In fact, earlier should be issued to, domestic about google tips aspects of finishing, I probably was one of the first people right, then sniper write a google hack, they’re more lazy. Now help wives find the papers, the keyword matching tired of death. These tips are my finishing after the phase-out of the rear, preferably those if you are interested you can find me directly to request
Http://www.feelids.com
By swap
Site search address:
http://www.google.com/custom?domains=here write we want to search the site 比如 feelids.com)
进去 可以 选择 www 和 feelids.com of course then we’re the site search!
Hacking specific information and information on the search address is:
http://www.google.com/custom?hl=xx-hacker
Here’s google keyword usage, you want to set it to Chinese, it is
http://www.google.com/custom?hl=zh-CN
English is http://www. google. com/custom? hl=en
Commonly used google keyword:
foo1 foo2 (which is associated, such as search xx company xx beauty)
operator:foo
filetype:1 2 3 Type
site:foo.com relatively straightforward to see the website more interesting, you can get many unexpected information
intext:foo
intitle: fooltitle title Oh
allinurl:foo search xx website all the relevant connections. (Pedal point necessary)
links:foo don’t say you know is it related links
allintilte:foo.com
We can assist"-" "+"to adjust the search to the precise degree
Direct search password: (quotation marks are represented as exact search)
Of course we can then extend the above results to the second search
“index of” htpasswd / passwd
filetype:xls username password email
“ws_ftp. log”
“config.php”
allinurl:admin mdb
service filetype:pwd… Or some such as pcanywhere the password suffix cif, etc.
More and more interesting, then a little more sensitive information
“robots.txt” “Disallow:” filetype:txt
inurl:_vti_cnf (FrontPage key index. the scanner of CGI libraries in General)
allinurl: /msadc/Samples/selector/showcode. asp
/…/…/…/passwd
/examples/jsp/snp/snoop. jsp
phpsysinfo
intitle:index of /admin
intitle:“documetation”
inurl: 5 8 0 0(vnc port)or desktop port such as multiple keyword search
webmin port 1 0 0 0 0
inurl:/admin/login. asp
intext:Powered by GBook365
intitle:“php shell*” “Enable stderr” filetype:php direct the search to phpwebshell
foo.org filetype:inc
ipsec filetype:conf
intilte:“error occurred” ODBC request WHERE (select|insert) plainly means, you can directly try to check the database to retrieve, for the current popular sql injection, will be developed Oh
intitle:“php shell*” “Enable stderr” filetype:php
“Dumping data for table” username password
intitle:“Error using Hypernews”
“Server Software”
intitle:“HTTP_USER_AGENT=Googlebot”
“HTTP_USER_ANGET=Googlebot” THS ADMIN
filetype:.doc site:. mil classified direct search military-related word
Check multiple keywords:
intitle:config confixx login password
“mydomain.com” nessus report
“report generated by”
“ipconfig”
“winipconfig”
google cache use hoho, the most influential of the things recommended everyone to search when"search all sites"
Particularly recommended: administrator, users and other related things, such as your name, birthday, etc… The most miserable it can also be used as a dictionary.
cache:foo.com
You can check the similar result
The first look of the website management background address:
site:xxxx.com intext:management
site:xxxx.com inurl:login
site:xxxx.com intitle:management
site:a2.xxxx.com inurl:file
site:a3.xxxx.com inurl:load
site:a2.xxxx.com intext:ftp://:
site:a2.xxxx.com filetype:asp
site:xxxx.com //obtain the N second-level domain
site:xxxx.com intext:*@xxxx.com //get N E-mail address, and the mailbox owner’s name or something.
site:xxxx.com intext:phone //N Telephone
intitle:“index of” etc
intitle:“Index of” . sh_history
intitle:“Index of” . bash_history
intitle:“index of” passwd
intitle:“index of” people. lst
intitle:“index of” pwd. db
intitle:“index of” etc/shadow
intitle:“index of” spwd
intitle:“index of” master. passwd
intitle:“index of” htpasswd
“# -FrontPage-” inurl:service. pwd
allinurl:bbs data
filetype:mdb inurl:database
filetype:inc conn
inurl:data filetype:mdb
intitle:“index of” data
…
Some tips collection:
“http://*:*@www” domainname find some ISP site, you can check the ip of the virtual host
3
auth_user_file.txt not practical, too old.
The Master List looking for a mailing list
intitle:“welcome. to. squeezebox” is a special management system, The default open port 9 0
passlist.txt (a better way) dictionary
“A syntax error has occurred” filetype:ihtml
ext:php program_listing intitle:MythWeb. Program. Listing
1 0) intitle:index. of abyss. conf
1 1)ext:nbe nbe
1 2)intitle:“SWW link” “Please wait…”
1 3)
1 4) intitle:“Freifunk.Net - Status” -site:commando.de
1 5) intitle:“WorldClient” intext:“? (2003/2004) Alt-N Technologies.”
