Answer the question
In order to leave comments, you need to log in
How to understand that the CRLF vulnerability was successful?
Habr example: https://habr.com/ru/company/otus/blog/512226/
/index.php?page=home&%0d%0a127.0.0.1 - 08:15 - /index.php?page=home&restrictedaction =edit - make two requests in one, send. how to further understand that there is CRLF, is there some kind of response to the page or to the sniffer?
Answer the question
In order to leave comments, you need to log in
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question