How to use the Google calculator:
Google’s calculator tries to understand the problem you are attempting to solve without requiring you to use special syntax. However, it may be helpful to know the most direct way to pose a question to get the best results. Listed below are a few suggestions for the most common type of expressions (and a few more esoteric ones).
Most operators come between the two numbers they combine, such as the plus sign in the expression 1+1.
Operator Function Example
+ addition 3+44
- subtraction 13-5
* multiplication 7*8
/ division 12/3
^ exponentiation (raise to a power of) 8^2
% modulo (finds the remainder after division) 8%7
choose X choose Y determines the number of ways of choosing a set of Y elements from a set of X elements 18 choose 4
th root of calculates the nth root of a number 5th root of 32
% of X % of Y computes X percent of Y 20% of 150
Some operators work on only one number and should come before that number. In these cases, it often helps to put the number in parentheses.
Operator Function Example
sqrt square root sqrt(9)
sin, cos, etc. trigonometric functions (numbers are assumed to be radians) sin(pi/3)
tan(45 degrees)
ln logarithm base e ln(17)
log logarithm base 10 log(1,000)
A few operators come after the number.
Operator Function Example
! factorial 5!
Other good things to know
You can force the calculator to try and evaluate an expression by putting an equals sign (=) after it. This only works if the expression is mathematically resolvable. For example, 1-800-555-1234= will return a result, but 1/0= will not.
Parentheses can be used to enclose the parts of your expression that you want evaluated first. For example, (1+2)*3 causes the addition to happen before the multiplication.
The in operator is used to specify what units you want used to express the answer. Put the word in followed by the name of a unit at the end of your expression. This works well for unit conversions such as: 5 kilometers in miles.
You can use hexadecimal, octal and binary numbers. Prefix hexadecimal numbers with 0x, octal numbers with 0o and binary numbers with 0b. For example: 0x7f + 0b10010101.
The calculator understands many different units, as well as many physical and mathematical constants. These can be used in your expression. Many of these constants and units have both long and short names. You can use either name in most cases. For example, km and kilometer both work, as do c and the speed of light.
Feel free to experiment with the calculator as not all of its capabilities are listed here. To get you started, we’ve included a few expressions linked to their results.
1 a.u./c
56*78
1.21 GW / 88 mph
e^(i pi)+1
100 miles in kilometers
sine(30 degrees)
G*(6e24 kg)/(4000 miles)^2
0x7d3 in roman numerals
0b1100101*0b1001
More info on:
http://www.google.co.in/help/calculator.html
My lovely readers :) Please Follow Up my Blog Ok :)
Blogger templates
Friday, March 18, 2011
How to use the Google calculator
by
blog saya kata
at
March 18, 2011
past tense:
How to use the Google calculator
google hack, part 1
Google serves some 80 percent of all
search queries on the Internet, making
it by far the most popular search
engine. Its popularity is due not only to excellent
search effectiveness, but also extensive
querying capabilities. However, we should
also remember that the Internet is a highly
dynamic medium, so the results presented
by Google are not always up-to-date – some
search results might be stale, while other
relevant resources might not yet have been
visited by Googlebot (the automatic script
that browses and indexes Web resources for
Google).
Table 1 presents a summary of the most
important and most useful query operators
along with their descriptions, while Figure 1
shows document locations referred to by the
operators when applied to Web searches. Of
course, this is just a handful of examples – skilful
Google querying can lead to much more
interesting results.
Hunting for Prey
Google makes it possible to reach not just
publicly available Internet resources, but also
some that should never have been revealed.
Operator Description Sample query
site restricts results to sites within the
specified domain
site:google.com fox will find all sites containing the
word fox, located within the *.google.com domain
intitle restricts results to documents whose
title contains the specified phrase
intitle:fox fire will find all sites with the word fox in the
title and fire in the text
allintitle restricts results to documents
whose title contains all the specified
phrases
allintitle:fox fire will find all sites with the words fox
and fire in the title, so it's equivalent to intitle:fox
intitle:fire
inurl restricts results to sites whose URL
contains the specified phrase
inurl:fox fire will find all sites containing the word fire
in the text and fox in the URL
allinurl restricts results to sites whose URL
contains all the specified phrases
allinurl:fox fire will find all sites with the words fox
and fire in the URL, so it's equivalent to inurl:fox
inurl:fire
filetype, ext restricts results to documents of the
specified type
filetype:pdf fire will return PDFs containing the word
fire, while filetype:xls fox will return Excel spreadsheets
with the word fox
numrange restricts results to documents containing
a number from the specified
range
numrange:1-100 fire will return sites containing a number
from 1 to 100 and the word fire. The same result can be
achieved with 1..100 fire
link restricts results to sites containing
links to the specified location
link:www.google.com will return documents containing
one or more links to www.google.com
inanchor restricts results to sites containing
links with the specified phrase in
their descriptions
inanchor:fire will return documents with links whose
description contains the word fire (that's the actual link
text, not the URL indicated by the link)
allintext restricts results to documents containing
the specified phrase in the
text, but not in the title, link descriptions
or URLs
allintext:"fire fox" will return documents which contain
the phrase fire fox in their text only
+ specifies that a phrase should occur
frequently in results
+fire will order results by the number of occurrences of
the word fire
- specifies that a phrase must not occur
in results
-fire will return documents that don't contain the word
fire
"" delimiters for entire search phrases
(not single words)
"fire fox" will return documents containing the phrase
fire fox
. wildcard for a single character fire.fox will return documents containing the phrases
fire fox, fireAfox, fire1fox, fire-fox etc.
* wildcard for a single word fire * fox will return documents containing the phrases
fire the fox, fire in fox, fire or fox etc.
logical OR "fire fox"
firefox will return documents containing the
phrase fire fox or the word firefox
----------------------------------------------------------------------------------------------
Table 2. Google queries for locating various Web servers
Query Server
"Apache/1.3.28 Server at" intitle:index.of Apache 1.3.28
"Apache/2.0 Server at" intitle:index.of Apache 2.0
"Apache/* Server at" intitle:index.of any version of Apache
"Microsoft-IIS/4.0 Server at" intitle:index.of Microsoft Internet Information Services 4.0
"Microsoft-IIS/5.0 Server at" intitle:index.of Microsoft Internet Information Services 5.0
"Microsoft-IIS/6.0 Server at" intitle:index.of Microsoft Internet Information Services 6.0
"Microsoft-IIS/* Server at" intitle:index.of any version of Microsoft Internet Information Services
"Oracle HTTP Server/* Server at" intitle:index.of any version of Oracle HTTP Server
"IBM _ HTTP _ Server/* * Server at" intitle:index.of any version of IBM HTTP Server
"Netscape/* Server at" intitle:index.of any version of Netscape Server
"Red Hat Secure/*" intitle:index.of any version of the Red Hat Secure server
"HP Apache-based Web Server/*" intitle:index.of any version of the HP server
Table 3. Queries for discovering standard post-installation Web server pages
Query Server
intitle:"Test Page for Apache Installation" "You are free" Apache 1.2.6
intitle:"Test Page for Apache Installation" "It worked!"
"this Web site!"
Apache 1.3.0 – 1.3.9
intitle:"Test Page for Apache Installation" "Seeing this
instead"
Apache 1.3.11 – 1.3.33, 2.0
intitle:"Test Page for the SSL/TLS-aware Apache
Installation" "Hey, it worked!"
Apache SSL/TLS
intitle:"Test Page for the Apache Web Server on Red Hat
Linux"
Apache on Red Hat
intitle:"Test Page for the Apache Http Server on Fedora
Core"
Apache on Fedora
intitle:"Welcome to Your New Home Page!" Debian Apache on Debian
intitle:"Welcome to IIS 4.0!" IIS 4.0
intitle:"Welcome to Windows 2000 Internet Services" IIS 5.0
intitle:"Welcome to Windows XP Server Internet Services" IIS 6.0
-----------------------------------------------------------------------------------
with SQL database support, used
for adding guestbooks to websites.
In April 2004, information
was published about a vulnerability
in the application's 2.2 version,
making it possible to access the
administration panel using an SQL
injection attack (see SQL Injection
Attacks with PHP/MySQL in hakin9
3/2005). It's enough to navigate
to the panel login screen (see
Figure 4) and log in leaving the
username blank and entering ') OR
('a' = 'a as password or the other
way around – leaving password
blank and entering ? or 1=1 -- for
username. The potential aggressor
can locate vulnerable websites
by querying Google for intitle:
Guestbook "Advanced Guestbook 2.2
Powered" or "Advanced Guestbook
2.2" Username inurl:admin.
To prevent such security leaks,
administrators should track current
information on all the applications
used by their systems and immediately
patch any vulnerabilities.
Another thing to bear in mind is that
it's well worth removing application
banners, names and versions from
any pages or files that might contain
them.
Information about
Networks and Systems
Practically all attacks on IT systems
require preparatory target
reconnaissance, usually involving
scanning computers in an attempt
Table 4. Querying for application-generated system reports
Query Type of information
"Generated by phpSystem" operating system type and version, hardware configuration,
logged users, open connections, free memory and
disk space, mount points
"This summary was generated by wwwstat" web server statistics, system file structure
"These statistics were produced by getstats" web server statistics, system file structure
"This report was generated by WebLog" web server statistics, system file structure
intext:"Tobias Oetiker" "traffic analysis" system performance statistics as MRTG charts, network
configuration
intitle:"Apache::Status" (inurl:server-status
inurl:
status.html
inurl:apache.html)
server version, operating system type, child process list,
current connections
intitle:"ASP Stats Generator *.*" "ASP Stats
Generator" "2003-2004 weppos"
web server activity, lots of visitor information
intitle:"Multimon UPS status page" UPS device performance statistics
intitle:"statistics of" "advanced web statistics" web server statistics, visitor information
intitle:"System Statistics" +"System and Network
Information Center"
system performance statistics as MRTG charts, hardware
configuration, running services
intitle:"Usage Statistics for" "Generated by
Webalizer"
web server statistics, visitor information, system file
structure
intitle:"Web Server Statistics for ****" web server statistics, visitor information
inurl:"/axs/ax-admin.pl" -script web server statistics, visitor information
inurl:"/cricket/grapher.cgi" MRTG charts of network interface performance
inurl:server-info "Apache Server Information" web server version and configuration, operating system
type, system file structure
"Output produced by SysWatch *" operating system type and version, logged users, free
memory and disk space, mount points, running processes,
system logs...
tu je la... penat nk copy paste..
search queries on the Internet, making
it by far the most popular search
engine. Its popularity is due not only to excellent
search effectiveness, but also extensive
querying capabilities. However, we should
also remember that the Internet is a highly
dynamic medium, so the results presented
by Google are not always up-to-date – some
search results might be stale, while other
relevant resources might not yet have been
visited by Googlebot (the automatic script
that browses and indexes Web resources for
Google).
Table 1 presents a summary of the most
important and most useful query operators
along with their descriptions, while Figure 1
shows document locations referred to by the
operators when applied to Web searches. Of
course, this is just a handful of examples – skilful
Google querying can lead to much more
interesting results.
Hunting for Prey
Google makes it possible to reach not just
publicly available Internet resources, but also
some that should never have been revealed.
Operator Description Sample query
site restricts results to sites within the
specified domain
site:google.com fox will find all sites containing the
word fox, located within the *.google.com domain
intitle restricts results to documents whose
title contains the specified phrase
intitle:fox fire will find all sites with the word fox in the
title and fire in the text
allintitle restricts results to documents
whose title contains all the specified
phrases
allintitle:fox fire will find all sites with the words fox
and fire in the title, so it's equivalent to intitle:fox
intitle:fire
inurl restricts results to sites whose URL
contains the specified phrase
inurl:fox fire will find all sites containing the word fire
in the text and fox in the URL
allinurl restricts results to sites whose URL
contains all the specified phrases
allinurl:fox fire will find all sites with the words fox
and fire in the URL, so it's equivalent to inurl:fox
inurl:fire
filetype, ext restricts results to documents of the
specified type
filetype:pdf fire will return PDFs containing the word
fire, while filetype:xls fox will return Excel spreadsheets
with the word fox
numrange restricts results to documents containing
a number from the specified
range
numrange:1-100 fire will return sites containing a number
from 1 to 100 and the word fire. The same result can be
achieved with 1..100 fire
link restricts results to sites containing
links to the specified location
link:www.google.com will return documents containing
one or more links to www.google.com
inanchor restricts results to sites containing
links with the specified phrase in
their descriptions
inanchor:fire will return documents with links whose
description contains the word fire (that's the actual link
text, not the URL indicated by the link)
allintext restricts results to documents containing
the specified phrase in the
text, but not in the title, link descriptions
or URLs
allintext:"fire fox" will return documents which contain
the phrase fire fox in their text only
+ specifies that a phrase should occur
frequently in results
+fire will order results by the number of occurrences of
the word fire
- specifies that a phrase must not occur
in results
-fire will return documents that don't contain the word
fire
"" delimiters for entire search phrases
(not single words)
"fire fox" will return documents containing the phrase
fire fox
. wildcard for a single character fire.fox will return documents containing the phrases
fire fox, fireAfox, fire1fox, fire-fox etc.
