DarkPanda Posted March 2, 2014 Report Posted March 2, 2014 (edited) Link: travispeed.eu/s2/login.phpChallenge: Extract the version using union based SQLi and print your username alongside.Request type: POSTVulnerable param: userProof: Do not post a picture as proof, just send me a PM containing your syntax.Nu postati o imagine ca dovada, trimiteti-mi un PM cu sintaxa voastra.* The challenge does not consist of the injection itself.Solvers: Edited March 2, 2014 by DarkPanda
Renegade Posted March 2, 2014 Report Posted March 2, 2014 (edited) Link: travispeed.eu/s2/login.phpChallenge: Extract the version using union based SQLi and print your username alongside.Request type: POSTVulnerable param: userProof: Do not post a picture as proof, just send me a PM containing your syntax.Nu postati o imagine ca dovada, trimiteti-mi un PM cu sintaxa voastra.* The challenge does not consist of the injection itself.Solvers:acest chall a mai fost pus aici https://rstforums.com/forum/76366-medium-sqli-challenge.rst cu tot cu rezolvare.param user eu sincer nu il mai gasescinclusiv linkul cu dovada e acelasi cu al lui Gecko Edited March 2, 2014 by Renegade
DarkPanda Posted March 2, 2014 Author Report Posted March 2, 2014 l-am relansat... ma rog, atunci s-a inchis site-ul