Lucene search

K
myhack58佚名MYHACK58:6220066931
HistoryFeb 07, 2006 - 12:00 a.m.

Focus technology:Google you really good(Google Hack)-vulnerability warning-the black bar safety net

2006-02-0700:00:00
佚名
www.myhack58.com
73

In fact, earlier should be issued to, domestic about google tips aspects of finishing, I probably was one of the first people right, then sniper write a google hack, they’re more lazy. Now help wives find the papers, the keyword matching tired of death. These tips are my finishing after the phase-out of the rear, preferably those if you are interested you can find me directly to request

Http://www.feelids.com
By swap

Site search address:
http://www.google.com/custom?domains=here write we want to search the site 比如 feelids.com
进去 可以 选择 www 和 feelids.com of course then we’re the site search!
Hacking specific information and information on the search address is:
http://www.google.com/custom?hl=xx-hacker
Here’s google keyword usage, you want to set it to Chinese, it is
http://www.google.com/custom?hl=zh-CN
English is http://www. google. com/custom? hl=en

Commonly used google keyword:
foo1 foo2 (which is associated, such as search xx company xx beauty)
operator:foo
filetype:1 2 3 Type
site:foo.com relatively straightforward to see the website more interesting, you can get many unexpected information
intext:foo
intitle: fooltitle title Oh
allinurl:foo search xx website all the relevant connections. (Pedal point necessary)
links:foo don’t say you know is it related links
allintilte:foo.com

We can assist"-" "+"to adjust the search to the precise degree

Direct search password: (quotation marks are represented as exact search)
Of course we can then extend the above results to the second search
“index of” htpasswd / passwd
filetype:xls username password email
“ws_ftp. log”
“config.php”
allinurl:admin mdb
service filetype:pwd… Or some such as pcanywhere the password suffix cif, etc.

More and more interesting, then a little more sensitive information
“robots.txt” “Disallow:” filetype:txt
inurl:_vti_cnf (FrontPage key index. the scanner of CGI libraries in General)
allinurl: /msadc/Samples/selector/showcode. asp
/…/…/…/passwd
/examples/jsp/snp/snoop. jsp
phpsysinfo
intitle:index of /admin
intitle:“documetation”
inurl: 5 8 0 0(vnc port)or desktop port such as multiple keyword search
webmin port 1 0 0 0 0
inurl:/admin/login. asp
intext:Powered by GBook365
intitle:“php shell*” “Enable stderr” filetype:php direct the search to phpwebshell

foo.org filetype:inc

ipsec filetype:conf
intilte:“error occurred” ODBC request WHERE (select|insert) plainly means, you can directly try to check the database to retrieve, for the current popular sql injection, will be developed Oh
intitle:“php shell*” “Enable stderr” filetype:php
“Dumping data for table” username password
intitle:“Error using Hypernews”
“Server Software”
intitle:“HTTP_USER_AGENT=Googlebot”
“HTTP_USER_ANGET=Googlebot” THS ADMIN
filetype:.doc site:. mil classified direct search military-related word

Check multiple keywords:
intitle:config confixx login password

mydomain.com” nessus report
“report generated by”
“ipconfig”
“winipconfig”

google cache use hoho, the most influential of the things recommended everyone to search when"search all sites"
Particularly recommended: administrator, users and other related things, such as your name, birthday, etc… The most miserable it can also be used as a dictionary.
cache:foo.com

You can check the similar result

The first look of the website management background address:
site:xxxx.com intext:management
site:xxxx.com inurl:login
site:xxxx.com intitle:management
site:a2.xxxx.com inurl:file
site:a3.xxxx.com inurl:load
site:a2.xxxx.com intext:ftp://:
site:a2.xxxx.com filetype:asp
site:xxxx.com //obtain the N second-level domain
site:xxxx.com intext:*@xxxx.com //get N E-mail address, and the mailbox owner’s name or something.
site:xxxx.com intext:phone //N Telephone
intitle:“index of” etc
intitle:“Index of” . sh_history
intitle:“Index of” . bash_history
intitle:“index of” passwd
intitle:“index of” people. lst
intitle:“index of” pwd. db
intitle:“index of” etc/shadow
intitle:“index of” spwd
intitle:“index of” master. passwd
intitle:“index of” htpasswd
“# -FrontPage-” inurl:service. pwd

allinurl:bbs data
filetype:mdb inurl:database
filetype:inc conn
inurl:data filetype:mdb
intitle:“index of” data

Some tips collection:

  1. http://*:*@www” domainname find some ISP site, you can check the ip of the virtual host
    3

  2. auth_user_file.txt not practical, too old.

