hacking google 2

Sabtu, 10 Juli 2010

ini beberapa keyword google hacking ke dua setelah yang kemarin.Google adalah harta karun penuh informasi penting, terutama untuk dunia bawah tanah. Fakta Potensi juga dapat dimanfaatkan dalam data untuk username dan password disimpan pada sebuah server.


Jika administrator tidak menyimpan data penting dalam sistem lengkap folder authentifikasi, maka kemungkinan besar akan dicapai oleh mesin pencari google. Jika data berhasil mencuri dalam oleh orang yang tidak berhak, maka akan berada dalam penyalahgunaan.

Berikut, beberapa sintaks pencarian google untuk menjelajah:


"FrontPage-" inurl:service.pwd
" Dumping data for table"
"phpMyAdmin MySQL-Dump" filetype:txt
"1999-2004 FuseTalk Inc" -site:fusetalk.com
"4images Administration Control Panel"
"ASP.NET_SessionId" "data source="
"Active Webcam Page" inurl:8080
"AnWeb/1.42h" intitle:index.of
"BlackBoard 1.5.1-f | © 2003-4 by Yves Goergen"
"CERN httpd 3.0B (VAX VMS)"
"Certificate Practice Statement" inurl:(PDF | DOC)
"Copyright (c) Tektronix, Inc." "printer status"
"Enter ip" inurl:"php-ping.php"
"FC Bigfeet" -inurl:mail
"File Upload Manager v1.3" "rename to"
"HTTP_FROM=googlebot" googlebot.com "Server_Software="
"IMail Server Web Messaging" intitle:login
"Ideal BB Version: 0.1" -idealbb.com
"Incorrect syntax near"
"Index of /backup"
"Index of" rar r01 nfo Modified 2004
"Internal Server Error" "server at"
"JRun Web Server" intitle:index.of
"Login to Usermin" inurl:20000
"MaXX/3.1" intitle:index.of
"Microsoft (R) Windows * (TM) Version * DrWtsn32 Copyright (C)" ext:log
"Microsoft-IIS/* server at" intitle:index.of
"Microsoft-IIS/5.0 server at"
"More Info about MetaCart Free"
"Netware * Home" inurl:nav.html
"Network Vulnerability Assessment Report"
"OPENSRS Domain Management" inurl:manage.cgi
"ORA-00933: SQL command not properly ended"
"ORA-12541: TNS:no listener" intitle:"error occurred"
"OmniHTTPd/2.10" intitle:index.of
"OpenSA/1.0.4" intitle:index.of
"Phaser 6250" "Printer Neighborhood" "XEROX CORPORATION"
"Phaser® 740 Color Printer" "printer named: "
"Phorum Admin" "Database Connection" inurl:forum inurl:admin
"Powered *: newtelligence" ("dasBlog 1.6"| "dasBlog 1.5"| "dasBlog 1.4"|"dasBlog 1.3")
"Powered by A-CART"
"Powered by Coppermine Photo Gallery"
"Powered by DCP-Portal v5.5"
"Powered by Duclassified" -site:duware.com
"Powered by Dudirectory" -site:duware.com
"Powered by Gallery v1.4.4"
"Powered by Ikonboard 3.1.1"
"Powered by Invision Power File Manager" (inurl:login.php) | (intitle:"Browsing directory /" )
"Powered by Link Department"
"Powered by MercuryBoard [v1"
"Powered by PHPFM" filetype:php -username
"Powered by WordPress" -html filetype:php -demo -wordpress.org -bugtraq
"Powered by YaPig V0.92b"
"Powered by ocPortal" -demo -ocportal.com
"Powered by yappa-ng"
"Red Hat Secure/2.0"
"Request Details" "Control Tree" "Server Variables"
"Select a database to view" intitle:"filemaker pro"
"SquirrelMail version 1.4.4" inurl:src ext:php
"Supplied argument is not a valid MySQL result resource"
"Switch to table format" inurl:table|plain
"SysCP - login"
"The script whose uid is " "is not allowed to access"
"This file was generated by Nessus"
"This page has been automatically generated by Plesk Server Administrator"
"This report was generated by WebLog"
"Unclosed quotation mark before the character string"
"VNC Desktop" inurl:5800
"Warning: Cannot modify header information - headers already sent"
"Warning: pg_connect(): Unable to connect to PostgreSQL server: FATAL"
"Web File Browser" "Use regular expression"
"WebSTAR Mail - Please Log In"
