We use google hacking to find vulnerable websites !! Google Hacking is an another module of C|EH which ill discuss after this module!!
Now we will use some dorks to find sql vulnerable websites !!! Just copy one dork in google search engine and c the result, there comes lot of websites with id=? . Mostly 50% of them are sqli vulnerable .