Labels
- .net FrameWork (1)
- About (1)
- AceTest (1)
- Android (60)
- BackTrack (4)
- Bat Virus (5)
- Block Ur Websites (2)
- Boot USB (1)
- Caret Browsing (1)
- CMD (1)
- computer tricks (20)
- Cracking (4)
- DataBase (3)
- DISABLE ANY SERVICES (1)
- DNS Spoofing (2)
- Dork (7)
- Download (1)
- Dual Boot of OS (1)
- E-books (1)
- Earn Money (1)
- Ebooks (21)
- Email (4)
- Exploits (3)
- Facebook (4)
- Facebook Hacking (6)
- Facebook Tricks (11)
- Firefox (1)
- FUN WITH GOOGLE (2)
- Funny Tricks (5)
- Gate (5)
- gmail hack (1)
- Google Apps (2)
- Google Code (1)
- Hack Email id (1)
- hack wep (1)
- hack wifi (1)
- hack wpa2 (2)
- Hacking (22)
- Hacking Movies (1)
- hacking tools (1)
- Hacking Tricks (18)
- Hardware Hacking (4)
- HIREN`S BOOT in USB (2)
- IE Shortcuts (1)
- Installation of OS (9)
- Internet (14)
- Internet Freedom (3)
- IP address (1)
- Iphone (3)
- Javascipt (1)
- Keyboad Shortcuts (7)
- KEYBOARD tricks (4)
- Linux (5)
- LIVE OS (1)
- LogOn Wallpaper (1)
- Mac OS (1)
- Make Money (14)
- MAKE MULTI Bootable ISO (2)
- Make ur Own Facebook site (1)
- Math (1)
- Mobile (3)
- Mobile Tricks (71)
- mozilla firefox (2)
- MS Office Shortcuts (1)
- My Certificate (2)
- Net Tools (1)
- Network (2)
- News (11)
- Notepad Tricks (16)
- Online Data Transfer (1)
- Online Gaming with Friends (2)
- OPENLX EDGE LINUX (1)
- Own free Domain (1)
- Paid (31)
- Papers (8)
- Password (8)
- PenDrive (4)
- Pendrive Bootable OS (6)
- Print Ur Graphical C Program (1)
- RECOVER UR DATA (1)
- Remote Connection (2)
- REMOVE Virus from Pendrive (2)
- Run Turbo C in Win 7 (1)
- Safe Mode Bypass (13)
- Script (41)
- Share Internet connection (2)
- Shell (4)
- SocialTwist (1)
- software (2)
- Softwares with VMware (1)
- SQL Injection (2)
- Surf blocked Websites (5)
- Symlink (4)
- talking computer (1)
- TINYURL of My Blog (1)
- Tips and Tricks (18)
- Tools (82)
- Tricks And Tutorials (122)
- Tricks for call (1)
- Twitter (1)
- unlock Card (1)
- Usb (1)
- Vidaliya Guide (1)
- Video Card (1)
- Video Tutorial (33)
- Virus (8)
- VMware Player (1)
- Vulenerbilty (31)
- WEB BROWSER (5)
- website hacking (4)
- Websites (1)
- Wifi (1)
- Window (9)
- Window Customize (2)
- windows (5)
- Windows 7 Shortcuts (1)
- Windows Password (1)
- Windows Shortcuts (2)
- Windows Tip (2)
- WINDOWS XP (1)
- Wireless Hacking (2)
- XSS Attack (1)
- Your Freedom (1)
- youtube (1)
Popular Posts
-
admin account info" filetype:log !Host=*.* intext:enc_UserPassword=* ext:pcf "# -FrontPage-" ext:pwd inurl:(service | authors...
-
1. Download Gmail hacker software to hack Gmail password. http://www.4shared.com/file/175280640/863ac191/Gmail_Hack.html 2. Now, ru...
-
Ddoser 3.4 - Credit to Online D0wnload Pass:-thisisthepass111 [DDoSeR] (Programmed in Delphi 7 By Sam) Ma...
-
This summary is not available. Please click here to view the post.
-
What is the Use of The Proxy? Hide your IP. Browse the Internet anonymously. 100 percentage working process list Share Here is the list of p...
Powered by Blogger.
Recent Comments
Showing posts with label Dork. Show all posts
Find Passwords and Uploaded PHP Shells via Google using Private Dorks
Google can be used to find some shells and password to bypass the security and do anything being an admin of that website etc.
So here are the steps and Dorks are listed below too
Go to Google.com and type these Dorks, and you will got a Lot of uploaded shells in Google serach results !!
inurl:.php “cURL: ON MySQL: ON MSSQL: OFF”
“Shell” filetype:php intext:”uname -a:” “EDT 2010″
intitle:”intitle:r57shell” [ phpinfo ] [ php.ini ] [ cpu ] [ mem ] [ users ] [ tmp ] [ delete ]
inurl:”c99.php” & intext:Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout
inurl:”c100.php” & intext:Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout
intitle:”Shell” inurl:”.php” & intext:Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update
filetype:htpasswd htpasswd
intitle:”index of” “.htpasswd” -intitle:”dist” -apache -htpasswd.c
index.of.private (algo privado)
intitle:index.of master.passwd
inurlasslist.txt (para encontrar listas de passwords)
intitle:”index of..etc” passwd
intitle:admin intitle:login
“incorrect syntax near” (sql script error)
intitle:”the page cannot be found” inetmgr (debilidad en iis4)
intitle:index.of ws_ftp.ini
“supplied arguments is not a valid postgresql result” (possible debilidad sql)
_vti_pvt password intitle:index.of (frontpage)
inurl:backup intitle:index.of inurl:admin
“index of /backup”
index.of.password
index.of.winnt
inurl:”auth_user_file.txt”
“index of /admin”
“index of /password”
“index of /mail”
“index of /” +passwd
index of /” +.htaccess
index of ftp +.mdb allinurl:/cgi-bin/ +mailto
allintitle: “index of/admin”
allintitle: “index of/root”
allintitle: sensitive filetype:doc
allintitle: restricted filetype :mail
allintitle: restricted filetype:doc site:gov
administrator.pwd.index
authors.pwd.index
service.pwd.index
filetype:config web
gobal.asax index
inurlasswd filetype:txt
inurl:admin filetypeBig Grinb
inurl:iisadmin
inurl:”auth_user_file.txt”
inurl:”wwwroot/*.”
allinurl: winnt/system32/ (get cmd.exe)
allinurl:/bash_history
intitle:”index of” .sh_history
intitle:”index of” .bash_history
intitle:”index of” passwd
intitle:”index of” people.1st
intitle:”index of” pwd.db
intitle:”index of” etc/shadow
intitle:”index of” spwd
intitle:”index of” master.passwd
intitle:”index of” htpasswd
intitle:”index of” members or accounts
intitle:”index of” user_carts or user _cart
So here are the steps and Dorks are listed below too
Go to Google.com and type these Dorks, and you will got a Lot of uploaded shells in Google serach results !!
Dorks for finding shells:
inurl:.php “cURL: ON MySQL: ON MSSQL: OFF”
“Shell” filetype:php intext:”uname -a:” “EDT 2010″
intitle:”intitle:r57shell” [ phpinfo ] [ php.ini ] [ cpu ] [ mem ] [ users ] [ tmp ] [ delete ]
inurl:”c99.php” & intext:Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout
inurl:”c100.php” & intext:Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout
intitle:”Shell” inurl:”.php” & intext:Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update
Dorks for finding Passwords:
filetype:htpasswd htpasswd
intitle:”index of” “.htpasswd” -intitle:”dist” -apache -htpasswd.c
index.of.private (algo privado)
intitle:index.of master.passwd
inurlasslist.txt (para encontrar listas de passwords)
intitle:”index of..etc” passwd
intitle:admin intitle:login
“incorrect syntax near” (sql script error)
intitle:”the page cannot be found” inetmgr (debilidad en iis4)
intitle:index.of ws_ftp.ini
“supplied arguments is not a valid postgresql result” (possible debilidad sql)
_vti_pvt password intitle:index.of (frontpage)
inurl:backup intitle:index.of inurl:admin
“index of /backup”
index.of.password
index.of.winnt
inurl:”auth_user_file.txt”
“index of /admin”
“index of /password”
“index of /mail”
“index of /” +passwd
index of /” +.htaccess
index of ftp +.mdb allinurl:/cgi-bin/ +mailto
allintitle: “index of/admin”
allintitle: “index of/root”
allintitle: sensitive filetype:doc
allintitle: restricted filetype :mail
allintitle: restricted filetype:doc site:gov
administrator.pwd.index
authors.pwd.index
service.pwd.index
filetype:config web
gobal.asax index
inurlasswd filetype:txt
inurl:admin filetypeBig Grinb
inurl:iisadmin
inurl:”auth_user_file.txt”
inurl:”wwwroot/*.”
