Bugfix link writeup ECW
parent
7940dacb88
commit
e4a6aeda85
|
@ -4,10 +4,10 @@ title: ECW CTF - Web Writeups
|
|||
---
|
||||
|
||||
Prequals online
|
||||
- [Web 50 - Hall of Fame](#web-50---hall-of-fame)
|
||||
- [Web 100 - Pass Through](#web-100---pass-through)
|
||||
- [Web 150 - GoldFish](#web-150---goldfish)
|
||||
- [Web 175 - Magic Car](#web-175---magic-car)
|
||||
- [Web 50 - Hall of Fame](ECW-CTF/#web-50---hall-of-fame)
|
||||
- [Web 100 - Pass Through](ECW-CTF/#web-100---pass-through)
|
||||
- [Web 150 - GoldFish](ECW-CTF/#web-150---goldfish)
|
||||
- [Web 175 - Magic Car](ECW-CTF/#web-175---magic-car)
|
||||
|
||||
## Web 50 - Hall of Fame
|
||||
This challenge was a basic SQL injection, let's follow our [methodology](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/SQL injection/MySQL Injection.md) and extract the informations in the database. First we need to extract the columns number of the current "SELECT column1, column2 FROM ..."
|
||||
|
|
Loading…
Reference in New Issue