webProhard
Dosie X (Dossier X)
hackerlab
Task: Exploit a Flask web application with user registration to retrieve admin credentials. Solution: Inject SQL via the unvalidated "about" field during registration using SQLite string concatenation, enumerate the database schema, extract the admin MD5 password hash, crack it with John the Ripper, and log in as admin.
$ ls tags/ techniques/
sql_injectiondatabase_enumerationmd5_cracking
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][Pro]QuickBite — SSTI via Registration Name Field— hackadvisor
- [web][Pro]Состояние 0x7F— hackerlab
- [web][Pro]Nova Arts— hackerlab
- [web][free]Guild— hackthebox
- [web][Pro]Bug Bounty-code— hackerlab