In fact, it should be sent out, and the domestic gangle skills have been organized. I am probably the earliest person. Later, Sniper wrote Google Hack, it was more lazy. Today, helping our wife looking for a papers, keywords are tired to die. These techniques are after I have eliminated after I organize, the best are interested, I can find me directly.
Http://www.feelids.com by swap
The site search address is: http://www.google.com/custom ketomains= (here, we want to search for the site, such as feelids.com), you can choose WWW and Feelids.com, of course, choose the search in the station we want. Oh! Hacker special information and data search address is: http://www.google.com/custom?hl=xx-hacker This is the usage of Google Keywords. To set it to Chinese, it is http://www.google. COM / CUSTOM? HL = zh-cn English is http://www.google.com/custom?hl=en
Common Google Keywords: Foo1 Foo2 (also related, such as XX company XX beauty) Operator: foo filetype: 123 Type Site: foo.com relative to the website is more interesting, you can get many unexpected information intexT: foo intitle: FoolTitle Title Oh, AlLinURL: Foo Search all related connections to the XX website. (Stepping point essential) Links: foo Don't say that it is its related link Allintilte: foo.com
We can assist "-" " " to adjust the exact degree of search
Direct search password: (quotation marks expressed as accurate search) Of course, we can extend to the results of the above search "index of" htpasswd / passwd filetype: xls username password email "ws_ftp.log" "config.php" AllinURL: Admin MDB Service FileType: PWD .... or a password suffix of Pcanywhere's password suffix CIF, etc.
What is more and more interesting, come back more sensitive information "Robots.txt" "," Filety: txt inURL: _vti_cnf (FrontPage's key index, scanner CGI library generally) AllinURL: / MSADC / Samples / Selector / showcode.asp /../../passwd /examples/jsp/snp/snoop.jsp phpsysinfo intitle: index of / admin intricle: "Documetation" InURL: 5800 (VNC port) or Desktop Port, etc. Multiple keyword search webmin port 10000 inURL: /admin/login.asp intexT: Powered by gbook365 intute: "php shell *" "enable stderr" filety: php Directly search PHPWebshell
Foo.org FileType: INC
IPsec filety: "Error Occurred" ODBC Request WHERE (Select | Insert) is white, it is said that you can try it directly to check the database search, which will develop developed SQL injections, Intitle: "php shell *" " Enable stderr "filetype: php" Dumping data for table "username password intitle:" Error using Hypernews "" Server Software "intitle:" HTTP_USER_AGENT = Googlebot "" HTTP_USER_ANGET = Googlebot "THS ADMIN filetype: .doc site: .mil classified direct Search Military related Word check multiple keywords: intitle: config confixx login password
"Mydomain.com" Nessus Report "Report generated by" "ipconfig" "WinipConfig"
Google Cache Utilization (Hoho, the most influential thing) recommended everyone "searchak all sites" special recommendation: administrator users, etc., such as name, birthday, etc. Cache: foo.com
You can view similar results
First find the management background address: Site: xxxx.com intext: management site: xxxx.com INURL: Login Site: XXXX.com INTITLE: Manage Site: a2.xxxx.com Inout: File Site: a3.xxxx.com InURL: Load Site: a2.xxxx.com intext: ftp: // *: * Site: A2.xxxx.com FileType: ASP Site: XXXX.com // Get n secondary domain name Site: xxxx.com intext: * @ xxxx.com // Get N email addresses, there is also the name of the owner of the mailbox: XXXX.com INTEXT: Phone // N Phone INTITLE: "INDEX OF" etc ositle: "index of" .sh_history Intitle : "Index of" .bash_history intitle: "index of" passwd Intitle: "index of" people.lst intitle: "index of" pwd.db intitle: "index of" etc / shadion: "index of" spwd intIntle: "index of" master.passwd intitle: "INDEX OF" htpasswd "# -frontpage-" Inout: service.pwd
AllinURL: BBS Data FileType: MDB InURL: Database FileType: Inc CONN INURL: DATA FILETYPE: MDB INTITLE: "INDEX OF" Data ...
