [🔎 Recon With Me](recon-strategies-by-other-hackers/recon-with-me.md)
* [🔎 Simple Recon Methodology](recon-strategies-by-other-hackers/simple-recon-methodology.md)
* [SQL injection through HTTP headers](recon-strategies-by-other-hackers/sql-injection-through-http-headers.md)
* [🔎 SQL injection through HTTP headers](recon-strategies-by-other-hackers/sql-injection-through-http-headers.md)
* [🎯 subdomain-enumeration](subdomain-enumeration/README.md)
* [❌ xss](xss/README.md)

View file

@ -1,4 +1,10 @@
# SQL injection through HTTP headers
---
description: >-
source:
https://resources.infosecinstitute.com/topics/application-security/sql-injection-http-headers/
---
# 🔎 SQL injection through HTTP headers
During vulnerability assessment or penetration testing, identifying the input vectors of the target application is a primordial step. Sometimes, when dealing with Web application testing, verification routines related to [SQL injection](https://www.infosecinstitute.com/skills/courses/sql-injection/?utm\_source=resources\&utm\_medium=infosec+network\&utm\_campaign=skills+pricing\&utm\_content=hyperlink) flaws discovery are restricted to the GET and POST variables as the unique inputs vectors ever.