ctf-writeup/CTF After Dark - Winter 2023/Bank
Muhammad Daffa a1e03a758b feat: added picoCTF 2023-04-01 16:50:03 +07:00
..
images feat: added CTF After Dark - Winter 2023 2023-03-09 22:43:49 +07:00
README.md feat: added picoCTF 2023-04-01 16:50:03 +07:00

README.md

Bank

This is a bank. I hate php very much. Here

About the Challenge

In the website there is a login form like this

preview

How to Solve?

This is SQL injection chall and we need to get the flag from the database, luckily the website showing us the query and the result on the website. For example I inputted test/test as the username and the password

input

And we know the flag was located on flags table and in that table there are 2 columns. flag and value So we can input the payload like this

Username: ' union select group_concat(flag, value),2,3 from flags-- -
Password: 

Because there is a filter on the select keyword, we can bypass that filter by using selselectect. And then read the flag on flags table. This is the final payload.

' union sselectelect group_concat(flag, value),2,3 from flags-- -

flag

flag{3min3m_kind@_wa$hed}