Welcome to DevilGroup - Carding Forum - Free Premium Accounts

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features such as download links. by joining our free
community you will have access to posts topics,communicate privately with other members (PM),respond to polls,upload content and access many other special features.
Registration is fast,simple and absolutely free so please,
 Click Sign up Button For Register 

- Advertisement Area -
For purchasing Ads contact ICQ : 623378515 
http://cloud-shack.com/ https://rescator.cm/
Sign in to follow this  
Mr Bomb

SQL Injection Tutorial With Havij

8 posts in this topic

Disclaimer – Our tutorials are designed to aid aspiring pen testers/security enthusiasts in learning new skills, we only recommend that you test this tutorial on a system that belongs to YOU. We do not accept responsibility for anyone who thinks it’s a good idea to try to use this to attempt to hack systems that do not belong to you


Things you will need


  • Havij SQL injection Tool: There is a free version HERE
  • A SQL vulnerable test site (we recommend something like DVWA)
  • A very important thing you will need: your mind

Checking for SQL vulnerability


Now to check is this site vulnerable to a verbose SQL injection, a hacker will simply add ‘ (apostrophe) after the site url like this:


and the hacker will get this error on the site

You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ‘\” at line 1

It means that site is vulnerable to SQL injection.

Exploiting the vulnerable site


  • Open Havij and paste site url in target field and hit enter.
  • Now wait for Havij to get all the databases of the website.
  • Now the hacker clicks on available database of site and click on Get Tables. Here, they select 535480_toyonorte for this site like in this image:


  • By clicking Get Tables Havij will look after the tables available in the database.
  • Now after the scanning Havij will get all tables, now the main work will start , they must check if there table available with a name that has something to do with admin, users and something similar. Here, we have a table called usuario in this website. It is selected and then click on Get Columns.


  • Now after clicking Get Columns havij will get all the columns available in users table.
  • In this case, the hacker found different columns like id, login, pass and many more.
  • Now select the columns and click on Get Data like in pic given below.


Now havij will look after the data available in columns login and password i.e admin username and password like i getusername –> adminpassword–> 21232f297a57a5a743894a0e4a801fc3 (in encrypted form)Such as in the image below


  • Now after they have found the username and password there is a problem. The password is encrypted in md5 language , so the hacker must crack it .
  • To crack encrypted password the hacker copies the password click on MD5 tab in havij and paste the encrypted password in MD5 hash field and hit start. Now havij will try to crack the password.


  • Now they get the Password cracked for admin.
  • The hacker will check for admin panel where they will login with username and password.
  • To find admin panel click Find Admin tab in Havij and click start. Now havij will check the admin panel of website.

In this case, they found http://site.com.co/admin/ as admin panel and open it in a web browser. They login with username and password and now they have control of the website.

Share this post

Link to post
Share on other sites

That's a good easy to understand tutorial. Thanks for the share

Share this post

Link to post
Share on other sites

nice tutorials, thanks

Share this post

Link to post
Share on other sites

i need this tutorials, thanks

Share this post

Link to post
Share on other sites

a thousand thanks for the explanation tutorial

Share this post

Link to post
Share on other sites

Can this tool make a perfect dump of data big data?..

Share this post

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
Sign in to follow this