webeasy

Dead or alive 2

spbctf

Task: SQL injection bypass challenge where addslashes() is used for input escaping. Solution: Bypass addslashes() protection using MySQL hex encoding (0x...) for string literals instead of quoted strings.

$ ls tags/ techniques/
addslashes_bypass_hex

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]