May 16, 2023, 9:31 a.m. | Ahmet Talha Şen

InfoSec Write-ups - Medium infosecwriteups.com

Created by lexica.art

SQLi 1 / SQLi

To solve the “Gain access to any user's account" CTF challenge, we need to exploit a SQL Injection vulnerability in the login system. The challenge provides us with the username "user" and suggests that the vulnerability is related to SQL Injection.

To get around the password check and access the account, we may insert SQL code into the password box of the login form. We may disregard the …

ctf ctf-walkthrough ctf-writeup cybersecurity ethical hacking

Red Team Penetration Tester and Operator, Junior

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)

Director, Security Operations & Risk Management

@ Live Nation Entertainment | Toronto, ON

IT and Security Specialist APAC (F/M/D)

@ Flowdesk | Singapore, Singapore, Singapore

Senior Security Controls Assessor

@ Capgemini | Washington, DC, District of Columbia, United States; McLean, Virginia, United States

GRC Systems Solution Architect

@ Deloitte | Midrand, South Africa

Cybersecurity Subject Matter Expert (SME)

@ SMS Data Products Group, Inc. | Fort Belvoir, VA, United States