SQLMap Essentials - Bypassing Web Application Protections: Case#11

Struggling so hard with this module. No clue why this isn’t clicking for me. Considering there aren’t any that apply to ‘<’ symbols, can anyone confirm if we need write a custom tamper script for this?

edit**not including the ‘least’ script

EDIT* I’m reluctant to post anymore details for fear of spoilers. If anyone can pm me about this one, I’d be very appreciative.

No custom tamper needed.
Try to focus in the lessons learned in the previous sections in order to get the flag

That doesn’t help. Just capture the request in burp, and I personally add the tamper flag. It takes some time.