"Welcome to PHP-Nuke" congratulations
"Welcome to the Prestige Web-Based Configurator"
"You have an error in your SQL syntax near"
"access denied for user" "using password"
"allow_call_time_pass_reference" "PATH_INFO"
"cacheserverreport for" "This analysis was produced by calamaris"
"delete entries" inurl:admin/delete.asp
"driven by: ASP Message Board"
"ftp://" "www.eastgame.net"
"http://*:*@www" domainname
"index of cgi-bin"
"index of" / picasa.ini
"index of/" "ws_ftp.ini" "parent directory"
"intitle:Index.Of /" stats merchant cgi-* etc
"liveice configuration file" ext:cfg -site:sourceforge.net
"not for distribution" confidential
"phone * * *" "address *" "e-mail" intitle:"curriculum vitae"
"please log in"
"powered by CuteNews" "2003..2005 CutePHP"
"powered by antiboard"
"powered by duclassmate" -site:duware.com
"powered by minibb" -site:www.minibb.net -intext:1.7f
"powered by phpWebSite" 0.9-3-2...4
"powered by webcamXP" "Pro|Broadcast"
"powered | performed by Beyond Security's Automated Scanning"
"robots.txt" "Disallow:" filetype:txt
"seeing this instead" intitle:"test page for apache"
"sets mode: +p"
"supplied argument is not a valid MySQL result resource"
"ttawlogin.cgi/?action="
( filetype:mail | filetype:eml | filetype:mbox | filetype:mbx ) intext:password|subject
("Fiery WebTools" inurl:index2.html) | "WebTools enable * * observe, *, * * * flow * print jobs"
("Indexed.By"|"Monitored.By") hAcxFtpScan
(intext:"MOBOTIX M1" | intext:"MOBOTIX M10") intext:"Open Menu" Shift-Reload
(inurl:"ars/cgi-bin/arweb?O=0" | inurl:arweb.jsp) -site:remedy.com -site:mil
(inurl:/shop.cgi/page=) | (inurl:/shop.pl/page=)
(inurl:81/cgi-bin/.cobalt/) | (intext:"Welcome to the Cobalt RaQ")
+"HSTSNR" -"netop.com"
+"Powered by phpBB 2.0.6..10" -phpbb.com -phpbb.pl
+intext:"webalizer" +intext:"Total Usernames" +intext:"Usage Statistics for"
-site:php.net -"The PHP Group" inurl:source inurl:url ext:pHp
94FBR "ADOBE PHOTOSHOP"
ACID "by Roman Danyliw" filetype:php
ASP.login_aspx "ASP.NET_SessionId"
Admin intitle:"eZ publish administration"
An unexpected token "END-OF-STATEMENT" was found
BEGIN (CERTIFICATE|DSA|RSA) filetype:csr
BEGIN (CERTIFICATE|DSA|RSA) filetype:key
HTTP_USER_AGENT=Googlebot
Index of phpMyAdmin
LeapFTP intitle:"index.of./" sites.ini modified
Login ("Powered by Jetbox One CMS ™" | "Powered by Jetstream © *")
Novell NetWare intext:"netware management portal version"
PHPKonsole PHPShell filetype:php -echo
POWERED BY HIT JAMMER 1.0!
Powered.by.RaidenHTTPD intitle:index.of
SEDWebserver * server +at intitle:index.of
WebControl intitle:"AMX NetLinx"
Xerox Phaser. 740 Color Printer
aboutprinter.shtml (More Xerox printers on the web!)
allintitle:Brains, Corp. camera
allintitle:Netscape FastTrack Server Home Page
allinurl: admin mdb
allinurl:".nsconfig" -sample -howto -tutorial
allinurl:"/*/_vti_pvt/" | allinurl:"/*/_vti_cnf/"
allinurl:"exchange/logon.asp"
allinurl:"index.php" "site=sglinks"
allinurl:/examples/jsp/snp/snoop.jsp
allinurl:index.htm?cus?audio
allinurl:install/install.php
allinurl:intranet admin
allinurl:servlet/SnoopServlet
axis storpoint "file view" inurl:/volumes/
buddylist.blt
camera linksys inurl:main.cgi
comment:Files containing juicy info***]
comment:Files containing usernames
comment:Pages containing login portals
comment:Sensitive Directories***]
comment:Various online devices
comment:Vulnerable servers
comment:advisories and vulnerabilities
data filetype:mdb -site:gov -site:mil
databasetype. Code : 80004005. Error Description
e-mail address filetype:csv csv
eggdrop filetype:user user
etc (index.of)
