diff --git a/src/generic-methodologies-and-resources/python/README.md b/src/generic-methodologies-and-resources/python/README.md index a7190d625..1e847c2d3 100644 --- a/src/generic-methodologies-and-resources/python/README.md +++ b/src/generic-methodologies-and-resources/python/README.md @@ -5,8 +5,8 @@ **チェックする興味深いページ:** - [**Pyscript hacking tricks**](pyscript.md) -- [**Python deserializations**](../../pentesting-web/deserialization/index.html#python) -- [**Tricks to bypass python sandboxes**](bypass-python-sandboxes/index.html) +- [**Python deserializations**](../../pentesting-web/deserialization/README.md) +- [**Tricks to bypass python sandboxes**](bypass-python-sandboxes/README.md) - [**Basic python web requests syntax**](web-requests.md) - [**Basic python syntax and libraries**](basic-python.md) diff --git a/src/network-services-pentesting/pentesting-web/python.md b/src/network-services-pentesting/pentesting-web/python.md index f0269b033..0cb24c3a7 100644 --- a/src/network-services-pentesting/pentesting-web/python.md +++ b/src/network-services-pentesting/pentesting-web/python.md @@ -4,22 +4,22 @@ ## Pythonを使用したサーバー -関数 _str()_ を使用して、可能な **コード実行** をテストします: +可能な**コード実行**をテストするには、関数 _str()_ を使用します: ```python "+str(True)+" #If the string True is printed, then it is vulnerable ``` -### トリック +### Tricks {{#ref}} -../../generic-methodologies-and-resources/python/bypass-python-sandboxes/ +../../generic-methodologies-and-resources/python/bypass-python-sandboxes/README.md {{#endref}} {{#ref}} -../../pentesting-web/ssti-server-side-template-injection/ +../../pentesting-web/ssti-server-side-template-injection/README.md {{#endref}} {{#ref}} -../../pentesting-web/deserialization/ +../../pentesting-web/deserialization/README.md {{#endref}} {{#include ../../banners/hacktricks-training.md}}