Focus technology: Google is really good (Google Hack)

xiaoxiao2021-03-18  195

In fact, it should be sent out, and the domestic gangle skills have been organized. I am probably the earliest person. Later, Sniper wrote Google Hack, it was more lazy. Today, helping our wife looking for a papers, keywords are tired to die. These techniques are after I have eliminated after I organize, the best are interested, I can find me directly.

Http://www.feelids.com by swap

The site search address is: http://www.google.com/custom ketomains= (here, we want to search for the site, such as feelids.com), you can choose WWW and Feelids.com, of course, choose the search in the station we want. Oh! Hacker special information and data search address is: http://www.google.com/custom?hl=xx-hacker This is the usage of Google Keywords. To set it to Chinese, it is http://www.google. COM / CUSTOM? HL = zh-cn English is http://www.google.com/custom?hl=en

Common Google Keywords: Foo1 Foo2 (also related, such as XX company XX beauty) Operator: foo filetype: 123 Type Site: foo.com relative to the website is more interesting, you can get many unexpected information intexT: foo intitle: FoolTitle Title Oh, AlLinURL: Foo Search all related connections to the XX website. (Stepping point essential) Links: foo Don't say that it is its related link Allintilte: foo.com

We can assist "-" " " to adjust the exact degree of search

Direct search password: (quotation marks expressed as accurate search) Of course, we can extend to the results of the above search "index of" htpasswd / passwd filetype: xls username password email "ws_ftp.log" "config.php" AllinURL: Admin MDB Service FileType: PWD .... or a password suffix of Pcanywhere's password suffix CIF, etc.

What is more and more interesting, come back more sensitive information "Robots.txt" "," Filety: txt inURL: _vti_cnf (FrontPage's key index, scanner CGI library generally) AllinURL: / MSADC / Samples / Selector / showcode.asp /../../passwd /examples/jsp/snp/snoop.jsp phpsysinfo intitle: index of / admin intricle: "Documetation" InURL: 5800 (VNC port) or Desktop Port, etc. Multiple keyword search webmin port 10000 inURL: /admin/login.asp intexT: Powered by gbook365 intute: "php shell *" "enable stderr" filety: php Directly search PHPWebshell

Foo.org FileType: INC

IPsec filety: "Error Occurred" ODBC Request WHERE (Select | Insert) is white, it is said that you can try it directly to check the database search, which will develop developed SQL injections, Intitle: "php shell *" " Enable stderr "filetype: php" Dumping data for table "username password intitle:" Error using Hypernews "" Server Software "intitle:" HTTP_USER_AGENT = Googlebot "" HTTP_USER_ANGET = Googlebot "THS ADMIN filetype: .doc site: .mil classified direct Search Military related Word check multiple keywords: intitle: config confixx login password

"Mydomain.com" Nessus Report "Report generated by" "ipconfig" "WinipConfig"

Google Cache Utilization (Hoho, the most influential thing) recommended everyone "searchak all sites" special recommendation: administrator users, etc., such as name, birthday, etc. Cache: foo.com

You can view similar results

First find the management background address: Site: xxxx.com intext: management site: xxxx.com INURL: Login Site: XXXX.com INTITLE: Manage Site: a2.xxxx.com Inout: File Site: a3.xxxx.com InURL: Load Site: a2.xxxx.com intext: ftp: // *: * Site: A2.xxxx.com FileType: ASP Site: XXXX.com // Get n secondary domain name Site: xxxx.com intext: * @ xxxx.com // Get N email addresses, there is also the name of the owner of the mailbox: XXXX.com INTEXT: Phone // N Phone INTITLE: "INDEX OF" etc ositle: "index of" .sh_history Intitle : "Index of" .bash_history intitle: "index of" passwd Intitle: "index of" people.lst intitle: "index of" pwd.db intitle: "index of" etc / shadion: "index of" spwd intIntle: "index of" master.passwd intitle: "INDEX OF" htpasswd "# -frontpage-" Inout: service.pwd

AllinURL: BBS Data FileType: MDB InURL: Database FileType: Inc CONN INURL: DATA FILETYPE: MDB INTITLE: "INDEX OF" Data ...