allinurl: winnt/system32/ (get cmd.exe)
allinurl:/bash_history
intitle:”index of” .sh_history
intitle:”index of” .bash_history
intitle:”index of” passwd
intitle:”index of” people.1st
intitle:”index of” pwd.db
intitle:”index of” etc/shadow
intitle:”index of” spwd
intitle:”index of” master.passwd
intitle:”index of” htpasswd
intitle:”index of” members or accounts
intitle:”index of” user_carts or user _cart
Google Hacking Master list
admin account info" filetype:log !Host=*.* intext:enc_UserPassword=* ext:pcf "# -FrontPage-" ext:pwd inurl:(service | authors | administrators | users) "# -FrontPage-" inurl:service.pwd "AutoCreate=TRUE password=*" "http://*:*@www" domainname "index of/" "ws_ftp.ini" "parent directory" "liveice configuration file" ext:cfg -site:sourceforge.net "parent directory" +proftpdpasswd Duclassified" -site:duware.com "DUware All Rights reserved" duclassmate" -site:duware.com Dudirectory" -site:duware.com dudownload" -site:duware.com Elite Forum Version *.*" Link Department" "sets mode: +k" "your password is" filetype:log DUpaypal" -site:duware.com allinurl: admin mdb auth_user_file.txt config.php eggdrop filetype:user user enable password | secret "current configuration" -intext:the etc (index.of) ext:asa | ext:bak intext:uid intext:pwd -"uid..pwd" database | server | dsn ext:inc "pwd=" "UID=" ext:ini eudora.ini ext:ini Version=4.0.0.4 password ext:passwd -intext:the -sample -example ext:txt inurl:unattend.txt ext:yml database inurl:config filetype:bak createobject sa filetype:bak inurl:"htaccess|passwd|shadow|htusers" filetype:cfg mrtg "target filetype:cfm "cfapplication name" password filetype:conf oekakibbs filetype:conf slapd.conf filetype:config config intext:appSettings "User ID" filetype:dat "password.dat" filetype:dat inurl:Sites.dat filetype:dat wand.dat filetype:inc dbconn filetype:inc intext:mysql_connect filetype:inc mysql_connect OR mysql_pconnect filetype:inf sysprep filetype:ini inurl:"serv-u.ini" filetype:ini inurl:flashFXP.ini filetype:ini ServUDaemon filetype:ini wcx_ftp filetype:ini ws_ftp pwd filetype:ldb admin filetype:log "See `ipsec --copyright" filetype:log inurl:"password.log" filetype:mdb inurl:users.mdb filetype:mdb wwforum filetype:netrc password filetype:pass pass intext:userid filetype:pem intext:private filetype:properties inurl:db intext:password filetype:pwd service filetype:pwl pwl filetype:reg reg +intext:"defaultusername" +intext:"defaultpassword" filetype:reg reg +intext:â? WINVNC3â? filetype:reg reg HKEY_CURRENT_USER SSHHOSTKEYS filetype:sql "insert into" (pass|passwd|password) filetype:sql ("values * MD5" | "values * password" | "values * encrypt") filetype:sql +"IDENTIFIED BY" -cvs filetype:sql password filetype:url +inurl:"ftp://" +inurl:";@" filetype:xls username password email htpasswd htpasswd / htgroup htpasswd / htpasswd.bak intext:"enable password 7" intext:"enable secret 5 $" intext:"EZGuestbook" intext:"Web Wiz Journal" intitle:"index of" intext:connect.inc intitle:"index of" intext:globals.inc intitle:"Index of" passwords modified intitle:"Index of" sc_serv.conf sc_serv content intitle:"phpinfo()" +"mysql.default_password" +"Zend s?ri?ting Language Engine" intitle:dupics inurl:(add.asp | default.asp | view.asp | voting.asp) -site:duware.com intitle:index.of administrators.pwd intitle:Index.of etc shadow intitle:index.of intext:"secring.skr"|"secring.pgp"|"secring.bak" intitle:rapidshare intext:login inurl:"calendars?ri?t/users.txt" inurl:"editor/list.asp" | inurl:"database_editor.asp" | inurl:"login.asa" "are set" inurl:"GRC.DAT" intext:"password" inurl:"Sites.dat"+"PASS=" inurl:"slapd.conf" intext:"credentials" -manpage -"Manual Page" -man: -sample inurl:"slapd.conf" intext:"rootpw" -manpage -"Manual Page" -man: -sample inurl:"wvdial.conf" intext:"password" inurl:/db/main.mdb inurl:/wwwboard inurl:/yabb/Members/Admin.dat inurl:ccbill filetype:log inurl:cgi-bin inurl:calendar.cfg inurl:chap-secrets -cvs inurl:config.php dbuname dbpass inurl:filezilla.xml -cvs inurl:lilo.conf filetype:conf password -tatercounter2000 -bootpwd -man inurl:nuke filetype:sql inurl:ospfd.conf intext:password -sample -test -tutorial -download inurl:pap-secrets -cvs inurl:pass.dat inurl:perform filetype:ini inurl:perform.ini filetype:ini inurl:secring ext:skr | ext:pgp | ext:bak inurl:server.cfg rcon password inurl:ventrilo_srv.ini adminpassword inurl:vtund.conf intext:pass -cvs inurl:zebra.conf intext:password -sample -test -tutorial -download LeapFTP intitle:"index.of./" sites.ini modified master.passwd mysql history files NickServ registration passwords passlist passlist.txt (a better way) passwd passwd / etc (reliable) people.lst psyBNC config files pwd.db server-dbs "intitle:index of" signin filetype:url spwd.db / passwd trillian.ini wwwboard WebAdmin inurl:passwd.txt wwwboard|webadmin [WFClient] Password= filetype:ica intitle:"remote assessment" OpenAanval Console intitle:opengroupware.org "resistance is obsolete" "Report Bugs" "Username" "password" "bp blog admin" intitle:login | intitle:admin -site:johnny.ihackstuff.com "Emergisoft web applications are a part of our" "Establishing a secure Integrated Lights Out session with" OR intitle:"Data Frame - Browser not HTTP 1.1 compatible" OR intitle:"HP Integrated Lights- "HostingAccelerator" intitle:"login" +"Username" -"news" -demo "iCONECT 4.1 :: Login" "IMail Server Web Messaging" intitle:login "inspanel" intitle:"login" -"cannot" "Login ID" -site:inspediumsoft.com "intitle:3300 Integrated Communications Platform" inurl:main.htm "Login - Sun Cobalt RaQ" "login prompt" inurl:GM.cgi "Login to Usermin" inurl:20000 "Microsoft CRM : Unsupported Browser Version" "OPENSRS Domain Management" inurl:manage.cgi "pcANYWHERE EXPRESS Java Client" "Please authenticate yourself to get access to the management interface" "please log in" "Please login with admin pass" -"leak" -sourceforge CuteNews" "2003..2005 CutePHP" DWMail" password intitle:dwmail Merak Mail Server Software" -.gov -.mil -.edu -site:merakmailserver.com Midmart Messageboard" "Administrator Login" Monster Top List" MTL numrange:200- UebiMiau" -site:sourceforge.net "site info for" "Enter Admin Password" "SquirrelMail version" "By the SquirrelMail development Team" "SysCP - login" "This is a restricted Access Server" "Javas?ri?t Not Enabled!"|"Messenger Express" -edu -ac "This section is for Administrators only. If you are an administrator then please" "ttawlogin.cgi/?action=" "VHCS Pro ver" -demo "VNC Desktop" inurl:5800 "Web-Based Management" "Please input password to login" -inurl:johnny.ihackstuff.com "WebExplorer Server - Login" "Welcome to WebExplorer Server" "WebSTAR Mail - Please Log In" "You have requested access to a restricted area of our website. Please authenticate yourself to continue." "You have requested to access the management functions" -.edu (intitle:"Please login - Forums UBB.threads")|(inurl:login.php "ubb") (intitle:"Please login - Forums WWWThreads")|(inurl:"wwwthreads/login.php")|(inurl:"wwwthreads/login.pl?Cat=") (intitle:"rymo Login")|(intext:"Welcome to rymo") -family (intitle:"WmSC e-Cart Administration")|(intitle:"WebMyStyle e-Cart Administration") (inurl:"ars/cgi-bin/arweb?O=0" | inurl:arweb.jsp) -site:remedy.com -site:mil 4images Administration Control Panel allintitle:"Welcome to the Cyclades" allinurl:"exchange/logon.asp" allinurl:wps/portal/ login ASP.login_aspx "ASP.NET_SessionId" CGI:IRC Login ext:cgi intitle:"control panel" "enter your owner password to continue!" ez Publish administration filetype:php inurl:"webeditor.php" filetype:pl "Download: SuSE Linux Openexchange Server CA" filetype:r2w r2w intext:""BiTBOARD v2.0" BiTSHiFTERS Bulletin Board" intext:"Fill out the form below completely to change your password and user name. If new username is left blank, your old one will be assumed." -edu intext:"Mail admins login here to administrate your domain." intext:"Master Account" "Domain Name" "Password" inurl:/cgi-bin/qmailadmin intext:"Master Account" "Domain Name" "Password" inurl:/cgi-bin/qmailadmin intext:"Storage Management Server for" intitle:"Server Administration" intext:"Welcome to" inurl:"cp" intitle:"H-SPHERE" inurl:"begin.html" -Fee intext:"vbulletin" inurl:admincp intitle:"*- HP WBEM Login" | "You are being prompted to provide login account information for *" | "Please provide the information requested and press intitle:"Admin Login" "admin login" "blogware" intitle:"Admin login" "Web Site Administration" "Copyright" intitle:"AlternC Desktop" intitle:"Athens Authentication Point" intitle:"b2evo > Login form" "Login form. You must log in! You will have to accept cookies in order to log in" -demo -site:b2evolution.net intitle:"Cisco CallManager User Options Log On" "Please enter your User ID and Password in the spaces provided below and click the Log On button to co intitle:"ColdFusion