Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



   30322

SQLi DUMPER 9.7 TUTORIAL - MAKE YOUR OWN COMBOS

by Jowka - 27 November, 2019 - 01:07 PM
This post is by a banned member (ofaruka) - Unhide
This post is by a banned member (soloweb) - Unhide
soloweb  
Registered
15
Posts
0
Threads
4 Years of service
#98
jtdrseryvfsd
This post is by a banned member (lorenzomail31) - Unhide
5
Posts
0
Threads
4 Years of service
#99
thanks for sharing
This post is by a banned member (calcehero06) - Unhide
5
Posts
0
Threads
3 Years of service
tytytyty
This post is by a banned member (Anonymus3657) - Unhide
33
Posts
0
Threads
4 Years of service
(27 November, 2019 - 01:07 PM)Jowka Wrote: Show More
SQLi DUMPER 9.7 TUTORIAL

Even though SQLi dumper changes slightly each version, the principles are the same so if you use 8.3/8.5 etc it shouldn't matter as the basics are the same.


This tutorial involves the usage of proxies and dorks. If you are unaware of how to create or gather these yourself there are other tutorials and dork and proxy lists posted by myself and other members in the relevant sections on this forum.

Step 1) You're gna wanna start by preparing a dork list. There are tools on here that can help you do it or you can just google for them but public dorks wont get you the best results. There are some paid services such as Ezdork etc. This part is up to you. You also want to prepare a proxy list. 

Adding proxies is the first thing you're going to want to do, so click "Proxies List" you will see on the toolbar at the top a button called "Apprend" 

[Image: 3571yd.png]

Make sure that you have your chosen proxies copied to your clipboard and select "https/socks4/socks5" depending on which proxies you are copying into sqli dumper.


Step 2) Once you have got your dork list you're gna wanna go ahead and open up SQLi Dumper. Below is what 9.7 looks like, your version will look something similar.


[Image: wuc3P3.png]

Now in that picture above where you see "inurl:" in a list is where you copy and paste your chosen dorks. If this is your first time using the program then the second part of the program where you see "https://" in a list will be blank for you, this is normal.


Step 3) Now you are ready to start scanning, so in the bottom left of the program where it says "Start Scanner" with a big green play button, you wanna hit that. 

[Image: lvUdpr.png]

Depending on how many dorks you've chosen to use, and how many threads you set along with the internet speed and overall power of your PC or RDP this may take some time. You wanna leave it for at least a couple of hours to a  couple of days.


Step 4) You will have noticed that your 'Scanner' option on the left hand side has started to go up in numbers as mine does in the image below showing 23k links. 

[Image: yhOuC0.png]



Step 5) Click into your SQL Injection tab on the left hand side (other versions this will be called exploitables) Set the threads (I usually use 200) and click "Start Exploiter"

[Image: Ze4vFZ.png]



Step 6) You will eventually see websites starting to fill up in the SQL Injection or "exploitables" section of SQLi Dumper

[Image: hdjrIj.png]

Again the speed of this process completely depends on your internet speed and overall performance of your PC or RDP. Once this has finished running and checking all of the sites from your "scanner" list you can either double click any of the websites or right click and then click "Go Dumper"

[Image: NiS0se.png]


Step 7) You will be taken to the dumper module, which looks like this: 

[Image: oaC9HJ.png]

In your list you will see the database name for the MYSQL database the website you are exploiting is using. You need to click the database name and then click the "Get columns" button. 

This will start to pull through all the tables within that specific database. You are usually going to be looking for something along the lines of "users" "customers" "members" "logins" that type of thing. Some/a lot of websites/stores, etc will use prefixes too such as "pvt_users" "forum_members" etc.

Step 8) When you have generated all the tables for your chosen website, you will then presented with something that looks similar to this:

[Image: MoYTel.png]

Notice how I've already highlighted and found the "ns_users" table? This is the most likely place that the "email" and "password" columns will be stored and if we are looking to make a combo list that's exactly what we want. 

Highlight over your chosen table and click "Get columns"

[Image: g1ktqy.png]

Now some websites may store their emails separately to where they store passwords (eg a forum that requires login via username and only stores emails for a newsletter)  but this is still fine and User:Pass combo lists are still insanely useful. On the website I've happen to choose while writing this tutorial its a User:Pass type of website.

[Image: GeKMB3.png]

Now you select the data you want to dump like the picture above and click the "dump data" button.

[Image: CF1obP.png]

This will change your data dumper screen a little when it starts to gather the data from the columns. You should end up with something that looks like this: 

[Image: xKLaUY.png]

Websites that have multiple tables (this has over 60) you will need to go through and keep searching until you find the one thats storing the userbase information. This table I've stumbled across appears to be for some type of admin login either with their CMS, shopping system or forum/blog. If you are wanting to go down the route of exploiting their admin panel you certainly can and could even potentially gain access to the site and root the server and use for your own purposes along with being able to then strip the data of every other website hosted on that server, however that's a tutorial for another day. 

This should get you moving with the basics of SQLi Dumper, if you have any questions ask in the thread, do not PM me.

ty dude
This post is by a banned member (shabdarof) - Unhide
shabdarof  
Registered
22
Posts
0
Threads
3 Years of service
thanks bro
This post is by a banned member (elad8021) - Unhide
elad8021  
Registered
9
Posts
0
Threads
5 Years of service
seems good
This post is by a banned member (noname43) - Unhide
noname43  
Registered
33
Posts
0
Threads
3 Years of service
thx m8

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 4 Guest(s)