Skip to main content
Blog July 7, 2012

A series of SQL Injection challenges

I want to introduce three SQL Injection challenges which were created for a CTF, but have yet to be solved... Could you be the first?

Share this article:

I want to introduce 3 SQL Injection challenges I originally created for the GuadalajaraCON CTF. After the conference had come to a close, I decided to open these challenges to the public via twitter and sla.ckers. Almost 2 months later, most challenges have yet to be solved, so I figured it was time to make an official post. Additionally, to make the challenges easier and more appealing to everyone, I went ahead and translated them to English.

 

Each challenge has 2 parts, A and B. The second part, B, is a modified version of A and is a bit harder. If you think you have what it takes, you can access the challenges at:

http://50.57.51.240/challenges/ (challenge is no longer available online)



Please submit your solutions to [email protected], including the SQL Injection used to solve the challenge. Only solutions which use SQL Injection will be accepted.

 

I hope you enjoy solving them!

Subscribe to our Newsletter

Get the latest cybersecurity insights and updates delivered to your inbox.

Related Articles

Discover more cybersecurity insights and solutions to help strengthen your organization's security posture

Image unavailable
Blog October 3, 2023

A Comparison Between the Real User ID and the Effective User ID is not Enough to Prevent Privilege Escalation

In Unix-like systems, processes have a real and effective user ID determining their access permissions. While usually identical, they can differ in situations like when the setuid bit is activated in executables.

Image unavailable
Blog May 19, 2022

CVE-2022-21404: Another story of developers fixing vulnerabilities unknowingly because of CodeQL

How CodeQL may help reduce false negatives within Open-Source projects. Taking a look into a deserialization vulnerability within Oracle Helidon (CVE-2022-21404).

Image unavailable
Blog September 2, 2021

Cybersecurity in Web Applications - Where to start? Where to improve? Where to learn more?

A list of resources for web application security and a short description of what each resource covers.