That's all! We press "Launch Scanner" and wait for the end of the process.Īfter the links are parsed, go to the "SQL Injection" tab and click "Run Exploiter" at the bottom left, waiting for the end. Right in the window with the dorks, you can / need to add some keywords through the space in order to diversify the search, for example: There are a lot of them and it is easy to google them on the Internet, there are already several in SQLi Dumper v.9.7. After the proxies are checked, right-click on them -> Select All and click the checkbox next to any of them, so we will select all the proxies for work. If you wish, you can check them for validity right in the program, for this we press the "Check Proxy" button in the upper right corner. Today we are again performing SQL injection manually on a live website in order to reduce your stress of installing setup of dhakkan. Copy them to the clipboard, in SQLi Dumper go to the "Proxy List" tab and click on the "Apprend" button in the upper left corner, a small window will appear where you need to select the type of your proxies and click "ok", the proxies will be loaded into the program. This article is based on our previous article where you have learned different techniques to perform SQL injection manually using dhakkan. Find a list of live proxies on the network (you can parse without them, but it's better with them). Before starting work, it is better to expand the program to full screen so that all the controls would fit.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |