Corporate Life 2

by sealldev
🚩 CTFs KashiCTF 2025 web
Suggested: #sql-injection
Corporate Life 2 / KashiCTF 2025
Corporate Life 2

Description

The disgruntled employee also stashed some company secrets deep within the database, can you find them out?

Original Writeup on seall.dev

Same process as Corporate Life 1 getting to /v2-testing but the SQLi requires UNION injection to view the contents of another table.

We can try and list the tables (I did this on the Corporate Life 1 instance assuming the flag was stored on both), I identified it was SQLite using a payload from PayloadAllTheThings.

corplife2-1.png

Now that we know the table is called flags and has columns request_id and secret_flag, we can dump the contents.

corplife2-2.png

Flag: KashiCTF{b0r1ng_old_c0rp0_l1f3_am_1_r1gh7_FbU5cNXH}

Share this writeup

Contribute

Found an issue or want to improve this writeup?

Edit on GitHub