  3. The Master List looking for a mailing list

  4. intitle:“welcome. to. squeezebox” is a special management system, The default open port 9 0

  5. passlist.txt (a better way) dictionary

  6. “A syntax error has occurred” filetype:ihtml

  7. ext:php program_listing intitle:MythWeb. Program. Listing
    1 0) intitle:index. of abyss. conf
    1 1)ext:nbe nbe

1 2)intitle:“SWW link” “Please wait…”
1 3)

1 4) intitle:“Freifunk.Net - Status” -site:commando.de

1 5) intitle:“WorldClient” intext:“? (2003/2004) Alt-N Technologies.”

1 7) intitle:open-xchange inurl:login.pl

2 0) intitle:“site administration: please log in” “site designed by emarketsouth”
2 1) ORA-0 0 9 2 1: unexpected end of SQL command

2 2)intitle:“YALA: Yet Another LDAP Administrator”
2 3)welcome. to phpqladmin “Please login” -cvsweb
2 4)intitle:“SWW link” “Please wait…”
2 of 5)inurl:“port_255” -htm

2 7)intitle:“WorldClient” intext:“? (2003/2004) Alt-N Technologies.”

These are new some of the vulnerabilities skill in 0days Bulletin published

ext:php program_listing intitle:MythWeb. Program. Listing

inurl:preferences. ini "[emule]"intitle:“Index of /CFIDE/” administrator

“access denied for user” “using password”

ext:php intext:“Powered by phpNewMan Version” you can see: path/to/news/browse. php? clang=…/…/…/…/…/…/file/i/want

inurl:“/becommunity/community/index. php? pageurl=”

intitle:“ASP FileMan” Resend-site:iisworks.com

“Enter ip” inurl:“php-ping.php”

ext:conf inurl:rsyncd. conf-cvs-man

intitle: private, protected, secret, secure, winnt

intitle:“DocuShare” inurl:“docushare/dsweb/” -faq-gov-edu
“#mysql dump” filetype:sql

“allow_call_time_pass_reference” “PATH_INFO”

“Certificate Practice Statement” inurl:(PDF | DOC)

LeapFTP intitle:“index. of./” sites. ini modified
master. passwd

mysql history files
NickServ registration passwords
passlist
passlist.txt (a better way)
passwd
passwd / etc (reliable)
people. lst
psyBNC config files
pwd. db
signin filetype:url
spwd. db / passwd
trillian. ini
wwwboard WebAdmin inurl:passwd.txt wwwboard|webadmin

“# -FrontPage-” ext:pwd inurl:(service | authors | administrators | users) “# -FrontPage-”

inurl:service. pwd
“AutoCreate=TRUE password=*”
http://*:*@www” domainname
“index of/” “ws_ftp. ini” “parent directory”
“liveice configuration file” ext:cfg-site:sourceforge.net
“powered by ducalendar” -site:duware.com
“Powered by Duclassified” -site:duware.com
“Powered by Duclassified” -site:duware.com “DUware All Rights reserved”
“powered by duclassmate” -site:duware.com
“Powered by Dudirectory” -site:duware.com
“powered by dudownload” -site:duware.com
“Powered By Elite Forum Version .
“Powered by Link Department”
“sets mode: +k”
“Powered by DUpaypal” -site:duware.com
allinurl: admin mdb
auth_user_file.txt
config.php
eggdrop filetype:user user
etc (index. of)
ext:ini eudora. ini
ext:ini Version=… password
ext:txt inurl:unattend.txt

filetype:bak inurl:“htaccess|passwd|shadow|htusers”

filetype:cfg mrtg “target[*]” -sample-cvs-example

filetype:cfm “cfapplication name” password

filetype:conf oekakibbs
filetype:conf sc_serv. conf

filetype:conf slapd. conf

filetype:config config intext:appSettings “User ID”

filetype:dat “password. dat”

filetype:dat wand. dat

filetype:inc dbconn

filetype:inc intext:mysql_connect
filetype:inc mysql_connect OR mysql_pconnect

filetype:inf sysprep

filetype:ini inurl:“serv-u. ini”
filetype:ini inurl:flashFXP. ini
filetype:ini ServUDaemon
filetype:ini wcx_ftp
filetype:ini ws_ftp pwd

filetype:ldb admin

filetype:log “See `ipsec-copyright”

filetype:log inurl:“password. log”

filetype:mdb inurl:users. mdb

filetype:mdb wwforum

filetype:netrc password

filetype:pass pass intext:userid

filetype:pem intext:private

filetype:properties inurl:db intext:password

filetype:pwd service
filetype:pwl pwl

filetype:reg reg +intext:“defaultusername” +intext:“defaultpassword”
filetype:reg reg HKEY_CURRENT_USER SSHHOSTKEYS
filetype:sql (“values * MD” | “values * password” | “values * encrypt”)
filetype:sql (“passwd values” | “password values” | “pass values” )
filetype:sql +“IDENTIFIED BY” -cvs
filetype:sql password