* wildcard for a single word fire * fox will return documents containing the phrases
fire the fox, fire in fox, fire or fox etc.
logical OR "fire fox"
firefox will return documents containing the
phrase fire fox or the word firefox
----------------------------------------------------------------------------------------------
Table 2. Google queries for locating various Web servers
Query Server
"Apache/1.3.28 Server at" intitle:index.of Apache 1.3.28
"Apache/2.0 Server at" intitle:index.of Apache 2.0
"Apache/* Server at" intitle:index.of any version of Apache
"Microsoft-IIS/4.0 Server at" intitle:index.of Microsoft Internet Information Services 4.0
"Microsoft-IIS/5.0 Server at" intitle:index.of Microsoft Internet Information Services 5.0
"Microsoft-IIS/6.0 Server at" intitle:index.of Microsoft Internet Information Services 6.0
"Microsoft-IIS/* Server at" intitle:index.of any version of Microsoft Internet Information Services
"Oracle HTTP Server/* Server at" intitle:index.of any version of Oracle HTTP Server
"IBM _ HTTP _ Server/* * Server at" intitle:index.of any version of IBM HTTP Server
"Netscape/* Server at" intitle:index.of any version of Netscape Server
"Red Hat Secure/*" intitle:index.of any version of the Red Hat Secure server
"HP Apache-based Web Server/*" intitle:index.of any version of the HP server
Table 3. Queries for discovering standard post-installation Web server pages
Query Server
intitle:"Test Page for Apache Installation" "You are free" Apache 1.2.6
intitle:"Test Page for Apache Installation" "It worked!"
"this Web site!"
Apache 1.3.0 – 1.3.9
intitle:"Test Page for Apache Installation" "Seeing this
instead"
Apache 1.3.11 – 1.3.33, 2.0
intitle:"Test Page for the SSL/TLS-aware Apache
Installation" "Hey, it worked!"
Apache SSL/TLS
intitle:"Test Page for the Apache Web Server on Red Hat
Linux"
Apache on Red Hat
intitle:"Test Page for the Apache Http Server on Fedora
Core"
Apache on Fedora
intitle:"Welcome to Your New Home Page!" Debian Apache on Debian
intitle:"Welcome to IIS 4.0!" IIS 4.0
intitle:"Welcome to Windows 2000 Internet Services" IIS 5.0
intitle:"Welcome to Windows XP Server Internet Services" IIS 6.0
-----------------------------------------------------------------------------------
with SQL database support, used
for adding guestbooks to websites.
In April 2004, information
was published about a vulnerability
in the application's 2.2 version,
making it possible to access the
administration panel using an SQL
injection attack (see SQL Injection
Attacks with PHP/MySQL in hakin9
3/2005). It's enough to navigate
to the panel login screen (see
Figure 4) and log in leaving the
username blank and entering ') OR
('a' = 'a as password or the other
way around – leaving password
blank and entering ? or 1=1 -- for
username. The potential aggressor
can locate vulnerable websites
by querying Google for intitle:
Guestbook "Advanced Guestbook 2.2
Powered" or "Advanced Guestbook
2.2" Username inurl:admin.
To prevent such security leaks,
administrators should track current
information on all the applications
used by their systems and immediately
patch any vulnerabilities.
Another thing to bear in mind is that
it's well worth removing application
banners, names and versions from
any pages or files that might contain
them.
Information about
Networks and Systems
Practically all attacks on IT systems
require preparatory target
reconnaissance, usually involving
scanning computers in an attempt
Table 4. Querying for application-generated system reports
Query Type of information
"Generated by phpSystem" operating system type and version, hardware configuration,
logged users, open connections, free memory and
disk space, mount points
"This summary was generated by wwwstat" web server statistics, system file structure
"These statistics were produced by getstats" web server statistics, system file structure
"This report was generated by WebLog" web server statistics, system file structure
intext:"Tobias Oetiker" "traffic analysis" system performance statistics as MRTG charts, network
configuration
intitle:"Apache::Status" (inurl:server-status
inurl:
status.html
inurl:apache.html)
server version, operating system type, child process list,
current connections
intitle:"ASP Stats Generator *.*" "ASP Stats
Generator" "2003-2004 weppos"
web server activity, lots of visitor information
intitle:"Multimon UPS status page" UPS device performance statistics
intitle:"statistics of" "advanced web statistics" web server statistics, visitor information
intitle:"System Statistics" +"System and Network
Information Center"
system performance statistics as MRTG charts, hardware
configuration, running services
intitle:"Usage Statistics for" "Generated by
Webalizer"
web server statistics, visitor information, system file
structure
intitle:"Web Server Statistics for ****" web server statistics, visitor information
inurl:"/axs/ax-admin.pl" -script web server statistics, visitor information
inurl:"/cricket/grapher.cgi" MRTG charts of network interface performance
inurl:server-info "Apache Server Information" web server version and configuration, operating system
type, system file structure
"Output produced by SysWatch *" operating system type and version, logged users, free
memory and disk space, mount points, running processes,
system logs...
tu je la... penat nk copy paste..
by
blog saya kata
at
March 18, 2011
past tense:
google hack part 1
google hack 3
Notice I am only changing the word after the parent directory,
change it to what you want and you will get a lot of stuff.
To see results; just write in the (http://www.google.com/) search engine the code:
"parent directory " /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
And
"parent directory " DVDRip -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
And
"parent directory "Xvid -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
And
"parent directory " Gamez -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
And
"parent directory " MP3 -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
And
"parent directory " Name of Singer or album -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
Or
?intitle:index.of? mp3
You only need add the name of the song/artist/singer.
Example: ?intitle:index.of? mp3 jackson
==============================================
You can change the string to watever you want, ex. microsoft to adobe, iso to zip etc…
To see results; just write in the (http://www.google.com/) search engine the code:
inurl:microsoft filetype:iso
==============================================
This search reveals channel keys (passwords) on IRC as revealed from IRC chat logs.
To see results; just write in the (http://www.google.com/) search engine the code:
"sets mode: +k"
==============================================
These are eggdrop config files. Avoiding a full-blown descussion about eggdrops and IRC bots,
suffice it to say that this file contains usernames and passwords for IRC users.
To see results; just write in the (http://www.google.com/) search engine the code:
eggdrop filetype:user user
==============================================
This will search for backup files (*.bak) created by some editors or
even by the administrator himself (before activating a new version).
Every attacker knows that changing the extenstion of a file on a webserver can have ugly consequences.
see results; just write in the (http://www.google.com/) search engine the code:
filetype:bak inurl:"htaccess
passwd
shadow
htusers"
==============================================
Let's pretend you need a serial number for windows xp pro. The key is the 94FBR code..
it was included with many MS Office registration codes so this will help you dramatically
reduce the amount of 'fake' porn sites that trick you.
To see results; just write in the (http://www.google.com/) search engine the code:
"Windows XP Professional" 94FBR
By the way, don't forget to change "Window sXP Professional" to any product you need its serial number.
==============================================
Notice this excellent trick. You can search for any product whether hardware or software
(between any prices price: for example, $250.. $350 ).
To see results; just write in the (http://www.google.com/) search engine the code:
DVD player $250..350
By the way, don't forget to change "DVD player" to any product you need to search for.
==============================================
At first glance, this search reveals even more examples of operating system users enabling the
operating system default web server software. This is generally accepted to be a Bad Idea(TM)
as mentioned in the previous example. However, the googleDork index on this particular
category gets quite a boost from the fact that this particular screen should NEVER
be seen by the general public. To quote the default index screen: "Any users
attempting to connect to this site are currently receiving an 'Under Construction page'"
THIS is not the 'Under Construction page.' I was only able to generate this screen
while sitting at the console of the server. The fact that this screen is revealed to the
general public may indicate a misconfiguration of a much more insidious nature...
To see results; just write in the (http://www.google.com/) search engine the code:
intitle:"Welcome to Windows 2000 Internet Services"
==============================================
Suppose you want a certain song to a singer and you can not find it; by this trick you
can find the song in the original directory of the original web site.
To see results; just write in the (http://www.google.com/) search engine the code:
"index of/" "Top Gun" .mp3
By the way, don't forget to change "Top Gun" to any song you need to search for.
==============================================
This is a fabulous link. This is the secret link of the web site "Google" to search for any
"Crack" you need.
Just write the following link in the address bar:
http://www.googlecrack.com/WWW/
==============================================
By the way, for anyone who needs to have an account in the google mail for "One GigaByte",
go to the following address bar. You will receive within "36 hours" the confirmation mail for your registration:
http://www.googlemail.cjb.net/
Or from:
http://www.gmailforums.com/index.php
By the way, you can open your Google mail from your browser through this link:
http://toolbar.google.com/gmail-helper/
==============================================
Imagine that when you enter any web site, and you are surprised that when searching for
any program in it you can not find it. By this fabulous trick, you can find the link
for downloading any program in this site through any search engine.
For example, suppose you want to search for the program "Norton" in the web site
www.download.com ; when you go to www.google.com and write the following code, you will
be surprised that the "Google" search engine searches only in the site www.download.com. To do this:
Write in the address bar of the web browser this address: www.google.com.
When opening the web site; write in the search engine this code: "norton site:
www.download.com", and press the button search or "ÃÈÍË".
As mentioned earlier: the code is easy, you just write in the place of the word
"Norton"; any word you need to search for in the site followed in the code.
The code again is....
norton site:www.download.com
By the way, you can practice this code at any search engine.
Another trick is that you can force the search engine of the "Google" web site to search
for a certain category like "Linux" topics. When you add any category after the Google
link and write any thing in the search engine, you will surprised that the site searched
for Linux only. For example, if you wrote the following code:
http://www.google.com/linux
As I mentioned in the code earlier, the site followed by the word "Linux". So the web site
is forced for searching for the Linux topics only all over the internet.
==============================================
Imagine that you can connect to another computer remotely through the internet from the
feature called "Remote Desktop Web Connection".
To see results; just write in the (http://www.google.com/) search engine the code:
intitle:"Remote Desktop Web Connection"
==============================================
Through this query you can find every web page "Google" has crawled for a specific site.
To see results; just write in the (http://www.google.com/) search engine the code:
Site: Microsoft.com
==============================================
Through this query, you can see web servers with default pages can serve as juicy targets.
To see results; just write in the (http://www.google.com/) search engine the code:
Intitle:test.page.for.apache "it worked"
==============================================
No one can deny that the directory listings can be a source of great information.
To see results; just write in the (http://www.google.com/) search engine the code:
Intitle:index.of/admin
==============================================
We will use this query to locate additional servers, subtract common hostnames from the query.
To see results; just write in the (http://www.google.com/) search engine the code:
Site: Microsoft.com - Site:www.Microsoft.com
==============================================
From this query you can get huge user names and passwords from huge sites for free.
To see results; just write in the (http://www.google.com/) search engine the code:
"Welcome to *" "Your password is *"
==============================================
From this query you can collect many numbers of ".PST" files, which contain all E-mail folders, addresses or anything else that Outlook 97, 2000, xp or 2003 collects.
To see results; just write in the (http://www.google.com/) search engine the code:
outlook filetype:pst
==============================================
allinurl:gmail.google.com
"NetLife" Exclusive: Security hole found in "Gmail"
An Israeli hacker reveals: A security hole in "Gmail" allows the compromise of users' email boxes – without the need of a password Nitzan Weidenfeld, Nana NetLife Magazine.
So you’ve got a "Gmail" mail account? Or maybe you’ve just received an invitation? Well, we have some bad news for you: Your mail box is exposed. A major security hole in Google's mail service, allows full access to user accounts, without the need of a password.
