This document provides a tutorial on exploiting MySQL injection vulnerabilities to extract information from a database. It begins by introducing SQL injection and MySQL. It then walks through testing for vulnerabilities, exploiting a sample site to get the MySQL version, user, databases, tables, and columns. The document demonstrates how to use these techniques to retrieve usernames and passwords stored in the database. The goal is to illustrate how an attacker can access sensitive information by chaining together SQL injection commands.