A corporate directory validates user input with a regex pattern and Python's re.MULTILINE flag. The developers are confident their ^[a-z0-9 ]+$ pattern blocks all SQL injection attempts. They don't realize that MULTILINE changes how ^ and $ anchors behave. Security researchers know that a single control character can split validation logic across lines, bypassing even careful regex checks. Exploit this documented vulnerability and demonstrate why regex patterns cannot secure SQL queries.
Launch your dedicated AWS machine to begin hacking
This challenge demonstrates how flawed regex-based input validation fails to prevent SQL injection attacks. Developers often use regex patterns to block dangerous keywords, but case sensitivity and incomplete validation allow bypasses.
A corporate user directory implements regex filtering to prevent SQL injection. The filter blocks semicolons and backslashes, plus uppercase SQL keywords, but can be bypassed using lowercase syntax to extract the flag from the database.
Enter your email to continue
Choose a username to get started
We've sent a 9-character code to your email