"Everything could get publicly exposed – your received mails might be readable, as well as all of your sent mail, and furthermore – anyone could send and receive mail under your name", thus reveals Nir Goldshlagger, an Israeli hacker, on an exclusive interview with "Nana NetLife" Magazine. "Even more alarming", he explains, "is the fact that the hack itself is quite simple. All that is needed of the malicious hacker, beside knowledge of the specific technique, is quite basic computer knowledge, the victim's username – and that’s it, he's inside".
When approached, Google admitted to the security flaw. Google also assured us that this matter is being resolved, and that "the company will go to any length to protect its users".
The flaw which was discovered by Goldshlagger and was tested many times by Nana's editorial board had shown an alarming success rate. In order not to further jeopardize mail boxes' owners, we will only disclose that the process is based upon a security breach in the service's identity authentication. It allows the hacker to "snatch" the victims cookie file (a file planted in the victim's computer used to identify him) using a seemingly innocent link (which directs to Gmail's site itself). Once stolen, this cookie file allows the hacker to identify himself as the victim, without the need of a password. Even if the victim does change his password afterwards, it will be to no avail. "The system authenticates the hacker as the victim, using the stolen cookie file. Thus no password is involved in the authentication process. The victim can change his password as many times as he pleases, and it still won't stop the hacker from using his box", explains Goldshlagger.
Whether hackers have already used this method to compromise users' accounts is unclear at the moment.
Matters are several times worse when it comes to a service such as "Gmail". Besides the obvious blow to Google's seemingly spotless image, we're looking here at a major threat to anyone who has turned to "Gmail" as his major email box. "Because "Gmail" offers a gigabyte of storage, several times bigger than most other web based mail services, users hardly delete any old correspondence", says Goldshlagger. "The result is a huge amount of mail accumulating in the users' boxes, which frequently include bank notices, passwords, private documents and other files the user wanted to backup. Who ever takes a hold of this data, could literally take over the victim's life and identity".
"Ofer Elzam", a security expert for "Aladdin", who examined the security hole at "Nana's Netlife" request, explains: "This is a major threat, for the following reasons: First – the users have no way of protecting themselves. Second – it's quite easy to carry out, and third – it allows identity theft, which is nothing less than a serious danger to the victim".
"On the bright side", he adds, "its a good thing that this hole was found now, before the service was officially announced and offered to millions of users world-wide. I reckon it's just a matter of time before an automatic tool is made, which would allow even the less computer-savvy people to exploit this hack. The damage, needless to say, could be huge"
Is there a way, after all, to protect ourselves in the face of this danger? Elzam does not bear good news on the matter. "The only immediate solution that comes to mind is not using "Gmail" to store any messages or files that might be maliciously used. At least until Google attends to this problem".
I received a weird email last week and I forwarded it to the bug report. Guess that was the cookie link I talked about. I put it here:
From: accounts-noreply@google.com
To: xxxx@xxxx
Date: Tue, 26 Oct 2004 08:22:16 -0700 (PDT)
Subject: Google Password Assistance
Reply
Reply to all
Forward
Print
Add sender to contacts list
Trash this message
Show original
To initiate the process for resetting the password for your
xxxxx@gmail.com Google Account, visit the link below
http://www.google.com/accounts/xxxx----removed----xxxx
Thank you for using Google.
For questions or concerns regarding your account, please send mail to
accounts-support@google.com.
This is a post-only mailing. Replies to this message are not monitored
or answered.
And this is the explanation to what mentioned earlier:
Last Monday reported that a vulnerability in "GSuite". A local user can obtain the target user's "GMail" password.
It is reported that a local user with access to the target user's 'documents and settings\user name\Application Data\GSuite\' folder can view the 'settings.xml' file, which contains the target user's password in ASCII value encoded form. The password can be readily decoded.
Impact: A local user can obtain a target user's GMail password.
Solution: No solution was available at the time of this entry. The vendor plans to include a fix in the next release.
==============================================
change it to what you want and you will get a lot of stuff.
To see results; just write in the (http://www.google.com/) search engine the code:
"parent directory " /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
And
"parent directory " DVDRip -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
And
"parent directory "Xvid -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
And
"parent directory " Gamez -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
And
"parent directory " MP3 -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
And
"parent directory " Name of Singer or album -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
Or
?intitle:index.of? mp3
You only need add the name of the song/artist/singer.
Example: ?intitle:index.of? mp3 jackson
==============================================
You can change the string to watever you want, ex. microsoft to adobe, iso to zip etc…
To see results; just write in the (http://www.google.com/) search engine the code:
inurl:microsoft filetype:iso
==============================================
This search reveals channel keys (passwords) on IRC as revealed from IRC chat logs.
To see results; just write in the (http://www.google.com/) search engine the code:
"sets mode: +k"
==============================================
These are eggdrop config files. Avoiding a full-blown descussion about eggdrops and IRC bots,
suffice it to say that this file contains usernames and passwords for IRC users.
To see results; just write in the (http://www.google.com/) search engine the code:
eggdrop filetype:user user
==============================================
This will search for backup files (*.bak) created by some editors or
even by the administrator himself (before activating a new version).
Every attacker knows that changing the extenstion of a file on a webserver can have ugly consequences.
see results; just write in the (http://www.google.com/) search engine the code:
filetype:bak inurl:"htaccess
passwd
shadow
htusers"
==============================================
Let's pretend you need a serial number for windows xp pro. The key is the 94FBR code..
it was included with many MS Office registration codes so this will help you dramatically
reduce the amount of 'fake' porn sites that trick you.
To see results; just write in the (http://www.google.com/) search engine the code:
"Windows XP Professional" 94FBR
By the way, don't forget to change "Window sXP Professional" to any product you need its serial number.
==============================================
Notice this excellent trick. You can search for any product whether hardware or software
(between any prices price: for example, $250.. $350 ).
To see results; just write in the (http://www.google.com/) search engine the code:
DVD player $250..350
By the way, don't forget to change "DVD player" to any product you need to search for.
==============================================
At first glance, this search reveals even more examples of operating system users enabling the
operating system default web server software. This is generally accepted to be a Bad Idea(TM)
as mentioned in the previous example. However, the googleDork index on this particular
category gets quite a boost from the fact that this particular screen should NEVER
be seen by the general public. To quote the default index screen: "Any users
attempting to connect to this site are currently receiving an 'Under Construction page'"
THIS is not the 'Under Construction page.' I was only able to generate this screen
while sitting at the console of the server. The fact that this screen is revealed to the
general public may indicate a misconfiguration of a much more insidious nature...
To see results; just write in the (http://www.google.com/) search engine the code:
intitle:"Welcome to Windows 2000 Internet Services"
==============================================
Suppose you want a certain song to a singer and you can not find it; by this trick you
can find the song in the original directory of the original web site.
To see results; just write in the (http://www.google.com/) search engine the code:
"index of/" "Top Gun" .mp3
By the way, don't forget to change "Top Gun" to any song you need to search for.
==============================================
This is a fabulous link. This is the secret link of the web site "Google" to search for any
"Crack" you need.
Just write the following link in the address bar:
http://www.googlecrack.com/WWW/
==============================================
By the way, for anyone who needs to have an account in the google mail for "One GigaByte",
go to the following address bar. You will receive within "36 hours" the confirmation mail for your registration:
http://www.googlemail.cjb.net/
Or from:
http://www.gmailforums.com/index.php
By the way, you can open your Google mail from your browser through this link:
http://toolbar.google.com/gmail-helper/
==============================================
Imagine that when you enter any web site, and you are surprised that when searching for
any program in it you can not find it. By this fabulous trick, you can find the link
for downloading any program in this site through any search engine.
For example, suppose you want to search for the program "Norton" in the web site
www.download.com ; when you go to www.google.com and write the following code, you will
be surprised that the "Google" search engine searches only in the site www.download.com. To do this:
Write in the address bar of the web browser this address: www.google.com.
When opening the web site; write in the search engine this code: "norton site:
www.download.com", and press the button search or "ÃÈÍË".
As mentioned earlier: the code is easy, you just write in the place of the word
"Norton"; any word you need to search for in the site followed in the code.
The code again is....
norton site:www.download.com
By the way, you can practice this code at any search engine.
Another trick is that you can force the search engine of the "Google" web site to search
for a certain category like "Linux" topics. When you add any category after the Google
link and write any thing in the search engine, you will surprised that the site searched
for Linux only. For example, if you wrote the following code:
http://www.google.com/linux
As I mentioned in the code earlier, the site followed by the word "Linux". So the web site
is forced for searching for the Linux topics only all over the internet.
==============================================
Imagine that you can connect to another computer remotely through the internet from the
feature called "Remote Desktop Web Connection".
To see results; just write in the (http://www.google.com/) search engine the code:
intitle:"Remote Desktop Web Connection"
==============================================
Through this query you can find every web page "Google" has crawled for a specific site.
To see results; just write in the (http://www.google.com/) search engine the code:
Site: Microsoft.com
==============================================
Through this query, you can see web servers with default pages can serve as juicy targets.
To see results; just write in the (http://www.google.com/) search engine the code:
Intitle:test.page.for.apache "it worked"
==============================================
No one can deny that the directory listings can be a source of great information.
To see results; just write in the (http://www.google.com/) search engine the code:
Intitle:index.of/admin
==============================================
We will use this query to locate additional servers, subtract common hostnames from the query.
To see results; just write in the (http://www.google.com/) search engine the code:
Site: Microsoft.com - Site:www.Microsoft.com
==============================================
From this query you can get huge user names and passwords from huge sites for free.
To see results; just write in the (http://www.google.com/) search engine the code:
"Welcome to *" "Your password is *"
==============================================
From this query you can collect many numbers of ".PST" files, which contain all E-mail folders, addresses or anything else that Outlook 97, 2000, xp or 2003 collects.
To see results; just write in the (http://www.google.com/) search engine the code:
outlook filetype:pst
==============================================
allinurl:gmail.google.com
"NetLife" Exclusive: Security hole found in "Gmail"
An Israeli hacker reveals: A security hole in "Gmail" allows the compromise of users' email boxes – without the need of a password Nitzan Weidenfeld, Nana NetLife Magazine.
So you’ve got a "Gmail" mail account? Or maybe you’ve just received an invitation? Well, we have some bad news for you: Your mail box is exposed. A major security hole in Google's mail service, allows full access to user accounts, without the need of a password.
"Everything could get publicly exposed – your received mails might be readable, as well as all of your sent mail, and furthermore – anyone could send and receive mail under your name", thus reveals Nir Goldshlagger, an Israeli hacker, on an exclusive interview with "Nana NetLife" Magazine. "Even more alarming", he explains, "is the fact that the hack itself is quite simple. All that is needed of the malicious hacker, beside knowledge of the specific technique, is quite basic computer knowledge, the victim's username – and that’s it, he's inside".
When approached, Google admitted to the security flaw. Google also assured us that this matter is being resolved, and that "the company will go to any length to protect its users".
The flaw which was discovered by Goldshlagger and was tested many times by Nana's editorial board had shown an alarming success rate. In order not to further jeopardize mail boxes' owners, we will only disclose that the process is based upon a security breach in the service's identity authentication. It allows the hacker to "snatch" the victims cookie file (a file planted in the victim's computer used to identify him) using a seemingly innocent link (which directs to Gmail's site itself). Once stolen, this cookie file allows the hacker to identify himself as the victim, without the need of a password. Even if the victim does change his password afterwards, it will be to no avail. "The system authenticates the hacker as the victim, using the stolen cookie file. Thus no password is involved in the authentication process. The victim can change his password as many times as he pleases, and it still won't stop the hacker from using his box", explains Goldshlagger.
Whether hackers have already used this method to compromise users' accounts is unclear at the moment.
Matters are several times worse when it comes to a service such as "Gmail". Besides the obvious blow to Google's seemingly spotless image, we're looking here at a major threat to anyone who has turned to "Gmail" as his major email box. "Because "Gmail" offers a gigabyte of storage, several times bigger than most other web based mail services, users hardly delete any old correspondence", says Goldshlagger. "The result is a huge amount of mail accumulating in the users' boxes, which frequently include bank notices, passwords, private documents and other files the user wanted to backup. Who ever takes a hold of this data, could literally take over the victim's life and identity".
"Ofer Elzam", a security expert for "Aladdin", who examined the security hole at "Nana's Netlife" request, explains: "This is a major threat, for the following reasons: First – the users have no way of protecting themselves. Second – it's quite easy to carry out, and third – it allows identity theft, which is nothing less than a serious danger to the victim".
