From 5ec8394dbf7ad3b5cb27a5f0b1f1bece2b0a650b Mon Sep 17 00:00:00 2001 From: Miroslav Stampar Date: Thu, 13 Apr 2017 10:14:33 +0200 Subject: [PATCH] Fixes #2478 --- Introduction.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Introduction.md b/Introduction.md index 6df287f82..1cc37da4e 100644 --- a/Introduction.md +++ b/Introduction.md @@ -40,7 +40,7 @@ sqlmap can automate the process of identifying and exploiting this type of vulne ...and depending on supplied options, it will enumerate data or takeover the database server entirely. -There exist many [resources](http://delicious.com/inquis/sqlinjection) on the web explaining in depth how to detect, exploit and prevent SQL injection vulnerabilities in web applications. It is recommendeded that you read them before going much further with sqlmap. +There exist many [resources](https://del.icio.us/inquis/sqlinjection) on the web explaining in depth how to detect, exploit and prevent SQL injection vulnerabilities in web applications. It is recommendeded that you read them before going much further with sqlmap. ## Direct connection to the database management system Up until sqlmap version **0.8**, the tool has been **yet another SQL injection tool**, used by web application penetration testers/newbies/curious teens/computer addicted/punks and so on. Things move on