webeasy

Login (easy)

spbctf

Task: Login form vulnerable to blind SQL injection. Solution: Time-based blind SQLi using SLEEP() function with binary search to extract admin password character by character.

$ ls tags/ techniques/
binary_search_extractiontime_based_blind_sqlisleep_injection

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]