Join us on Slack!
Don't judge the unknown - Grindordie
Friday, October 18, 2019
Navigation
Home
 Find:
 Information:
Learn
Communicate
Submit
Shop
Challenges
 Exploit:
 Programming:
 Think:
 Track:
 Patch:
 Other:
 Need Help?
Other
Members Online
Total Online: 46
Guests Online: 45
Members Online: 1

Registered Members: 119019
Newest Member: Olivialoave
Latest Articles
View Thread

HellBound Hackers | Challenges | Basic

Author

basic 8- solved but some doubts

suyash_96
Member

Your avatar

Posts: 1
Location:
Joined: 27.03.16
Rank:
Newbie
Posted on 31-03-16 20:55
I've solved basic 8. But can someone elaborate more on xxxx.php?variable=.... concept ? The working ?
Author

RE: basic 8- solved but some doubts

Huitzilopochtli
Member



Posts: 1622
Location:
Joined: 19.02.13
Rank:
God
Posted on 31-03-16 21:16
If you mean the var="sql here" part from the source, you would never find that in the wild as it would be highlighting a real sql injection hole, and you'd get pwned pretty quickly, so it's just there to point out the simulated injection point.