1 7) intitle:open-xchange inurl:login.pl
2 0) intitle:“site administration: please log in” “site designed by emarketsouth”
2 1) ORA-0 0 9 2 1: unexpected end of SQL command
2 2)intitle:“YALA: Yet Another LDAP Administrator”
2 3)welcome. to phpqladmin “Please login” -cvsweb
2 4)intitle:“SWW link” “Please wait…”
2 of 5)inurl:“port_255” -htm
2 7)intitle:“WorldClient” intext:“? (2003/2004) Alt-N Technologies.”
These are new some of the vulnerabilities skill in 0days Bulletin published
ext:php program_listing intitle:MythWeb. Program. Listing
inurl:preferences. ini "[emule]"intitle:“Index of /CFIDE/” administrator
“access denied for user” “using password”
ext:php intext:“Powered by phpNewMan Version” you can see: path/to/news/browse. php? clang=…/…/…/…/…/…/file/i/want
inurl:“/becommunity/community/index. php? pageurl=”
intitle:“ASP FileMan” Resend-site:iisworks.com
“Enter ip” inurl:“php-ping.php”
ext:conf inurl:rsyncd. conf-cvs-man
intitle: private, protected, secret, secure, winnt
intitle:“DocuShare” inurl:“docushare/dsweb/” -faq-gov-edu
“#mysql dump” filetype:sql
“allow_call_time_pass_reference” “PATH_INFO”
“Certificate Practice Statement” inurl:(PDF | DOC)
LeapFTP intitle:“index. of./” sites. ini modified
master. passwd
mysql history files
NickServ registration passwords
passlist
passlist.txt (a better way)
passwd
passwd / etc (reliable)
people. lst
psyBNC config files
pwd. db
signin filetype:url
spwd. db / passwd
trillian. ini
wwwboard WebAdmin inurl:passwd.txt wwwboard|webadmin
“# -FrontPage-” ext:pwd inurl:(service | authors | administrators | users) “# -FrontPage-”
inurl:service. pwd
“AutoCreate=TRUE password=*”
“http://*:*@www” domainname
“index of/” “ws_ftp. ini” “parent directory”
“liveice configuration file” ext:cfg-site:sourceforge.net
“powered by ducalendar” -site:duware.com
“Powered by Duclassified” -site:duware.com
“Powered by Duclassified” -site:duware.com “DUware All Rights reserved”
“powered by duclassmate” -site:duware.com
“Powered by Dudirectory” -site:duware.com
“powered by dudownload” -site:duware.com
“Powered By Elite Forum Version .”
“Powered by Link Department”
“sets mode: +k”
“Powered by DUpaypal” -site:duware.com
allinurl: admin mdb
auth_user_file.txt
config.php
eggdrop filetype:user user
etc (index. of)
ext:ini eudora. ini
ext:ini Version=… password
ext:txt inurl:unattend.txt
filetype:bak inurl:“htaccess|passwd|shadow|htusers”
filetype:cfg mrtg “target[*]” -sample-cvs-example
filetype:cfm “cfapplication name” password
filetype:conf oekakibbs
filetype:conf sc_serv. conf
filetype:conf slapd. conf
filetype:config config intext:appSettings “User ID”
filetype:dat “password. dat”
filetype:dat wand. dat
filetype:inc dbconn
filetype:inc intext:mysql_connect
filetype:inc mysql_connect OR mysql_pconnect
filetype:inf sysprep
filetype:ini inurl:“serv-u. ini”
filetype:ini inurl:flashFXP. ini
filetype:ini ServUDaemon
filetype:ini wcx_ftp
filetype:ini ws_ftp pwd
filetype:ldb admin
filetype:log “See `ipsec-copyright”
filetype:log inurl:“password. log”
filetype:mdb inurl:users. mdb
filetype:mdb wwforum
filetype:netrc password
filetype:pass pass intext:userid
filetype:pem intext:private