"On the bright side", he adds, "its a good thing that this hole was found now, before the service was officially announced and offered to millions of users world-wide. I reckon it's just a matter of time before an automatic tool is made, which would allow even the less computer-savvy people to exploit this hack. The damage, needless to say, could be huge"
Is there a way, after all, to protect ourselves in the face of this danger? Elzam does not bear good news on the matter. "The only immediate solution that comes to mind is not using "Gmail" to store any messages or files that might be maliciously used. At least until Google attends to this problem".
I received a weird email last week and I forwarded it to the bug report. Guess that was the cookie link I talked about. I put it here:
From: accounts-noreply@google.com
To: xxxx@xxxx
Date: Tue, 26 Oct 2004 08:22:16 -0700 (PDT)
Subject: Google Password Assistance
Reply
Reply to all
Forward
Add sender to contacts list
Trash this message
Show original
To initiate the process for resetting the password for your
xxxxx@gmail.com Google Account, visit the link below
http://www.google.com/accounts/xxxx----removed----xxxx
Thank you for using Google.
For questions or concerns regarding your account, please send mail to
accounts-support@google.com.
This is a post-only mailing. Replies to this message are not monitored
or answered.
And this is the explanation to what mentioned earlier:
Last Monday reported that a vulnerability in "GSuite". A local user can obtain the target user's "GMail" password.
It is reported that a local user with access to the target user's 'documents and settings\user name\Application Data\GSuite\' folder can view the 'settings.xml' file, which contains the target user's password in ASCII value encoded form. The password can be readily decoded.
Impact: A local user can obtain a target user's GMail password.
Solution: No solution was available at the time of this entry. The vendor plans to include a fix in the next release.
==============================================
by
blog saya kata
at
March 18, 2011
past tense:
google hack3
google hack 3
Notice I am only changing the word after the parent directory,
change it to what you want and you will get a lot of stuff.
To see results; just write in the (http://www.google.com/) search engine the code:
"parent directory " /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
And
"parent directory " DVDRip -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
And
"parent directory "Xvid -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
And
"parent directory " Gamez -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
And
"parent directory " MP3 -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
And
"parent directory " Name of Singer or album -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
Or
?intitle:index.of? mp3
You only need add the name of the song/artist/singer.
Example: ?intitle:index.of? mp3 jackson
==============================================
You can change the string to watever you want, ex. microsoft to adobe, iso to zip etc…
To see results; just write in the (http://www.google.com/) search engine the code:
inurl:microsoft filetype:iso
==============================================
This search reveals channel keys (passwords) on IRC as revealed from IRC chat logs.
To see results; just write in the (http://www.google.com/) search engine the code:
"sets mode: +k"
==============================================
These are eggdrop config files. Avoiding a full-blown descussion about eggdrops and IRC bots,
suffice it to say that this file contains usernames and passwords for IRC users.
To see results; just write in the (http://www.google.com/) search engine the code:
eggdrop filetype:user user
==============================================
This will search for backup files (*.bak) created by some editors or
even by the administrator himself (before activating a new version).
Every attacker knows that changing the extenstion of a file on a webserver can have ugly consequences.
see results; just write in the (http://www.google.com/) search engine the code:
filetype:bak inurl:"htaccess
passwd
shadow
htusers"
==============================================
Let's pretend you need a serial number for windows xp pro. The key is the 94FBR code..
it was included with many MS Office registration codes so this will help you dramatically
reduce the amount of 'fake' porn sites that trick you.
To see results; just write in the (http://www.google.com/) search engine the code:
"Windows XP Professional" 94FBR
By the way, don't forget to change "Window sXP Professional" to any product you need its serial number.
==============================================
Notice this excellent trick. You can search for any product whether hardware or software
(between any prices price: for example, $250.. $350 ).
To see results; just write in the (http://www.google.com/) search engine the code:
DVD player $250..350
By the way, don't forget to change "DVD player" to any product you need to search for.
==============================================
At first glance, this search reveals even more examples of operating system users enabling the
operating system default web server software. This is generally accepted to be a Bad Idea(TM)
as mentioned in the previous example. However, the googleDork index on this particular
category gets quite a boost from the fact that this particular screen should NEVER
be seen by the general public. To quote the default index screen: "Any users
attempting to connect to this site are currently receiving an 'Under Construction page'"
THIS is not the 'Under Construction page.' I was only able to generate this screen
while sitting at the console of the server. The fact that this screen is revealed to the
general public may indicate a misconfiguration of a much more insidious nature...
To see results; just write in the (http://www.google.com/) search engine the code:
intitle:"Welcome to Windows 2000 Internet Services"
==============================================
Suppose you want a certain song to a singer and you can not find it; by this trick you
can find the song in the original directory of the original web site.
To see results; just write in the (http://www.google.com/) search engine the code:
"index of/" "Top Gun" .mp3
By the way, don't forget to change "Top Gun" to any song you need to search for.
==============================================
This is a fabulous link. This is the secret link of the web site "Google" to search for any
"Crack" you need.
Just write the following link in the address bar:
http://www.googlecrack.com/WWW/
==============================================
By the way, for anyone who needs to have an account in the google mail for "One GigaByte",
go to the following address bar. You will receive within "36 hours" the confirmation mail for your registration:
http://www.googlemail.cjb.net/
Or from:
http://www.gmailforums.com/index.php
By the way, you can open your Google mail from your browser through this link:
http://toolbar.google.com/gmail-helper/
==============================================
Imagine that when you enter any web site, and you are surprised that when searching for
any program in it you can not find it. By this fabulous trick, you can find the link
for downloading any program in this site through any search engine.
For example, suppose you want to search for the program "Norton" in the web site
www.download.com ; when you go to www.google.com and write the following code, you will
be surprised that the "Google" search engine searches only in the site www.download.com. To do this:
Write in the address bar of the web browser this address: www.google.com.
When opening the web site; write in the search engine this code: "norton site:
www.download.com", and press the button search or "ÃÈÍË".
As mentioned earlier: the code is easy, you just write in the place of the word
"Norton"; any word you need to search for in the site followed in the code.
The code again is....
norton site:www.download.com
By the way, you can practice this code at any search engine.
Another trick is that you can force the search engine of the "Google" web site to search
for a certain category like "Linux" topics. When you add any category after the Google
link and write any thing in the search engine, you will surprised that the site searched
for Linux only. For example, if you wrote the following code:
http://www.google.com/linux
As I mentioned in the code earlier, the site followed by the word "Linux". So the web site
is forced for searching for the Linux topics only all over the internet.
==============================================
Imagine that you can connect to another computer remotely through the internet from the
feature called "Remote Desktop Web Connection".
To see results; just write in the (http://www.google.com/) search engine the code:
intitle:"Remote Desktop Web Connection"
==============================================
Through this query you can find every web page "Google" has crawled for a specific site.
To see results; just write in the (http://www.google.com/) search engine the code:
Site: Microsoft.com
==============================================
Through this query, you can see web servers with default pages can serve as juicy targets.
To see results; just write in the (http://www.google.com/) search engine the code:
Intitle:test.page.for.apache "it worked"
==============================================
No one can deny that the directory listings can be a source of great information.
To see results; just write in the (http://www.google.com/) search engine the code:
Intitle:index.of/admin
==============================================
We will use this query to locate additional servers, subtract common hostnames from the query.
To see results; just write in the (http://www.google.com/) search engine the code:
Site: Microsoft.com - Site:www.Microsoft.com
==============================================
From this query you can get huge user names and passwords from huge sites for free.
To see results; just write in the (http://www.google.com/) search engine the code:
"Welcome to *" "Your password is *"
==============================================
From this query you can collect many numbers of ".PST" files, which contain all E-mail folders, addresses or anything else that Outlook 97, 2000, xp or 2003 collects.
To see results; just write in the (http://www.google.com/) search engine the code:
outlook filetype:pst
==============================================
allinurl:gmail.google.com
"NetLife" Exclusive: Security hole found in "Gmail"
An Israeli hacker reveals: A security hole in "Gmail" allows the compromise of users' email boxes – without the need of a password Nitzan Weidenfeld, Nana NetLife Magazine.
So you’ve got a "Gmail" mail account? Or maybe you’ve just received an invitation? Well, we have some bad news for you: Your mail box is exposed. A major security hole in Google's mail service, allows full access to user accounts, without the need of a password.
"Everything could get publicly exposed – your received mails might be readable, as well as all of your sent mail, and furthermore – anyone could send and receive mail under your name", thus reveals Nir Goldshlagger, an Israeli hacker, on an exclusive interview with "Nana NetLife" Magazine. "Even more alarming", he explains, "is the fact that the hack itself is quite simple. All that is needed of the malicious hacker, beside knowledge of the specific technique, is quite basic computer knowledge, the victim's username – and that’s it, he's inside".
When approached, Google admitted to the security flaw. Google also assured us that this matter is being resolved, and that "the company will go to any length to protect its users".
The flaw which was discovered by Goldshlagger and was tested many times by Nana's editorial board had shown an alarming success rate. In order not to further jeopardize mail boxes' owners, we will only disclose that the process is based upon a security breach in the service's identity authentication. It allows the hacker to "snatch" the victims cookie file (a file planted in the victim's computer used to identify him) using a seemingly innocent link (which directs to Gmail's site itself). Once stolen, this cookie file allows the hacker to identify himself as the victim, without the need of a password. Even if the victim does change his password afterwards, it will be to no avail. "The system authenticates the hacker as the victim, using the stolen cookie file. Thus no password is involved in the authentication process. The victim can change his password as many times as he pleases, and it still won't stop the hacker from using his box", explains Goldshlagger.
Whether hackers have already used this method to compromise users' accounts is unclear at the moment.
Matters are several times worse when it comes to a service such as "Gmail". Besides the obvious blow to Google's seemingly spotless image, we're looking here at a major threat to anyone who has turned to "Gmail" as his major email box. "Because "Gmail" offers a gigabyte of storage, several times bigger than most other web based mail services, users hardly delete any old correspondence", says Goldshlagger. "The result is a huge amount of mail accumulating in the users' boxes, which frequently include bank notices, passwords, private documents and other files the user wanted to backup. Who ever takes a hold of this data, could literally take over the victim's life and identity".
"Ofer Elzam", a security expert for "Aladdin", who examined the security hole at "Nana's Netlife" request, explains: "This is a major threat, for the following reasons: First – the users have no way of protecting themselves. Second – it's quite easy to carry out, and third – it allows identity theft, which is nothing less than a serious danger to the victim".
"On the bright side", he adds, "its a good thing that this hole was found now, before the service was officially announced and offered to millions of users world-wide. I reckon it's just a matter of time before an automatic tool is made, which would allow even the less computer-savvy people to exploit this hack. The damage, needless to say, could be huge"
Is there a way, after all, to protect ourselves in the face of this danger? Elzam does not bear good news on the matter. "The only immediate solution that comes to mind is not using "Gmail" to store any messages or files that might be maliciously used. At least until Google attends to this problem".
I received a weird email last week and I forwarded it to the bug report. Guess that was the cookie link I talked about. I put it here:
From: accounts-noreply@google.com
To: xxxx@xxxx
Date: Tue, 26 Oct 2004 08:22:16 -0700 (PDT)
Subject: Google Password Assistance
Reply
Reply to all
Forward
Print
Add sender to contacts list
Trash this message
Show original
To initiate the process for resetting the password for your
xxxxx@gmail.com Google Account, visit the link below
http://www.google.com/accounts/xxxx----removed----xxxx
Thank you for using Google.
For questions or concerns regarding your account, please send mail to
accounts-support@google.com.
This is a post-only mailing. Replies to this message are not monitored
or answered.
And this is the explanation to what mentioned earlier:
Last Monday reported that a vulnerability in "GSuite". A local user can obtain the target user's "GMail" password.
It is reported that a local user with access to the target user's 'documents and settings\user name\Application Data\GSuite\' folder can view the 'settings.xml' file, which contains the target user's password in ASCII value encoded form. The password can be readily decoded.
Impact: A local user can obtain a target user's GMail password.
Solution: No solution was available at the time of this entry. The vendor plans to include a fix in the next release.
==============================================
change it to what you want and you will get a lot of stuff.
To see results; just write in the (http://www.google.com/) search engine the code:
"parent directory " /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
And
"parent directory " DVDRip -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
And
"parent directory "Xvid -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
And
"parent directory " Gamez -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
And
"parent directory " MP3 -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
And
"parent directory " Name of Singer or album -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
Or
?intitle:index.of? mp3
You only need add the name of the song/artist/singer.
