webhard

Nova Arts

hackerlab

Task: exploit a Flask web app with a TrackingId cookie vulnerable to blind SQL injection against SQLite. Solution: use CASE WHEN with LOAD_EXTENSION as error oracle (X-Theme header change), binary search extraction of admin credentials via cookie injection, then login to /admin.

$ ls tags/ techniques/
binary_search_extractionblind_sqli_cookiesqlite_load_extension_oracleparallel_extraction

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]