Skip to content

Commit 2ad3d98

Browse files
Formatting the blog
1 parent 02727c7 commit 2ad3d98

File tree

1 file changed

+5
-0
lines changed

1 file changed

+5
-0
lines changed

_posts/2025-08-15-thm-light-walkthrough.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -79,21 +79,25 @@ Lets try to change the approach.
7979

8080
Lets try putting in some random input, my mind is getting a little idea of where it is going _maybe_.
8181
![Testing random input](/assets/img/Pasted image 20250816003925.png)
82+
8283
Its more of an Injection vulnerability I see
8384
Its been a long I have not dealt with a SQLi, now quickly digging through my notes for revising required methods.
8485

8586
From the responses below
8687
![SQL injection response](/assets/img/Pasted image 20250816004841.png)
88+
8789
I can imagine of a SQL query
8890
`select pass from users where user='<input>' limit 30`
8991

9092
Now we'll try creating some SQL payloads based on the payloads I already have in my notes.
9193
`'union select 1'`
9294
![Union select blocked](/assets/img/Pasted image 20250816005530.png)
95+
9396
Okhayy!
9497
They might be blocking some keywords most probably as an easy way out.
9598
Here might be a logic error lets try `'UnIOn sElecT 1'`
9699
![Bypassing keyword filter](/assets/img/Pasted image 20250816005739.png)
100+
97101
as a developer I would also blacklist these keywords as its an easy fix(not a fix really). Laziness is a problem frr.
98102
I love these kinda logic based errors!
99103

@@ -120,6 +124,7 @@ Enough to craft useful payloads.
120124
121125
`'Union Select username from admintable where id='1`
122126
![Admin username](/assets/img/Pasted image 20250816011619.png)
127+
123128
If needed we could've dumped all but in this case we don't need the whole database.
124129

125130
![Question 1 answer](/assets/img/Pasted image 20250816011809.png)

0 commit comments

Comments
 (0)