Rating: 5.0
# spooky store
```
It's a simple webpage with 3 buttons, you got this :)
```
Visiting this page revealed a website with 3 clickable buttons that displayed a location's latitute and longitute

Intercepting the request in burpsuite revealed that the POST request is using XML

Let's try modifying the post request to be a simple XXE payload to print /etc/passwd (this is the typical payload example that you will find with a google search)

This worked and printed /etc/passwd, which included the flag

# epic admin pwn
```
this challenge is epic i promise
```
For this challenge we are presented with a simple login screen

Start off by trying sql injection to login with user Admin and password 'or '1' ='1 is successful

This gives us a static page, which is basically a dead end. Let's try using sqlmap to try and get something more out of the database.
To do this we intercept the login request in burpsuite and save it to a file called post.txt

From here we run sqlmap. Normally I would use --sql-shell, but that wasn't working so I tried --dump instead.

This successfully dumps the database, which included the flag.