ext:asp inurl:DUgallery intitle:"3.0" -site:dugallery.com -site:duware.com
ext:asp inurl:pathto.asp
ext:cgi intext:"nrg-" " This web page was created on "
ext:cgi inurl:editcgi.cgi inurl:file=
ext:cgi inurl:ubb6_test.cgi
ext:conf inurl:rsyncd.conf -cvs -man
ext:gho gho
ext:ini eudora.ini
ext:ini intext:env.ini
ext:ldif ldif
ext:log "Software: Microsoft Internet Information Services *.*"
ext:mdb inurl:*.mdb inurl:fpdb shop.mdb
ext:nsf nsf -gov -mil
ext:php intext:"Powered by phpNewMan Version"
ext:pl inurl:cgi intitle:"FormMail *" -"*Referrer" -"* Denied" -sourceforge -error -cvs -input
ext:reg "username=*" putty
ext:txt inurl:dxdiag
ext:vmx vmx
ezBOO "Administrator Panel" -cvs
filetype:QDF QDF
filetype:asp "Custom Error Message" Category Source
filetype:asp DBQ=" * Server.MapPath("*.mdb")
filetype:asp inurl:"shopdisplayproducts.asp"
filetype:bak inurl:"htaccess|passwd|shadow|htusers"
filetype:bkf bkf
filetype:blt blt +intext:screenname
filetype:cfg auto_inst.cfg
filetype:cfg ks intext:rootpw -sample -test -howto
filetype:cfg login "LoginServer="
filetype:cfg mrtg "target[*]" -sample -cvs -example
filetype:cfm "cfapplication name" password
filetype:cgi inurl:"Web_Store.cgi"
filetype:cgi inurl:"fileman.cgi"
filetype:cgi inurl:"irc.cgi" | intitle:"CGI:IRC Login"
filetype:cgi inurl:cachemgr.cgi
filetype:cgi inurl:pdesk.cgi
filetype:cgi inurl:tseekdir.cgi
filetype:cgi transcoder.cgi
filetype:cnf my.cnf -cvs -example
filetype:conf inurl:firewall -intitle:cvs
filetype:conf inurl:proftpd.conf -sample
filetype:conf inurl:psybnc.conf "USER.PASS="
filetype:conf inurl:unrealircd.conf -cvs -gentoo
filetype:conf oekakibbs
filetype:conf sc_serv.conf
filetype:conf slapd.conf
filetype:config config intext:appSettings "User ID"
filetype:ctl Basic
filetype:ctt "msn"
filetype:ctt ctt messenger
filetype:dat "password.dat"
filetype:dat wand.dat
filetype:eml eml +intext:"Subject" +intext:"From"
filetype:fp3 fp3
filetype:fp5 fp5 -site:gov -site:mil -"cvs log"
filetype:fp7 fp7
filetype:htpasswd htpasswd
filetype:inc dbconn
filetype:inc inc intext:setcookie
filetype:inc intext:mysql_connect
filetype:inf inurl:capolicy.inf
filetype:ini ServUDaemon
filetype:ini inurl:flashFXP.ini
filetype:ini wcx_ftp
filetype:ini ws_ftp pwd
filetype:ldb admin
filetype:lic lic intext:key
filetype:lit lit (books|ebooks)
filetype:log "PHP Parse error" | "PHP Warning" | "
filetype:log "See `ipsec --copyright"
filetype:log access.log -CVS
filetype:log intext:"ConnectionManager2"
filetype:log inurl:"password.log"
filetype:log username putty
filetype:mbx mbx intext:Subject
filetype:mdb inurl:users.mdb
filetype:mdb wwforum
filetype:mny mny
filetype:myd myd -CVS
filetype:netrc password
filetype:ora ora
filetype:pass pass intext:userid
filetype:pdb pdb backup (Pilot | Pluckerdb)
filetype:pdf "Assessment Report" nessus
filetype:pem intext:private
filetype:php HAXPLORER "Server Files Browser"
filetype:php inurl:"logging.php" "Discuz" error
filetype:php inurl:"viewfile" -"index.php" -"idfil
filetype:php inurl:"webeditor.php"
filetype:php inurl:index.php inurl:"module=subjects" inurl:"func=*" (listpages| viewpage | listcat)
filetype:php inurl:ipinfo.php "Distributed Intrusion Detection System"
filetype:php inurl:nqt intext:"Network Query Tool"
filetype:php inurl:vAuthenticate
filetype:php login inurl:phpWebMail (intitle:phpWe
filetype:pl "Download: SuSE Linux Openexchange Server CA"
filetype:pot inurl:john.pot
filetype:properties inurl:db intext:password
filetype:pst inurl:"outlook.pst"
filetype:pst pst -from -to -date
filetype:pwd service
filetype:pwl pwl
filetype:qbb qbb
filetype:r2w r2w
