webmedium

level31

spbctf

Task: extract a base64-encoded flag from a web app with LIKE/REGEXP SQL injection. Solution: escape the LIKE/REGEXP context, use UNION SELECT to extract the encoded flag, then base64-decode it.

$ ls tags/ techniques/
union_based_sqlibase64_decodinglike_regexp_injection

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]