We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent be80211 commit f283279Copy full SHA for f283279
README.md
@@ -1,12 +1,12 @@
1
-# Hands-on Express SQLi
+# SQL injection with Express and sqlite
2
3
This application is a demonstration prototype just to show how to perform SQLi attack.
4
5
## Setting-up
6
7
### Deploy on heroku
8
9
-[](https://heroku.com/deploy?template=https://github.com/0xdbe/Hands-on-Express-SQLi)
+[](https://heroku.com/deploy?template=https://github.com/0xdbe-appsec/sqli-express-sqlite)
10
11
### Deploy on your host
12
@@ -50,4 +50,8 @@ Open http://localhost:3000/ and log in with:
50
SELECT name FROM user where username = 'admin' --' and password = 'a'
51
```
52
53
-You are now log in as "Admin",
+You are now log in as "Admin"
54
+
55
+### Fix it
56
57
+use prepared statement
0 commit comments