- Published on
 
SQL Tutor
- Authors
 - Name
 - EternalCirco
 - Github
 - @Eternalcirno
 
Burpsuite
In the response part of the execute request, we can see debug is set to null
So we add a debug=true to our post params
This true value can also be seen in the js source code.
With debug=true, we can leak the signature and do the sql injection since the filtering phase is over.
Encode the payload in base64 and get the sig. And then from here its a normal union injection.
The flag is found under the name attribute of a user whose id is equal to 1:dctf {Pump_7h3_s7r3am_h4s5_up!_353aa965}