Blind GQL injection and optimised binary search - A7 ~ Gee cue elle (misc) Google CTF 2017
Channel:
Subscribers:
921,000
Published on ● Video Link: https://www.youtube.com/watch?v=za_9hrq-ZuA
This was considered a hard challenge. After finding and analysing the source code we found a GQL injection. Unfortuantely there is a system in place that will ban you for too many requests. So we use a modified binary search algorithm to finish in time.
gql.py: https://gist.github.com/LiveOverflow/16f0e4ff0ca9b0b993c25e14759de731
-=[ β€οΈ Support ]=-
β per Video: https://www.patreon.com/join/liveoverflow
β per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join
-=[ π Social ]=-
β Twitter: https://twitter.com/LiveOverflow/
β Website: https://liveoverflow.com/
β Subreddit: https://www.reddit.com/r/LiveOverflow/
β Facebook: https://www.facebook.com/LiveOverflow/
#WebSecurity #CTF
Other Videos By LiveOverflow
Tags:
Live Overflow
liveoverflow
hacking tutorial
how to hack
exploit tutorial
gql
google query language
gql injection
binary search
binary search algorithm
blind gql
blind sql
sql injection
google graph language
google ctf
googlectf
gee clue elle
a7
OWASP A7
owasp
a7 controversy