You are on page 1of 15

learntocrack.

com
Copy to : Everyone Ebook By DonXirus
Copy to : Everyone Ebook By DonXirus

SQLI DUMPER TUTORIAL


Here I will teach you a tutorial on how to use SQLi Dumper. It doesn't take long to just go straight to
the point . Most of you Know how to use Sqli Dumper, but i want to make this E-Book as Title say it
(AIO Dorks Making) and help newbies too to get some skills on cracking world. And the Next
Chapter V 1.03 will be about some Good methods that i usualy used to get my Database, and as you
did read on the first Version 1.0, Dorks are like Dough, you can play with them as you want, using
different ways and methods, with any possible combinations, to Make Sense to your Database. So
let’s start with this chapter. And learn something new.

1- DOWNLOAD SQLi Dumper V8.3


Link Download >>>>> Here
2- After the download is downloaded extract the .rar file

3- After extracting we open the SQLi Dumper 8.3.exe file


4- Make dorks that we will use for the Target. Try to see the tutorial on the e-book Methods.

5- Tabs appear as shown below, then we enter the dorks that we will use for our Target. My
advice is to use only 15k so that the Sqli dumper will not crash,
6- Now connect your choosing vpn, i preffer zenmate, express vpn with Mouse and Keyboard
Recorder for auto ip switch every 1 min. then we click the Start Scanner in the top right corner.

A- Scanning Dorks
Copy to : Everyone Ebook By DonXirus

7- Wait until you get at least 50K+ urls as result like on the creen bellow.

8- After the Start Dorks Scanner process is complete, then we open the Exploitables tab. After
entering the Exploitables tab, click the Start Exploiter again as shown in the following picture.

B- Scanning forExploitables
Copy to : Everyone Ebook By DonXirus

9- After the start exploiter process is complete we will get a result like this as on the screen
bellow.
I did stop scanning to give you just an example. But you need to keep scanning until all URLs
are done.

10- Now enter the next tab, the Injectables tab. Almost the same as in the tab before, we
only need to click Start Analizer in the upper right corner of the tab. as in the following picture.
Copy to : Everyone Ebook By DonXirus

C- Scanning for Injectables


11- After the process is 100% complete there will be a result like this.
Copy to : Everyone Ebook By DonXirus

12- Now select all those injectable urls then follow the screen bellow
Copy to : Everyone Ebook By DonXirus

D- Dumping Phase
13- Then a small table will apear and start giving you every Urls Content, Email, Pass, User
like on the screen bellow.
Copy to : Everyone Ebook By DonXirus

14- Now it’s time to check all those urls one by one,
1- For Combos ( email :pass , User, pass) Check Rows as on the screen bekllow
2- 6708 is our target combo with the same count of (6708 email = 6708 user = 6708 pass)
3- Now click on the url then go to Dumper & click on New dumper instance.
Copy to : Everyone Ebook By DonXirus

4- You will get a Dumper like this.

5- Click avepa_users then another click on Get Columns.


6- Now as you can see we get the Content of avepa_users Table.
7- Check Email, username, & password.
Copy to : Everyone Ebook By DonXirus

8- Now Before you start dumping, follow the options as on the screen bellow. When all is set up
as well click on Dump Data and wait untill the dumping procces is 100% done.

9- when the Dumping is 100% done click on Export Data.


Copy to : Everyone Ebook By DonXirus

10- You will get a small table like this, now click on Custom, then put ( : ) as separator then click
start and choose where to save your combo.

11- So our combo is dumped and saved with no problems.

12- At this time the password of our e-mail can still be HASH. Next we change the next hash to the
original password.

13- But now i need to tell you one thing that you need to know before starting the first Dorks
scanning phase.

