提交 3ef0c0b5 编写于 作者: W wizardforcel

fix

上级 568f878a
......@@ -159,7 +159,7 @@ insert into sqlinj values (1, "item: 1");
之后我们将以下内容保存为`sql.php`
```php
<form method="POST" target="./sql.php">
<form method="POST" action="./sql.php">
ID:
<input type="text" name="id" />
<input type="submit" value="查询" />
......
......@@ -38,7 +38,7 @@ s123456 nihao123 caonima123 zxcvbnm123 wang123 159357 1A2B3C4D asdasd123 584520
比如说,我们使用这样一段代码来演示弱口令漏洞,它模拟了某个系统的后台。(课件里没有这个代码,这是我还原出来的)
```php
<form method="POST" target="./lesspass.php">
<form method="POST" action="./lesspass.php">
<input type="text" name="un" />
<input type="password" name="pw" />
<input type="submit" value="登录" />
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册