filetype:url +inurl:“ftp://” +inurl:“;@”

filetype:xls username password email

htpasswd
htpasswd / htgroup
htpasswd / htpasswd. bak

intext:“enable secret $”
intext:“powered by Web Wiz Journal”

intitle:“index of” intext:connect. inc
intitle:“index of” intext:globals. inc
intitle:“Index of” passwords modified

intitle:dupics inurl:(add. asp | default. asp | view. asp | voting. asp) -site:duware.com
----------------------------------------------------------------------------------------------------------------------

intitle:index. of intext:“secring. skr”|“secring. pgp”|“secring. bak”

inurl:“GRC. DAT” intext:“password”

inurl:“slapd. conf” intext:“credentials” -manpage -“Manual Page” -man: -sample

inurl:“slapd. conf” intext:“rootpw” -manpage -“Manual Page” -man: -sample

inurl:“wvdial. conf” intext:“password”

inurl:/db/main. mdb

inurl:chap-secrets-cvs

inurl:config.php dbuname dbpass
inurl:filezilla.xml -cvs

inurl:lilo. conf filetype:conf password-tatercounter-bootpwd-man

inurl:nuke filetype:sql

inurl:ospfd. conf intext:password-sample-test-tutorial-download routing configuration
inurl:pap-secrets-cvs

inurl:perform filetype:ini
inurl:secring ext:skr | ext:pgp | ext:bak

inurl:vtund. conf intext:pass-cvs

inurl:zebra. conf intext:password-sample-test-tutorial-download

“Generated by phpSystem”
“generated by wwwstat”

“Host Vulnerability Summary Report” ]

“HTTP_FROM=googlebot” googlebot.com “Server_Software=”

“Index of” / “chat/logs” chat room
“Installed Objects Scanner” inurl:default. asp

“Mecury Version” “Infastructure Group”
“Microsoft ® Windows * ™ Version * DrWtsn Copyright ©” ext:log

“Most Submitted Forms and Scripts” “this section”

“Network Vulnerability Assessment Report”

“not for distribution” confidential
“phone * * *” “address *” “e-mail” intitle:“curriculum vitae”

“phpMyAdmin” “running on” inurl:“main.php”

“produced by getstats”
The “Request Details” “Control Tree” “Server Variables”
“robots.txt” “Disallow:” filetype:txt

“Running in Child mode”

“sets mode: +p”
“sets mode: +s”
“Thank you for your order” +receipt
“This is a Shareaza Node”
“This report was generated by WebLog”
( filetype:mail | filetype:eml | filetype:mbox | filetype:mbx ) intext:password|subject

(inurl:“robot.txt” | inurl:“robots.txt” ) intext:disallow filetype:txt

-site:php.net -“The PHP Group” inurl:source inurl:url ext:pHp

FBR “ADOBE PHOTOSHOP”
AIM buddy lists
allinurl:/examples/jsp/snp/snoop. jsp
allinurl:servlet/SnoopServlet
cgiirc. conf

data filetype:mdb-site:gov-site:mil

exported email addresses

ext:asp inurl:pathto. asp

ext:cgi inurl:editcgi. cgi inurl:file=

ext:conf inurl:rsyncd. conf-cvs-man
ext:conf NoCatAuth-cvs

ext:dat bpk. dat
ext:gho gho

ext:ini intext:env. ini
ext:ldif ldif

ext:log “Software: Microsoft Internet Information Services .
------------------------------------------------------------------------------------------
ext:mdb inurl:*. mdb inurl:fpdb shop. mdb

filetype:bkf bkf
filetype:blt “buddylist”
filetype:blt blt +intext:screenname

filetype:cfg auto_inst. cfg

filetype:conf inurl:firewall-intitle:cvs
filetype:config web. config-CVS

filetype:ctt ctt messenger

filetype:fp fp
filetype:fp fp-site:gov-site:mil -“cvs log”

filetype:inf inurl:capolicy. inf
filetype:lic lic intext:key

filetype:myd myd-CVS
filetype:ns ns
filetype:ora ora
filetype:ora tnsnames
filetype:pdb pdb backup (Pilot | Pluckerdb)

filetype:pot inurl:john. pot
------------------------------------------------------------------------------------------------------------------
filetype:pst inurl:“outlook. pst”
filetype:pst pst-from-to-date
filetype:qbb qbb
filetype:rdp rdp

filetype:reg “Terminal Server Client”
filetype:vcs vcs
filetype:wab wab

filetype:xls-site:gov inurl:contact
filetype:xls inurl:“email.xls”
Financial spreadsheets: finance.xls
Financial spreadsheets: finances.xls

