WebMar 12, 2024 · As there is nothing on the page so let us move to the Page Source. As the source code is quite simple but notice the comment is contains some name. But pasting them in the box on the page gives useless information, but one can notice that the page is vulnerable to SQL injection as the name of the level suggests. WebWellcome to my CTFlearn-Writeups Repository ! In this Repository you will find writeups for CTFs from the website CTFlearn. You can also check the soultions on my YoTube channel - EdbR yotube channel.
CTFLearn write-up: Misc (Easy) Planet DesKel
WebCTFLEARN. Login; Join Now. Blank Page 30 points Easy. I've just graduated the Super Agent School. This is my first day as a spy. The Master-Mind sent me the secret message, but I don't remember how to read this. Help! TheMessage.txt Flag ... WebFeb 18, 2024 · It seems we can query usernames, and some data related to them. But there is nothing more. The CTF is named as “Basic Injection”. So, l decided to try the most basic SQL hacking techniques. If your aim is to dump a database, the most basic technique you can use is the “OR 1”, which is a simple yet devilish way to alter the query to ... flooring options for a bathroom
CTFlearn Walkthrough -- Binary Exploitation (Part 1) - YouTube
WebAug 15, 2024 · CTFLearn write-up: Misc (Easy) 1 minutes to read. Hello there, welcome to another CTFlearn write-up. Today we are going for something a bit weird where all these challenges are categorized as Misc. The challenge can be OSINT, some point grabbing and etc. Even though most of the challenge getting the low rating but I’m still loving it. WebJul 24, 2024 · 29 CTFlearn{5432103279251234} Voila our flag is CTFlearn{5432103279251234} 2. Basic Android RE 1 A simple APK, reverse engineer the logic, recreate the flag, and submit! We are given with an apk file to reverse engineer. Normally, I prefer using apktool to decompress the apk (Very useful for solving … WebOriginal Query: SELECT * FROM webfour.webfour where name = '$input' Your Resulting Query: SELECT * FROM webfour.webfour where name = '' 0 results great old one dnd 5e