Tags: web 

Rating:

## Colonel Mustard's Simple Signin - Web 172:

**Description:** We know Col Mustard is up to something--can you find a way in to tell us what?
**Challenge:** http://13.59.239.132/
**Difficulty:** Easy
**Solved by:** Tahar

**Solution:**
We open up the challenge URL as usual, we notice the same login form! But of course it shouldn't be the same solution or same challenge =)
From previous experience as usual from too many CTFs, most of those logins forms are meant to say **SQLi Form Login Bypass** and it means bypassing the login form by injecting a **Structure Query Language** Payload. We use the following payload and boom flag:
```' or ''='```
```' or ''='```

**Flag:**
TUCTF{1_4ccu53_c0l0n3l_mu574rd_w17h_7h3_r0p3_1n_7h3_l061n}

Original writeup (https://github.com/ImperiumCTF/Writeups/blob/master/TUCTF%202018/Web/Colonel_Mustard's_Simple_Signin.md).