webmedium
level31
spbctf
Task: extract a base64-encoded flag from a web app with LIKE/REGEXP SQL injection. Solution: escape the LIKE/REGEXP context, use UNION SELECT to extract the encoded flag, then base64-decode it.
$ ls tags/ techniques/
union_based_sqlibase64_decodinglike_regexp_injection
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]