Skip to content

Commit

Permalink
update to point to sql-playground
Browse files Browse the repository at this point in the history
  • Loading branch information
zardus committed Jan 26, 2025
1 parent cfa4abe commit c20aeba
Showing 1 changed file with 1 addition and 2 deletions.
3 changes: 1 addition & 2 deletions web-security/auth-bypass-param/DESCRIPTION.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,8 +4,7 @@ A common type of vulnerability is an _Authentication Bypass_, where an attacker
This level challenges you to explore one such scenario.
This specific scenario arises because, again, of a gap between what the developer expects (that the URL parameters set by the application will only be set by the application itself) and the reality (that attackers can craft HTTP requests to their hearts content).

The goal here is not only to let you experience how such vulnerabilites might arise, but to familiarize you with _databases_: places where web applications stored structured data.
As you'll see in this level, data is stored into and read from these databases using a language called the _Structured Query Language_, or SQL (often pronounced like "sequel") for short.
This level assumes a passing familiarity with SQL, which you can develop in the [SQL Playground](/fundamentals/sql-playground).
SQL will become incredibly relevant later, but for now, it is an incidental part of the challenge.

Anyways, go and bypass this authentication to log in as the `admin` user and get the flag!

0 comments on commit c20aeba

Please sign in to comment.