Step 8: Once you have all exploitables go to "Injectables" tab and click "Start Analizer" wait for it to finish finding the injectables out of all the exploitables. Step 7: Once urls are finished being collected click "exploitables" tab then click " start exploiter" wait for it to scan through all urls and find the exploitable ones. For enough urls to get a good Database try having at least 2000-5000. i think it stops at 150% you can always stop when you think its collected enough dorks. note: it will go even further then 100% don't freak out. Wait for dorks to finish scanning and collect all urls for you. Step 6: On SQLi Dumpers Main page where the dorks are. Step 5: (Optional) Load your elite proxylist into SQLi by clicking the " Tools&Settings" Tab, Then "Proxy" Tab.Copy and paste your proxies or try using a VPN on your desktop to change your ip so you dont get temp ip banned when scanning dorks and stay safer also.( if using a windows VPS or RDP you dont need a proxylist or VPN unless you are temp ip banned, its usually faster without them though) Now load your dorks to SQLI dumper by copying and pasting. Step 3: Use the program Combo# To scrape some elite proxies If desired. link to free dork generator - ez dork gen - Click Here or Combo# Click Here Step 2: Find Dorks, use a dork generator, or buy some privately made ones or paid dork gen. HOW TO USE SQLI DUMPER & CRACK HASHED PASSWORDS AFTERWARDS 2022
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |