Now we will specify the database using -D, the table using -T, and then request the columns using --columns.I hope you guys are starting to get the pattern by now. It might contain the username and passwords of registered users on the website (hackers always look for sensitive data). Try to look at other columns and tables and see what you can dig up.First off, you need to have Kali linux (or backtrack) up and running on your machine.
This is just what you've been searching long and hard for - and we're offering it up to you 100% completely free of charge!Now, if you were following along attentively, now we will be getting data from one of the columns. Okay, nothing great, but in the real world web pentesting, you can come across more sensitive data. Take a look at the previous tutorial on Manual SQl Injection which will help you find more interesting vulnerable sites.While that hypothesis is not completely wrong, its time we go one step ahead. As usual, we will specify the database with -D, table with -T, and column with -C. Under such circumstances, the right thing to do is mail the admin of the website and tell him to fix the vulnerability ASAP. Our aim is to be as all inclusive as possible, and because of that, we make sure we have something to offer for any and all tastes.So whatever it is that tickles your fancy, be it teens, MILFs, couples, gays, shemales, or anything else, we've got them here broadcasting live.