webmedium
Ограничения (Restrictions)
hackerlab
Task: Web application with login/registration form where admin user already exists. Solution: SQL Truncation Attack using tab character to bypass trim() and VARCHAR length limit, creating a duplicate admin account with our password.
$ ls tags/ techniques/
authentication_bypasstrailing_whitespaceregistration_formsql_truncation_attackmysql_varcharphp_trim_bypasstab_characteradmin_impersonation
SQL Truncation Attack via VARCHAR length limitPHP trim() bypass using tab characterMySQL trailing whitespace removal exploitationAdmin account impersonation
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]