Example: ?intitle:index.of? mp3 jackson
==============================================
You can change the string to watever you want, ex. microsoft to adobe, iso to zip etc…
To see results; just write in the (http://www.google.com/) search engine the code:
inurl:microsoft filetype:iso
==============================================
This search reveals channel keys (passwords) on IRC as revealed from IRC chat logs.
To see results; just write in the (http://www.google.com/) search engine the code:
"sets mode: +k"
==============================================
These are eggdrop config files. Avoiding a full-blown descussion about eggdrops and IRC bots,
suffice it to say that this file contains usernames and passwords for IRC users.
To see results; just write in the (http://www.google.com/) search engine the code:
eggdrop filetype:user user
==============================================
This will search for backup files (*.bak) created by some editors or
even by the administrator himself (before activating a new version).
Every attacker knows that changing the extenstion of a file on a webserver can have ugly consequences.
see results; just write in the (http://www.google.com/) search engine the code:
filetype:bak inurl:"htaccess
passwd
shadow
htusers"
==============================================
Let's pretend you need a serial number for windows xp pro. The key is the 94FBR code..
it was included with many MS Office registration codes so this will help you dramatically
reduce the amount of 'fake' porn sites that trick you.
To see results; just write in the (http://www.google.com/) search engine the code:
"Windows XP Professional" 94FBR
By the way, don't forget to change "Window sXP Professional" to any product you need its serial number.
==============================================
Notice this excellent trick. You can search for any product whether hardware or software
(between any prices price: for example, $250.. $350 ).
To see results; just write in the (http://www.google.com/) search engine the code:
DVD player $250..350
By the way, don't forget to change "DVD player" to any product you need to search for.
==============================================
At first glance, this search reveals even more examples of operating system users enabling the
operating system default web server software. This is generally accepted to be a Bad Idea(TM)
as mentioned in the previous example. However, the googleDork index on this particular
category gets quite a boost from the fact that this particular screen should NEVER
be seen by the general public. To quote the default index screen: "Any users
attempting to connect to this site are currently receiving an 'Under Construction page'"
THIS is not the 'Under Construction page.' I was only able to generate this screen
while sitting at the console of the server. The fact that this screen is revealed to the
general public may indicate a misconfiguration of a much more insidious nature...
To see results; just write in the (http://www.google.com/) search engine the code:
intitle:"Welcome to Windows 2000 Internet Services"
==============================================
Suppose you want a certain song to a singer and you can not find it; by this trick you
can find the song in the original directory of the original web site.
To see results; just write in the (http://www.google.com/) search engine the code:
"index of/" "Top Gun" .mp3
By the way, don't forget to change "Top Gun" to any song you need to search for.
==============================================
This is a fabulous link. This is the secret link of the web site "Google" to search for any
"Crack" you need.
Just write the following link in the address bar:
http://www.googlecrack.com/WWW/
==============================================
By the way, for anyone who needs to have an account in the google mail for "One GigaByte",
go to the following address bar. You will receive within "36 hours" the confirmation mail for your registration:
http://www.googlemail.cjb.net/
Or from:
http://www.gmailforums.com/index.php
By the way, you can open your Google mail from your browser through this link:
http://toolbar.google.com/gmail-helper/
==============================================
Imagine that when you enter any web site, and you are surprised that when searching for
any program in it you can not find it. By this fabulous trick, you can find the link
for downloading any program in this site through any search engine.
For example, suppose you want to search for the program "Norton" in the web site
www.download.com ; when you go to www.google.com and write the following code, you will
be surprised that the "Google" search engine searches only in the site www.download.com. To do this:
Write in the address bar of the web browser this address: www.google.com.
When opening the web site; write in the search engine this code: "norton site:
www.download.com", and press the button search or "ÃÈÍË".
As mentioned earlier: the code is easy, you just write in the place of the word
"Norton"; any word you need to search for in the site followed in the code.
The code again is....
norton site:www.download.com
By the way, you can practice this code at any search engine.
Another trick is that you can force the search engine of the "Google" web site to search
for a certain category like "Linux" topics. When you add any category after the Google
link and write any thing in the search engine, you will surprised that the site searched
for Linux only. For example, if you wrote the following code:
http://www.google.com/linux
As I mentioned in the code earlier, the site followed by the word "Linux". So the web site
is forced for searching for the Linux topics only all over the internet.
==============================================
Imagine that you can connect to another computer remotely through the internet from the
feature called "Remote Desktop Web Connection".
To see results; just write in the (http://www.google.com/) search engine the code:
intitle:"Remote Desktop Web Connection"
==============================================
Through this query you can find every web page "Google" has crawled for a specific site.
To see results; just write in the (http://www.google.com/) search engine the code:
Site: Microsoft.com
==============================================
Through this query, you can see web servers with default pages can serve as juicy targets.
To see results; just write in the (http://www.google.com/) search engine the code:
Intitle:test.page.for.apache "it worked"
==============================================
No one can deny that the directory listings can be a source of great information.
To see results; just write in the (http://www.google.com/) search engine the code:
Intitle:index.of/admin
==============================================
We will use this query to locate additional servers, subtract common hostnames from the query.
To see results; just write in the (http://www.google.com/) search engine the code:
Site: Microsoft.com - Site:www.Microsoft.com
==============================================
From this query you can get huge user names and passwords from huge sites for free.
To see results; just write in the (http://www.google.com/) search engine the code:
"Welcome to *" "Your password is *"
==============================================
From this query you can collect many numbers of ".PST" files, which contain all E-mail folders, addresses or anything else that Outlook 97, 2000, xp or 2003 collects.
To see results; just write in the (http://www.google.com/) search engine the code:
outlook filetype:pst
==============================================
allinurl:gmail.google.com
"NetLife" Exclusive: Security hole found in "Gmail"
An Israeli hacker reveals: A security hole in "Gmail" allows the compromise of users' email boxes – without the need of a password Nitzan Weidenfeld, Nana NetLife Magazine.
So you’ve got a "Gmail" mail account? Or maybe you’ve just received an invitation? Well, we have some bad news for you: Your mail box is exposed. A major security hole in Google's mail service, allows full access to user accounts, without the need of a password.
"Everything could get publicly exposed – your received mails might be readable, as well as all of your sent mail, and furthermore – anyone could send and receive mail under your name", thus reveals Nir Goldshlagger, an Israeli hacker, on an exclusive interview with "Nana NetLife" Magazine. "Even more alarming", he explains, "is the fact that the hack itself is quite simple. All that is needed of the malicious hacker, beside knowledge of the specific technique, is quite basic computer knowledge, the victim's username – and that’s it, he's inside".
When approached, Google admitted to the security flaw. Google also assured us that this matter is being resolved, and that "the company will go to any length to protect its users".
The flaw which was discovered by Goldshlagger and was tested many times by Nana's editorial board had shown an alarming success rate. In order not to further jeopardize mail boxes' owners, we will only disclose that the process is based upon a security breach in the service's identity authentication. It allows the hacker to "snatch" the victims cookie file (a file planted in the victim's computer used to identify him) using a seemingly innocent link (which directs to Gmail's site itself). Once stolen, this cookie file allows the hacker to identify himself as the victim, without the need of a password. Even if the victim does change his password afterwards, it will be to no avail. "The system authenticates the hacker as the victim, using the stolen cookie file. Thus no password is involved in the authentication process. The victim can change his password as many times as he pleases, and it still won't stop the hacker from using his box", explains Goldshlagger.
Whether hackers have already used this method to compromise users' accounts is unclear at the moment.
Matters are several times worse when it comes to a service such as "Gmail". Besides the obvious blow to Google's seemingly spotless image, we're looking here at a major threat to anyone who has turned to "Gmail" as his major email box. "Because "Gmail" offers a gigabyte of storage, several times bigger than most other web based mail services, users hardly delete any old correspondence", says Goldshlagger. "The result is a huge amount of mail accumulating in the users' boxes, which frequently include bank notices, passwords, private documents and other files the user wanted to backup. Who ever takes a hold of this data, could literally take over the victim's life and identity".
"Ofer Elzam", a security expert for "Aladdin", who examined the security hole at "Nana's Netlife" request, explains: "This is a major threat, for the following reasons: First – the users have no way of protecting themselves. Second – it's quite easy to carry out, and third – it allows identity theft, which is nothing less than a serious danger to the victim".
"On the bright side", he adds, "its a good thing that this hole was found now, before the service was officially announced and offered to millions of users world-wide. I reckon it's just a matter of time before an automatic tool is made, which would allow even the less computer-savvy people to exploit this hack. The damage, needless to say, could be huge"
Is there a way, after all, to protect ourselves in the face of this danger? Elzam does not bear good news on the matter. "The only immediate solution that comes to mind is not using "Gmail" to store any messages or files that might be maliciously used. At least until Google attends to this problem".
I received a weird email last week and I forwarded it to the bug report. Guess that was the cookie link I talked about. I put it here:
From: accounts-noreply@google.com
To: xxxx@xxxx
Date: Tue, 26 Oct 2004 08:22:16 -0700 (PDT)
Subject: Google Password Assistance
Reply
Reply to all
Forward
Add sender to contacts list
Trash this message
Show original
To initiate the process for resetting the password for your
xxxxx@gmail.com Google Account, visit the link below
http://www.google.com/accounts/xxxx----removed----xxxx
Thank you for using Google.
For questions or concerns regarding your account, please send mail to
accounts-support@google.com.
This is a post-only mailing. Replies to this message are not monitored
or answered.
And this is the explanation to what mentioned earlier:
Last Monday reported that a vulnerability in "GSuite". A local user can obtain the target user's "GMail" password.
It is reported that a local user with access to the target user's 'documents and settings\user name\Application Data\GSuite\' folder can view the 'settings.xml' file, which contains the target user's password in ASCII value encoded form. The password can be readily decoded.
Impact: A local user can obtain a target user's GMail password.
Solution: No solution was available at the time of this entry. The vendor plans to include a fix in the next release.
==============================================
by
blog saya kata
at
March 18, 2011
past tense:
google hack3
Google hack 2,
Tired of websearching ? Want something to read ? You can find Ebooks
(thousands of them) with this search..LIT files can be opened with Microsoft Reader
(http://www.microsoft.com/reader/).
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:lit lit (books
ebooks)
==============================================
Using Google, and some finely crafted searches we can find a lot of interesting information.
For Example we can find: Credit Card Numbers / Passwords / Software / MP3's
...... (and on and on and on)Presented below is just a sample of interesting searches
that we can send to google to obtain info that some people might not want us having..
After you get a taste using some of these, try your own crafted searches
to find info that you would be interested in.
To see results; just write in the (http://www.google.com/) search engine the code:
intitle:"Index of" passwords modified
And
allinurl:auth_user_file.txt
And
"access denied for user" "using password"
And
"A syntax error has occurred" filetype:ihtml
And
allinurl: admin mdb
And
"ORA-00921: unexpected end of SQL command"
And
inurl:passlist.txt
And
"Index of /backup"
And
"Chatologica MetaSearch" "stack tracking:"
And
Amex Numbers: 300000000000000..399999999999999
And
MC Numbers: 5178000000000000..5178999999999999
And
visa 4356000000000000..4356999999999999
(thousands of them) with this search..LIT files can be opened with Microsoft Reader
(http://www.microsoft.com/reader/).
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:lit lit (books
ebooks)
==============================================
Using Google, and some finely crafted searches we can find a lot of interesting information.
For Example we can find: Credit Card Numbers / Passwords / Software / MP3's
...... (and on and on and on)Presented below is just a sample of interesting searches
that we can send to google to obtain info that some people might not want us having..
After you get a taste using some of these, try your own crafted searches
to find info that you would be interested in.
To see results; just write in the (http://www.google.com/) search engine the code:
intitle:"Index of" passwords modified
And
allinurl:auth_user_file.txt
And
"access denied for user" "using password"
And
"A syntax error has occurred" filetype:ihtml
And
allinurl: admin mdb
And
"ORA-00921: unexpected end of SQL command"
And
inurl:passlist.txt
And
"Index of /backup"
And
"Chatologica MetaSearch" "stack tracking:"
And
Amex Numbers: 300000000000000..399999999999999
And
MC Numbers: 5178000000000000..5178999999999999
And
visa 4356000000000000..4356999999999999
by
blog saya kata
at
March 18, 2011
past tense:
ebook,
google hack2,
hacking tutorial,
how to find e-books
Google hack 2,
Tired of websearching ? Want something to read ? You can find Ebooks
(thousands of them) with this search..LIT files can be opened with Microsoft Reader
(http://www.microsoft.com/reader/).
