Blinderra
HardWeb Security
Overview
A new student portal has been launched. Can you dig deep enough to uncover what lies hidden within its pages?
Flag format: Flag{text}
Lab Details
Prerequisites & Requirements
- How SQL works (queries, SELECT, WHERE, FROM, etc.).
- What SQL Injection (SQLi) is, and specifically Boolean-based Blind SQLi.
- How HTTP requests and responses work (query parameters, GET/POST).
- Basic Python scripting (loops, string operations, HTTP requests).
- Familiarity with database metadata tables like information_schema in MySQL.
- Basic cryptography knowledge.
- Familiar with hash cracking tools.
What will you learn?
- How to detect Boolean-based Blind SQL Injection.
- How to exploit blind SQLi manually using crafted payloads.
- How to automate extraction with a Python script.
- Techniques to bypass input filters (e.g., replacing space with %09).
- How to enumerate:
Tools
- Web Browser → To interact with the vulnerable app manually.
- Burp Suite (optional) → To intercept and test SQLi payloads.
- Python 3 → To automate the exploitation process.
- Requests library → For sending HTTP requests inside the Python script.
- Text editor/IDE (VS Code, Sublime, etc.) → For writing your script.
Job Positions
Application Security Engineer
Tags
Sql InjectionWaf BypassInput ValidationOwasp Top 10Broken Access Control