SQLi Exploitation
Discover SQL Injection vulnerabilities in web applications.
Access SQLi Exploitation via the Navigation Menu
note
Users can scan using VAPT Tools via the "VAPT Tools" navigation menu. By clicking on the "VAPT Tools" menu, various tools will appear, then click SQLi Exploitation tool.
To scan using SQLi Exploitation, users can follow these steps.
- Enter the task name in the Task Name textbox
- Input the target value in the form of domain/URL/IPs
- Select one of the scan options between domain, direct, or request
- If the user selects Domain, then only fill in the target value in the form of a domain
- If the user selects Direct, the path filling will appear
- If the user selects Request, a request (required) and parameters (optional) will appear.
- Click the agree Terms of Service checkbox
- Click the Apply button to start the scan
Access SQLi Exploitation Via Targets Page
note
The selected target will be scanned with the available tools. Select SQLi Exploitation Tool
To scan using SQLi Exploitation, users can follow these steps.
- Enter the task name in the Task Name textbox
- Select one of the scan options, namely Domain, Direct, or Request
- If the user selects Domain, then only fill in the target value in the form of a domain
- If the user selects Direct, the path filling will appear
- If the user selects Request, a request (required) and parameters (optional) will appear.
- Click the agree Terms of Service checkbox
- Click the Start Scan button to start the scan, click Cancel if you want to cancel