filetype:rdp rdp
filetype:reg "Terminal Server Client"
filetype:reg reg +intext:"defaultusername" +intext:"defaultpassword"
filetype:reg reg +intext:"internet account manager"
filetype:reg reg HKEY_CURRENT_USER SSHHOSTKEYS
filetype:reg reg HKEY_CURRENT_USER username
filetype:sql ("passwd values" | "password values" | "pass values" )
filetype:sql +"IDENTIFIED BY" -cvs
filetype:sql password
filetype:url +inurl:"ftp://" +inurl:"@"
filetype:vcs vcs
filetype:vsd vsd network -samples -examples
filetype:wab wab
filetype:wsdl wsdl
filetype:xls -site:gov inurl:contact
filetype:xls inurl:"email.xls"
filetype:xls inurl:"password.xls"
filetype:xls username password email
fitweb-wwws * server at intitle:index.of
htpasswd
htpasswd / htpasswd.bak
iletype:log cron.log
index.of passlist
index.of perform.ini
index.of.etc
index.of.password
index.of.private
index.of.protected
index.of.secret
index.of.secure
index.of.winnt
index_i.shtml Ready (Xerox printers on the web!)
intext:"404 Object Not Found" Microsoft-IIS/5.0
intext:"Error Message : Error loading required libraries."
intext:"MaiLinX Alert (Notify)" -site:networkprinters.com
intext:"Please enter correct password for Administrator Access. Thank you" "Copyright © 2003 SMC Networks, Inc. All rights reserved."
intext:"Ready with 10/100T Ethernet"
intext:"Session Start * * * *:*:* *" filetype:log
intext:"Tobias Oetiker" "traffic analysis"
intext:"UAA (MSB)" Lexmark -ext:pdf
intext:"Warning: * am able * write ** configuration file" "includes/configure.php" -Forums
intext:"Warning: Failed opening" "on line" "include_path"
intext:"Warning: Failed opening" "on line" "include_path" -----PHP application warnings failing "include_path"-----
intext:"d.aspx?id" || inurl:"d.aspx?id"
intext:"enable secret 5 $"
intext:("UBB.threads™ 6.2"|"UBB.threads™ 6.3") intext:"You * not logged *" -site:ubbcentral.com
intext:(password | passcode) intext:(username | userid | user) filetype:csv
intext:SQLiteManager inurl:main.php
intext:centreware inurl:status -----Phasers 4500/6250/8200/8400-----
intitle:"300 multiple choices"
intitle:"500 Internal Server Error" "server at"
intitle:"ADSL Configuration page"
intitle:"ASP FileMan" Resend -site:iisworks.com
intitle:"ASP Stats Generator *.*" "ASP Stats Generator" "2003-2004 weppos"
intitle:"Apache HTTP Server" intitle:"documentation"
intitle:"Apache::Status" (inurl:server-status | inurl:status.html | inurl:apache.html)
intitle:"Athens Authentication Point"
intitle:"Azureus : Java BitTorrent Client Tracker"
intitle:"Big Brother - Status" inurl:bb
intitle:"Big Sister" +"OK Attention Trouble"
intitle:"BorderManager Information alert"
intitle:"Cayman-DSL.home"
intitle:"ColdFusion Administrator Login"
intitle:"DEFAULT_CONFIG - HP"
intitle:"DVR Web client"
intitle:"Dell Remote Access Controller"
intitle:"Directory Listing For" intext:Tomcat -intitle:Tomcat
intitle:"Directory Listing" "tree view"
intitle:"Directory Listing, Index of /*/"
intitle:"EMUMAIL - Login" "Powered by EMU Webmail"
intitle:"EpsonNet WebAssist Rev"
intitle:"Error Occurred While Processing Request" +WHERE (SELECT|INSERT) filetype:cfm
intitle:"Error Occurred" "The error occurred in" filetype:cfm
intitle:"Error using Hypernews" "Server Software"
intitle:"EvoCam" inurl:"webcam.html"
intitle:"Execution of this script not permitted"
intitle:"Gallery in Configuration mode"
intitle:"Ganglia" "Cluster Report for"
intitle:"Gateway Configuration Menu"
intitle:"HFS /" +"HttpFileServer"
intitle:"IBM HTTP Server" "Use the Administration Server to configure"
intitle:"ISPMan : Unauthorized Access prohibited"

