**https://portswigger.net/web-security/sql-injection/lab-login-bypass**
This lab contains an SQL injection vulnerability in the login function.
To solve the lab, perform an SQL injection attack that logs in to the application as the administrator
user.
so try to inject in username with administrator and reject the password field
SOLVED
What happened in the backend:
SELECT * FROM users WHERE username = 'administrator'--' AND password = ''