HackTheBox Appointment Writeup

Summary :- The Appointment box simulates a web application vulnerable to SQL Injection. It features a search function tied to a backend SQL database with restricted access levels—regular users see only product data, while admins can access sensitive user info. However, due to poor input handling, attackers can exploit SQL Injection to bypass these restrictions and access any database table, regardless of user privileges.
TASK ANSWERS
SQL stands for:
Structured Query LanguageCommon SQL vulnerability:
SQL injectionOWASP 2021 classification:
A03:2021-InjectionService/version on port 80 (Nmap):
Apache httpd 2.4.38 ((Debian))Standard HTTPS port:
443Web folder terminology:
directoryHTTP response code for 'Not Found':
404Gobuster switch for directories:
dirMySQL comment character:
#First word on webpage after SQL Injection login bypass:
Congratulations
🏁 Root Flag:
e3d0796d002a446c0e622226f42e9672Last updated