This document provides instructions for uploading a PHP shell to a vulnerable website using SQL injection. It begins by creating a vulnerable PHP page and MySQL database. SQL injection is then demonstrated by manipulating the 'id' parameter. The number of columns in the database table is determined. Hexadecimal encoding is used to insert a PHP uploader script into the database as a file. The uploaded file path is then manipulated to execute the PHP shell.