SQLI
Last updated
Last updated
Given a basic login form with username and password required. Since those credentials were not provided, it's time for SQLI. There are many ways to bypass this login form
4turkr34tif24{F1R5T_5T3P_PR0_SQLi}
Given was a flight tracking website. User need to enter their tracking number in the form.
To validate whether the database using sql or not, put any sql syntax in that form and it will displayed an error or warning.
This challenge is different than the one before. The idea here is to drop the database instead of bypassing the credential checking.
Search for table count using the 'null's. If it hits, it will drop the database
Now, the database is present. Look for the suitable table and column.
To look for the column, use this.
Now that the right column and table are identified, just craft the right syntax
4turkr34tif24{h4v354f370urn3y}
For Level 1, there's many payload to bypass this since it filters OR
Level 2 filters OR, AND, LIKE, --, =
Use the payload to bypass it.
Level 3 filters OR, AND, LIKE, --, =, <, >
Again, just need to comment out the rest of the code.
Level 4 filters OR, AND, LIKE, --, =, <, >, UNION, ADMIN
The only way to input 'admin' without input 'admin' is to seperate the word.
Flag: 4turkr34tif24{H4141_1NJ3c710N_!??}