Desc: http://146.148.60.107:9991/在Post data中输入and 1=1 和and 1=2,勾选“Enable Post data”,单击“Execute”进行测验,如图5所示,成果无任何改变,阐明直接post提交无法绕过。
$ env x=‘() { :;}; echo vulnerable' bash -c "echo this is a test"The password for the next level is stored in a file called - located in the home directory });
general_log_file | /usr/local/mysql/data/S4b0rdeMacBook-Pro.log清楚方针主机上的日志记载。