Orbital

The page looks like this:

look at the code:

and password verify function looks like this:

so sql injection:

admin\"

so we unleash sqlmap over it:

ichliebedich
sqlmap -r request.txt --batch --dump

so we have the export functionality to get the file:

look at the Dockerfile:

when we give the payloaD:

HTB{T1m3_b4$3d_$ql1_4r3_fun!!!}

Last updated