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:lit lit (books
ebooks)
==============================================
Using Google, and some finely crafted searches we can find a lot of interesting information.
For Example we can find: Credit Card Numbers / Passwords / Software / MP3's
...... (and on and on and on)Presented below is just a sample of interesting searches
that we can send to google to obtain info that some people might not want us having..
After you get a taste using some of these, try your own crafted searches
to find info that you would be interested in.
To see results; just write in the (http://www.google.com/) search engine the code:
intitle:"Index of" passwords modified
And
allinurl:auth_user_file.txt
And
"access denied for user" "using password"
And
"A syntax error has occurred" filetype:ihtml
And
allinurl: admin mdb
And
"ORA-00921: unexpected end of SQL command"
And
inurl:passlist.txt
And
"Index of /backup"
And
"Chatologica MetaSearch" "stack tracking:"
And
Amex Numbers: 300000000000000..399999999999999
And
MC Numbers: 5178000000000000..5178999999999999
And
visa 4356000000000000..4356999999999999
(thousands of them) with this search..LIT files can be opened with Microsoft Reader
(http://www.microsoft.com/reader/).
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:lit lit (books
ebooks)
==============================================
Using Google, and some finely crafted searches we can find a lot of interesting information.
For Example we can find: Credit Card Numbers / Passwords / Software / MP3's
...... (and on and on and on)Presented below is just a sample of interesting searches
that we can send to google to obtain info that some people might not want us having..
After you get a taste using some of these, try your own crafted searches
to find info that you would be interested in.
To see results; just write in the (http://www.google.com/) search engine the code:
intitle:"Index of" passwords modified
And
allinurl:auth_user_file.txt
And
"access denied for user" "using password"
And
"A syntax error has occurred" filetype:ihtml
And
allinurl: admin mdb
And
"ORA-00921: unexpected end of SQL command"
And
inurl:passlist.txt
And
"Index of /backup"
And
"Chatologica MetaSearch" "stack tracking:"
And
Amex Numbers: 300000000000000..399999999999999
And
MC Numbers: 5178000000000000..5178999999999999
And
visa 4356000000000000..4356999999999999
by
blog saya kata
at
March 18, 2011
past tense:
ebook,
google hack2,
hacking tutorial,
how to find e-books
Google Hack
Excellent tricks and techniques of Google Hacks
ws_ftp.ini is a configuration file for a popular FTP client that stores usernames,
(weakly) encoded passwords, sites and directories that the user can store for later reference.
These should not be on the web!
That's some good stuff. Just copy/paste the text into your own WS FTP ini file
and you're good as gold (assuming you're using the same version). Don't forget -
even if they have taken the file offline, use the "cache:FULL_URL/wsftp.ini" to see the contents.
probably one of the best exploits I have seen in a long time, when I did it
there were about 20 vulnerable computers, just recently there was 4
so I hope whitehats got to this before anyone else. really nice !!
To see results; just write in the (http://www.google.com/) search engine the code:
intitle:index.of ws_ftp.ini
==============================================
Frontpage.. very nice clean search results listing !!
I magine with me that you can steal or know the password of any web site designed by
"Frontpage". But the file containing the password might be encrypted; to decrypt the
file download the program " john the ripper".
To see results; just write in the (http://www.google.com/) search engine the code:
"# -FrontPage-" inurl:service.pwd
==============================================
This searches the password for "Website Access Analyzer", a Japanese software that
creates webstatistics.
To see results; just write in the (http://www.google.com/) search engine the code:
"AutoCreate=TRUE password=*"
==============================================
This is a query to get inline passwords from search engines (not just Google),
you must type in the query followed with the the domain name without the .com or .net.
To see results; just write in the (http://www.google.com/) search engine the code:
"http://*:*@www" bangbus or "http://*:*@www"bangbus
Or
http://bob:bob@www
Or
http://admin:*@www
==============================================
This search is a cleanup of a previous entry by J0hnny. It uses "parent directory"
to avoid results other than directory listings.
WS_FTP.ini is a configuration file for a popular win32 FTP client that stores
usernames and weakly encoded passwords.
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:ini ws_ftp pwd
Or
"index of/" "ws_ftp.ini" "parent directory"
==============================================
Microsoft Frontpage extensions appear on virtually every type of scanner. In the late 90's
people thought they where hardcore by defacing sites with Frontpage. Today, there are still
vulnerable servers found with Google.
An attacker can simply take advantage from administrators who 'forget' to set up the policies
for Frontpage extensions. An attacker can also search for 'filetype:pwd users'.
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:pwd service
==============================================
Not all of these pages are administrator's access databases containing usernames, passwords and
other sensitive information, but many are! And much adminstrated passwords and user passwords,
a lot of emails and the such too…
To see results; just write in the (http://www.google.com/) search engine the code:
allinurl: admin mdb
==============================================
DCForum's password file. This file gives a list of (crackable) passwords, usernames and email
addresses for DCForum and for DCShop (a shopping cart program(!!!). Some lists are bigger than others, all are fun.
To see results; just write in the (http://www.google.com/) search engine the code:
allinurl:auth_user_file.txt
==============================================
This search brings up sites with "config.php" files. To skip the technical discussion,
this configuration file contains both a username and a password for an SQL database.
Most sites with forums run a PHP message base. This file gives you the keys to that forum,
including FULL ADMIN access to the database. To see view the PHP files; there in lies the catch.
Browsers are made to process the commands of PHP before display, so if no commands, nothing to show.
You can't use that persay to get into the config file, but it would show potential threats
if someone got into server anyway. (If that happens you're basically boned anyway, not much around that.
To see results; just write in the (http://www.google.com/) search engine the code:
intitle:index.of config.php
By the way, to know how to view the PHP file contents, you can use this code:
intitle:"Index of" phpinfo.php
==============================================
These files contain ColdFusion source code. In some cases, the pages are examples that are found in
discussion forums. However, in many cases these pages contain live sourcecode with usernames,
database names or passwords in plaintext.
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:cfm "cfapplication name" password
==============================================
FlashFXP offers the easiest and fastest way to transfer any file using FTP, providing an exceptionally
stable and robust program that you can always count on to get your job done quickly and efficiently.
There are many, many features available in FlashFXP.
The flashFXP.ini file is its configuration file and may contain usernames/passwords and everything
else that is needed to use FTP.
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:ini inurl:flashFXP.ini
==============================================
The encryption method used in WS_FTP is _extremely_ weak. These files can be found with the "index of"
keyword or by searching directly for the PWD= value inside the configuration file.
There is an easy way to decrypt the hash, use the decryptor at:
http://www.codebluehacks.com/Tools.php?ID=1
Or
http://www.hispasec.com/directorio/laboratorio/Software/ws_ftp.html
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:ini ws_ftp pwd
==============================================
These files contain cleartext usernames and passwords, as well as the sites associated with those credentials.
Attackers can use this information to log on to that site as that user.
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:log inurl:"password.log"
==============================================
Web Wiz Forums is a free ASP Bulletin Board software package. It uses a Microsoft Access database for storage.
The installation instructions clearly indicate to change the default path and filename (admin/database/wwForum.mdb).
vendor: http://www.webwizguide.info/web_wiz_forums/
The forum database contains the members passwords, either encrypted or in plain text, depending on the version.
Please note: this search is proof that results can stay in Google's index for a long time, even when they are not
on the site any longer. Currently only 2 out of 9 are actually still downloadable by an attacker.
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:mdb wwforum
==============================================
VNC is a remote-controlled desktop product. Depending on the configuration, remote users may not be presented with
a password. Even when presented with a password, the mere existance of VNC can be important to an attacker,
as is the open port of 5800.
To see results; just write in the (http://www.google.com/) search engine the code:
"VNC Desktop" inurl:5800
By the way, New version of VNC changed title to VNC Viewer so now you can search for…
intitle:vnc.desktop inurl:5800
==============================================
linux vpns store their usernames and passwords for CHAP authentification in a file called "chap-secrets"
where the usernames and the passwords are in cleartext.
To see results; just write in the (http://www.google.com/) search engine the code:
inurl:chap-secrets -cvs
==============================================
These lock files often contain usernames of the user that has locked the file.
Username harvesting can be done using this technique.
To see results; just write in the (http://www.google.com/) search engine the code:
"index of" / lck
==============================================
A standard FTP configuration file that provides far too many details about how the server
is setup, including installation paths, location of logfiles, generic username and associated group, etc.
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:conf inurl:proftpd.conf -sample
==============================================
This search finds registry files from the Windows Operating system. Considered the "soul" of the system,
these files, and snippets from these files contain sensitive information, in this case usernames and/or passwords.
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:reg reg HKEY_CURRENT_USER username
==============================================
Allows an attacker to create an account on a server running Argosoft mail server pro for windows
with unlimited disk quota (but a 5mb per message limit should you use your account to send mail).
To see results; just write in the (http://www.google.com/) search engine the code:
"adding new user" inurl:addnewuser -"there are no domains"
==============================================
The famous Sun linux appliance. The default page displays this text:
"Congratulations on Choosing a Cobalt RaQ - the premier server appliance platform for web hosting.
This page can easily be replaced with your own page. To replace this page, transfer
your new content to the directory /home/sites/home/web".
To see results; just write in the (http://www.google.com/) search engine the code:
(inurl:81/cgi-bin/.cobalt/)
(intext:"Welcome to the Cobalt RaQ")
==============================================
WS_FTP.LOG can be used in many ways to find more information about a server.
This query is very flexible, just substitute "+htpasswd" for "+FILENAME" and
you may get several hits that you hadn't seen with the 'normal' search.
Filenames suggested by the forum to explore are: phpinfo, admin, MySQL, password,
htdocs, root, Cisco, Oracle, IIS, resume, inc, sql, users, mdb, frontpage,
CMS, backend, https, editor, intranet . The list goes on and on..
A different approach might be "allinurl: "some.host.com" WS_FTP.LOG filetype:log"
which tells you more about who's uploading files to a specific site.
To see results; just write in the (http://www.google.com/) search engine the code:
+htpasswd +WS_FTP.LOG filetype:log
==============================================
The Web Data Administrator is a utility program implemented in ASP.NET
that enables you to easily manage your SQL Server data wherever you are.
Using its built-in features, you can do the following from Internet Explorer
or your favorite Web browser.
Create and edit databases in Microsoft SQL Server 2000 or Microsoft SQL Server
2000 Desktop Engine (MSDE) Perform ad-hoc queries against databases and save
them to your file system Export and import database schema and data.
To see results; just write in the (http://www.google.com/) search engine the code:
intitle:"Web Data Administrator - Login"
==============================================
The Aanval Intrusion Detection Console is an advanced intrusion detection monitor
and alerting system. Currently supporting modules for Snort and syslog - Aanval
provides real-time monitoring, reporting, alerting and stability. Aanval's
web-browser interface provides real-time event viewing and system/sensor management.
To see results; just write in the (http://www.google.com/) search engine the code:
intitle:"remote assessment" OpenAanval Console
ws_ftp.ini is a configuration file for a popular FTP client that stores usernames,
(weakly) encoded passwords, sites and directories that the user can store for later reference.
These should not be on the web!
That's some good stuff. Just copy/paste the text into your own WS FTP ini file
and you're good as gold (assuming you're using the same version). Don't forget -
even if they have taken the file offline, use the "cache:FULL_URL/wsftp.ini" to see the contents.
probably one of the best exploits I have seen in a long time, when I did it
there were about 20 vulnerable computers, just recently there was 4
so I hope whitehats got to this before anyone else. really nice !!
To see results; just write in the (http://www.google.com/) search engine the code:
intitle:index.of ws_ftp.ini
==============================================
Frontpage.. very nice clean search results listing !!
I magine with me that you can steal or know the password of any web site designed by
"Frontpage". But the file containing the password might be encrypted; to decrypt the
file download the program " john the ripper".
To see results; just write in the (http://www.google.com/) search engine the code:
"# -FrontPage-" inurl:service.pwd
==============================================
This searches the password for "Website Access Analyzer", a Japanese software that
creates webstatistics.
To see results; just write in the (http://www.google.com/) search engine the code:
"AutoCreate=TRUE password=*"
==============================================
This is a query to get inline passwords from search engines (not just Google),
you must type in the query followed with the the domain name without the .com or .net.
To see results; just write in the (http://www.google.com/) search engine the code:
"http://*:*@www" bangbus or "http://*:*@www"bangbus
Or
http://bob:bob@www
Or
http://admin:*@www
==============================================
This search is a cleanup of a previous entry by J0hnny. It uses "parent directory"
to avoid results other than directory listings.
