https://www.root-me.org/IMG/logo/siteon0.svg

Code Snippet Serie - 01 - SQL Like injection

Challenge Description This challenge, authored by @Elweth, involves exploiting a vulnerability in a SQL Query which lets you abuse the LIKE clause to first bypass authentication and then retrieve the entire API key. Vulnerability Overview 🛑 Vulnerability: The vulnerability lies in the SQL query, which remains vulnerable despite the use of the prepare statement system in Python. Conventional SQL injection exploitation methods won’t work here, because the query is correctly prepared with python.

How to start in cybersecurity

Every person in this community was once a begginer and it’s usually a hard domain to begin with if you’re not guided. I will try to guide you through this article and give you some tips to start your cybersecurity journey. This article is for beginners. 1. The mindset First of all, before even talking about how to begin and where, you should answer this question: why? Typically: Why do you want to learn cybersecurity?