Inj3ction Time
100 points Hard

I stumbled upon this website: http://web.ctflearn.com/web8/ and I think they have the flag in their somewhere. UNION might be a helpful command

Flag
Rating 4.71
5
4
3
2
1

Discussion

BBBBBBBBOOOOOOOOOOOTTTTTTTTTTTTTAAAAAAAAAAKKKKKKKKKK!!!!!!!!!!!!

0

now it would actually be hard if you didn't give away the part that requires thinking, which is to use UNION and ORDER BY

0

thats really good practice but its med level , some hints for starters : 1- check first what is url looks like before and after send data so you can know about filtering . 2- union is 1st step for any sqli, so read more about it . 3- after that you can see clearly how you can write your injection queries without blocking filters . 4- now , what you looking for is two things mainly : () - tables () - coulmns , after all that => you will find the REAL flag .

0

I'm confused. I tried the commands shown in the comments but nothing returned. Has this challenge changed since the comments were posted?

-1

i used sqlmap , used the opportunity to learn about sqlmap

0

Should be considered an easy injection question, solvable without using any tool with just manual trial and error in a cpl minutes. Now it would actually be hard if you didn't give away the part that requires thinking, which is to use UNION and ORDER BY

-1

I swear i knew sql for sqli like 2 months ago and i just forgot most of it ☠️

4

Needs basic understanding of union and order in sql injection perspective.

0

A beautiful concept explained here, as it focuses on SQLi using UNION.

0

Is it by design that https://web.ctflearn.com/web8/fade.js is missing and returns 404 when browser tries to load it?

0

This was really quick but fun. The hint gave it away instantly for me

1

Hello,

I have a doubt.

when given an id, it returns 3 text values (name,breed and color). When I try the payload (id=1+union+select+'a','b','c','d') why is it returning nothing.

because since when an id is given it is returning text values the result from the union operation should be text values or union query will fail.

but when I use the below payload it is working fine. id=1+union+select+1,2,3,4

the above query should cause error and should not give any results. But the app is returning 1,2,3 values on to the website.

What is happening here? Could anyone explain me?

Thanks

inplace of 1 in id=1+union+select+1,2,3,4 I have used 'a'. SO the query now is

id=1+union+select+'a',2,3,4. <---- This is returning 0 results.

But when I use below query it is returning table names.

id=1+union+select+table_name,2,3,4 from information_schema.tables <---- returns table names

No idea why. Could someone please explain?

THanks

0