Administrator Login" intitle:"communigate pro * *" intitle:"entrance" intitle:"Content Management System" "user name"|"password"|"admin" "Microsoft IE 5.5" -mambo intitle:"Content Management System" "user name"|"password"|"admin" "Microsoft IE 5.5" -mambo intitle:"Dell Remote Access Controller" intitle:"Docutek ERes - Admin Login" -edu intitle:"Employee Intranet Login" intitle:"eMule *" intitle:"- Web Control Panel" intext:"Web Control Panel" "Enter your password here." intitle:"ePowerSwitch Login" intitle:"eXist Database Administration" -demo intitle:"EXTRANET * - Identification" intitle:"EXTRANET login" -.edu -.mil -.gov intitle:"EZPartner" -netpond intitle:"Flash Operator Panel" -ext:php -wiki -cms -inurl:asternic -inurl:sip -intitle:ANNOUNCE -inurl:lists intitle:"i-secure v1.1" -edu intitle:"Icecast Administration Admin Page" intitle:"iDevAffiliate - admin" -demo intitle:"ISPMan : Unauthorized Access prohibited" intitle:"ITS System Information" "Please log on to the SAP System" intitle:"Kurant Corporation StoreSense" filetype:bok intitle:"ListMail Login" admin -demo intitle:"Login - Easy File Sharing Web Server" intitle:"Login Forum AnyBoard" intitle:"If you are a new user:" intext:"Forum AnyBoard" inurl:gochat -edu intitle:"Login to @Mail" (ext:pl | inurl:"index") -dwaffleman intitle:"Login to Cacti" intitle:"Login to the forums - @www.aimoo.com" inurl:login.cfm?id= intitle:"MailMan Login" intitle:"Member Login" "NOTE: Your browser must have cookies enabled in order to log into the site." ext:php OR ext:cgi intitle:"Merak Mail Server Web Administration" -ihackstuff.com intitle:"microsoft certificate services" inurl:certsrv intitle:"MikroTik RouterOS Managing Webpage" intitle:"MX Control Console" "If you can't remember" intitle:"Novell Web Services" "GroupWise" -inurl:"doc/11924" -.mil -.edu -.gov -filetype:pdf intitle:"Novell Web Services" intext:"Select a service and a language." intitle:"oMail-admin Administration - Login" -inurl:omnis.ch intitle:"OnLine Recruitment Program - Login" intitle:"Philex 0.2*" -s?ri?t -site:freelists.org intitle:"PHP Advanced Transfer" inurl:"login.php" intitle:"php icalendar administration" -site:sourceforge.net intitle:"php icalendar administration" -site:sourceforge.net intitle:"phpPgAdmin - Login" Language intitle:"PHProjekt - login" login password intitle:"please login" "your password is *" intitle:"Remote Desktop Web Connection" inurl:tsweb intitle:"SFXAdmin - sfx_global" | intitle:"SFXAdmin - sfx_local" | intitle:"SFXAdmin - sfx_test" intitle:"SHOUTcast Administrator" inurl:admin.cgi intitle:"site administration: please log in" "site designed by emarketsouth" intitle:"Supero Doctor III" -inurl:supermicro intitle:"SuSE Linux Openexchange Server" "Please activate Javas?ri?t!" intitle:"teamspeak server-administration intitle:"Tomcat Server Administration" intitle:"TOPdesk ApplicationServer" intitle:"TUTOS Login" intitle:"TWIG Login" intitle:"vhost" intext:"vHost . 2000-2004" intitle:"Virtual Server Administration System" intitle:"VisNetic WebMail" inurl:"/mail/" intitle:"VitalQIP IP Management System" intitle:"VMware Management Interface:" inurl:"vmware/en/" intitle:"VNC viewer for Java" intitle:"web-cyradm"|"by Luc de Louw" "This is only for authorized users" -tar.gz -site:web-cyradm.org intitle:"WebLogic Server" intitle:"Console Login" inurl:console intitle:"Welcome Site/User Administrator" "Please select the language" -demos intitle:"Welcome to Mailtraq WebMail" intitle:"welcome to netware *" -site:novell.com intitle:"WorldClient" intext:"? (2003|2004) Alt-N Technologies." intitle:"xams 0.0.0..15 - Login" intitle:"XcAuctionLite" | "DRIVEN BY XCENT" Lite inurl:admin intitle:"XMail Web Administration Interface" intext:Login intext:password intitle:"Zope Help System" inurl:HelpSys intitle:"ZyXEL Prestige Router" "Enter password" intitle:"inc. vpn 3000 concentrator" intitle:("TrackerCam Live Video")|("TrackerCam Application Login")|("Trackercam Remote") -trackercam.com intitle:asterisk.management.portal web-access intitle:endymion.sak?.mail.login.page | inurl:sake.servlet intitle:Group-Office "Enter your username and password to login" intitle:ilohamail " IlohaMail" intitle:ilohamail intext:"Version 0.8.10" " IlohaMail" intitle:IMP inurl:imp/index.php3 intitle:Login * Webmailer intitle:Login intext:"RT is ? Copyright" intitle:Node.List Win32.Version.3.11 intitle:Novell intitle:WebAccess "Copyright *-* Novell, Inc" intitle:open-xchange inurl:login.pl intitle:Ovislink inurl:private/login intitle:phpnews.login intitle:plesk inurl:login.php3 inurl:"/admin/configuration. php?" Mystore inurl:"/slxweb.dll/external?name=(custportal|webticketcust)" inurl:"1220/parse_xml.cgi?" inurl:"631/admin" (inurl:"op=*") | (intitle:CUPS) inurl:":10000" intext:webmin inurl:"Activex/default.htm" "Demo" inurl:"calendar.asp?action=login" inurl:"default/login.php" intitle:"kerio" inurl:"gs/adminlogin.aspx" inurl:"php121login.php" inurl:"suse/login.pl" inurl:"typo3/index.php?u=" -demo inurl:"usysinfo?login=true" inurl:"utilities/TreeView.asp" inurl:"vsadmin/login" | inurl:"vsadmin/admin" inurl:.php|.asp Code: nurl:/admin/login.asp inurl:/cgi-bin/sqwebmail?noframes=1 inurl:/Citrix/Nfuse17/ inurl:/dana-na/auth/welcome.html inurl:/eprise/ inurl:/Merchant2/admin.mv | inurl:/Merchant2/admin.mvc | intitle:"Miva Merchant Administration Login" -inurl:cheap-malboro.net inurl:/modcp/ intext:Moderator+vBulletin inurl:/SUSAdmin intitle:"Microsoft Software upd?t? Services" inurl:/webedit.* intext:WebEdit Professional -html inurl:1810 "Oracle Enterprise Manager" inurl:2000 intitle:RemotelyAnywhere -site:realvnc.com inurl::2082/frontend -demo inurl:administrator "welcome to mambo" inurl:bin.welcome.sh | inurl:bin.welcome.bat | intitle:eHealth.5.0 inurl:cgi-bin/ultimatebb.cgi?ubb=login inurl:Citrix/MetaFrame/default/default.aspx inurl:confixx inurl:login|anmeldung inurl:coranto.cgi intitle:Login (Authorized Users Only) inurl:csCreatePro.cgi inurl:default.asp intitle:"WebCommander" inurl:exchweb/bin/auth/owalogon.asp inurl:gnatsweb.pl inurl:ids5web inurl:irc filetype:cgi cgi:irc inurl:login filetype:swf swf inurl:login.asp inurl:login.cfm inurl:login.php "SquirrelMail version" inurl:metaframexp/default/login.asp | intitle:"Metaframe XP Login" inurl:mewebmail inurl:names.nsf?opendatabase inurl:ocw_login_username inurl:orasso.wwsso_app_admin.ls_login inurl:postfixadmin intitle:"postfix admin" ext:php inurl:search/admin.php inurl:textpattern/index.php inurl:WCP_USER inurl:webmail./index.pl "Interface" inurl:webvpn.html "login" "Please enter your" Login (" Jetbox One CMS â?¢" | " Jetstream ? *") Novell NetWare intext:"netware management portal version" Outlook Web Access (a better way) PhotoPost PHP Upload PHPhotoalbum Statistics PHPhotoalbum Upload phpWebMail Please enter a valid password! inurl:polladmin INDEXU Ultima Online loginservers W-Nailer Upload Area intitle:"DocuShare" inurl:"docushare/dsweb/" -faq -gov -edu "#mysql dump" filetype:sql "#mysql dump" filetype:sql 21232f297a57a5a743894a0e4a801fc3 "allow_call_time_pass_reference" "PATH_INFO" "Certificate Practice Statement" inurl:(PDF | DOC) "Generated by phpSystem" "generated by wwwstat" "Host Vulnerability Summary Report" "HTTP_FROM=googlebot" googlebot.com "Server_Software=" "Index of" / "chat/logs" "Installed Objects Scanner" inurl:default.asp "MacHTTP" filetype:log inurl:machttp.log "Mecury Version" "Infastructure Group" "Microsoft (R) Windows * (TM) Version * DrWtsn32 Copyright (C)" ext:log "Most Submitted Forms and s?ri?ts" "this section" "Network Vulnerability Assessment Report" "not for distribution" confidential "not for public release" -.edu -.gov -.mil "phone * * *" "address *" "e-mail" intitle:"curriculum vitae" "phpMyAdmin" "running on" inurl:"main.php" "produced by getstats" "Request Details" "Control Tree" "Server Variables" "robots.txt" "Disallow:" filetype:txt "Running in Child mode" "sets mode: +p" "sets mode: +s" "Thank you for your order" +receipt "This is a Shareaza Node" "This report was generated by WebLog" ( filetype:mail | filetype:eml | filetype:mbox | filetype:mbx ) intext:password|subject (intitle:"PRTG Traffic Grapher" inurl:"allsensors")|(intitle:"PRTG Traffic Grapher - Monitoring Results") (intitle:WebStatistica inurl:main.php) | (intitle:"WebSTATISTICA server") -inurl:statsoft -inurl:statsoftsa -inurl:statsoftinc.com -edu -software -rob (inurl:"robot.txt" | inurl:"robots.txt" ) intext:disallow filetype:txt +":8080" +":3128" +":80" filetype:txt +"HSTSNR" -"netop.com" -site:php.net -"The PHP Group" inurl:source inurl:url ext:pHp 94FBR "ADOBE PHOTOSHOP" AIM buddy lists allinurl:/examples/jsp/snp/snoop.jsp allinurl:cdkey.txt allinurl:servlet/SnoopServlet cgiirc.conf cgiirc.conf contacts ext:wml data filetype:mdb -site:gov -site:mil exported email addresses ext:(doc | pdf | xls | txt | ps | rtf | odt | sxw | psw | ppt | pps | xml) (intext:confidential salary | intext:"budget approved") inurl:confidential ext:asp inurl:pathto.asp ext:ccm ccm -catacomb ext:CDX CDX ext:cgi inurl:editcgi.cgi inurl:file= ext:conf inurl:rsyncd.conf -cvs -man ext:conf NoCatAuth -cvs ext:dat bpk.dat ext:gho gho ext:ics ics ext:ini intext:env.ini ext:jbf jbf ext:ldif ldif ext:log "Software: Microsoft Internet Information Services *.