靶场完成目标:
This lab contains a blind SQL injection vulnerability. The application uses a tracking cookie for analytics, and performs an SQL query containing the value of the submitted cookie.
The results of the SQL query are not returned, and no error messages are displayed.But the application includes a “Welcome back” message in the page if the query returns any rows.
The database contains a different table called users, with columns called username and password. You need to exploit the blind SQL injection vulnerability to find out the password of the administrator user.
To solve the lab, log in as the administrator user.
综上所述,没有报错,但是如果合法就会出现welcome back的字样
靶场目标是使用administrator账户登录
开启演练
打开靶场并用burp抓包,发送到repeater