# spooky store
It's a simple webpage with 3 buttons, you got this :)
Visiting this page revealed a website with 3 clickable buttons that displayed a location's latitute and longitute
Intercepting the request in burpsuite revealed that the POST request is using XML
Let's try modifying the post request to be a simple XXE payload to print /etc/passwd (this is the typical payload example that you will find with a google search)
This worked and printed /etc/passwd, which included the flag
# epic admin pwn
this challenge is epic i promise
For this challenge we are presented with a simple login screen
Start off by trying sql injection to login with user Admin and password 'or '1' ='1 is successful
This gives us a static page, which is basically a dead end. Let's try using sqlmap to try and get something more out of the database.
To do this we intercept the login request in burpsuite and save it to a file called post.txt
From here we run sqlmap. Normally I would use --sql-shell, but that wasn't working so I tried --dump instead.
This successfully dumps the database, which included the flag.