WS_FTP.ini is a configuration file for a popular win32 FTP client that stores
usernames and weakly encoded passwords.
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:ini ws_ftp pwd
Or
"index of/" "ws_ftp.ini" "parent directory"
==============================================
Microsoft Frontpage extensions appear on virtually every type of scanner. In the late 90's
people thought they where hardcore by defacing sites with Frontpage. Today, there are still
vulnerable servers found with Google.
An attacker can simply take advantage from administrators who 'forget' to set up the policies
for Frontpage extensions. An attacker can also search for 'filetype:pwd users'.
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:pwd service
==============================================
Not all of these pages are administrator's access databases containing usernames, passwords and
other sensitive information, but many are! And much adminstrated passwords and user passwords,
a lot of emails and the such too…
To see results; just write in the (http://www.google.com/) search engine the code:
allinurl: admin mdb
==============================================
DCForum's password file. This file gives a list of (crackable) passwords, usernames and email
addresses for DCForum and for DCShop (a shopping cart program(!!!). Some lists are bigger than others, all are fun.
To see results; just write in the (http://www.google.com/) search engine the code:
allinurl:auth_user_file.txt
==============================================
This search brings up sites with "config.php" files. To skip the technical discussion,
this configuration file contains both a username and a password for an SQL database.
Most sites with forums run a PHP message base. This file gives you the keys to that forum,
including FULL ADMIN access to the database. To see view the PHP files; there in lies the catch.
Browsers are made to process the commands of PHP before display, so if no commands, nothing to show.
You can't use that persay to get into the config file, but it would show potential threats
if someone got into server anyway. (If that happens you're basically boned anyway, not much around that.
To see results; just write in the (http://www.google.com/) search engine the code:
intitle:index.of config.php
By the way, to know how to view the PHP file contents, you can use this code:
intitle:"Index of" phpinfo.php
==============================================
These files contain ColdFusion source code. In some cases, the pages are examples that are found in
discussion forums. However, in many cases these pages contain live sourcecode with usernames,
database names or passwords in plaintext.
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:cfm "cfapplication name" password
==============================================
FlashFXP offers the easiest and fastest way to transfer any file using FTP, providing an exceptionally
stable and robust program that you can always count on to get your job done quickly and efficiently.
There are many, many features available in FlashFXP.
The flashFXP.ini file is its configuration file and may contain usernames/passwords and everything
else that is needed to use FTP.
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:ini inurl:flashFXP.ini
==============================================
The encryption method used in WS_FTP is _extremely_ weak. These files can be found with the "index of"
keyword or by searching directly for the PWD= value inside the configuration file.
There is an easy way to decrypt the hash, use the decryptor at:
http://www.codebluehacks.com/Tools.php?ID=1
Or
http://www.hispasec.com/directorio/laboratorio/Software/ws_ftp.html
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:ini ws_ftp pwd
==============================================
These files contain cleartext usernames and passwords, as well as the sites associated with those credentials.
Attackers can use this information to log on to that site as that user.
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:log inurl:"password.log"
==============================================
Web Wiz Forums is a free ASP Bulletin Board software package. It uses a Microsoft Access database for storage.
The installation instructions clearly indicate to change the default path and filename (admin/database/wwForum.mdb).
vendor: http://www.webwizguide.info/web_wiz_forums/
The forum database contains the members passwords, either encrypted or in plain text, depending on the version.
Please note: this search is proof that results can stay in Google's index for a long time, even when they are not
on the site any longer. Currently only 2 out of 9 are actually still downloadable by an attacker.
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:mdb wwforum
==============================================
VNC is a remote-controlled desktop product. Depending on the configuration, remote users may not be presented with
a password. Even when presented with a password, the mere existance of VNC can be important to an attacker,
as is the open port of 5800.
To see results; just write in the (http://www.google.com/) search engine the code:
"VNC Desktop" inurl:5800
By the way, New version of VNC changed title to VNC Viewer so now you can search for…
intitle:vnc.desktop inurl:5800
==============================================
linux vpns store their usernames and passwords for CHAP authentification in a file called "chap-secrets"
where the usernames and the passwords are in cleartext.
To see results; just write in the (http://www.google.com/) search engine the code:
inurl:chap-secrets -cvs
==============================================
These lock files often contain usernames of the user that has locked the file.
Username harvesting can be done using this technique.
To see results; just write in the (http://www.google.com/) search engine the code:
"index of" / lck
==============================================
A standard FTP configuration file that provides far too many details about how the server
is setup, including installation paths, location of logfiles, generic username and associated group, etc.
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:conf inurl:proftpd.conf -sample
==============================================
This search finds registry files from the Windows Operating system. Considered the "soul" of the system,
these files, and snippets from these files contain sensitive information, in this case usernames and/or passwords.
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:reg reg HKEY_CURRENT_USER username
==============================================
Allows an attacker to create an account on a server running Argosoft mail server pro for windows
with unlimited disk quota (but a 5mb per message limit should you use your account to send mail).
To see results; just write in the (http://www.google.com/) search engine the code:
"adding new user" inurl:addnewuser -"there are no domains"
==============================================
The famous Sun linux appliance. The default page displays this text:
"Congratulations on Choosing a Cobalt RaQ - the premier server appliance platform for web hosting.
This page can easily be replaced with your own page. To replace this page, transfer
your new content to the directory /home/sites/home/web".
To see results; just write in the (http://www.google.com/) search engine the code:
(inurl:81/cgi-bin/.cobalt/)
(intext:"Welcome to the Cobalt RaQ")
==============================================
WS_FTP.LOG can be used in many ways to find more information about a server.
This query is very flexible, just substitute "+htpasswd" for "+FILENAME" and
you may get several hits that you hadn't seen with the 'normal' search.
Filenames suggested by the forum to explore are: phpinfo, admin, MySQL, password,
htdocs, root, Cisco, Oracle, IIS, resume, inc, sql, users, mdb, frontpage,
CMS, backend, https, editor, intranet . The list goes on and on..
A different approach might be "allinurl: "some.host.com" WS_FTP.LOG filetype:log"
which tells you more about who's uploading files to a specific site.
To see results; just write in the (http://www.google.com/) search engine the code:
+htpasswd +WS_FTP.LOG filetype:log
==============================================
The Web Data Administrator is a utility program implemented in ASP.NET
that enables you to easily manage your SQL Server data wherever you are.
Using its built-in features, you can do the following from Internet Explorer
or your favorite Web browser.
Create and edit databases in Microsoft SQL Server 2000 or Microsoft SQL Server
2000 Desktop Engine (MSDE) Perform ad-hoc queries against databases and save
them to your file system Export and import database schema and data.
To see results; just write in the (http://www.google.com/) search engine the code:
intitle:"Web Data Administrator - Login"
==============================================
The Aanval Intrusion Detection Console is an advanced intrusion detection monitor
and alerting system. Currently supporting modules for Snort and syslog - Aanval
provides real-time monitoring, reporting, alerting and stability. Aanval's
web-browser interface provides real-time event viewing and system/sensor management.
To see results; just write in the (http://www.google.com/) search engine the code:
intitle:"remote assessment" OpenAanval Console
by
blog saya kata
at
March 18, 2011
past tense:
google hack
Google Hack
Excellent tricks and techniques of Google Hacks
ws_ftp.ini is a configuration file for a popular FTP client that stores usernames,
(weakly) encoded passwords, sites and directories that the user can store for later reference.
These should not be on the web!
That's some good stuff. Just copy/paste the text into your own WS FTP ini file
and you're good as gold (assuming you're using the same version). Don't forget -
even if they have taken the file offline, use the "cache:FULL_URL/wsftp.ini" to see the contents.
probably one of the best exploits I have seen in a long time, when I did it
there were about 20 vulnerable computers, just recently there was 4
so I hope whitehats got to this before anyone else. really nice !!
To see results; just write in the (http://www.google.com/) search engine the code:
intitle:index.of ws_ftp.ini
==============================================
Frontpage.. very nice clean search results listing !!
I magine with me that you can steal or know the password of any web site designed by
"Frontpage". But the file containing the password might be encrypted; to decrypt the
file download the program " john the ripper".
To see results; just write in the (http://www.google.com/) search engine the code:
"# -FrontPage-" inurl:service.pwd
==============================================
This searches the password for "Website Access Analyzer", a Japanese software that
creates webstatistics.
To see results; just write in the (http://www.google.com/) search engine the code:
"AutoCreate=TRUE password=*"
==============================================
This is a query to get inline passwords from search engines (not just Google),
you must type in the query followed with the the domain name without the .com or .net.
To see results; just write in the (http://www.google.com/) search engine the code:
"http://*:*@www" bangbus or "http://*:*@www"bangbus
Or
http://bob:bob@www
Or
http://admin:*@www
==============================================
This search is a cleanup of a previous entry by J0hnny. It uses "parent directory"
to avoid results other than directory listings.
WS_FTP.ini is a configuration file for a popular win32 FTP client that stores
usernames and weakly encoded passwords.
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:ini ws_ftp pwd
Or
"index of/" "ws_ftp.ini" "parent directory"
==============================================
Microsoft Frontpage extensions appear on virtually every type of scanner. In the late 90's
people thought they where hardcore by defacing sites with Frontpage. Today, there are still
vulnerable servers found with Google.
An attacker can simply take advantage from administrators who 'forget' to set up the policies
for Frontpage extensions. An attacker can also search for 'filetype:pwd users'.
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:pwd service
==============================================
Not all of these pages are administrator's access databases containing usernames, passwords and
other sensitive information, but many are! And much adminstrated passwords and user passwords,
a lot of emails and the such too…
To see results; just write in the (http://www.google.com/) search engine the code:
allinurl: admin mdb
==============================================
DCForum's password file. This file gives a list of (crackable) passwords, usernames and email
addresses for DCForum and for DCShop (a shopping cart program(!!!). Some lists are bigger than others, all are fun.
To see results; just write in the (http://www.google.com/) search engine the code:
allinurl:auth_user_file.txt
==============================================
This search brings up sites with "config.php" files. To skip the technical discussion,
this configuration file contains both a username and a password for an SQL database.
Most sites with forums run a PHP message base. This file gives you the keys to that forum,
including FULL ADMIN access to the database. To see view the PHP files; there in lies the catch.
Browsers are made to process the commands of PHP before display, so if no commands, nothing to show.
You can't use that persay to get into the config file, but it would show potential threats
if someone got into server anyway. (If that happens you're basically boned anyway, not much around that.
To see results; just write in the (http://www.google.com/) search engine the code:
intitle:index.of config.php
By the way, to know how to view the PHP file contents, you can use this code:
intitle:"Index of" phpinfo.php
==============================================
These files contain ColdFusion source code. In some cases, the pages are examples that are found in
discussion forums. However, in many cases these pages contain live sourcecode with usernames,
database names or passwords in plaintext.
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:cfm "cfapplication name" password
==============================================
FlashFXP offers the easiest and fastest way to transfer any file using FTP, providing an exceptionally
stable and robust program that you can always count on to get your job done quickly and efficiently.
There are many, many features available in FlashFXP.
The flashFXP.ini file is its configuration file and may contain usernames/passwords and everything
else that is needed to use FTP.
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:ini inurl:flashFXP.ini
==============================================
The encryption method used in WS_FTP is _extremely_ weak. These files can be found with the "index of"
keyword or by searching directly for the PWD= value inside the configuration file.
There is an easy way to decrypt the hash, use the decryptor at:
http://www.codebluehacks.com/Tools.php?ID=1
Or
http://www.hispasec.com/directorio/laboratorio/Software/ws_ftp.html
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:ini ws_ftp pwd
==============================================
These files contain cleartext usernames and passwords, as well as the sites associated with those credentials.
Attackers can use this information to log on to that site as that user.
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:log inurl:"password.log"
==============================================
Web Wiz Forums is a free ASP Bulletin Board software package. It uses a Microsoft Access database for storage.
The installation instructions clearly indicate to change the default path and filename (admin/database/wwForum.mdb).
vendor: http://www.webwizguide.info/web_wiz_forums/
The forum database contains the members passwords, either encrypted or in plain text, depending on the version.
Please note: this search is proof that results can stay in Google's index for a long time, even when they are not
on the site any longer. Currently only 2 out of 9 are actually still downloadable by an attacker.
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:mdb wwforum
==============================================
VNC is a remote-controlled desktop product. Depending on the configuration, remote users may not be presented with
a password. Even when presented with a password, the mere existance of VNC can be important to an attacker,
as is the open port of 5800.