filetype:properties inurl:db intext:password
filetype:pwd service
filetype:pwl pwl
filetype:reg reg +intext:“defaultusername” +intext:“defaultpassword”
filetype:reg reg HKEY_CURRENT_USER SSHHOSTKEYS
filetype:sql (“values * MD” | “values * password” | “values * encrypt”)
filetype:sql (“passwd values” | “password values” | “pass values” )
filetype:sql +“IDENTIFIED BY” -cvs
filetype:sql password
filetype:url +inurl:“ftp://” +inurl:“;@”
filetype:xls username password email
htpasswd
htpasswd / htgroup
htpasswd / htpasswd. bak
intext:“enable secret $”
intext:“powered by Web Wiz Journal”
intitle:“index of” intext:connect. inc
intitle:“index of” intext:globals. inc
intitle:“Index of” passwords modified
intitle:dupics inurl:(add. asp | default. asp | view. asp | voting. asp) -site:duware.com
----------------------------------------------------------------------------------------------------------------------
intitle:index. of intext:“secring. skr”|“secring. pgp”|“secring. bak”
inurl:“GRC. DAT” intext:“password”
inurl:“slapd. conf” intext:“credentials” -manpage -“Manual Page” -man: -sample
inurl:“slapd. conf” intext:“rootpw” -manpage -“Manual Page” -man: -sample
inurl:“wvdial. conf” intext:“password”
inurl:/db/main. mdb
inurl:chap-secrets-cvs
inurl:config.php dbuname dbpass
inurl:filezilla.xml -cvs
inurl:lilo. conf filetype:conf password-tatercounter-bootpwd-man
inurl:nuke filetype:sql
inurl:ospfd. conf intext:password-sample-test-tutorial-download routing configuration
inurl:pap-secrets-cvs
inurl:perform filetype:ini
inurl:secring ext:skr | ext:pgp | ext:bak
inurl:vtund. conf intext:pass-cvs
inurl:zebra. conf intext:password-sample-test-tutorial-download
“Generated by phpSystem”
“generated by wwwstat”
“Host Vulnerability Summary Report” ]
“HTTP_FROM=googlebot” googlebot.com “Server_Software=”
“Index of” / “chat/logs” chat room
“Installed Objects Scanner” inurl:default. asp
“Mecury Version” “Infastructure Group”
“Microsoft ® Windows * ™ Version * DrWtsn Copyright ©” ext:log
“Most Submitted Forms and Scripts” “this section”
“Network Vulnerability Assessment Report”
“not for distribution” confidential
“phone * * *” “address *” “e-mail” intitle:“curriculum vitae”
“phpMyAdmin” “running on” inurl:“main.php”
“produced by getstats”
The “Request Details” “Control Tree” “Server Variables”
“robots.txt” “Disallow:” filetype:txt
“Running in Child mode”
“sets mode: +p”
“sets mode: +s”
“Thank you for your order” +receipt
“This is a Shareaza Node”
“This report was generated by WebLog”
( filetype:mail | filetype:eml | filetype:mbox | filetype:mbx ) intext:password|subject
(inurl:“robot.txt” | inurl:“robots.txt” ) intext:disallow filetype:txt
-site:php.net -“The PHP Group” inurl:source inurl:url ext:pHp
FBR “ADOBE PHOTOSHOP”
AIM buddy lists
allinurl:/examples/jsp/snp/snoop. jsp
allinurl:servlet/SnoopServlet
cgiirc. conf
data filetype:mdb-site:gov-site:mil
exported email addresses
ext:asp inurl:pathto. asp
ext:cgi inurl:editcgi. cgi inurl:file=
ext:conf inurl:rsyncd. conf-cvs-man
ext:conf NoCatAuth-cvs
ext:dat bpk. dat
ext:gho gho
ext:ini intext:env. ini
ext:ldif ldif
ext:log “Software: Microsoft Internet Information Services .”