Infos that you need to know :


a- Use VPN while scanning Dorks.
b- Don’t use proxies you will not get google Urls.
c- Use proxies only when scanning for exploitable, injectables & stop the VPN.
d- For VPN you need to choose one that have HQ ip addresses.
e- VPN is using tunnels like (IKEV2, L2TP... Protocols thats why it can get into google urls.
f- HQ Proxies are using Rotated ip addresses, but it will be slow while scanning for google
Urls.
g- You don’t need proxies or vpn on dumping phase.
h- You can setup Mouse and Keyboard Recorder for auto ip switch every 1 min on the VPN.
--------------------------------------------------------------------------------------------------------------------------

SQLI DUMPER TUTORIAL DONE


Go to the next Step
Dorks Methods
Copy to : Everyone Ebook By DonXirus

Three New Dork Methods.


Now I’m sure that every one of you will know how to create those
Dorks, Everything explained in the E-Book Version 1.0
&
for Customers that have bought Dorky Dorker, they can edit the
presets to create faster Dorks. Using any deserved Method.
So just try to make a small look on the 3 Dorks examples then try to
practice on any Dorker, i recommend to use Dorky Dorker

--------------------------------------------
A- Mysql Warning Dorks method
1- Mysql Warning Dorks method  Getting mysql database

 Keep the form & just replace the Warnning with your diserved target Keyword
"id=" & intext:"Warnning: mysql_fetch_array()
"id=" & intext:"Warnning: getimagesize()
"id=" & intext:"Warnning: session_start()
"id=" & intext:"Warnning: mysql_num_rows()
"id=" & intext:"Warnning: mysql_query()
"id=" & intext:"Warnning: array_merge()
"id=" & intext:"Warnning: preg_match()
"id=" & intext:"Warnning: ilesize()
"id=" & intext:"Warnning: filesize()
Copy to : Everyone Ebook By DonXirus

B- Mysql Error Dorks method

2- Mysql Error Dorks method  Getting random SQL database

 Keep the form & just replace the +site: (X domain) to your diserved country
like +site:Fr, +site:Pl, +site:Com ...
intext:"error in your SQL syntax" +site: (X domain)
intext:"mysql_num_rows()" +site: (X domain)
intext:"mysql_fetch_array()" +site: (X domain)
intext:"Error Occurred While Processing Request" +site: (X domain)
intext:"Server Error in '/' Application" +site: (X domain)
intext:"Microsoft OLE DB Provider for ODBC Drivers error" +site: (X domain)
intext:"Invalid Querystring" +site: (X domain)
intext:"OLE DB Provider for ODBC" +site: (X domain)
intext:"VBScript Runtime" +site: (X domain)
intext:"ADODB.Field" +site: (X domain)
intext:"BOF or EOF" +site: (X domain)
intext:"ADODB.Command" +site: (X domain)
intext:"JET Database" +site: (X domain)
intext:"mysql_fetch_row()" +site: (X domain)
intext:"Syntax error" +site: (X domain)
intext:"include()" +site: (X domain)
intext:"mysql_fetch_assoc()" +site: (X domain)
intext:"mysql_fetch_object()" +site: (X domain)
intext:"mysql_numrows()" +site: (X domain)
intext:"GetArray()" +site: (X domain)
intext:"FetchRow()" +site: (X domain)
intext:"Input string was not in a correct format" +site: (X domain)

3- Mysql Error Dorks method  Getting Shopping database

 Keep the form & just replace the "keywords" to your diserved target & you
can change Country domain +site:. (X domain) but this time use (+site:.)
inurl:".php?cat="+intext:"Paypal"+site:.(X domain)
inurl:".php?cat="+intext:"/Buy Now/"+site:. (X domain)
inurl:".php?cid="+intext:"online+betting"
inurl:".php?id=" intext:"View cart"
inurl:".php?id=" intext:"Buy Now"
inurl:".php?id=" intext:"add to cart"
inurl:".php?id=" intext:"shopping"
inurl:".php?id=" intext:"boutique"
inurl:".php?id=" intext:"/store/"
inurl:".php?id=" intext:"/shop/"
inurl:".php?id=" intext:"toys"
inurl:".php?cid="
inurl:".php?cid=" intext:"shopping"
inurl:".php?cid=" intext:"add to cart"
Copy to : Everyone Ebook By DonXirus

I Hope you Enjoy reading This Chapter

Happy Cracking
&
Have A Nice Day

You might also like