Why I know that. If you get used to SQL injection, you will be sensitive with where the information is leaked.
But in this challenge, there are a lot of characters and words are filtered. I will list some I met: or, and, ||, /**/, union, select, join, whitespace, like, =, %0a, %0b, %0c, ',comma(,),...
But with select and union, just upercase is filtered, when I change these words to lowercase, we can bypass.
With these information, my idea is use UNION and SELECT to leak information from table membres. Table name and columns name is provide, you can view source to see:
If don't have above provided information, this challenge will become very difficult because when I test, information_schema.tables, =, like are filtered so we can't leak table name as well as columns name easily.
Okay, back to challenge, because whitespace and many tab character is filter so I will use %09 to replace for whitespace.