6. SQL Injection Challenge - My try:
burpsuite / sqlmap
Good content length is: 2520
Content-Type: application/x-www-form-urlencoded - which means that we would have to use url encoding for targeting the sqli
Test 1:
Encode ' or 1=1# - content-length: 4946
Encode ' or 1=2# - content-length: 2520 -- there is something to find in here
Went to sqlmap as I found in sqlmap that is vulnerable to AND clause.
The challenge was actually easy in the video and the best takeaway from the whole video was that quoting NahamSec as well:
"It is more important to do manual testing than anything else."
Although I thought there is something to do with encoding, bad luck it wasn't even encoded and with simple SQLi testing on the field with basic true validation and then a union select you could have found the username and password for the admin account.