📔
CTF Writeups
RedTeam Capstone Challegen TryHackMeTryHackMeHackTheBox
  • Hello
  • Red Team Capstone Challenge TryHackMe
    • OSINT
    • Permieter Breach
    • Initial Compromise of Active Directory
    • Full Compromise of CORP Domain
    • Full Compromise of Parent Domain
    • Full Compromise of BANK Domain
    • Compromise of SWIFT and Payment Transfer
  • Try Hack Me
    • 2025
      • Robots
      • Billing
      • Crypto Failures
      • Smol
      • Silver Platter
      • The Sticker Shop
      • Lo-Fi
      • Light
      • Lookup
    • 2024
      • Breakme
      • New York Flankees
      • Publisher
      • Capture Returns
      • mKingdom
      • Creative
      • Clocky
      • Hack Smarter Security
      • Kitty
      • Breaking RSA
      • Umbrella
      • SSRF
      • Capture!
      • WhyHackMe
      • Stealth
    • 2023
      • AVenger
      • Slingshot
    • Advent of Cyber 2023
      • Day 1
      • Day 2
      • Day 3
      • Day 4
      • Day 5
      • Day 6
      • Day 7
      • Day 8
      • Day 9
      • Day 10
      • Day 11
      • Day 12
      • Day 13
      • Day 14
      • Day 15
      • Day 16
      • Day 17
      • Day 18
      • Day 19
      • Day 20
      • Day 21
      • Day 22
      • Day 23
      • Day 24
  • Hack The Box
    • 2024
      • Jab
      • IClean
      • Skyfall
      • Headless
      • Blue
Powered by GitBook
On this page

Was this helpful?

  1. Try Hack Me
  2. Advent of Cyber 2023

Day 10

PreviousDay 9NextDay 11

Last updated 1 year ago

Was this helpful?

Learning Objectives

  • Learn to understand and identify SQL injection vulnerabilities

  • Exploit stacked queries to turn SQL injection into remote code execution

  • Help Elf McRed restore the Best Festival website and save its reputation!

This room is straightforward with all the instructions and commands given to us.

Manually navigate the defaced website to find the vulnerable search form. What is the first webpage you come across that contains the gift-finding feature?
[REDACTED]
Open the website and you will find a gift search option available. 
Analyze the SQL error message that is returned. What ODBC Driver is being used in the back end of the website?
[REDACTED]
One of the given commands will lead us to this error. The answer can be found in the error message
Inject the 1=1 condition into the Gift Search form. What is the last result returned in the database?
[REDACTED]
The command will  retrieve all gift results, regardless of the specified parameters.
What flag is in the note file Gr33dstr left behind on the system?
[REDACTED]
Upon sucessfully getting a reverse shell. We can look around to find the note.txt
The flag can be found inside it.

The main goal of this room is to restore the defaced website. When we get reverse shell and after manually looking around in the folders we find hints on how to restore the website. We find that the original website and the defaced website have backups.

What is the flag you receive on the homepage after restoring the website?
[REDACTED]
Restore to website and access it again and you will get the flag.
First flag found in note.txt
Second flag found after restoring website