------------------------------------------------------------------------------------------
ext:mdb inurl:*. mdb inurl:fpdb shop. mdb
filetype:bkf bkf
filetype:blt “buddylist”
filetype:blt blt +intext:screenname
filetype:cfg auto_inst. cfg
filetype:conf inurl:firewall-intitle:cvs
filetype:config web. config-CVS
filetype:ctt ctt messenger
filetype:fp fp
filetype:fp fp-site:gov-site:mil -“cvs log”
filetype:inf inurl:capolicy. inf
filetype:lic lic intext:key
filetype:myd myd-CVS
filetype:ns ns
filetype:ora ora
filetype:ora tnsnames
filetype:pdb pdb backup (Pilot | Pluckerdb)
filetype:pot inurl:john. pot
------------------------------------------------------------------------------------------------------------------
filetype:pst inurl:“outlook. pst”
filetype:pst pst-from-to-date
filetype:qbb qbb
filetype:rdp rdp
filetype:reg “Terminal Server Client”
filetype:vcs vcs
filetype:wab wab
filetype:xls-site:gov inurl:contact
filetype:xls inurl:“email.xls”
Financial spreadsheets: finance.xls
Financial spreadsheets: finances.xls
Ganglia Cluster Reports
haccess. ctl (one way)
haccess. ctl (VERY reliable)
ICQ chat logs, please…
iletype:log cron. log
intext:“Session Start* * * ::* *” filetype:log
intext:“Tobias Oetiker” “traffic analysis”
intext:(password | passcode) intext:(username | userid | user) filetype:csv
intext:gmail invite intext:http://gmail. google. com/gmail/a
intext:SQLiteManager inurl:main.php
intitle:“Apache::Status” (inurl:server-status | inurl:status.html | inurl:apache.html)
intitle:“AppServ Open Project” -site:www.appservnetwork.com
intitle:“ASP Stats Generator .” “ASP Stats Generator” “- weppos”
intitle:“FTP root at”
intitle:“index of” +myd size
intitle:“Index Of” -inurl:maillog maillog size
intitle:“Index Of” cookies.txt size
intitle:“index of” mysql. conf OR mysql_config
intitle:“Index of” upload size parent directory
intitle:“index. of” . diz . nfo last modified
intitle:“Multimon UPS status page”
intitle:“PHP Advanced Transfer” (inurl:index.php | inurl:showrecent.php )
intitle:“PhpMyExplorer” inurl:“index.php” -cvs
---------------------------------------------------------------------
intitle:“statistics of” “advanced web statistics”
intitle:“System Statistics” +“System and Network Information Center”
intitle:“Usage Statistics for” “Generated by Webalizer”
intitle:“wbem” compaq login “Compaq Information Technologies Group”
intitle:“Web Server Statistics for****”
intitle:“web server status” SSH Telnet
intitle:“welcome. to. squeezebox”
intitle:admin intitle:login
intitle:index. of “Apache” “server at”
intitle:index. of cleanup. log
intitle:index. of the dead. letter
intitle:index. of inbox
intitle:index. of inbox dbx
intitle:intranet inurl:intranet +intext:“phone”
inurl:“/axs/ax-admin.pl” -script
inurl:“/cricket/grapher. cgi”
inurl:“bookmark.htm”
inurl:“cacti” +inurl:“graph_view.php” +“Settings Tree View” -cvs-RPM
inurl:“newsletter/admin/”
inurl:“newsletter/admin/” intitle:“newsletter admin”
inurl:“putty. reg”
inurl:“smb. conf” intext:“workgroup” filetype:conf conf
----------------------------------------------------------------------------------------------------------
Welcome to ntop!
“adding new user” inurl:addnewuser -“there are no domains”
(inurl:/cgi-bin/. cobalt/) | (intext:“Welcome to the Cobalt RaQ”)
filetype:php HAXPLORER “Server Files Browser”
intitle:“Web Data Administrator - Login”
inurl:ConnectComputer/precheck.htm | inurl:Remote/logon. aspx
PHP Shell (unprotected)
PHPKonsole PHPShell filetype:php-echo
Public PHP FileManagers
“index of” / picasa. ini
“index of” inurl:recycler
“Index of” rar r nfo Modified
“intitle:Index. Of /” stats merchant cgi-* etc
“Powered by Invision Power File Manager” (inurl:login.php) | (intitle:“Browsing directory /” )
“Web File Browser” “Use regular expression”
filetype:ini Desktop. ini intext:mydocs.dll
intext:“d. aspx? id” || inurl:“d. aspx? id”
intext:“Powered By: TotalIndex” intitle:“TotalIndex”
intitle:“album permissions” “Users who can modify photos” “EVERYBODY”
intitle:“Directory Listing For” intext:Tomcat-intitle:Tomcat
intitle:“HFS /” +“HttpFileServer”
intitle:“Index of *” inurl:“my shared folder” size modified
-------------------------------------------------------------------------------------------------------------------
“File Upload Manager v.” “rename to”
ext:asp “powered by DUForum” inurl:(messages|details|login|default|register) -site:duware.com
ext:asp inurl:DUgallery intitle:“.” -site:dugallery.com -site:duware.com
ext:cgi inurl:ubb_test
ezBOO “Administrator Panel” -cvs
filetype:cgi inurl:cachemgr. cgi
filetype:cnf my. cnf-cvs-example
filetype:inc inc intext:setcookie
filetype:php inurl:“viewfile” -“index.php” -"idfil
filetype:wsdl wsdl
intitle:“ASP FileMan” Resend-site:iisworks.com
intitle:“Index of /” modified php.exe
intitle:“phpremoteview” filetype:php “Name, Size, Type, Modify”
inurl:" WWWADMIN.PL" intitle:“wwwadmin”
inurl:“nph-proxy. cgi” “Start browsing through this CGI-based proxy”
inurl:“plog/register.php”
inurl:cgi. asx? StoreID
inurl:robpoll. cgi filetype:cgi
The Master List
“More Info about MetaCart Free”