To see results; just write in the (http://www.google.com/) search engine the code:
"VNC Desktop" inurl:5800
By the way, New version of VNC changed title to VNC Viewer so now you can search for…
intitle:vnc.desktop inurl:5800
==============================================
linux vpns store their usernames and passwords for CHAP authentification in a file called "chap-secrets"
where the usernames and the passwords are in cleartext.
To see results; just write in the (http://www.google.com/) search engine the code:
inurl:chap-secrets -cvs
==============================================
These lock files often contain usernames of the user that has locked the file.
Username harvesting can be done using this technique.
To see results; just write in the (http://www.google.com/) search engine the code:
"index of" / lck
==============================================
A standard FTP configuration file that provides far too many details about how the server
is setup, including installation paths, location of logfiles, generic username and associated group, etc.
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:conf inurl:proftpd.conf -sample
==============================================
This search finds registry files from the Windows Operating system. Considered the "soul" of the system,
these files, and snippets from these files contain sensitive information, in this case usernames and/or passwords.
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:reg reg HKEY_CURRENT_USER username
==============================================
Allows an attacker to create an account on a server running Argosoft mail server pro for windows
with unlimited disk quota (but a 5mb per message limit should you use your account to send mail).
To see results; just write in the (http://www.google.com/) search engine the code:
"adding new user" inurl:addnewuser -"there are no domains"
==============================================
The famous Sun linux appliance. The default page displays this text:
"Congratulations on Choosing a Cobalt RaQ - the premier server appliance platform for web hosting.
This page can easily be replaced with your own page. To replace this page, transfer
your new content to the directory /home/sites/home/web".
To see results; just write in the (http://www.google.com/) search engine the code:
(inurl:81/cgi-bin/.cobalt/)
(intext:"Welcome to the Cobalt RaQ")
==============================================
WS_FTP.LOG can be used in many ways to find more information about a server.
This query is very flexible, just substitute "+htpasswd" for "+FILENAME" and
you may get several hits that you hadn't seen with the 'normal' search.
Filenames suggested by the forum to explore are: phpinfo, admin, MySQL, password,
htdocs, root, Cisco, Oracle, IIS, resume, inc, sql, users, mdb, frontpage,
CMS, backend, https, editor, intranet . The list goes on and on..
A different approach might be "allinurl: "some.host.com" WS_FTP.LOG filetype:log"
which tells you more about who's uploading files to a specific site.
To see results; just write in the (http://www.google.com/) search engine the code:
+htpasswd +WS_FTP.LOG filetype:log
==============================================
The Web Data Administrator is a utility program implemented in ASP.NET
that enables you to easily manage your SQL Server data wherever you are.
Using its built-in features, you can do the following from Internet Explorer
or your favorite Web browser.
Create and edit databases in Microsoft SQL Server 2000 or Microsoft SQL Server
2000 Desktop Engine (MSDE) Perform ad-hoc queries against databases and save
them to your file system Export and import database schema and data.
To see results; just write in the (http://www.google.com/) search engine the code:
intitle:"Web Data Administrator - Login"
==============================================
The Aanval Intrusion Detection Console is an advanced intrusion detection monitor
and alerting system. Currently supporting modules for Snort and syslog - Aanval
provides real-time monitoring, reporting, alerting and stability. Aanval's
web-browser interface provides real-time event viewing and system/sensor management.
To see results; just write in the (http://www.google.com/) search engine the code:
intitle:"remote assessment" OpenAanval Console
ws_ftp.ini is a configuration file for a popular FTP client that stores usernames,
(weakly) encoded passwords, sites and directories that the user can store for later reference.
These should not be on the web!
That's some good stuff. Just copy/paste the text into your own WS FTP ini file
and you're good as gold (assuming you're using the same version). Don't forget -
even if they have taken the file offline, use the "cache:FULL_URL/wsftp.ini" to see the contents.
probably one of the best exploits I have seen in a long time, when I did it
there were about 20 vulnerable computers, just recently there was 4
so I hope whitehats got to this before anyone else. really nice !!
To see results; just write in the (http://www.google.com/) search engine the code:
intitle:index.of ws_ftp.ini
==============================================
Frontpage.. very nice clean search results listing !!
I magine with me that you can steal or know the password of any web site designed by
"Frontpage". But the file containing the password might be encrypted; to decrypt the
file download the program " john the ripper".
To see results; just write in the (http://www.google.com/) search engine the code:
"# -FrontPage-" inurl:service.pwd
==============================================
This searches the password for "Website Access Analyzer", a Japanese software that
creates webstatistics.
To see results; just write in the (http://www.google.com/) search engine the code:
"AutoCreate=TRUE password=*"
==============================================
This is a query to get inline passwords from search engines (not just Google),
you must type in the query followed with the the domain name without the .com or .net.
To see results; just write in the (http://www.google.com/) search engine the code:
"http://*:*@www" bangbus or "http://*:*@www"bangbus
Or
http://bob:bob@www
Or
http://admin:*@www
==============================================
This search is a cleanup of a previous entry by J0hnny. It uses "parent directory"
to avoid results other than directory listings.
WS_FTP.ini is a configuration file for a popular win32 FTP client that stores
usernames and weakly encoded passwords.
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:ini ws_ftp pwd
Or
"index of/" "ws_ftp.ini" "parent directory"
==============================================
Microsoft Frontpage extensions appear on virtually every type of scanner. In the late 90's
people thought they where hardcore by defacing sites with Frontpage. Today, there are still
vulnerable servers found with Google.
An attacker can simply take advantage from administrators who 'forget' to set up the policies
for Frontpage extensions. An attacker can also search for 'filetype:pwd users'.
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:pwd service
==============================================
Not all of these pages are administrator's access databases containing usernames, passwords and
other sensitive information, but many are! And much adminstrated passwords and user passwords,
a lot of emails and the such too…
To see results; just write in the (http://www.google.com/) search engine the code:
allinurl: admin mdb
==============================================
DCForum's password file. This file gives a list of (crackable) passwords, usernames and email
addresses for DCForum and for DCShop (a shopping cart program(!!!). Some lists are bigger than others, all are fun.
To see results; just write in the (http://www.google.com/) search engine the code:
allinurl:auth_user_file.txt
==============================================
This search brings up sites with "config.php" files. To skip the technical discussion,
this configuration file contains both a username and a password for an SQL database.
Most sites with forums run a PHP message base. This file gives you the keys to that forum,
including FULL ADMIN access to the database. To see view the PHP files; there in lies the catch.
Browsers are made to process the commands of PHP before display, so if no commands, nothing to show.
You can't use that persay to get into the config file, but it would show potential threats
if someone got into server anyway. (If that happens you're basically boned anyway, not much around that.
To see results; just write in the (http://www.google.com/) search engine the code:
intitle:index.of config.php
By the way, to know how to view the PHP file contents, you can use this code:
intitle:"Index of" phpinfo.php
==============================================
These files contain ColdFusion source code. In some cases, the pages are examples that are found in
discussion forums. However, in many cases these pages contain live sourcecode with usernames,
database names or passwords in plaintext.
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:cfm "cfapplication name" password
==============================================
FlashFXP offers the easiest and fastest way to transfer any file using FTP, providing an exceptionally
stable and robust program that you can always count on to get your job done quickly and efficiently.
There are many, many features available in FlashFXP.
The flashFXP.ini file is its configuration file and may contain usernames/passwords and everything
else that is needed to use FTP.
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:ini inurl:flashFXP.ini
==============================================
The encryption method used in WS_FTP is _extremely_ weak. These files can be found with the "index of"
keyword or by searching directly for the PWD= value inside the configuration file.
There is an easy way to decrypt the hash, use the decryptor at:
http://www.codebluehacks.com/Tools.php?ID=1
Or
http://www.hispasec.com/directorio/laboratorio/Software/ws_ftp.html
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:ini ws_ftp pwd
==============================================
These files contain cleartext usernames and passwords, as well as the sites associated with those credentials.
Attackers can use this information to log on to that site as that user.
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:log inurl:"password.log"
==============================================
Web Wiz Forums is a free ASP Bulletin Board software package. It uses a Microsoft Access database for storage.
The installation instructions clearly indicate to change the default path and filename (admin/database/wwForum.mdb).
vendor: http://www.webwizguide.info/web_wiz_forums/
The forum database contains the members passwords, either encrypted or in plain text, depending on the version.
Please note: this search is proof that results can stay in Google's index for a long time, even when they are not
on the site any longer. Currently only 2 out of 9 are actually still downloadable by an attacker.
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:mdb wwforum
==============================================
VNC is a remote-controlled desktop product. Depending on the configuration, remote users may not be presented with
a password. Even when presented with a password, the mere existance of VNC can be important to an attacker,
as is the open port of 5800.
To see results; just write in the (http://www.google.com/) search engine the code:
"VNC Desktop" inurl:5800
By the way, New version of VNC changed title to VNC Viewer so now you can search for…
intitle:vnc.desktop inurl:5800
==============================================
linux vpns store their usernames and passwords for CHAP authentification in a file called "chap-secrets"
where the usernames and the passwords are in cleartext.
To see results; just write in the (http://www.google.com/) search engine the code:
inurl:chap-secrets -cvs
==============================================
These lock files often contain usernames of the user that has locked the file.
Username harvesting can be done using this technique.
To see results; just write in the (http://www.google.com/) search engine the code:
"index of" / lck
==============================================
A standard FTP configuration file that provides far too many details about how the server
is setup, including installation paths, location of logfiles, generic username and associated group, etc.
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:conf inurl:proftpd.conf -sample
==============================================
This search finds registry files from the Windows Operating system. Considered the "soul" of the system,
these files, and snippets from these files contain sensitive information, in this case usernames and/or passwords.
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:reg reg HKEY_CURRENT_USER username
==============================================
Allows an attacker to create an account on a server running Argosoft mail server pro for windows
with unlimited disk quota (but a 5mb per message limit should you use your account to send mail).
To see results; just write in the (http://www.google.com/) search engine the code:
"adding new user" inurl:addnewuser -"there are no domains"
==============================================
The famous Sun linux appliance. The default page displays this text:
"Congratulations on Choosing a Cobalt RaQ - the premier server appliance platform for web hosting.
This page can easily be replaced with your own page. To replace this page, transfer
your new content to the directory /home/sites/home/web".
To see results; just write in the (http://www.google.com/) search engine the code:
(inurl:81/cgi-bin/.cobalt/)
(intext:"Welcome to the Cobalt RaQ")
==============================================
WS_FTP.LOG can be used in many ways to find more information about a server.
This query is very flexible, just substitute "+htpasswd" for "+FILENAME" and
you may get several hits that you hadn't seen with the 'normal' search.
Filenames suggested by the forum to explore are: phpinfo, admin, MySQL, password,
htdocs, root, Cisco, Oracle, IIS, resume, inc, sql, users, mdb, frontpage,
CMS, backend, https, editor, intranet . The list goes on and on..
A different approach might be "allinurl: "some.host.com" WS_FTP.LOG filetype:log"
which tells you more about who's uploading files to a specific site.
To see results; just write in the (http://www.google.com/) search engine the code:
+htpasswd +WS_FTP.LOG filetype:log
==============================================
The Web Data Administrator is a utility program implemented in ASP.NET
that enables you to easily manage your SQL Server data wherever you are.
Using its built-in features, you can do the following from Internet Explorer
or your favorite Web browser.
Create and edit databases in Microsoft SQL Server 2000 or Microsoft SQL Server
2000 Desktop Engine (MSDE) Perform ad-hoc queries against databases and save
them to your file system Export and import database schema and data.
To see results; just write in the (http://www.google.com/) search engine the code:
intitle:"Web Data Administrator - Login"
==============================================
The Aanval Intrusion Detection Console is an advanced intrusion detection monitor
and alerting system. Currently supporting modules for Snort and syslog - Aanval
provides real-time monitoring, reporting, alerting and stability. Aanval's
web-browser interface provides real-time event viewing and system/sensor management.
To see results; just write in the (http://www.google.com/) search engine the code:
intitle:"remote assessment" OpenAanval Console
by
blog saya kata
at
March 18, 2011
past tense:
google hack
Saturday, March 5, 2011
Let's Couple! :)
by
blog saya kata
at
March 05, 2011
past tense:
apps,
comic strip,
drawings,
iphone 4 comic,
latest comic,
let's couple,
love comic
Subscribe to:
Posts (Atom)