- Web Penetration Testing with Kali Linux(Third Edition)
- Gilberto Najera Gutierrez Juned Ahmed Ansari
- 92字
- 2021-06-24 18:44:52
The POST method
The POST method is similar to the GET method. It is used to retrieve data from the server, but it passes the content via the body of the request. Since the data is now passed in the body of the request, it becomes more difficult for an attacker to detect and attack the underlying operation. As shown in the following POST request, the username (login) and password (pwd) are not sent in the URL but rather in the body, which is separated from the header by a blank line:

推薦閱讀
- 白話區塊鏈
- 玩到極致 iPhone 4S完全攻略
- 精解Windows8
- 循序漸進學Docker
- 高性能Linux服務器構建實戰:系統安全、故障排查、自動化運維與集群架構
- RHCSARHCE 紅帽Linux認證學習指南(第7版)EX200 & EX300
- Python UNIX和Linux系統管理指南
- Windows 10從新手到高手
- Heroku Cloud Application Development
- OpenVZ Essentials
- 應急指揮信息系統設計
- 鴻蒙HarmonyOS應用開發從入門到精通
- 電腦辦公(Windows 7 + Office 2013)入門與提高
- 分布式實時處理系統:原理、架構與實現
- Windows10開發入門經典