contoh penjelasan

"Http://username: password @ www ..." filetype: bak inurl: "htaccess | passwd | shadow | ht users"
(this command is to take the user names and passwords for backup files)

filetype:mdb inurl:”account|users|admin|administrators|passwd|password” mdb files (this command is to take the password information)

filetype:ini ws_ftp pwd (searching admin password with ws_ftp.ini file)

intitle: "Index of" pwd.db (searching the encrypted usernames and passwords)

inurl:admin inurl:backup intitle:index.of (searching directories whose names contain the words admin and backup)

“Index of/” “Parent Directory” “WS _ FTP.ini” filetype:ini WS _ FTP PWD (WS_FTP configuration files is to take FTP server access passwords)

ext:pwd inurl:(service|authors|administrators|users) “# -FrontPage-” (there is Microsoft FrontPage passwords)

filetype: sql ( "passwd values ****" |" password values ****" | "pass values ****") searching a SQL code and passwords stored in the database)

intitle:index.of trillian.ini (configuration files for the Trillian IM)

eggdrop filetype:user (user configuration files for the Eggdrop ircbot)

filetype:conf slapd.conf (configuration files for OpenLDAP)

inurl:”wvdial.conf” intext:”password” (configuration files for WV Dial)

ext:ini eudora.ini (configuration files for the Eudora mail client)

filetype: mdb inurl: users.mdb (potentially to take user account information with Microsoft Access files)

intext:”powered by Web Wiz Journal” (websites using Web Wiz Journal, which in its standard configuration allows access to the passwords file – just enter http:///journal/journal.mdb instead of the default http:///journal/)