Some skills collection:

3) "http: // *: * @ www" DomainName finds some ISP sites, you can check the virtual host of the other IP 3 4) Auth_user_file.txt is not practical, too old 5) The master list looks for mailing list

6) INTITLE: "Welcome.to.squeezeBox" A special management system, default open port 90 7) Passlist.txt (a better Way) Dictionary

8) "A Syntax Error Has Occurred" FileType: IHTML

9) EXT: PHP Program_LISTING INTITLE: Mythweb.Program.Listing 10) INTITLE: Index.Of Abyss.conf 11) EXT: NBE NBE

12) INTITLE: "SWW link" "please wait ....." 13)

14) Intitle: "freifunk.net - status" -site: commando.de

15) INTITLE: "WorldClient" Intext: "(2003 | 2004) Alt-N Technologies."

17) INTITLE: Open-XChange Inurl: Login.pl

20) INTITLE: "Site Administration: Please log in" "Site Designed by Emarketsuth" 21) ORA-00921: Unexpected end of sql command

22) INTITLE: "YALA: YET ANOTHER LDAP Administrator" 23) Welcome.to phpqladmin "please login" -cvsweb 24) INTITLE: "SWW link" "please wait ....." 25) InURL: "Port_255" -htm

27) INTITLE: "WorldClient" IntexT: "(2003 | 2004) Alt-N Technologies."

These are some new vulnerabilities, announced at the 0DAYS announcement

EXT: PHP Program_Listing Intitle: mythweb.program.listing

Inurl: preferences.ini "[emule]"

INTITLE: "INDEX OF / CFIDE /" Administrator

"Access Denied for User" "Using Password"

EXT: PHP INTEXT: "Powered by phpnewman version" You can see: path / to / news / browse.php? clang = .. / .. / .. / .. / .. / .. / file / I / want

InURL: "/ becommunity / community / index.php? PageURL ="

Intitle: "ASP Fileman" resend -site: Iisworks.com

"Enter IP" InURL: "PHP-PING.PHP"

EXT: confinur: rsyncd.conf -cvs -man

Intitle: Private, Protected, Secret, Secure, Winnt

INTITLE: "DOCUSHARE" inURL: "DOCUSHARE / DSWEB /" -faq -gov -edu "#MYSQL DUMP" FileType: SQL "allow_call_time_pass_reference" "PATH_INFO"

"CERTIFICATE PRACTICE STATEMENT" InURL: (PDF | DOC)

Leapftp Intitle: "Index.Of./" Sites.ini Modified Master.Passwd

mysql history files NickServ registration passwords passlist passlist.txt (a better way) passwd passwd / etc (reliable) people.lst psyBNC config files pwd.db signin filetype: url spwd.db / passwd trillian.ini wwwboard WebAdmin inurl: passwd.txt Wwwboard | WebAdmin

"# -Frontpage-" ext: pwd inurl: (Service | Authors | Administrators | Users) "# -frontpage-"

InURL: service.pwd "autocreate = true password = *" "http: // *: * @ www" DomainName "index of /" "ws_ftp.ini" "Parent Directory" "Liveice Configuration File" EXT: CFG -Site: sourceforge.net "powered by ducalendar" -site: duware.com "Powered by Duclassified" -site: duware.com "Powered by Duclassified" -site: duware.com "DUware All Rights reserved" "powered by duclassmate" -site: Duware.com "Powered By Dudirectory" -site: duware.com "Powered by Dudownload" -site: duware.com "Powered by elite forum version *. *" "Powered by link department" "sets mode: k" "Powered By duware.com allinarch: admin mdb auth_user_file.txt config.php eggdrop filetype: User ETC (INDEX.OF) EXT: INI EUDORA.INI EXT: INI VERSITION = ... Password Ext: txt inURL: Unattend.txt

FileType: Bak Inur: "HTACCESS | Passwd | Shadow | HTUSERS"

