Tags: web 

Rating:

# S-Q-L

```
Keith keeps trying to keep his flag safe. This time, he used a database and some PHP.

https://s-q-l.web.chal.hsctf.com/
```

![](https://raw.githubusercontent.com/shawnduong/ctf-writeups/master/2019-HSCTF6/images/sql-1.png)

This is a simple SQL injection challenge. The username is admin. The injection string is:

```
' or '1'='1
```

In essence, what an SQL injection does is it "breaks" a comparison, injects the boolean OR operator, and then creates a scenario which will always evaluate to true, in essence making the entire comparison evaluate to true.

![](https://raw.githubusercontent.com/shawnduong/ctf-writeups/master/2019-HSCTF6/image/sql-2.png)

Original writeup (https://github.com/shawnduong/ctf-writeups/blob/master/2019-HSCTF6/Web/s-q-l.md).