“Powered by DUclassified” -site:duware.com "Powered by DUclassified"-site: duware.com
“Powered by DUcalendar” -site:duware.com "Powered by DUcalendar"-site: duware.com
“Powered by DUdirectory” -site:duware.com "Powered by DUdirectory"-site: duware.com
“Powered by DUclassmate” -site:duware.com "Powered by DUclassmate"-site: duware.com
“Powered by DUdownload” -site:duware.com "Powered by DUdownload"-site: duware.com
“Powered by DUpaypal” -site:duware.com "Powered by DUpaypal"-site: duware.com
“Powered by DUforum” -site:duware.com "Powered by DUforum"-site: duware.com


intitle:dupics inurl:(add.asp | default.asp |view.asp | voting.asp) -site:duware.com (websites that use DUclassified, DUcalendar, DUdirectory, DUclassmate, DUdownload, DUpaypal, DUforum or DUpics applications, by default allows us to retrieve passwords file)

To DUclassified, just visit http:///duClassified/ _private / duclassified.mdb
or http:///duClassified/ or http:///duClassified/

intext: "BiTBOARD v2.0" "BiTSHiFTERS Bulletin Board" (Bitboard2 use the website bulletin board, the default settings make it possible to retrieve the passwords files to be obtained with the ways http:///forum/admin/data _ passwd.dat
or http:///forum/forum.php) or http:///forum/forum.php)

Searching for specific documents :

filetype: xls inurl: "email.xls" (potentially to take the information contact)

“phone * * *” “address *” “e-mail” intitle:”curriculum vitae”
CVs "not for distribution"
(confidential documents containing the confidential clause
buddylist.blt)

AIM contacts list AIM contacts list

intitle:index.of mystuff.xml intitle: index.of mystuff.xml

Trillian IM contacts list Trillian IM contacts list

filetype:ctt “msn” filetype: Note "msn"

MSN contacts list MSN contacts list

filetype:QDF
(QDF database files for the Quicken financial application)

intitle: index.of finances.xls (finances.xls files, potentially to take information on bank accounts, financial Summaries and credit card numbers)

intitle: "Index Of"-inurl: maillog (potentially to retrieve e-mail account)

10 komentar
  1. Anonim Said,

    Congratulations! This is the best thing, Thank you so much for taking the time to share such a nice information.
    Personnel Forms

    Posted on 28 Februari 2013 pukul 10.03

     
  2. Anonim Said,

    Congrates...Thanks for sharing this...Amazing article...very useful info...Read more

    Posted on 23 Juli 2015 pukul 03.45

     
  3. Unknown Said,

    Bersama Kami Agen Judi Online Terpercaya
    Dapatkan Bonus Sekarang Juga
    Untuk Info, Silahkan Hubungi Contact Kami :
    BBM : BOLAVITA
    line : bolavita
    wechat : bolavita
    whatup : 6281377055002

    Posted on 29 Maret 2018 pukul 22.52

     
  4. Posted on 24 Oktober 2018 pukul 15.42

     
  5. Jessy Lee Said,

    Posted on 24 Mei 2019 pukul 06.52

     
  6. Sylvia Said,

    Posted on 6 Juli 2019 pukul 19.33

     
  7. Sylvia Said,

    Posted on 15 Agustus 2019 pukul 09.05

     
  8. Sylvia Said,

    Posted on 18 Agustus 2019 pukul 09.22

     
  9. Posted on 2 Juli 2021 pukul 03.10

     
  10. Posted on 3 Juli 2021 pukul 20.28

     

Posting Komentar

look ! bugs my blog

Arabic Korean Japanese Chinese Simplified Russian Portuguese
English French German Spain Italian Dutch

visitors