diff --git a/docs/class2/lab2.rst b/docs/class2/lab2.rst index 51e70c48..dbf505ee 100644 --- a/docs/class2/lab2.rst +++ b/docs/class2/lab2.rst @@ -91,7 +91,7 @@ Cloud Console. .. code:: BASH - curl 'http://.lab-sec.f5demos.com' --user-agent 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.2.1 Safari/605.1.15' + curl http://.lab-sec.f5demos.com --user-agent "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.2.1 Safari/605.1.15" This HTTP request will not show up in the Security Analytics however you will find it in Request logging. @@ -142,7 +142,7 @@ and understand its implementation. .. code:: BASH - curl -v 'http://.lab-sec.f5demos.com/auth.php' -H 'Content-Type: application/x-www-form-urlencoded' --user-agent 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.2.1 Safari/605.1.15' --data-raw 'identity=user%40f5.com&token=password&submit=Submit' + curl -v http://.lab-sec.f5demos.com/auth.php -H "Content-Type: application/x-www-form-urlencoded" --user-agent "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.2.1 Safari/605.1.15" --data-raw "identity=user%40f5.com&token=password&submit=Submit" For this application, a successful logon will have a 302 response to the location ./data.php?page=data @@ -243,7 +243,7 @@ and understand its implementation. .. code:: BASH - curl -v 'http://.lab-sec.f5demos.com/auth.php' -H 'Content-Type: application/x-www-form-urlencoded' --user-agent 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.2.1 Safari/605.1.15' --data-raw 'identity=user%40f5.com&token=password&submit=Submit' + curl -v http://.lab-sec.f5demos.com/auth.php -H "Content-Type: application/x-www-form-urlencoded" --user-agent "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.2.1 Safari/605.1.15" --data-raw "identity=user%40f5.com&token=password&submit=Submit" As you can see, instead of signaling to a potential attacker that they have a good or bad password, we have prevented the would-be attacker from