Now with all programs like these, it is essentially very easy to know the process of running the application, without actually knowing the theory of how the program is working. Also there is now a SQL injection drop down box, you can configure that to determine which SQL injection you want to produce the errors. Configure your settings to that of your internet standards. To get there click on the Vuln.SQLi tab
Sqli dumper range archive#
Now comes the beauty of this program, the ability to inject chosen SQL into the archive to find a vulnerability. * on a side note, you can change these values for different sites *\ Once, we have our settings dialed right, we have to click "Start Scann SQLi" and away we go. Timeout of 5 seconds (increase this if your internet is slow and vice versa) This is going to be our first search type: So for this example we are going to be searching for pages with SQL based queries. This tab basically allows us to put in which criteria we want to scan for, and from what search engine we are going to do it from.
Logically, if we are to have any chance of finding an exploit, we must first have our archive of possible, vulnerable sites. Okay, well now you should have to program open and on the page you should see essentially a blank page, which at the top has a set of tabs: Once u have it downloaded, extract the files and save it to a safe and secure folder and open the program. To get the program, all we have to do is download it from this site: Click Me
Sqli dumper range how to#
In this article, my goal is to basically run you through how to use MySQLi and also run through a bit of the theory behind the exploit/attack.īefore we begin scanning any sites, we must first all have our own copies of the program. However, i had to spread the word.īasically the role of a scanner is to use search engine's results (Google/Yahoo) to find pages that have queries that may be vulnerable. Now it has only been recently that i have discovered the uses of having a SQL scanner, and i have still not yet mastered it or configured it to a wider range of exploits. Welcome to my second article, in this article basically we will be looking at the program: MySQLi Dumper, which is a SQL vulnerability Scanner, that deals with the dumping of data through SQL injection. Blah blah blah.don't do anything stupid guys. We by no means encourage or take responsibility of the tutorial of this program.