Identifying Filters

Try all other injection operators to see if any of them is not blacklisted. Which of (new-line, &, |) is not blacklisted by the web application?

In this application the payload ip=127.0.0.1%3b+whoami is being blocked. In order to understand this blacklist, lets try on operator at the time to see how the applications responds.

If you inserted the & and got a valid response, and Hack The Box is not accepting as a valid answer don't feel overwhelmed.

The correct answer is new-line as we manage to successfully bypass the filter of the & encoded character.

Last updated