Forum Discussion
1 Reply
Sort By
- natheCirrocumulus
Wasfi, in the GUI if you go to the Attack Signatures list you can filter on Request and Response signatures. This should highlight examples in the database. They are normally in place to block information leakage, such as error messages returned from the backend to the client (browser) revealing information of the backend technologies, such as a SQL database.
Hope this helps,
N