From f1429d4f84956d0c90fd75065815f4158b0e9967 Mon Sep 17 00:00:00 2001 From: Karan Preet Singh Sasan Date: Sun, 3 Dec 2023 17:31:07 -0800 Subject: [PATCH] Adding reddit troubleshooting link for application (#463) --- README.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/README.md b/README.md index 369d04ed..a4a3d0cf 100644 --- a/README.md +++ b/README.md @@ -92,6 +92,10 @@ In case you are stuck with any of the steps or understanding anything related to 2. [Overview of Owasp-VulnerableApp - Blogspot post](https://hussaina-begum.blogspot.com/2020/10/an-extensible-vulnerable-application.html) 3. [Introduction to Owasp VulnerableApp by Kenji Nakajima](https://jpn.nec.com/cybersecurity/blog/220520/index.html) +### Troubleshooting references + +1. [Reddit exploiting SQL Injection Vulnerability](https://www.reddit.com/r/hacking/comments/11wtf17/owasp_vulnerableappfacade_sql_injection/) + ### Readme in other languages 1. [Russian](https://github.com/SasanLabs/VulnerableApp/tree/master/docs/i18n/ru/README.md)