Jump to content
DarkPanda

[Medium]SQLI CHALLENGE

Recommended Posts

Posted (edited)

Link: travispeed.eu/s2/login.php

Challenge: Extract the version using union based SQLi and print your username alongside.

Request type: POST

Vulnerable param: user

Proof: d56r.png

Do not post a picture as proof, just send me a PM containing your syntax.

Nu postati o imagine ca dovada, trimiteti-mi un PM cu sintaxa voastra.

* The challenge does not consist of the injection itself.

Solvers:

Edited by DarkPanda
Posted (edited)
Link: travispeed.eu/s2/login.php

Challenge: Extract the version using union based SQLi and print your username alongside.

Request type: POST

Vulnerable param: user

Proof: d56r.png

Do not post a picture as proof, just send me a PM containing your syntax.

Nu postati o imagine ca dovada, trimiteti-mi un PM cu sintaxa voastra.

* The challenge does not consist of the injection itself.

Solvers:

acest chall a mai fost pus aici https://rstforums.com/forum/76366-medium-sqli-challenge.rst cu tot cu rezolvare.param user eu sincer nu il mai gasesc

inclusiv linkul cu dovada e acelasi cu al lui Gecko

Edited by Renegade
Guest
This topic is now closed to further replies.


×
×
  • Create New...