A web challenge! For 100 points, we we’re asked to log in as admin
.
Pointing a browser to the challenge site gave us the option to login, or register. I decided to register testz0r:testz0r
and logged in. The login then asked me to login as admin. Well, I had no password for admin. I went back to the register page, thinking there was a SQLi there. That might allow me to inject into the INSERT INTO statement and update the admin’s password. Alas, no dice.
I again fired up curl
and tried to get some SQLi going on the login form.
1 2 3 4 5 6 7 8 9 10 11 |
|
After messing around for a while, I remembered that sometimes, keywords like OR
and AND
are filtered. I tried to substitute OR
for ||
and whadda-ya-know:
1 2 3 4 5 6 7 8 9 10 11 |
|
Done! One filter bypass was all it took.