Ottergram
Level: Easy Points: 10 Type: Daily Challenge
Lab Interface

Intersting request

Possible SQLi in path parameter.
Using simple payload ' or 1=1 -- - proves this parameter is indeed vulnerable to sqli

Next step, finding column number. Using union select method, I found the no of column = 7

Using PayloadsAllTheThings SQLi Cheatsheet, I found the database to be sqlite
Next is dumping the columns name.

users table looks intersting.
Next step is to get columns name from users table.

Two interesting columns on users table are username and password . Dumping them as

Got the flag.
Last updated