From b50becdf686364302d9cf0bbfa8ccebdb43dc414 Mon Sep 17 00:00:00 2001 From: OPSXCQ Date: Mon, 2 Jan 2017 20:10:28 -0200 Subject: [PATCH] image fix --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 4c12dd3..40c1cb4 100644 --- a/README.md +++ b/README.md @@ -40,7 +40,7 @@ In the id field, add this query: %' and 1=0 union select null, concat(user,':',password) from users # -![sqli](sqli.png) +![sqli](https://github.com/opsxcq/docker-vulnerable-dvwa/blob/master/sqli.png?raw=true) There are several other ways and other vulnerabilities do exploit, go ahead, have fun !