webeasy
Basic Authorization
hackerlab
Task: a minimal Werkzeug login form sends GET parameters to /user and reveals different responses for valid and invalid users. Solution: use double-quote SQL injection in login to bypass authentication, then extract the admin password with UNION SELECT and log in as admin.
$ ls tags/ techniques/
union_based_sqlidouble_quote_sqliadmin_credential_extractionauthentication_bypass
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub to get started.
$ssh [email protected]