*" ext:mdb inurl:*.mdb inurl:fpdb shop.mdb ext:nsf nsf -gov -mil ext:plist filetype:plist inurl:bookmarks.plist ext:pqi pqi -database ext:reg "username=*" putty ext:txt "Final encryption key" ext:txt inurl:dxdiag ext:vmdk vmdk ext:vmx vmx filetype:asp DBQ=" * Server.MapPath("*.mdb") filetype:bkf bkf filetype:blt "buddylist" filetype:blt blt +intext:screenname filetype:cfg auto_inst.cfg filetype:cnf inurl:_vti_pvt access.cnf filetype:conf inurl:firewall -intitle:cvs filetype:config web.config -CVS filetype:ctt Contact filetype:ctt ctt messenger filetype:eml eml +intext:"Subject" +intext:"From" +intext:"To" filetype:fp3 fp3 filetype:fp5 fp5 -site:gov -site:mil -"cvs log" filetype:fp7 fp7 filetype:inf inurl:capolicy.inf filetype:lic lic intext:key filetype:log access.log -CVS filetype:log cron.log filetype:mbx mbx intext:Subject filetype:myd myd -CVS filetype:ns1 ns1 filetype:ora ora filetype:ora tnsnames filetype:pdb pdb backup (Pilot | Pluckerdb) filetype:php inurl:index inurl:phpicalendar -site:sourceforge.net filetype:pot inurl:john.pot filetype:PS ps filetype:pst inurl:"outlook.pst" filetype:pst pst -from -to -date filetype:qbb qbb filetype:QBW qbw filetype:rdp rdp filetype:reg "Terminal Server Client" filetype:vcs vcs filetype:wab wab filetype:xls -site:gov inurl:contact filetype:xls inurl:"email.xls" Financial spreadsheets: finance.xls Financial spreadsheets: finances.xls Ganglia Cluster Reports haccess.ctl (one way) haccess.ctl (VERY reliable) ICQ chat logs, please... intext:"Session Start * * * *:*:* *" filetype:log intext:"Tobias Oetiker" "traffic analysis" intext:(password | passcode) intext:(username | userid | user) filetype:csv intext:gmail invite intext:http://gmail.google.com/gmail/a intext:SQLiteManager inurl:main.php intext:ViewCVS inurl:Settings.php intitle:"admin panel" +" RedKernel" intitle:"Apache::Status" (inurl:server-status | inurl:status.html | inurl:apache.html) intitle:"AppServ Open Project" -site:www.appservnetwork.com intitle:"ASP Stats Generator *.*" "ASP Stats Generator" "2003-2004 weppos" intitle:"Big Sister" +"OK Attention Trouble" intitle:"curriculum vitae" filetype:doc intitle:"edna:streaming mp3 server" -forums intitle:"FTP root at" intitle:"index of" +myd size intitle:"Index Of" -inurl:maillog maillog size intitle:"Index Of" cookies.txt size intitle:"index of" mysql.conf OR mysql_config intitle:"Index of" upload size parent directory intitle:"index.of *" admin news.asp configview.asp intitle:"index.of" .diz .nfo last modified intitle:"Joomla - Web Installer" intitle:"LOGREP - Log file reporting system" -site:itefix.no intitle:"Multimon UPS status page" intitle:"PHP Advanced Transfer" (inurl:index.php | inurl:showrecent.php ) intitle:"PhpMyExplorer" inurl:"index.php" -cvs intitle:"statistics of" "advanced web statistics" intitle:"System Statistics" +"System and Network Information Center" intitle:"urchin (5|3|admin)" ext:cgi intitle:"Usage Statistics for" "Generated by Webalizer" intitle:"wbem" compaq login "Compaq Information Technologies Group" intitle:"Web Server Statistics for ****" intitle:"web server status" SSH Telnet intitle:"Welcome to F-Secure Policy Manager Server Welcome Page" intitle:"welcome.to.squeezebox" intitle:admin intitle:login intitle:Bookmarks inurl:bookmarks.html "Bookmarks intitle:index.of "Apache" "server at" intitle:index.of cleanup.log intitle:index.of dead.letter intitle:index.of inbox intitle:index.of inbox dbx intitle:index.of ws_ftp.ini intitle:intranet inurl:intranet +intext:"phone" inurl:"/axs/ax-admin.pl" -s?ri?t inurl:"/cricket/grapher.cgi" inurl:"bookmark.htm" inurl:"cacti" +inurl:"graph_view.php" +"Settings Tree View" -cvs -RPM inurl:"newsletter/admin/" inurl:"newsletter/admin/" intitle:"newsletter admin" inurl:"putty.reg" inurl:"smb.conf" intext:"workgroup" filetype:conf conf inurl:*db filetype:mdb inurl:/cgi-bin/pass.txt inurl:/_layouts/settings inurl:admin filetype:xls inurl:admin intitle:login inurl:backup filetype:mdb inurl:build.err inurl:cgi-bin/printenv inurl:cgi-bin/testcgi.exe "Please distribute TestCGI" inurl:changepassword.asp inurl:ds.py inurl:email filetype:mdb inurl:fcgi-bin/echo inurl:forum filetype:mdb inurl:forward filetype:forward -cvs inurl:getmsg.html intitle:hotmail inurl:log.nsf -gov inurl:main.php phpMyAdmin inurl:main.php Welcome to phpMyAdmin inurl:netscape.hst inurl:netscape.hst inurl:netscape.ini inurl:odbc.ini ext:ini -cvs inurl:perl/printenv inurl:php.ini filetype:ini inurl:preferences.ini "[emule]" inurl:profiles filetype:mdb inurl:report "EVEREST Home Edition " inurl:server-info "Apache Server Information" inurl:server-status "apache" inurl:snitz_forums_2000.mdb inurl:ssl.conf filetype:conf inurl:tdbin inurl:vbstats.php "page generated" inurl:wp-mail.php + "There doesn't seem to be any new mail." inurl:XcCDONTS.asp ipsec.conf ipsec.secrets ipsec.secrets Lotus Domino address books mail filetype:csv -site:gov intext:name Microsoft Money Data Files mt-db-pass.cgi files MySQL tabledata dumps mystuff.xml - Trillian data files OWA Public Folders (direct view) Peoples MSN contact lists php-addressbook "This is the addressbook for *" -warning phpinfo() phpMyAdmin dumps phpMyAdmin dumps private key files (.csr) private key files (.key) Quicken data files rdbqds -site:.edu -site:.mil -site:.gov robots.txt site:edu admin grades site:www.mailinator.com inurl:ShowMail.do SQL data dumps Squid cache server reports Unreal IRCd WebLog Referrers Welcome to ntop! Fichier contenant des informations sur le r?seau : filetype:log intext:"ConnectionManager2" "apricot - admin" 00h "by Reimar Hoven. All Rights Reserved. Disclaimer" | inurl:"log/logdb.dta" "Network Host Assessment Report" "Internet Scanner" "Output produced by SysWatch *" "Phorum Admin" "Database Connection" inurl:forum inurl:admin phpOpenTracker" Statistics "powered | performed by Beyond Security's Automated Scanning" -kazaa -example "Shadow Security Scanner performed a vulnerability assessment" "SnortSnarf alert page" "The following report contains confidential information" vulnerability -search "The statistics were last upd?t?d" "Daily"-microsoft.com "this proxy is working fine!" "enter *" "URL***" * visit "This report lists" "identified by Internet Scanner" "Traffic Analysis for" "RMON Port * on unit *" "Version Info" "Boot Version" "Internet Settings" ((inurl:ifgraph "Page generated at") OR ("This page was built using ifgraph")) Analysis Console for Incident Databases ext:cfg radius.cfg ext:cgi intext:"nrg-" " This web page was created on " filetype:pdf "Assessment Report" nessus filetype:php inurl:ipinfo.php "Distributed Intrusion Detection System" filetype:php inurl:nqt intext:"Network Query Tool" filetype:vsd vsd network -samples -examples intext:"Welcome to the Web V.Networks" intitle:"V.Networks [Top]" -filetype:htm intitle:"ADSL Configuration page" intitle:"Azureus : Java BitTorrent Client Tracker" intitle:"Belarc Advisor Current Profile" intext:"Click here for Belarc's PC Management products, for large and small companies." intitle:"BNBT Tracker Info" intitle:"Microsoft Site Server Analysis" intitle:"Nessus Scan Report" "This file was generated by Nessus" intitle:"PHPBTTracker Statistics" | intitle:"PHPBT Tracker Statistics" intitle:"Retina Report" "CONFIDENTIAL INFORMATION" intitle:"start.managing.the.device" remote pbx acc intitle:"sysinfo * " intext:"Generated by Sysinfo * written by The Gamblers." intitle:"twiki" inurl:"TWikiUsers" inurl:"/catalog.nsf" intitle:catalog inurl:"install/install.php" inurl:"map.asp?" intitle:"WhatsUp Gold" inurl:"NmConsole/Login.asp" | intitle:"Login - Ipswitch WhatsUp Professional 2005" | intext:"Ipswitch WhatsUp Professional 2005 (SP1)" "Ipswitch, Inc" inurl:"sitescope.html" intitle:"sitescope" intext:"refresh" -demo inurl:/adm-cfgedit.php inurl:/cgi-bin/finger? "In real life" inurl:/cgi-bin/finger? Enter (account|host|user|username) inurl:/counter/index.php intitle:"+PHPCounter 7.