diff --git a/SUMMARY.md b/SUMMARY.md index 92a3f13..3ee959d 100644 --- a/SUMMARY.md +++ b/SUMMARY.md @@ -19,6 +19,6 @@ * [🔎 Recon Like a Boss](recon-strategies-by-other-hackers/recon-like-a-boss.md) * [🔎 Recon With Me](recon-strategies-by-other-hackers/recon-with-me.md) * [🔎 Simple Recon Methodology](recon-strategies-by-other-hackers/simple-recon-methodology.md) - * [SQL injection through HTTP headers](recon-strategies-by-other-hackers/sql-injection-through-http-headers.md) + * [🔎 SQL injection through HTTP headers](recon-strategies-by-other-hackers/sql-injection-through-http-headers.md) * [🎯 subdomain-enumeration](subdomain-enumeration/README.md) * [❌ xss](xss/README.md) diff --git a/recon-strategies-by-other-hackers/sql-injection-through-http-headers.md b/recon-strategies-by-other-hackers/sql-injection-through-http-headers.md index 83c9c79..1061552 100644 --- a/recon-strategies-by-other-hackers/sql-injection-through-http-headers.md +++ b/recon-strategies-by-other-hackers/sql-injection-through-http-headers.md @@ -1,4 +1,10 @@ -# SQL injection through HTTP headers +--- +description: >- + source: + https://resources.infosecinstitute.com/topics/application-security/sql-injection-http-headers/ +--- + +# 🔎 SQL injection through HTTP headers During vulnerability assessment or penetration testing, identifying the input vectors of the target application is a primordial step. Sometimes, when dealing with Web application testing, verification routines related to [SQL injection](https://www.infosecinstitute.com/skills/courses/sql-injection/?utm\_source=resources\&utm\_medium=infosec+network\&utm\_campaign=skills+pricing\&utm\_content=hyperlink) flaws discovery are restricted to the GET and POST variables as the unique inputs vectors ever.