{"html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fwww.demandosigno.study%2Fentry%2F2025%2F11%2F23%2F134453\" title=\"SQL injection 16 / 51 LAB4 - demandosigno\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","height":"190","image_url":"https://cdn-ak.f.st-hatena.com/images/fotolife/d/demandosigno/20251123/20251123131602.png","categories":["Web Security Academy","PortSwigger","SQL Injection"],"provider_name":"Hatena Blog","title":"SQL injection 16 / 51 LAB4","blog_url":"https://www.demandosigno.study/","width":"100%","url":"https://www.demandosigno.study/entry/2025/11/23/134453","provider_url":"https://hatena.blog","author_url":"https://blog.hatena.ne.jp/demandosigno/","author_name":"demandosigno","type":"rich","published":"2025-11-23 13:44:53","version":"1.0","description":"UNION attack: \u30c6\u30ad\u30b9\u30c8\u3092\u542b\u3080\u5217\u306e\u767a\u898b \u524d\u63d0\uff1a\u300c\u30ab\u30c6\u30b4\u30ea\u30fc\u300d\u30d1\u30e9\u30e1\u30fc\u30bf\u306bSQL\u30a4\u30f3\u30b8\u30a7\u30af\u30b7\u30e7\u30f3\u304c\u5b58\u5728\u3059\u308b\u3002 \u30b4\u30fc\u30eb\uff1aWeb\u30da\u30fc\u30b8\u4e0a\u306b\u6240\u5b9a\u306e\u6587\u5b57\u5217\u3092\u51fa\u529b\u3059\u308b\u3002 \u300c\u30a2\u30af\u30bb\u30b5\u30ea\u30fc\u300d\u30ab\u30c6\u30b4\u30ea\u30fc\u3092\u9078\u629e\u3057\u305f\u969b\u306e\u3001\u30c7\u30d5\u30a9\u30eb\u30c8\u30ea\u30af\u30a8\u30b9\u30c8\u30fb\u30ec\u30b9\u30dd\u30f3\u30b9 GET /filter?category=Accessories HTTP/2 Host: 0a9900c8044f594b80b3e45400f00075.web-security-academy.net Cookie: session=t1WUvqgc2MSAAKYy0vDQnB7lHSgWFWg0 \uff5e\u7701\u7565\uff5e HTTP/2 200 OK Conte\u2026","blog_title":"demandosigno"}