old-22 -- SQLi (Password+Salt)

URL: https://webhacking.kr/challenge/bonus-2/index.phparrow-up-right

old-22.png

I registered using x:y credentials, upon login we get password hash:

old-22-1.png

Password is md5(password+salt) and salt="apple"

old-22-2.png

Following payload logs us in, but we can't login because of password check

Brute the password hash:

Crack station didn't have this hash, so use hashcat to recover the password:

Creds: admin:wow

old-22-3.png

md5hashing.netarrow-up-right had this hash:

old-22-4.png

Last updated