webeasy
level26
spbctf
Task: SQL injection challenge where the injection point is hidden in the User-Agent HTTP header. Solution: Use sqlmap with --headers option or manual curl injection via User-Agent to extract data from the database.
$ ls tags/ techniques/
header_based_sqliuser_agent_injection
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]