# Introduction.
: BWAPP → Low → HTML Injection - reflected (GET)
# Training.
This 'html_get.php' is a page that prints the user's input value as follows.

And If you check the URL, you can see that the input value and variable name are exposed in the URL. Because it is the GET method.

In order to test the input items, I inserted HTML tags in the First name and Last name.
- <h1> Success</h1>
- <img src=http://192.168.10.119/bWAPP/images/bee_1.png>

The input result is as follows.


No comments:
Post a Comment