Rating:

# S-Q-L

## Description

Keith keeps trying to keep his flag safe. This time, he used a database and some PHP.

https://s-q-l.web.chal.hsctf.com/

## Solution

Simple SQL injection

![](solve.png)
![](ans.png)

```
hsctf{mysql_real_escape_string}
```

Original writeup (https://github.com/kuruwa2/ctf-writeups/tree/master/HSCTF%206/S-Q-L).