Some skills collection:
3) "http: // *: * @ www" DomainName finds some ISP sites, you can check the virtual host of the other IP 3 4) Auth_user_file.txt is not practical, too old 5) The master list looks for mailing list
6) INTITLE: "Welcome.to.squeezeBox" A special management system, default open port 90 7) Passlist.txt (a better Way) Dictionary
8) "A Syntax Error Has Occurred" FileType: IHTML
9) EXT: PHP Program_LISTING INTITLE: Mythweb.Program.Listing 10) INTITLE: Index.Of Abyss.conf 11) EXT: NBE NBE
12) INTITLE: "SWW link" "please wait ....." 13)
14) Intitle: "freifunk.net - status" -site: commando.de
15) INTITLE: "WorldClient" Intext: "(2003 | 2004) Alt-N Technologies."
17) INTITLE: Open-XChange Inurl: Login.pl
20) INTITLE: "Site Administration: Please log in" "Site Designed by Emarketsuth" 21) ORA-00921: Unexpected end of sql command
22) INTITLE: "YALA: YET ANOTHER LDAP Administrator" 23) Welcome.to phpqladmin "please login" -cvsweb 24) INTITLE: "SWW link" "please wait ....." 25) InURL: "Port_255" -htm
27) INTITLE: "WorldClient" IntexT: "(2003 | 2004) Alt-N Technologies."
These are some new vulnerabilities, announced at the 0DAYS announcement
EXT: PHP Program_Listing Intitle: mythweb.program.listing
Inurl: preferences.ini "[emule]"
INTITLE: "INDEX OF / CFIDE /" Administrator
"Access Denied for User" "Using Password"
EXT: PHP INTEXT: "Powered by phpnewman version" You can see: path / to / news / browse.php? clang = .. / .. / .. / .. / .. / .. / file / I / want
InURL: "/ becommunity / community / index.php? PageURL ="
Intitle: "ASP Fileman" resend -site: Iisworks.com
"Enter IP" InURL: "PHP-PING.PHP"
EXT: confinur: rsyncd.conf -cvs -man
Intitle: Private, Protected, Secret, Secure, Winnt
INTITLE: "DOCUSHARE" inURL: "DOCUSHARE / DSWEB /" -faq -gov -edu "#MYSQL DUMP" FileType: SQL "allow_call_time_pass_reference" "PATH_INFO"
"CERTIFICATE PRACTICE STATEMENT" InURL: (PDF | DOC)
Leapftp Intitle: "Index.Of./" Sites.ini Modified Master.Passwd
mysql history files NickServ registration passwords passlist passlist.txt (a better way) passwd passwd / etc (reliable) people.lst psyBNC config files pwd.db signin filetype: url spwd.db / passwd trillian.ini wwwboard WebAdmin inurl: passwd.txt Wwwboard | WebAdmin
"# -Frontpage-" ext: pwd inurl: (Service | Authors | Administrators | Users) "# -frontpage-"
InURL: service.pwd "autocreate = true password = *" "http: // *: * @ www" DomainName "index of /" "ws_ftp.ini" "Parent Directory" "Liveice Configuration File" EXT: CFG -Site: sourceforge.net "powered by ducalendar" -site: duware.com "Powered by Duclassified" -site: duware.com "Powered by Duclassified" -site: duware.com "DUware All Rights reserved" "powered by duclassmate" -site: Duware.com "Powered By Dudirectory" -site: duware.com "Powered by Dudownload" -site: duware.com "Powered by elite forum version *. *" "Powered by link department" "sets mode: k" "Powered By duware.com allinarch: admin mdb auth_user_file.txt config.php eggdrop filetype: User ETC (INDEX.OF) EXT: INI EUDORA.INI EXT: INI VERSITION = ... Password Ext: txt inURL: Unattend.txt
