webPromedium
Lab 53 — TeamPulse — SQL Injection via WebSocket Employee Lookup
hackadvisor
Task: TeamPulse HR platform with WebSocket-based employee lookup vulnerable to SQL injection via unparameterized employeeID field in SQLite. Solution: UNION-based SQLi through WebSocket to enumerate sqlite_master, discover system_config table, and extract the flag while ignoring decoy flags in HTML comments.
$ ls tags/ techniques/
sqlite_master_enumerationdecoy_flag_identificationcolumn_count_matchingwebsocket_sqliunion_based_injection
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][Pro]Lab 81 — InsightPulse — SQL Injection in Analytics Tracking— hackadvisor
- [web][Pro]Lab 226 — LiveDesk — SQL Injection via WebSocket Message Search— hackadvisor
- [web][Pro]Lab 69 — TeamPulse — Reflected XSS in OAuth2 Error Callback— hackadvisor
- [web][Pro]Lab 56 — DataPulse — XXE to SSRF via SVG Avatar Upload— hackadvisor
- [web][Pro]Lab 231 — PagePulse — XSS via Web Cache Poisoning— hackadvisor