HackTheBox Appointment Writeup

Summary :- The Appointment box simulates a web application vulnerable to SQL Injection. It features a search function tied to a backend SQL database with restricted access levels—regular users see only product data, while admins can access sensitive user info. However, due to poor input handling, attackers can exploit SQL Injection to bypass these restrictions and access any database table, regardless of user privileges.
TASK ANSWERS
SQL stands for:
Structured Query Language
Common SQL vulnerability:
SQL injection
OWASP 2021 classification:
A03:2021-Injection
Service/version on port 80 (Nmap):
Apache httpd 2.4.38 ((Debian))
Standard HTTPS port:
443
Web folder terminology:
directory
HTTP response code for 'Not Found':
404
Gobuster switch for directories:
dir
MySQL comment character:
#
First word on webpage after SQL Injection login bypass:
Congratulations
🏁 Root Flag:
e3d0796d002a446c0e622226f42e9672
Last updated