FileType: Bak Inur: "HTACCESS | Passwd | Shadow | HTUSERS"
FileType: cfg mrtg "target [*]" -sample -cvs -example
FileType: CFM "CFApplication Name" Password
FileType: Conf oekibbs fileType: conf sc_serv.conf
FileType: conf slapd.conf
FILETYPE: Config Config Intext: Appsettings "User ID"
FILETYPE: DAT "password.dat"
FILETYPE: DAT Wand.dat
FILETYPE: INC DBCONN
FILETYPE: INC INTEXT: MYSQL_CONNECT FileType: Inc mysql_connect or mysql_pconnect
FILETYPE: INF SYSPREP
FiletyPE: INURL: "Serv-U.ini" FileType: INURL: Flashfxp.ini FileType: INI WS_FTP FILETYPE: INI WS_FTP PWD
FILETYPE: LDB Admin
FILETYPE: LOG "See` ipsec copyright "
FileType: Log Inurl: "Password.log"
FileType: MDB InURL: Users.mdb
FILETYPE: MDB WWFORUM
FILETYPE: NETRC PASSWORD
FILETYPE: Pass Pass Intext: UserId
FILETYPE: PEM Intext: Private
FileTies InURL: DB INTEXT: PASSWORD
FILETYPE: PWD Service FileType: PWL PWL
filetype: reg reg intext: "defaultusername" intext: "defaultpassword" filetype: reg reg HKEY_CURRENT_USER SSHHOSTKEYS filetype: sql ( "values * MD" | "values * password" | "values * encrypt") filetype: sql ( "passwd VALUES "|" Password Values "|" Pass Values ") FileType: SQL " Identified by "-cvs FileType: SQL Password
FileType: URL InURL: "ftp: //" inURL: "@"
FileType: XLS Username Password Email
Htpasswd htpasswd / htgroup htpasswd / htpasswd.bak
Intext: "Enable Secret $" INTEXT: "Powered by Web Wiz Journal"
INTITLE: "INDEX OF" INTEXT: CONNECT.INC INTITLE: "INDEX OF" INTEXT: "INDEX OF" PASSWORDS MODIFIED
INTITLE: DUPICS InURL: (Add.asp | default.asp | View.asp | voting.asp) -site: duware.com ------------------------------------------------------------------------------------------------------------------------ -------------------------------------------------- -------------------------------------------- INTITLE: INDEX. Of intexT: "SECRING.SKR" | "SECRINPGP" | "SECRING.BAK"
InURL: "Grc.dat" INTEXT: "Password"
InURL: "Slapd.conf" Intext: "Credentials" -Manpage - "Manual Page" -man: -sample
InURL: "Slapd.conf" Intext: "rootpw" -manpage - "manual page" -man: -sample
InURL: "wvdial.conf" intexT: "password"
Inurl: /db/main.mdb
InURL: Chap-Secrets -CVS
InURL: config.php dbuname dbpass inurl: filezilla.xml -cvs
Inurl: lilo.conf fileetype: conf Password -tatercounter -bootpwd -man
InURL: Nuke FileType: SQL
InURL: OSPFD.CONF INTEXT: Password -Sample -Test -tutorial -download Route InURL: Pap-Secrets -CVS
InURL: Perform Filetype: INI InURL: SECRING EXT: SKR | EXT: PGP | EXT: BAK
