We can used sqlmap how example or articles for example: https://www.exploit-db.com/papers/13045/ https://www.sans.org/reading-room/whitepapers/securecode/sql-injection-modes-attack-defence-matters-23 https://www.exploit-db.com/papers/12975/