{"id":137,"date":"2021-10-06T21:43:49","date_gmt":"2021-10-06T20:43:49","guid":{"rendered":"http:\/\/localhost\/wordpress\/?p=137"},"modified":"2021-10-06T22:26:50","modified_gmt":"2021-10-06T21:26:50","slug":"sql-injections-showcase","status":"publish","type":"post","link":"http:\/\/localhost\/wordpress\/2021\/10\/06\/sql-injections-showcase\/","title":{"rendered":"SQL Injections showcase"},"content":{"rendered":"\n
This is my winning solution for a faculty SQL Injection<\/em> contest<\/span> I participated in 2021.<\/p>\n\n\n\n The main challenge was to find inventive and playful<\/em> ways to exploit<\/span> database connected applications that are vulnerable<\/span> to this kind of attack. <\/p>\n\n\n\n Therefore, I used two applications: one that was entirely coded by me<\/a>, and the other being a vulnerable webservice hosted on a Linux server. It was fun ( \u0361\u00b0 \u035c\u0296 \u0361\u00b0)<\/span> .<\/p>\n\n\n\n Below is the complete description of the exploitation process \/ write-up.<\/p>\n\n\n\n