* Register a new victim user account to Wasdat with email of "wasdat-victim@example.com" with password "qwerty".
* Find SQL injection vulnerability in Wasdat's login (2 pts)
* ~~Login as~~ Get JWT authentication token for wasdat-victim@example.com by exploiting SQL injection vulnerability (2 pts)
* Optional: If you want to see the client application get logged in as victim user, you'd need to intercept modify the outgoing POST request on the fly with e.g. Burp Suite (proxy+intercept).