InURL: vTund.conf Intext: Pass -CVS
Inurl: Zebra.conf Intext: Password -Sample -Test -tutorial -downloadLoad
"Generated by phssystem" "generated by wwwstat"
"Host Vulnerability Summary Report"]
"Http_from = Googlebot" Googlebot.com "Server_Software ="
"Index of" / "chat / logs" chat room "Installed Objects Scanner" InURL: Default.asp
"Mecury Version" "InfaStructure Group" "Microsoft (R) Windows * (TM) Version * Drwtsn Copyright (c)" EXT: LOG
"MOST Submitted Forms and Scripts" "this Section"
"NetWork Vulnerability Assessment Report"
"not for distribution" confidential "phone * * *" "Address *" "e-mail" intitle: "Curriculum Vitae"
"phpmyadmin" "Running on" Inout: "main.php"
"ProductD by getStats" "Request Details" "Server Variables" "Robots.txt" Disallow: "FileType: TXT
"Running in Child Mode"
"Sets Mode: P" "Sets Mode: S" "Thank you for your order" receipt "this is a shareaza node" "This Report Was generated by Weblog" (FileType: Mail | FileType: EML | Filety: MBOX FileType: MBX) INTEXT: Password | SUBJECT
(InURL: "Robot.txt" | InURL: "Robots.txt") INTEXT: DISALLOW FILETYPE: TXT
-Site: php.net - "The PHP Group" InURL: Source Inurl: URL EXT: PHP
FBR "Adobe Photoshop" AIM Buddy Lists AllinURL: /examples/jsp/snp/snoop.jsp AllinURL: Servlet / SnoopServlet CGIIRC.CONF
Data FileType: MDB -Site: Gov -site: Mil
Exported Email Addresses
EXT: ASP InURL: Pathto.asp
EXT: CGI InURL: Editcgi.cgi Inout: file =
EXT: confinur: rsyncd.conf -cvs -man ext: conf Nocatauth -cvs
EXT: DAT BPK.DAT EXT: GHO GHO
EXT: INI INTEXT: Env.ini EXT: LDIF LDIF
Ext: log "Software: Microsoft Internet Information Services *. *" ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ -------------------------------------------------- ---- EXT: MDB Inurl: *. MDB Inout: FPDB Shop.mdb
FileType: BKF BKF FileType: BLT "BuddyList" Filety: BLT BLT INTEXT: Screenname
FileType: CFG Auto_Inst.cfg
FileType: conf INURL: FireWall -Intitle: CVS FileType: config web.config -cvs
FileType: CTT CTT Messenger
FileType: FP FP FileType: FP FP -SITE: GOV -SIT: MIL - "CVS LOG"
FileType: INF InURL: Capolicy.inf FileType: LIC intext: Key
FileType: MYD MYD-CVS FileType: ORA ORA FILETYPE: ORA TNSNAMES FILETYPE: PDB PDB Backup (PLOT | PLUCKERDB) FILETYPE: POT INURL: John.pot -------------- -------------------------------------------------- -------------------------------------------------- FileType: PST InURL: "Outlook.pst" Filety: PST PST -FROM -TO -DATE FILETYPE: QBB QBB FILETYPE: RDP RDP
FileType: REG "Terminal Server Client" FileType: VCS VCS FileType: WAB WAB
FileType: gv: "email.xls" Financial Spreadsheets: Finance.xls Financial Spreadsheets: Finances.xls
Ganglia Cluster Reports
Haccess.ctl (One Way) Haccess.ctl (Very Reliable) ICQ Chat Logs, please ...
