- Published on
SQL Tutor
- Authors

- Name
- EternalCirco
- Github
- @Eternalcirno
Burpsuite
In the response part of the execute request, we can see debug is set to null

So we add a debug=true to our post params

This true value can also be seen in the js source code.

With debug=true, we can leak the signature and do the sql injection since the filtering phase is over.

Encode the payload in base64 and get the sig. And then from here its a normal union injection.




The flag is found under the name attribute of a user whose id is equal to 1:dctf {Pump_7h3_s7r3am_h4s5_up!_353aa965}