webPromedium

Lab 82 — PixelVault — SQL Injection via User-Agent in Activity Logging

hackadvisor

Task: Photo management platform with activity logging that stores User-Agent header directly in MariaDB via non-parameterized INSERT. Decoy flags in HTML comments mislead scanners. Solution: Time-based blind SQL injection via User-Agent header during login, using IF(condition, SLEEP(), NULL) in the datetime column of the INSERT statement, binary search extraction of flag from app_secrets table.

$ ls tags/ techniques/
binary_search_extractiontime_based_blind_sqlisqli_via_user_agent_headerdecoy_flag_avoidanceinsert_statement_injection

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups