diff --git a/SQL injection/README.md b/SQL injection/README.md index d72fae4e..80f6cc19 100644 --- a/SQL injection/README.md +++ b/SQL injection/README.md @@ -15,7 +15,7 @@ A SQL injection attack consists of insertion or "injection" of a SQL query via t * [SQL injection using SQLmap](#sql-injection-using-sqlmap) * [Authentication bypass](#authentication-bypass) * [Polyglot injection](#polyglot-injection-multicontext) -* [Second order injection](#second-order-injection) +* [Routed injection](#routed-injection) * [Insert Statement - ON DUPLICATE KEY UPDATE](#insert-statement---on-duplicate-key-update) * [WAF Bypass](#waf-bypass) @@ -467,4 +467,4 @@ mysql> mysql> select version(); * [Analyzing CVE-2018-6376 – Joomla!, Second Order SQL Injection](https://www.notsosecure.com/analyzing-cve-2018-6376/) * [Exploiting Second Order SQLi Flaws by using Burp & Custom Sqlmap Tamper](https://pentest.blog/exploiting-second-order-sqli-flaws-by-using-burp-custom-sqlmap-tamper/) * Sqlmap: - * [#SQLmap protip @zh4ck](https://twitter.com/zh4ck/status/972441560875970560) \ No newline at end of file + * [#SQLmap protip @zh4ck](https://twitter.com/zh4ck/status/972441560875970560)