🌐

WEB GAUNTLET 3

LEAD
πŸ™‚

HINTS

  1. Each filter is separated by a space. Spaces are not filtered.
  1. There is only 1 round this time, when you beat it the flag will be in filter.php.
  1. sqlite

We need to find a command that has not been filtered

Trying a rudimentary β€˜ or 1==1;β€” we can see that it has been filtered


Going to the filter.php file that has been provided by PicoCTF

We can see that the filters are extensive and will block the most commonly used commands to SQL inject but not spaces!

SPACES?
We are also given the fact that spaces are not filtered

Trying ad' 'min in the username field and 1 in the password field we get a response

As we can see , since spaces aren’t filtered , it did not filter the given input

Now we need to find a way around the password!

i would use β€˜1’ == 1 to force a True Boolean statement to be registered by SQL but the filter accounts for thisπŸ˜”

What if we do a 1 IS NOT 2 query this should force a True Boolean statement to be registered by SQL.

The admin username is not registering as admin but the password went through 😎

RESEARCH INTO DIFFERENT CONCATENATION METHODS IN SQL

THE PLUS βž•

https://www.w3schools.com/sql/func_sqlserver_concat_with_plus.asp

I tried to use the plus concatenation operator but this does not workπŸ˜”

|| OPERATOR

https://www.geeksforgeeks.org/sql-concatenation-operator/

Username: ad'||'min Password : 1' IS NOT '2

FLAG

We have found the correct exploit πŸŽ‰

πŸ’‘

picoCTF{k3ep_1t_sh0rt_68847fdd50e1430d80990b518fac4edb}