ILetype: log cron.log intexT: "session start * * * *: *: * *" Filety: log intexT: "Tobias Oetiker" "Traffic Analysis"
Intext: (PASSWORD | Passcode) Intext: (userName | userid | user) FileType: CSV Intext: gmail invite intexT: http://gmail.google.com/gmail/a
Intext: SQLITEMANAGER InURL: main.php
INTITLE: "Apache :: Status" (InURL: Server-Status | Inurl: status.html | Inurl: apache.html)
INTITLE: "AppServ Open Project" -site: www.appservnetwork.com Intitle: "ASP Stats Generator *. *" "ASP Stats Generator" "- WEPPOS"
INTITLE: "FTP Root AT" INTITLE: "INDEX OF" MYD SIZE
INTITLE: "Index of" -inURL: Mailog Maillog Size
INTITLE: "INDEX OF" cookies.txt size
INTITLE: "INDEX OF" mysql.conf or mysql_config intitle: "INDEX OF" UPLOAD SIZE PARENT DIRECTORY
intitle: "index.of" .diz .nfo last modified intitle: "Multimon UPS status page" intitle: "PHP Advanced Transfer" (inurl: index.php | inurl: showrecent.php) intitle: "PhpMyExplorer" inurl: "index .php "-cvs ---------------------------------------------------------------------------------------------------------------------------------- ------------------------ INTITLE: "Statistics of" "Advanced Web Statistics" INTITLE: "System Statistics" "System and NetWork Information Center" INTITLE : "Usage Statistics for" "Generated by Webalizer" intitle: "wbem" compaq login "Compaq Information Technologies Group" intitle: "Web Server Statistics for ****" intitle: "web server status" SSH Telnet intitle: "welcome. TO.SQUEEZEBOX
INTITLE: INDEX.OF "apache" "Server at" INTITLOG INTITLE: INDEX.OF DEAD.LOG INTITLE: INDEX.OF INBOX INTITLE: INDEX.OF Inbox DBX
INTITLE: INTRANET InURL: Intranet Intext: "Phone" InURL: "/ AXS / AX-ADMIN.PL" -script inURL: "/ cricket / grapher.cgi" InURL: "Bookmark.htm"
InURL: "CACTI" InURL: "Graph_View.php" "Settings Tree View" -cvs -rpm inURL: "Newsletter / Admin /" InURL: "Newsletter / Admin /" INTITLE: "newsletter admin" InURL: "PUTTY. REG "InURL:" SMB.CONF "INTEXT:" Workgroup "FileType: conf Conf -------------------------------------------------------------------------------------------------------------------------------------------------------------------- -------------------------------------------------- ---------------------------------------------------------------------------------------------------------------------------------------
Welcome to NTOP!
"adding new user" inURL: AddNewuser - "INURL: /CGI-BIN /.COBALT/) | (Intext:" Welcome to the cobalt raq)
filetype: php HAXPLORER "Server Files Browser" intitle: "Web Data Administrator - Login" inurl: ConnectComputer / precheck.htm | inurl: Remote / logon.aspx PHP Shell (unprotected) PHPKonsole PHPShell filetype: php -echo Public PHP FileManagers
"index of" / picasa.ini "index of" InURL: Recycler "Index of" Rar R nfo modified "intute: index.of /" stats merchant CGI- * etc "Powered by Invision Power File Manager" (InURL: Login. PHP) | (INTITLE: "Browsing Directory /") "Web File Browser" "Use Regular Expression"
FileType: ini desktop.ini intexT: mydocs.dll
INTEXT: "D.ASPX? ID" | INTEXT: "POWERED BY: TOTALINDEX" INTEXT: "TotalIndex" INTITLE: "Album Permissions" "Everybody" INTITLE : "Directory Listing for" Intext: Tomcat -Intitle: Tomcat Intitle: "HFS /" "httpfileserver" intitle: "index of *" inURL: "My Shared Folder" Size Modified ----------- -------------------------------------------------- -------------------------------------------------- ----
File Upload Manager V. "" Rename To "
EXT: ASP "Powered by Duforum" InURL: (Messages | Details | Login | DEFAULT | Register) -site: duware.com ext: ASP InURL: Dugallery Intitle: "." -site: dugallery.com -site: duware.com EXT: CGI InURL: UBB_TEST
EZBOO "administrator panel" -cvs
FileType: CGI InURL: Cachemgr.cgi FileType: CNF my.cnf -cvs -example filetype: Inc INC INTEXT: SETCOOKIE
FileType: "ViewFile" - "INDEX.PHP" - "IDFIL FileType: WSDL WSDL
Intitle: "ASP Fileman" resend -site: Iisworks.com
INTITLE: "index of /" modified php.exeintitle: "phpRemoteView" FileType: PHP "Name, Size, Type, Modify"
InURL: "wwwadmin.pl" Intitle: "wwwadmin" InURL: "NPH-Proxy.cgi" "Start Browsing Through this cgi-based proxy" InURL: "PLOG / register.php" InURL: CGI.ASX? StoreId
InURL: RobPoll.cgi FileType: CGI
The master list
"More Info About Metacart Free"