FileType: cfg mrtg "target [*]" -sample -cvs -example

FileType: CFM "CFApplication Name" Password

FileType: Conf oekibbs fileType: conf sc_serv.conf

FileType: conf slapd.conf

FILETYPE: Config Config Intext: Appsettings "User ID"

FILETYPE: DAT "password.dat"

FILETYPE: DAT Wand.dat

FILETYPE: INC DBCONN

FILETYPE: INC INTEXT: MYSQL_CONNECT FileType: Inc mysql_connect or mysql_pconnect

FILETYPE: INF SYSPREP

FiletyPE: INURL: "Serv-U.ini" FileType: INURL: Flashfxp.ini FileType: INI WS_FTP FILETYPE: INI WS_FTP PWD

FILETYPE: LDB Admin

FILETYPE: LOG "See` ipsec copyright "

FileType: Log Inurl: "Password.log"

FileType: MDB InURL: Users.mdb

FILETYPE: MDB WWFORUM

FILETYPE: NETRC PASSWORD

FILETYPE: Pass Pass Intext: UserId

FILETYPE: PEM Intext: Private

FileTies InURL: DB INTEXT: PASSWORD

FILETYPE: PWD Service FileType: PWL PWL

filetype: reg reg intext: "defaultusername" intext: "defaultpassword" filetype: reg reg HKEY_CURRENT_USER SSHHOSTKEYS filetype: sql ( "values ​​* MD" | "values ​​* password" | "values ​​* encrypt") filetype: sql ( "passwd VALUES "|" Password Values ​​"|" Pass Values ​​") FileType: SQL " Identified by "-cvs FileType: SQL Password

FileType: URL InURL: "ftp: //" inURL: "@"

FileType: XLS Username Password Email

Htpasswd htpasswd / htgroup htpasswd / htpasswd.bak

Intext: "Enable Secret $" INTEXT: "Powered by Web Wiz Journal"

INTITLE: "INDEX OF" INTEXT: CONNECT.INC INTITLE: "INDEX OF" INTEXT: "INDEX OF" PASSWORDS MODIFIED

INTITLE: DUPICS InURL: (Add.asp | default.asp | View.asp | voting.asp) -site: duware.com ------------------------------------------------------------------------------------------------------------------------ -------------------------------------------------- -------------------------------------------- INTITLE: INDEX. Of intexT: "SECRING.SKR" | "SECRINPGP" | "SECRING.BAK"

InURL: "Grc.dat" INTEXT: "Password"

InURL: "Slapd.conf" Intext: "Credentials" -Manpage - "Manual Page" -man: -sample

InURL: "Slapd.conf" Intext: "rootpw" -manpage - "manual page" -man: -sample

InURL: "wvdial.conf" intexT: "password"

Inurl: /db/main.mdb

InURL: Chap-Secrets -CVS

InURL: config.php dbuname dbpass inurl: filezilla.xml -cvs

Inurl: lilo.conf fileetype: conf Password -tatercounter -bootpwd -man

InURL: Nuke FileType: SQL

InURL: OSPFD.CONF INTEXT: Password -Sample -Test -tutorial -download Route InURL: Pap-Secrets -CVS

InURL: Perform Filetype: INI InURL: SECRING EXT: SKR | EXT: PGP | EXT: BAK

InURL: vTund.conf Intext: Pass -CVS

Inurl: Zebra.conf Intext: Password -Sample -Test -tutorial -downloadLoad

"Generated by phssystem" "generated by wwwstat"

"Host Vulnerability Summary Report"]

"Http_from = Googlebot" Googlebot.com "Server_Software ="

"Index of" / "chat / logs" chat room "Installed Objects Scanner" InURL: Default.asp

"Mecury Version" "InfaStructure Group" "Microsoft (R) Windows * (TM) Version * Drwtsn Copyright (c)" EXT: LOG

"MOST Submitted Forms and Scripts" "this Section"

"NetWork Vulnerability Assessment Report"

"not for distribution" confidential "phone * * *" "Address *" "e-mail" intitle: "Curriculum Vitae"

"phpmyadmin" "Running on" Inout: "main.php"

"ProductD by getStats" "Request Details" "Server Variables" "Robots.txt" Disallow: "FileType: TXT

"Running in Child Mode"

"Sets Mode: P" "Sets Mode: S" "Thank you for your order" receipt "this is a shareaza node" "This Report Was generated by Weblog" (FileType: Mail | FileType: EML | Filety: MBOX FileType: MBX) INTEXT: Password | SUBJECT

(InURL: "Robot.txt" | InURL: "Robots.txt") INTEXT: DISALLOW FILETYPE: TXT

-Site: php.net - "The PHP Group" InURL: Source Inurl: URL EXT: PHP

FBR "Adobe Photoshop" AIM Buddy Lists AllinURL: /examples/jsp/snp/snoop.jsp AllinURL: Servlet / SnoopServlet CGIIRC.CONF

Data FileType: MDB -Site: Gov -site: Mil

Exported Email Addresses

EXT: ASP InURL: Pathto.asp

EXT: CGI InURL: Editcgi.cgi Inout: file =

EXT: confinur: rsyncd.conf -cvs -man ext: conf Nocatauth -cvs

EXT: DAT BPK.DAT EXT: GHO GHO

EXT: INI INTEXT: Env.ini EXT: LDIF LDIF

Ext: log "Software: Microsoft Internet Information Services *. *" ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ -------------------------------------------------- ---- EXT: MDB Inurl: *. MDB Inout: FPDB Shop.mdb

FileType: BKF BKF FileType: BLT "BuddyList" Filety: BLT BLT INTEXT: Screenname

FileType: CFG Auto_Inst.cfg

FileType: conf INURL: FireWall -Intitle: CVS FileType: config web.config -cvs

FileType: CTT CTT Messenger

FileType: FP FP FileType: FP FP -SITE: GOV -SIT: MIL - "CVS LOG"

FileType: INF InURL: Capolicy.inf FileType: LIC intext: Key

FileType: MYD MYD-CVS FileType: ORA ORA FILETYPE: ORA TNSNAMES FILETYPE: PDB PDB Backup (PLOT | PLUCKERDB) FILETYPE: POT INURL: John.pot -------------- -------------------------------------------------- -------------------------------------------------- FileType: PST InURL: "Outlook.pst" Filety: PST PST -FROM -TO -DATE FILETYPE: QBB QBB FILETYPE: RDP RDP

FileType: REG "Terminal Server Client" FileType: VCS VCS FileType: WAB WAB

FileType: gv: "email.xls" Financial Spreadsheets: Finance.xls Financial Spreadsheets: Finances.xls

Ganglia Cluster Reports

Haccess.ctl (One Way) Haccess.ctl (Very Reliable) ICQ Chat Logs, please ...

ILetype: log cron.log intexT: "session start * * * *: *: * *" Filety: log intexT: "Tobias Oetiker" "Traffic Analysis"

Intext: (PASSWORD | Passcode) Intext: (userName | userid | user) FileType: CSV Intext: gmail invite intexT: http://gmail.google.com/gmail/a

Intext: SQLITEMANAGER InURL: main.php

INTITLE: "Apache :: Status" (InURL: Server-Status | Inurl: status.html | Inurl: apache.html)

INTITLE: "AppServ Open Project" -site: www.appservnetwork.com Intitle: "ASP Stats Generator *. *" "ASP Stats Generator" "- WEPPOS"

INTITLE: "FTP Root AT" INTITLE: "INDEX OF" MYD SIZE

INTITLE: "Index of" -inURL: Mailog Maillog Size

INTITLE: "INDEX OF" cookies.txt size

INTITLE: "INDEX OF" mysql.conf or mysql_config intitle: "INDEX OF" UPLOAD SIZE PARENT DIRECTORY

intitle: "index.of" .diz .nfo last modified intitle: "Multimon UPS status page" intitle: "PHP Advanced Transfer" (inurl: index.php | inurl: showrecent.php) intitle: "PhpMyExplorer" inurl: "index .php "-cvs ---------------------------------------------------------------------------------------------------------------------------------- ------------------------ INTITLE: "Statistics of" "Advanced Web Statistics" INTITLE: "System Statistics" "System and NetWork Information Center" INTITLE : "Usage Statistics for" "Generated by Webalizer" intitle: "wbem" compaq login "Compaq Information Technologies Group" intitle: "Web Server Statistics for ****" intitle: "web server status" SSH Telnet intitle: "welcome. TO.SQUEEZEBOX

