Bugfix link writeup ECW

pull/1/head
Swissky 2017-11-07 15:13:59 +01:00
parent 7940dacb88
commit e4a6aeda85
1 changed files with 4 additions and 4 deletions

View File

@ -4,10 +4,10 @@ title: ECW CTF - Web Writeups
---
Prequals online
- [Web 50 - Hall of Fame](#web-50---hall-of-fame)
- [Web 100 - Pass Through](#web-100---pass-through)
- [Web 150 - GoldFish](#web-150---goldfish)
- [Web 175 - Magic Car](#web-175---magic-car)
- [Web 50 - Hall of Fame](ECW-CTF/#web-50---hall-of-fame)
- [Web 100 - Pass Through](ECW-CTF/#web-100---pass-through)
- [Web 150 - GoldFish](ECW-CTF/#web-150---goldfish)
- [Web 175 - Magic Car](ECW-CTF/#web-175---magic-car)
## Web 50 - Hall of Fame
This challenge was a basic SQL injection, let's follow our [methodology](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/SQL injection/MySQL Injection.md) and extract the informations in the database. First we need to extract the columns number of the current "SELECT column1, column2 FROM ..."