Post

[NeverLAN 2019] - SQL FUN 2

Image of NeverLAN CTF 2019

Description:

Solution Author:

Lucian Nitescu, as part of jmp 0xc0ffee team.

Solution:

On this challenge, I was provided a basic and unrestricted SQL "console" that allowed me to enter any SQL query.

As easy as it may sound, I performed a basic select in order to retrieve the user password.

  • select * from passwd

Decoding the base64 string:

This post is licensed under CC BY 4.0 by the author.