githubEdit

Ottergram

Level: Easy Points: 10 Type: Daily Challenge

Lab Interface

Intersting request

Possible SQLi in path parameter. Using simple payload ' or 1=1 -- - proves this parameter is indeed vulnerable to sqli

Next step, finding column number. Using union select method, I found the no of column = 7

Using PayloadsAllTheThings SQLi Cheatsheetarrow-up-right, I found the database to be sqlite

Next is dumping the columns name.

users table looks intersting.

Next step is to get columns name from users table.

Two interesting columns on users table are username and password . Dumping them as

Got the flag.

Last updated