Posts: 148
Threads: 12
Joined: Jan 2024
Hey, BF new challenge is here This forum account is currently banned. Ban Length: Permanent (N/A Remaining) Ban Reason: Compromised - Malware Logs
Posts: 78
Threads: 24
Joined: Nov 2023
Posts: 27
Threads: 2
Joined: Jul 2023
Working on it, I figured out you can bypass the waf.php filter to circumvent "OR" by doing "o+r" .
the flag is obivously at id=6 from reading the code which is blocked
it doesn't see 5 + 1 as 6 though, just an invalid ID
Posts: 148
Threads: 2
Joined: Oct 2023
Feb 04, 2024, 11:50 AM
(This post was last modified: Feb 04, 2024, 11:51 AM by peRd1.)
It can be done with a very well formulated sqlmap query as well. Just don't forget about the flags, level, risk, random agent, etc.
And think about which endpoint, what you want to search for, and dump that shit.
It's going to find some injection parameter that can be abused of course...
Posts: 231
Threads: 18
Joined: Jul 2023
I read all the code but i couldn't bypass waf ! tried also with sqlmap -r req{http post request `Controllers/Handlers/SearchHandler.php`} with --level 5 --risk 3 --dump
Posts: 14
Threads: 3
Joined: Dec 2023
sqlmap is unintended afaik
Posts: 3
Threads: 0
Joined: Aug 2023
6' AND CASE WHEN gamedesc LIKE 'HTB{%}' THEN 1 ELSE load_extension(1) END -- -
I dumped the flag with this sqli but its not case sensitive, REGEXP and COLLATE doens't seems to work...
Posts: 43
Threads: 1
Joined: Oct 2023
(Feb 07, 2024, 04:10 PM)dhzzz Wrote: 6' AND CASE WHEN gamedesc LIKE 'HTB{%}' THEN 1 ELSE load_extension(1) END -- -
I dumped the flag with this sqli but its not case sensitive, REGEXP and COLLATE doens't seems to work...
how could you dump anything with the request that contains quote?
you should get response "SQL Injection attempt identified and prevented by WAF!" because your request contains '
Posts: 3
Threads: 0
Joined: Aug 2023
(Feb 08, 2024, 06:54 PM)Steward Wrote: (Feb 07, 2024, 04:10 PM)dhzzz Wrote: 6' AND CASE WHEN gamedesc LIKE 'HTB{%}' THEN 1 ELSE load_extension(1) END -- -
I dumped the flag with this sqli but its not case sensitive, REGEXP and COLLATE doens't seems to work...
how could you dump anything with the request that contains quote?
you should get response "SQL Injection attempt identified and prevented by WAF!" because your request contains '
Transfer-Encoding: chunked
Posts: 2
Threads: 0
Joined: Feb 2024
(Feb 09, 2024, 05:17 PM)dhzzz Wrote: (Feb 08, 2024, 06:54 PM)Steward Wrote: (Feb 07, 2024, 04:10 PM)dhzzz Wrote: 6' AND CASE WHEN gamedesc LIKE 'HTB{%}' THEN 1 ELSE load_extension(1) END -- -
I dumped the flag with this sqli but its not case sensitive, REGEXP and COLLATE doens't seems to work...
how could you dump anything with the request that contains quote?
you should get response "SQL Injection attempt identified and prevented by WAF!" because your request contains '
Transfer-Encoding: chunked
It's giving me internal server error. Any idea?
|