This project mainly uses load data local infile to obtain any files of the attacker's host (Windows platform), and the files to be visited can be listed in file.txt This will be very meaningful when we can control the connection configuration of Mysql in some cases.
Step 1:start Fake Mysql server
python2 Mysql-Read.py
Step 2:Connect malicious server