webeasy

Basic Authorization

hackerlab

Task: a minimal Werkzeug login form sends GET parameters to /user and reveals different responses for valid and invalid users. Solution: use double-quote SQL injection in login to bypass authentication, then extract the admin password with UNION SELECT and log in as admin.

$ ls tags/ techniques/
union_based_sqlidouble_quote_sqliadmin_credential_extractionauthentication_bypass

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub to get started.

$ssh [email protected]