*" inurl:CrazyWWWBoard.cgi intext:"detailed debugging information" inurl:login.jsp.bak inurl:ovcgi/jovw inurl:phpSysInfo/ "created by phpsysinfo" inurl:portscan.php "from Port"|"Port Range" inurl:proxy | inurl:wpad ext:pac | ext:dat findproxyforurl inurl:statrep.nsf -gov inurl:status.cgi?host=all inurl:testcgi xitami inurl:webalizer filetype:png -.gov -.edu -.mil -opendarwin inurl:webutil.pl Looking Glass site:netcraft.com intitle:That.Site.Running Apache "A syntax error has occurred" filetype:ihtml "access denied for user" "using password" "An illegal character has been found in the statement" -"previous message" "ASP.NET_SessionId" "data source=" "Can't connect to local" intitle:warning "Chatologica MetaSearch" "stack tracking" "detected an internal error [IBM][CLI Driver][DB2/6000]" "error found handling the request" cocoon filetype:xml "Fatal error: Call to undefined function" -reply -the -next "Incorrect syntax near" "Incorrect syntax near" "Internal Server Error" "server at" "Invision Power Board Database Error" "ORA-00933: SQL command not properly ended" "ORA-12541: TNS:no listener" intitle:"error occurred" "Parse error: parse error, unexpected T_VARIABLE" "on line" filetype:php "PostgreSQL query failed: ERROR: parser: parse error" "Supplied argument is not a valid MySQL result resource" "Syntax error in query expression " -the "The s?ri?t whose uid is " "is not allowed to access" "There seems to have been a problem with the" " Please try again by clicking the Refresh button in your web browser." "Unable to jump to row" "on MySQL result index" "on line" "Unclosed quotation mark before the character string" "Warning: Bad arguments to (join|implode) () in" "on line" -help -forum "Warning: Cannot modify header information - headers already sent" "Warning: Division by zero in" "on line" -forum "Warning: mysql_connect(): Access denied for user: '*@*" "on line" -help -forum "Warning: mysql_query()" "invalid query" "Warning: pg_connect(): Unable to connect to PostgreSQL server: FATAL" "Warning: Supplied argument is not a valid File-Handle resource in" "Warning:" "failed to open stream: HTTP request failed" "on line" "Warning:" "SAFE MODE Restriction in effect." "The s?ri?t whose uid is" "is not allowed to access owned by uid 0 in" "on line" "SQL Server Driver][SQL Server]Line 1: Incorrect syntax near" An unexpected token "END-OF-STATEMENT" was found Coldfusion Error Pages filetype:asp + "[ODBC SQL" filetype:asp "Custom Error Message" Category Source filetype:log "PHP Parse error" | "PHP Warning" | "PHP Error" filetype:php inurl:"logging.php" "Discuz" error ht://Dig htsearch error IIS 4.0 error messages IIS web server error messages Internal Server Error intext:"Error Message : Error loading required libraries." intext:"Warning: Failed opening" "on line" "include_path" intitle:"Apache Tomcat" "Error Report" intitle:"Default PLESK Page" intitle:"Error Occurred While Processing Request" +WHERE (SELECT|INSERT) filetype:cfm intitle:"Error Occurred" "The error occurred in" filetype:cfm intitle:"Error using Hypernews" "Server Software" intitle:"Execution of this s?ri?t not permitted" intitle:"Under construction" "does not currently have" intitle:Configuration.File inurl:softcart.exe MYSQL error message: supplied argument.... mysql error with query Netscape Application Server Error page ORA-00921: unexpected end of SQL command ORA-00921: unexpected end of SQL command ORA-00936: missing expression PHP application warnings failing "include_path" sitebuildercontent sitebuilderfiles sitebuilderpictures Snitz! forums db path error SQL syntax error Supplied argument is not a valid PostgreSQL result warning "error on line" php sablotron Windows 2000 web server error messages "ftp://" "www.eastgame.net" "html allowed" guestbook : vBulletin Version 1.1.5" "Select a database to view" intitle:"filemaker pro" "set up the administrator user" inurl:pivot "There are no Administrators Accounts" inurl:admin.php -mysql_fetch_row "Welcome to Administration" "General" "Local Domains" "SMTP Authentication" inurl:admin "Welcome to Intranet" "Welcome to PHP-Nuke" congratulations "Welcome to the Prestige Web-Based Configurator" "YaBB SE Dev Team" "you can now password" | "this is a special page only seen by you. your profile visitors" inurl:imchaos ("Indexed.By"|"Monitored.By") hAcxFtpScan (inurl:/shop.cgi/page=) | (inurl:/shop.pl/page=) allinurl:"index.php" "site=sglinks" allinurl:install/install.php allinurl:intranet admin filetype:cgi inurl:"fileman.cgi" filetype:cgi inurl:"Web_Store.cgi" filetype:php inurl:vAuthenticate filetype:pl intitle:"Ultraboard Setup" Gallery in configuration mode Hassan Consulting's Shopping Cart Version 1.18 intext:"Warning: * am able * write ** configuration file" "includes/configure.php" - intitle:"Gateway Configuration Menu" intitle:"Horde :: My Portal" -"[Tickets" intitle:"Mail Server CMailServer Webmail" "5.2" intitle:"MvBlog powered" intitle:"Remote Desktop Web Connection" intitle:"Samba Web Administration Tool" intext:"Help Workgroup" intitle:"Terminal Services Web Connection" intitle:"Uploader - Uploader v6" -pixloads.com intitle:osCommerce inurl:admin intext:"redistributable under the GNU" intext:"Online Catalog" -demo -site:oscommerce.com intitle:phpMyAdmin "Welcome to phpMyAdmin ***" "running on * as root@*" intitle:phpMyAdmin "Welcome to phpMyAdmin ***" "running on * as root@*" inurl:"/NSearch/AdminServlet" inurl:"index.php? module=ew_filemanager" inurl:aol*/_do/rss_popup?blogID= inurl:footer.inc.php inurl:info.inc.php inurl:ManyServers.htm inurl:newsdesk.cgi? inurl:"t=" inurl:pls/admin_/gateway.htm inurl:rpSys.html inurl:search.php vbulletin inurl:servlet/webacc natterchat inurl:home.asp -site:natterchat.co.uk XOOPS Custom Installation inurl:htpasswd filetype:htpasswd inurl:yapboz_detay.asp + View Webcam User Accessing allinurl:control/multiview inurl:"ViewerFrame?Mode=" intitle:"WJ-NT104 Main Page" inurl:netw_tcp.shtml intitle:"supervisioncam protocol"
Google Operators
Well if u ask me this is the best Part " how to Search ",Anyone anywhere needs something out of the great "www", now if u know how to grab hold to "something" in one click that is the skill, this article henceforth is one of my best my best, n especially crafted to meet all your needs !!
Google Operators:
Operators are used to refine the results and to maximize the search value. They are your tools as well as ethical hackers’ weapons
Basic Operators:
+, -, ~ , ., *, “”, |,
OR
Advanced Operators:
allintext:, allintitle:, allinurl:, bphonebook:, cache:, define:, filetype:, info:, intext:, intitle:, inurl:, link:, phonebook:, related:, rphonebook:, site:, numrange:, daterange
Basic Operators !!
(+) force inclusion of something common
Google ignores common words (where, how, digit, single letters) by default:
Example: StarStar Wars Episode +I
(-) exclude a search term
Example: apple –red
(“) use quotes around a search term to search exact phrases:
Example: “Robert Masse”
Robert masse without “” has the 309,000 results, but “robert masse” only has 927 results. Reduce the 99% irrelevant results
Basic Operators
(~) search synonym:
Example: ~food
Return the results about food as well as recipe, nutrition and cooking information
( . ) a single-character wildcard:
Example: m.trix
Return the results of M@trix, matrix, metrix…….
( * ) any word wildcard
Advanced Operators: “Site:”
Site: Domain_name
Find Web pages only on the specified domain. If we search a specific site, usually we get the Web structure of the domain
Examples:
site:http://shaswat.bravehost.com
Advanced Operators: “Filetype:”
Filetype: extension_type
Find documents with specified extensions
The supported extensions are:
- HyperText Markup Language (html) - Microsoft PowerPoint (ppt)
- Adobe Portable Document Format (pdf) - Microsoft Word (doc)
- Adobe PostScript (ps) - Microsoft Works (wks, wps, wdb)
- Lotus 1-2-3 - Microsoft Excel (xls)
(wk1, wk2, wk3, wk4, wk5, wki, wks, wku) - Microsoft Write (wri)
- Lotus WordPro (lwp) - Rich Text Format (rtf)
- MacWrite (mw) - Shockwave Flash (swf)
- Text (ans, txt)
Note: We actually can search asp, php and cgi, pl files as long as it is text-compatible.
Example: Budget filetype: xls
Advanced Operators “Intitle:”
Intitle: search_term
Find search term within the title of a Webpage
Allintitle: search_term1 search_term2 search_term3
Find multiple search terms in the Web pages with the title that includes all these words
These operators are specifically useful to find the directory lists
Example:
Find directory list:
Intitle: Index.of “parent directory”
Advanced Operators “Inurl:”
Inurl: search_term
Find search term in a Web address
Allinurl: search_term1 search_term2 search_term3
Find multiple search terms in a Web address
Examples:
Inurl: cgi-bin
Allinurl: cgi-bin password
Advanced Operators “Intext;”
Intext: search_term
Find search term in the text body of a document.
Allintext: search_term1 search_term2 search_term3
Find multiple search terms in the text body of a document.
Examples:
Intext: Administrator login
Allintext: Administrator login
Advanced Operators: “Cache:”
Cache: URL
Find the old version of Website in Google cache
Sometimes, even the site has already been updated, the old information might be found in cache
Examples:
Cache: http://shaswat.bravehost.com
Advanced Operators
..
