SQLi Cards — Union Injection into SQLite
Union-based SQL injection in a card lookup form to enumerate tables via sqlite_master and extract the flag.
Union-based SQL injection in a card lookup form to enumerate tables via sqlite_master and extract the flag.
Union-based SQL injection in the report ID parameter of a Node.js/TypeScript Express app to leak the flag from a hidden table.
Boolean blind SQL injection on a login form to extract a password character by character using HEX comparison.
Inject ’ OR ‘1’=‘1 into both username and password fields to make the SQL query always true and grab the flag from the response.
A WAF strips forbidden SQL keywords. Inject OFFSET inside reserved words (SELECT → SELOFFSETECT) so after the WAF removes OFFSET the original keyword is reconstructed, landing a UNION SELECT to dump the flag.
The server reads a base64-encoded JSON cookie containing an ID field and passes it unsanitised into a SQL query. Inject a UNION SELECT payload inside the JSON, re-encode as base64, and set the forged cookie to extract the flag in three phases.