SQL Injection

Level 1

The application reads the user agent value and then shows that . By changing the value to a single quote we can get the following error which reveals that MySQL is in use.

Level 2

In this level UNION and standard payloads are filtered.

Level 3

This level spaces are not allowed.

Level 4

Comments are blocked in this level.

Level 5

Same as above, but had to use double quotes.

Level 6

Needed a random case with every letter to bypass the filter. SQLMap randomcase tamper script can be used for this level.

Level 7

Non-recursive filter for the reserved words.

Level 8

URL encoding.

Level 9

Double char encode.

Last updated