INTITLE: INDEX.OF "apache" "Server at" INTITLOG INTITLE: INDEX.OF DEAD.LOG INTITLE: INDEX.OF INBOX INTITLE: INDEX.OF Inbox DBX

INTITLE: INTRANET InURL: Intranet Intext: "Phone" InURL: "/ AXS / AX-ADMIN.PL" -script inURL: "/ cricket / grapher.cgi" InURL: "Bookmark.htm"

InURL: "CACTI" InURL: "Graph_View.php" "Settings Tree View" -cvs -rpm inURL: "Newsletter / Admin /" InURL: "Newsletter / Admin /" INTITLE: "newsletter admin" InURL: "PUTTY. REG "InURL:" SMB.CONF "INTEXT:" Workgroup "FileType: conf Conf -------------------------------------------------------------------------------------------------------------------------------------------------------------------- -------------------------------------------------- ---------------------------------------------------------------------------------------------------------------------------------------

Welcome to NTOP!

"adding new user" inURL: AddNewuser - "INURL: /CGI-BIN /.COBALT/) | (Intext:" Welcome to the cobalt raq)

filetype: php HAXPLORER "Server Files Browser" intitle: "Web Data Administrator - Login" inurl: ConnectComputer / precheck.htm | inurl: Remote / logon.aspx PHP Shell (unprotected) PHPKonsole PHPShell filetype: php -echo Public PHP FileManagers

"index of" / picasa.ini "index of" InURL: Recycler "Index of" Rar R nfo modified "intute: index.of /" stats merchant CGI- * etc "Powered by Invision Power File Manager" (InURL: Login. PHP) | (INTITLE: "Browsing Directory /") "Web File Browser" "Use Regular Expression"

FileType: ini desktop.ini intexT: mydocs.dll

INTEXT: "D.ASPX? ID" | INTEXT: "POWERED BY: TOTALINDEX" INTEXT: "TotalIndex" INTITLE: "Album Permissions" "Everybody" INTITLE : "Directory Listing for" Intext: Tomcat -Intitle: Tomcat Intitle: "HFS /" "httpfileserver" intitle: "index of *" inURL: "My Shared Folder" Size Modified ----------- -------------------------------------------------- -------------------------------------------------- ----

File Upload Manager V. "" Rename To "

EXT: ASP "Powered by Duforum" InURL: (Messages | Details | Login | DEFAULT | Register) -site: duware.com ext: ASP InURL: Dugallery Intitle: "." -site: dugallery.com -site: duware.com EXT: CGI InURL: UBB_TEST

EZBOO "administrator panel" -cvs

FileType: CGI InURL: Cachemgr.cgi FileType: CNF my.cnf -cvs -example filetype: Inc INC INTEXT: SETCOOKIE

FileType: "ViewFile" - "INDEX.PHP" - "IDFIL FileType: WSDL WSDL

Intitle: "ASP Fileman" resend -site: Iisworks.com

INTITLE: "index of /" modified php.exeintitle: "phpRemoteView" FileType: PHP "Name, Size, Type, Modify"

InURL: "wwwadmin.pl" Intitle: "wwwadmin" InURL: "NPH-Proxy.cgi" "Start Browsing Through this cgi-based proxy" InURL: "PLOG / register.php" InURL: CGI.ASX? StoreId

InURL: RobPoll.cgi FileType: CGI

The master list

"More Info About Metacart Free"

转载请注明原文地址:https://www.9cbs.com/read-130010.html

New Post(0)