Conduct a number range search by specifying two numbers, separated by two periods, with no spaces. Be sure to specify a unit of measure or some other indicator of what the number range represents
Examples:
Computer $500..1000
DVD player $250..350
Advanced Operators: “Daterange:”
Daterange:-
Find the Web pages between start date and end date
Note: start_date and end date use the Julian date
The Julian date is calculated by the number of days since January 1, 4713 BC. For example, the Julian date for August 1, 2001 is 2452122
Examples:
2004.07.10=2453196
2004.08.10=2453258
Vulnerabilities date range: 2453196-2453258
Advanced Operators “Link:”
Link: URL
Find the Web pages having a link to the specified URL
Related: URL
Find the Web pages that are “similar” to the specified Web page
info: URL
Present some information that Google has about that Web page
Define: search_term
Provide a definition of the words gathered from various online sources
Examples:
Link: shaswat.bravehost.com
Related: shaswat.bravehost.com
Info: shaswat.bravehost.com
Define: Network security
Advanced Operators “phonebook:”
Phonebook
Search the entire Google phonebook
rphonebook
Search residential listings only
bphonebook
Search business listings only
Examples:
Phonebook: robert las vegas (robert in Las Vegas)
Phonebook: (702) 944-2001 (reverse search, not always work)
The phonebook is quite limited to U.S.A
But the Question rises What can Google can do for an Ethical Hacker?
Search sensitive information like payroll, SIN, even the personal email box
Vulnerabilities scanner
Transparent proxy
So how but if i tell u a different way to search
k lets do this type in the following statements n c d results
we can only provide u the guidelines, now u need to implement your Creativity to Keep it rolling.
http://shaswat.bravehost.com
Salary
Salary filetype: xls site: edu
Security social insurance number
Intitle: Payroll intext: ssn filetype: xls site: edu
Security Social Insurance Number
Payroll intext: Employee intext: ssn Filetype: xls
Filetype: xls “checking account” “credit card” - intext: Application -intext:
Form (only 39 results)
Financial Information
Intitle: “Index of” finances.xls (9)
Personal Mailbox
Intitle: Index.of inurl: Inbox (inurl: User OR inurl: Mail) (220)
Confidential Files
“not for distribution” confidential (1,760)
Confidential Files
“not for distribution” confidential filetype: pdf (marketing info) (456)
OS Detection
Use the keywords of the default installation page of a Web server to search.
Use the title to search
Use the footer in a directory index page
OS Detection-Windows
“Microsoft-IIS/5.0 server at”
OS Detection - Windows
Default web page?
Intitle: “Welcome to Windows 2000 Internet Services” IIS 5.0
OS Detection –Apache 1.3.11-1.3.26
Intitle: Test.Page.for.Apache seeing.this.instead
OS Detection-Apache SSL enable
Intitle: Test.page “SSL/TLS-aware” (127)
Search Passwords
Search the well known password filenames in URL
Search the database connection files or configuration files to find a password and username
Search specific username file for a specific product
Search Passwords
Inurl: etc inurl: passwd
Search Passwords
Intitle: “Index of..etc” passwd
Search Passwords
Intitle: “Index of..etc” passwd
Search Passwords
Inurl: admin.pwd filetype: pwd
Search Passwords
Filetype: inc dbconn
Search Passwords
Filetype: inc intext: mysql_connect
Search Passwords
Filetype: ini +ws_ftp +pwd (get the encrypted passwords)
Search Passwords
Filetype: log inurl: “password.log”
Search Username
+intext: "webalizer" +intext: “Total Usernames” +intext: “Usage Statistics for”
License Key
Filetype: lic lic intext: key (33) (license key)
Sensitive Directories Listing
Powerful buzz word: Index of
Search the well known vulnerable directories names
Sensitive Directories Listing
“index of cgi-bin” (3590)
Sensitive Directories Listing
Intitle: “Index of” cfide (coldfusion directory)
Sensitive Directories Listing
Intitle: index.of.winnt
Get the serial number you need ! (For Certain Things)
1) Go to Google.
2) Use Keyword as "Product name" 94FBR
3) Where, "Product Name" is the name of the item you want to find the serial number for.
4) And voila - there you go - the serial number you needed.
HOW DOES THIS WORK?
Quite simple really. 94FBR is part of a Office 2000 Pro cd key that is widely distributed as it bypasses the activation requirements of Office 2K Pro. By searching for the product name and 94fbr, you guarantee two things. 1) The pages that are returned are pages dealing specifically with the product you're wanting a serial for. 2) Because 94FBR is part of a serial number, and only part of a serial number, you guarantee that any page being returned is a serial number list page.
See these example searches:
Code:
"Photoshop 7"+94FBR
"Age of Mythology"+94FBR
"Nero Burning Rom 5.5"+94FBR
Google Operators:
Operators are used to refine the results and to maximize the search value. They are your tools as well as ethical hackers’ weapons
Basic Operators:
+, -, ~ , ., *, “”, |,
OR
Advanced Operators:
allintext:, allintitle:, allinurl:, bphonebook:, cache:, define:, filetype:, info:, intext:, intitle:, inurl:, link:, phonebook:, related:, rphonebook:, site:, numrange:, daterange
Basic Operators !!
(+) force inclusion of something common
Google ignores common words (where, how, digit, single letters) by default:
Example: StarStar Wars Episode +I
(-) exclude a search term
Example: apple –red
(“) use quotes around a search term to search exact phrases:
Example: “Robert Masse”
Robert masse without “” has the 309,000 results, but “robert masse” only has 927 results. Reduce the 99% irrelevant results
Basic Operators
(~) search synonym:
Example: ~food
Return the results about food as well as recipe, nutrition and cooking information
( . ) a single-character wildcard:
Example: m.trix
Return the results of M@trix, matrix, metrix…….
( * ) any word wildcard
Advanced Operators: “Site:”
Site: Domain_name
Find Web pages only on the specified domain. If we search a specific site, usually we get the Web structure of the domain
Examples:
site:http://shaswat.bravehost.com
Advanced Operators: “Filetype:”
Filetype: extension_type
Find documents with specified extensions
The supported extensions are:
- HyperText Markup Language (html) - Microsoft PowerPoint (ppt)
- Adobe Portable Document Format (pdf) - Microsoft Word (doc)
- Adobe PostScript (ps) - Microsoft Works (wks, wps, wdb)
- Lotus 1-2-3 - Microsoft Excel (xls)
(wk1, wk2, wk3, wk4, wk5, wki, wks, wku) - Microsoft Write (wri)
- Lotus WordPro (lwp) - Rich Text Format (rtf)
- MacWrite (mw) - Shockwave Flash (swf)
- Text (ans, txt)
Note: We actually can search asp, php and cgi, pl files as long as it is text-compatible.
Example: Budget filetype: xls
Advanced Operators “Intitle:”
Intitle: search_term
Find search term within the title of a Webpage
Allintitle: search_term1 search_term2 search_term3
Find multiple search terms in the Web pages with the title that includes all these words
These operators are specifically useful to find the directory lists
Example:
Find directory list:
Intitle: Index.of “parent directory”
Advanced Operators “Inurl:”
Inurl: search_term
Find search term in a Web address
Allinurl: search_term1 search_term2 search_term3
Find multiple search terms in a Web address
Examples:
Inurl: cgi-bin
Allinurl: cgi-bin password
Advanced Operators “Intext;”
Intext: search_term
Find search term in the text body of a document.
Allintext: search_term1 search_term2 search_term3
Find multiple search terms in the text body of a document.
Examples:
Intext: Administrator login
Allintext: Administrator login
Advanced Operators: “Cache:”
Cache: URL
Find the old version of Website in Google cache
Sometimes, even the site has already been updated, the old information might be found in cache
Examples:
Cache: http://shaswat.bravehost.com
Advanced Operators
Conduct a number range search by specifying two numbers, separated by two periods, with no spaces. Be sure to specify a unit of measure or some other indicator of what the number range represents
Examples:
Computer $500..1000
DVD player $250..350
Advanced Operators: “Daterange:”
Daterange:
Find the Web pages between start date and end date
Note: start_date and end date use the Julian date
The Julian date is calculated by the number of days since January 1, 4713 BC. For example, the Julian date for August 1, 2001 is 2452122
Examples:
2004.07.10=2453196
2004.08.10=2453258
Vulnerabilities date range: 2453196-2453258
Advanced Operators “Link:”
Link: URL
Find the Web pages having a link to the specified URL
Related: URL
Find the Web pages that are “similar” to the specified Web page
info: URL
Present some information that Google has about that Web page
Define: search_term
Provide a definition of the words gathered from various online sources
Examples:
Link: shaswat.bravehost.com
Related: shaswat.bravehost.com
Info: shaswat.bravehost.com
Define: Network security
Advanced Operators “phonebook:”
Phonebook
Search the entire Google phonebook
rphonebook
Search residential listings only
bphonebook
Search business listings only
Examples:
Phonebook: robert las vegas (robert in Las Vegas)
Phonebook: (702) 944-2001 (reverse search, not always work)
The phonebook is quite limited to U.S.A
But the Question rises What can Google can do for an Ethical Hacker?
Search sensitive information like payroll, SIN, even the personal email box
Vulnerabilities scanner
Transparent proxy
So how but if i tell u a different way to search
k lets do this type in the following statements n c d results
we can only provide u the guidelines, now u need to implement your Creativity to Keep it rolling.
http://shaswat.bravehost.com
Salary
Salary filetype: xls site: edu
Security social insurance number
Intitle: Payroll intext: ssn filetype: xls site: edu
Security Social Insurance Number
Payroll intext: Employee intext: ssn Filetype: xls
Filetype: xls “checking account” “credit card” - intext: Application -intext:
Form (only 39 results)
Financial Information
Intitle: “Index of” finances.xls (9)
Personal Mailbox
Intitle: Index.of inurl: Inbox (inurl: User OR inurl: Mail) (220)
Confidential Files
“not for distribution” confidential (1,760)
Confidential Files
“not for distribution” confidential filetype: pdf (marketing info) (456)
OS Detection
Use the keywords of the default installation page of a Web server to search.
