Now find all the injectables & sql injection vulnerable websites from the url list that we created in earlier class using EZ Dork Searcher, to dump their data base and then in next class we will dump them & dehash them 🙂