Ganglia Cluster Reports

haccess. ctl (one way)
haccess. ctl (VERY reliable)
ICQ chat logs, please…

iletype:log cron. log
intext:“Session Start* * * ::* *” filetype:log
intext:“Tobias Oetiker” “traffic analysis”

intext:(password | passcode) intext:(username | userid | user) filetype:csv
intext:gmail invite intext:http://gmail. google. com/gmail/a

intext:SQLiteManager inurl:main.php

intitle:“Apache::Status” (inurl:server-status | inurl:status.html | inurl:apache.html)

intitle:“AppServ Open Project” -site:www.appservnetwork.com
intitle:“ASP Stats Generator .” “ASP Stats Generator” “- weppos”

intitle:“FTP root at”
intitle:“index of” +myd size

intitle:“Index Of” -inurl:maillog maillog size

intitle:“Index Of” cookies.txt size

intitle:“index of” mysql. conf OR mysql_config
intitle:“Index of” upload size parent directory

intitle:“index. of” . diz . nfo last modified
intitle:“Multimon UPS status page”
intitle:“PHP Advanced Transfer” (inurl:index.php | inurl:showrecent.php )
intitle:“PhpMyExplorer” inurl:“index.php” -cvs
---------------------------------------------------------------------
intitle:“statistics of” “advanced web statistics”
intitle:“System Statistics” +“System and Network Information Center”
intitle:“Usage Statistics for” “Generated by Webalizer”
intitle:“wbem” compaq login “Compaq Information Technologies Group”

intitle:“Web Server Statistics for****”
intitle:“web server status” SSH Telnet
intitle:“welcome. to. squeezebox”

intitle:admin intitle:login
intitle:index. of “Apache” “server at”
intitle:index. of cleanup. log
intitle:index. of the dead. letter
intitle:index. of inbox
intitle:index. of inbox dbx

intitle:intranet inurl:intranet +intext:“phone”
inurl:“/axs/ax-admin.pl” -script
inurl:“/cricket/grapher. cgi”
inurl:“bookmark.htm”

inurl:“cacti” +inurl:“graph_view.php” +“Settings Tree View” -cvs-RPM
inurl:“newsletter/admin/”
inurl:“newsletter/admin/” intitle:“newsletter admin”
inurl:“putty. reg”
inurl:“smb. conf” intext:“workgroup” filetype:conf conf
----------------------------------------------------------------------------------------------------------

Welcome to ntop!

“adding new user” inurl:addnewuser -“there are no domains”
(inurl:/cgi-bin/. cobalt/) | (intext:“Welcome to the Cobalt RaQ”)

filetype:php HAXPLORER “Server Files Browser”
intitle:“Web Data Administrator - Login”

inurl:ConnectComputer/precheck.htm | inurl:Remote/logon. aspx
PHP Shell (unprotected)
PHPKonsole PHPShell filetype:php-echo
Public PHP FileManagers

“index of” / picasa. ini
“index of” inurl:recycler
“Index of” rar r nfo Modified
“intitle:Index. Of /” stats merchant cgi-* etc
“Powered by Invision Power File Manager” (inurl:login.php) | (intitle:“Browsing directory /” )
“Web File Browser” “Use regular expression”

filetype:ini Desktop. ini intext:mydocs.dll

intext:“d. aspx? id” || inurl:“d. aspx? id”
intext:“Powered By: TotalIndex” intitle:“TotalIndex”
intitle:“album permissions” “Users who can modify photos” “EVERYBODY”
intitle:“Directory Listing For” intext:Tomcat-intitle:Tomcat
intitle:“HFS /” +“HttpFileServer”
intitle:“Index of *” inurl:“my shared folder” size modified
-------------------------------------------------------------------------------------------------------------------

“File Upload Manager v.” “rename to”

ext:asp “powered by DUForum” inurl:(messages|details|login|default|register) -site:duware.com
ext:asp inurl:DUgallery intitle:“.” -site:dugallery.com -site:duware.com
ext:cgi inurl:ubb_test

ezBOO “Administrator Panel” -cvs

filetype:cgi inurl:cachemgr. cgi
filetype:cnf my. cnf-cvs-example
filetype:inc inc intext:setcookie

filetype:php inurl:“viewfile” -“index.php” -"idfil
filetype:wsdl wsdl

intitle:“ASP FileMan” Resend-site:iisworks.com

intitle:“Index of /” modified php.exe

intitle:“phpremoteview” filetype:php “Name, Size, Type, Modify”

inurl:" WWWADMIN.PL" intitle:“wwwadmin”
inurl:“nph-proxy. cgi” “Start browsing through this CGI-based proxy”
inurl:“plog/register.php”
inurl:cgi. asx? StoreID

inurl:robpoll. cgi filetype:cgi

The Master List

“More Info about MetaCart Free”

|