Use the title to search
Use the footer in a directory index page
OS Detection-Windows
“Microsoft-IIS/5.0 server at”
OS Detection - Windows
Default web page?
Intitle: “Welcome to Windows 2000 Internet Services” IIS 5.0
OS Detection –Apache 1.3.11-1.3.26
Intitle: Test.Page.for.Apache seeing.this.instead
OS Detection-Apache SSL enable
Intitle: Test.page “SSL/TLS-aware” (127)
Search Passwords
Search the well known password filenames in URL
Search the database connection files or configuration files to find a password and username
Search specific username file for a specific product
Search Passwords
Inurl: etc inurl: passwd
Search Passwords
Intitle: “Index of..etc” passwd
Search Passwords
Intitle: “Index of..etc” passwd
Search Passwords
Inurl: admin.pwd filetype: pwd
Search Passwords
Filetype: inc dbconn
Search Passwords
Filetype: inc intext: mysql_connect
Search Passwords
Filetype: ini +ws_ftp +pwd (get the encrypted passwords)
Search Passwords
Filetype: log inurl: “password.log”
Search Username
+intext: "webalizer" +intext: “Total Usernames” +intext: “Usage Statistics for”
License Key
Filetype: lic lic intext: key (33) (license key)
Sensitive Directories Listing
Powerful buzz word: Index of
Search the well known vulnerable directories names
Sensitive Directories Listing
“index of cgi-bin” (3590)
Sensitive Directories Listing
Intitle: “Index of” cfide (coldfusion directory)
Sensitive Directories Listing
Intitle: index.of.winnt
Get the serial number you need ! (For Certain Things)
1) Go to Google.
2) Use Keyword as "Product name" 94FBR
3) Where, "Product Name" is the name of the item you want to find the serial number for.
4) And voila - there you go - the serial number you needed.
HOW DOES THIS WORK?
Quite simple really. 94FBR is part of a Office 2000 Pro cd key that is widely distributed as it bypasses the activation requirements of Office 2K Pro. By searching for the product name and 94fbr, you guarantee two things. 1) The pages that are returned are pages dealing specifically with the product you're wanting a serial for. 2) Because 94FBR is part of a serial number, and only part of a serial number, you guarantee that any page being returned is a serial number list page.
See these example searches:
Code:
"Photoshop 7"+94FBR
"Age of Mythology"+94FBR
"Nero Burning Rom 5.5"+94FBR
Tag :
Dork,
Tricks And Tutorials,
Google’s Advanced Search Query Syntax
Google’s Advanced Search Query Syntax
Discussed below are various Google’s special commands and I shall be explaining each command in brief and will show how it can be used for getting confidential data.
[ intitle: ]
The “intitle:” syntax helps Google restrict the search results to pages containing that word in the title.
intitle: login password
will return links to those pages that has the word "login" in their title, and the word "password" anywhere in the page.
Similarly, if one has to query for more than one word in the page title then in that case “allintitle:” can be used instead of “intitle” to get the list of pages containing all those words in its title.
intitle: login intitle: password
is same as
allintitle: login password
[ inurl: ]
The “inurl:” syntax restricts the search results to those URLs containing the search keyword. For example: “inurl: passwd” (without quotes) will return only links to those pages that have "passwd" in the URL.
Similarly, if one has to query for more than one word in an URL then in that case “allinurl:” can be used instead of “inurl” to get the list of URLs containing all those search keywords in it.
allinurl: etc/passwd
will look for the URLs containing “etc” and “passwd”. The slash (“/”) between the words will be ignored by Google.
[ site: ]
The “site:” syntax restricts Google to query for certain keywords in a particular site or domain.
exploits site:hackingspirits.com
will look for the keyword “exploits” in those pages present in all the links of the domain “hackingspirits.com”. There should not be any space between “site:” and the “domain name”.
[ filetype: ]
This “filetype:” syntax restricts Google search for files on internet with particular extensions (i.e. doc, pdf or ppt etc).
filetype:doc site:gov confidential
will look for files with “.doc” extension in all government domains with “.gov” extension and containing the word “confidential” either in the pages or in the “.doc” file. i.e. the result will contain the links to all confidential word document files on the government sites.
[ link: ]
“link:” syntax will list down webpages that have links to the specified webpage.
link:www.expertsforge.com
will list webpages that have links pointing to the SecurityFocus homepage. Note there can be no space between the "link:" and the web page url.
[ related: ]
The “related:” will list web pages that are "similar" to a specified
web page.
related:www.expertsforge.com
will list web pages that are similar to the Securityfocus homepage. Note there can be no space between the "related:" and the web page url.
[ cache: ]
The query “cache:” will show the version of the web page that Google
has in its cache.
cache:www.hackingspirits.com
will show Google's cache of the Google homepage. Note there can be no space between the "cache:" and the web page url.
If you include other words in the query, Google will highlight those words within the cached document.
cache:www.hackingspirits.com guest
will show the cached content with the word "guest" highlighted.
[ intext: ]
The “intext:” syntax searches for words in a particular website. It ignores links or URLs and page titles.
intext:exploits
will return only links to those web pages that has the search keyword "exploits" in its webpage.
[ phonebook: ]
“phonebook” searches for U.S. street address and phone number information.
phonebook:Lisa+CA
will list down all names of person having “Lisa” in their names and located in “California (CA)”. This can be used as a great tool for hackers incase someone want to do dig personal information for social engineering.
Google Hacks
Well, the Google’s query syntaxes discussed above can really help people to precise their search and get what they are exactly looking for.
Now Google being so intelligent search engine, hackers don’t mind exploiting its ability to dig much confidential and secret information from the net which they are not supposed to know. Now I shall discuss those techniques in details how hackers dig information from the net using Google and how that information can be used to break into remote servers.
Index Of
Using “Index of ” syntax to find sites enabled with Index browsing
A webserver with Index browsing enabled means anyone can browse the webserver directories like ordinary local directories. The use of “index of” syntax to get a list links to webserver which has got directory browsing enabled will be discussd below. This becomes an easy source for information gathering for a hacker. Imagine if the get hold of password files or others sensitive files which are not normally visible to the internet. Below given are few examples using which one can get access to many sensitive information much easily.
Index of /admin
Index of /passwd
Index of /password
Index of /mail
"Index of /" +passwd
"Index of /" +password.txt
"Index of /" +.htaccess
"Index of /secret"
"Index of /confidential"
"Index of /root"
"Index of /cgi-bin"
"Index of /credit-card"
"Index of /logs"
"Index of /config"
Looking for vulnerable sites or servers using “inurl:” or “allinurl:”
a. Using “allinurl:winnt/system32/” (without quotes) will list down all the links to the server which gives access to restricted directories like “system32” through web. If you are lucky enough then you might get access to the cmd.exe in the “system32” directory. Once you have the access to “cmd.exe” and is able to execute it.
b. Using “allinurl:wwwboard/passwd.txt”(without quotes) in the Google search will list down all the links to the server which are vulnerable to “WWWBoard Password vulnerability”. To know more about this vulnerability you can have a look at the following link:
http://www.securiteam.com/exploits/2BUQ4S0SAW.html
c. Using “inurl:.bash_history” (without quotes) will list down all the links to the server which gives access to “.bash_history” file through web. This is a command history file. This file includes the list of command executed by the administrator, and sometimes includes sensitive information such as password typed in by the administrator. If this file is compromised and if contains the encrypted unix (or *nix) password then it can be easily cracked using “John The Ripper”.
d. Using “inurl:config.txt” (without quotes) will list down all the links to the servers which gives access to “config.txt” file through web. This file contains sensitive information, including the hash value of the administrative password and database authentication credentials.
For Example: Ingenium Learning Management System is a Web-based application for Windows based systems developed by Click2learn, Inc. Ingenium Learning Management System versions 5.1 and 6.1 stores sensitive information insecurely in the config.txt file. For more information refer the following
links: http://www.securiteam.com/securitynews/6M00H2K5PG.html
Other similar search using “inurl:” or “allinurl:” combined with other syntax
inurl:admin filetype:txt
inurl:admin filetype:db
inurl:admin filetype:cfg
inurl:mysql filetype:cfg
inurl:passwd filetype:txt
inurl:iisadmin
inurl:auth_user_file.txt
inurl:orders.txt
inurl:"wwwroot/*."
inurl:adpassword.txt
inurl:webeditor.php
inurl:file_upload.php
inurl:gov filetype:xls "restricted"
index of ftp +.mdb allinurl:/cgi-bin/ +mailto
Looking for vulnerable sites or servers using “intitle:” or “allintitle:”
a. Using [allintitle: "index of /root”] (without brackets) will list down the links to the web server which gives access to restricted directories like “root” through web. This directory sometimes contains sensitive information which can be easily retrieved through simple web requests.
b. Using [allintitle: "index of /admin”] (without brackets) will list down the links to the websites which has got index browsing enabled for restricted directories like “admin” through web. Most of the web application sometimes uses names like “admin” to store admin credentials in it. This directory sometimes contains sensitive information which can be easily retrieved through simple web requests.
