From 77d988f9201336da4f4735f99c40cccc7c84d561 Mon Sep 17 00:00:00 2001 From: Miroslav Stampar Date: Thu, 9 May 2024 15:56:57 +0200 Subject: [PATCH] Fixes #2478 --- Introduction.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Introduction.md b/Introduction.md index 1cc37da4e..1f6532053 100644 --- a/Introduction.md +++ b/Introduction.md @@ -40,7 +40,7 @@ sqlmap can automate the process of identifying and exploiting this type of vulne ...and depending on supplied options, it will enumerate data or takeover the database server entirely. -There exist many [resources](https://del.icio.us/inquis/sqlinjection) on the web explaining in depth how to detect, exploit and prevent SQL injection vulnerabilities in web applications. It is recommendeded that you read them before going much further with sqlmap. +There exist many resources on the web explaining in depth how to detect, exploit and prevent SQL injection vulnerabilities in web applications. It is recommended that you read them before going much further with sqlmap. ## Direct connection to the database management system Up until sqlmap version **0.8**, the tool has been **yet another SQL injection tool**, used by web application penetration testers/newbies/curious teens/computer addicted/punks and so on. Things move on