
Exploiting the vulnerable site ♻Open Havij and paste site url in target field and hit enter.Now wait for Havij to get all the databases of the website.Now the hacker clicks on available database of site and click on Get Tables. Things you will need 1⃣Havij SQL injection Tool 2⃣A SQL vulnerable site 3⃣A very important thing you will need: your mind Checking for SQL vulnerability ♻Now to check if a site is vulnerable to a verbose SQL injection, a hacker will simply add ‘ (apostrophe) after the site url like this: ′ and the hacker will get this error on the site You have an error in your SQL syntax check the manual that corresponds to your MySQL server version for the right syntax to use near ‘\” at line 1 ♻It means that site is vulnerable to SQL injection. ⚠Note Databases are like excel so don't be confused if I talk about rows and columns. By using Database hacking techniques( SQL injection, cross site scripting, Remote file Inclusion) ♻In this tutorial I will teach you Database hacking by SQL injection (I will use SQLi from now).


💳CREDIT CARD HACKING 💳 🤑 😕 ♻Credit cards can be hacked by two methods( what I know) 1.