Other similar search using “intitle:” or “allintitle:” combined with other syntax
intitle:"Index of" .sh_history
intitle:"Index of" .bash_history
intitle:"index of" passwd
intitle:"index of" people.lst
intitle:"index of" pwd.db
intitle:"index of" etc/shadow
intitle:"index of" spwd
intitle:"index of" master.passwd
intitle:"index of" htpasswd
intitle:"index of" members OR accounts
intitle:"index of" user_carts OR user_cart
allintitle: sensitive filetype:doc
allintitle: restricted filetype :mail
allintitle: restricted filetype:doc site:gov
Other interesting Search Queries
· To search for sites vulnerable to Cross-Sites Scripting (XSS) attacks:
allinurl:/scripts/cart32.exe
allinurl:/CuteNews/show_archives.php
allinurl:/phpinfo.php
· To search for sites vulnerable to SQL Injection attacks:
allinurl:/privmsg.php
allinurl:/privmsg.php
Discussed below are various Google’s special commands and I shall be explaining each command in brief and will show how it can be used for getting confidential data.
[ intitle: ]
The “intitle:” syntax helps Google restrict the search results to pages containing that word in the title.
intitle: login password
will return links to those pages that has the word "login" in their title, and the word "password" anywhere in the page.
Similarly, if one has to query for more than one word in the page title then in that case “allintitle:” can be used instead of “intitle” to get the list of pages containing all those words in its title.
intitle: login intitle: password
is same as
allintitle: login password
[ inurl: ]
The “inurl:” syntax restricts the search results to those URLs containing the search keyword. For example: “inurl: passwd” (without quotes) will return only links to those pages that have "passwd" in the URL.
Similarly, if one has to query for more than one word in an URL then in that case “allinurl:” can be used instead of “inurl” to get the list of URLs containing all those search keywords in it.
allinurl: etc/passwd
will look for the URLs containing “etc” and “passwd”. The slash (“/”) between the words will be ignored by Google.
[ site: ]
The “site:” syntax restricts Google to query for certain keywords in a particular site or domain.
exploits site:hackingspirits.com
will look for the keyword “exploits” in those pages present in all the links of the domain “hackingspirits.com”. There should not be any space between “site:” and the “domain name”.
[ filetype: ]
This “filetype:” syntax restricts Google search for files on internet with particular extensions (i.e. doc, pdf or ppt etc).
filetype:doc site:gov confidential
will look for files with “.doc” extension in all government domains with “.gov” extension and containing the word “confidential” either in the pages or in the “.doc” file. i.e. the result will contain the links to all confidential word document files on the government sites.
[ link: ]
“link:” syntax will list down webpages that have links to the specified webpage.
link:www.expertsforge.com
will list webpages that have links pointing to the SecurityFocus homepage. Note there can be no space between the "link:" and the web page url.
[ related: ]
The “related:” will list web pages that are "similar" to a specified
web page.
related:www.expertsforge.com
will list web pages that are similar to the Securityfocus homepage. Note there can be no space between the "related:" and the web page url.
[ cache: ]
The query “cache:” will show the version of the web page that Google
has in its cache.
cache:www.hackingspirits.com
will show Google's cache of the Google homepage. Note there can be no space between the "cache:" and the web page url.
If you include other words in the query, Google will highlight those words within the cached document.
cache:www.hackingspirits.com guest
will show the cached content with the word "guest" highlighted.
[ intext: ]
The “intext:” syntax searches for words in a particular website. It ignores links or URLs and page titles.
intext:exploits
will return only links to those web pages that has the search keyword "exploits" in its webpage.
[ phonebook: ]
“phonebook” searches for U.S. street address and phone number information.
phonebook:Lisa+CA
will list down all names of person having “Lisa” in their names and located in “California (CA)”. This can be used as a great tool for hackers incase someone want to do dig personal information for social engineering.
Google Hacks
Well, the Google’s query syntaxes discussed above can really help people to precise their search and get what they are exactly looking for.
Now Google being so intelligent search engine, hackers don’t mind exploiting its ability to dig much confidential and secret information from the net which they are not supposed to know. Now I shall discuss those techniques in details how hackers dig information from the net using Google and how that information can be used to break into remote servers.
Index Of
Using “Index of ” syntax to find sites enabled with Index browsing
A webserver with Index browsing enabled means anyone can browse the webserver directories like ordinary local directories. The use of “index of” syntax to get a list links to webserver which has got directory browsing enabled will be discussd below. This becomes an easy source for information gathering for a hacker. Imagine if the get hold of password files or others sensitive files which are not normally visible to the internet. Below given are few examples using which one can get access to many sensitive information much easily.
Index of /admin
Index of /passwd
Index of /password
Index of /mail
"Index of /" +passwd
"Index of /" +password.txt
"Index of /" +.htaccess
"Index of /secret"
"Index of /confidential"
"Index of /root"
"Index of /cgi-bin"
"Index of /credit-card"
"Index of /logs"
"Index of /config"
Looking for vulnerable sites or servers using “inurl:” or “allinurl:”
a. Using “allinurl:winnt/system32/” (without quotes) will list down all the links to the server which gives access to restricted directories like “system32” through web. If you are lucky enough then you might get access to the cmd.exe in the “system32” directory. Once you have the access to “cmd.exe” and is able to execute it.
b. Using “allinurl:wwwboard/passwd.txt”(without quotes) in the Google search will list down all the links to the server which are vulnerable to “WWWBoard Password vulnerability”. To know more about this vulnerability you can have a look at the following link:
http://www.securiteam.com/exploits/2BUQ4S0SAW.html
c. Using “inurl:.bash_history” (without quotes) will list down all the links to the server which gives access to “.bash_history” file through web. This is a command history file. This file includes the list of command executed by the administrator, and sometimes includes sensitive information such as password typed in by the administrator. If this file is compromised and if contains the encrypted unix (or *nix) password then it can be easily cracked using “John The Ripper”.
d. Using “inurl:config.txt” (without quotes) will list down all the links to the servers which gives access to “config.txt” file through web. This file contains sensitive information, including the hash value of the administrative password and database authentication credentials.
For Example: Ingenium Learning Management System is a Web-based application for Windows based systems developed by Click2learn, Inc. Ingenium Learning Management System versions 5.1 and 6.1 stores sensitive information insecurely in the config.txt file. For more information refer the following
links: http://www.securiteam.com/securitynews/6M00H2K5PG.html
Other similar search using “inurl:” or “allinurl:” combined with other syntax
inurl:admin filetype:txt
inurl:admin filetype:db
inurl:admin filetype:cfg
inurl:mysql filetype:cfg
inurl:passwd filetype:txt
inurl:iisadmin
inurl:auth_user_file.txt
inurl:orders.txt
inurl:"wwwroot/*."
inurl:adpassword.txt
inurl:webeditor.php
inurl:file_upload.php
inurl:gov filetype:xls "restricted"
index of ftp +.mdb allinurl:/cgi-bin/ +mailto
Looking for vulnerable sites or servers using “intitle:” or “allintitle:”
a. Using [allintitle: "index of /root”] (without brackets) will list down the links to the web server which gives access to restricted directories like “root” through web. This directory sometimes contains sensitive information which can be easily retrieved through simple web requests.
b. Using [allintitle: "index of /admin”] (without brackets) will list down the links to the websites which has got index browsing enabled for restricted directories like “admin” through web. Most of the web application sometimes uses names like “admin” to store admin credentials in it. This directory sometimes contains sensitive information which can be easily retrieved through simple web requests.
Other similar search using “intitle:” or “allintitle:” combined with other syntax
intitle:"Index of" .sh_history
intitle:"Index of" .bash_history
intitle:"index of" passwd
intitle:"index of" people.lst
intitle:"index of" pwd.db
intitle:"index of" etc/shadow
intitle:"index of" spwd
intitle:"index of" master.passwd
intitle:"index of" htpasswd
intitle:"index of" members OR accounts
intitle:"index of" user_carts OR user_cart
allintitle: sensitive filetype:doc
allintitle: restricted filetype :mail
allintitle: restricted filetype:doc site:gov
Other interesting Search Queries
· To search for sites vulnerable to Cross-Sites Scripting (XSS) attacks:
allinurl:/scripts/cart32.exe
allinurl:/CuteNews/show_archives.php
allinurl:/phpinfo.php
· To search for sites vulnerable to SQL Injection attacks:
allinurl:/privmsg.php
allinurl:/privmsg.php
Tag :
Dork,
Tricks And Tutorials,
Hacking Google: Turning a Search Engine into an MP3 Downloader
Yes, that's right. You can take everyone's favorite all-purpose search engine and turn it into a web-crawling, MP3 ripping demon for you. The procedure itself isn't as hard as you would think either.
First a little bit of a primer on Google. The Search Engine itself has a bunch of extra bells and whistles beyond "AND", "OR", and "NOT" in defining your search queries. We're not going to go through all of them now (Although that may be a good follow up article soon.), but suffice to say that if you spend enough time using Google, there are other search strings you can use to further narrow down your searches. (Check Advanced Google Searching for more Information.)
Copy / Paste the code below into your Google search box:
Code:
-inurl:(htm|html|php) intitle:"index of" +"
last modified" +"parent directory"
+description +size +(wma|mp3) ""
Where is either the name of the band you're searching for music for OR the name of the song you're looking for.
That's the hack in a nutshell, but if you're interested to see how it works, keep reading. Let's take a few moments to dismantle it and see what is happening in the search query.
Code:
-inurl:(htm|html|php) intitle:"index of"+"last modified" +"parent directory"
The first flag, -inurl restricts the Google queries without htm, html, and php pages, and has "index of" within the title. "Index Of" is a common flag that distinguishes website repositories, folder views of groupings of files on the internet. In a nutshell the first part of the query narrows down Google search results to pages you wouldn't ordinarily see, but nonetheless are logged and tracked by Google as it parses the net for new content.
Code:
+description +size +(wma|mp3) ""
In particular, this search will narrow down these repositores to include only sites with wma and mp3 files related to the BANDNAME or SONG you are searching for.
It should be noted though, that we at Haywire Hacking do not condone the illegal download of music: under federal law, if you own a copy of the correlating CD or published work of the author, you are entitled to a digital copy of the music
Tag :
Dork,
Tricks And Tutorials,