Hello hackers, I here with an intresting post on how to use google for malicious purposes. I have already posted a articles on Google Dorks and how to use them while hacking titled as Google Dorks:Learn How to Use Google for hacking. Here is another article for all you hungry hackers on how to use google to dig information deeper on the web which can be used for hacking and malicious stuff.
Dork Device
"Copyright (c) Tektronix, Inc." "printer status" PhaserLink printers
inurl:"printer/main.html" intext:"settings" Brother HL printers
intitle:"Dell Laser Printer" ews Dell printers with EWS technology
intext:centreware inurl:status Xerox Phaser 4500/6250/8200/8400 printers
inurl:hp/device/this.LCDispatcher HP printers
intitle:liveapplet inurl:LvAppl Canon Webview webcams
intitle:"EvoCam" inurl:"webcam.html" Evocam webcams
inurl:"ViewerFrame?Mode=" Panasonic Network Camera webcams
inurl:indexFrame.shtml Axis Axis webcams
SNC-RZ30 HOME Sony SNC-RZ30 webcams
intitle:"my webcamXP server!" inurl:":8080" Webcams accessible via WebcamXP Server
allintitle:Brains, Corp. Camera webcams accessible via mmEye
intitle:"active webcam page" USB webcams
filetype:xls inurl:"email.xls" Files and documents containing Contact Information
"not for distribution" Confidential documents
buddylist.blt AIM contacts list
intitle:index.of mystuff.xml Trillian IM contacts list
filetype:ctt "msn" MSN contacts list
intitle:"Index Of"-inurl:maillog maillog size Containing e-mail
"http://*:*@www" site passwords for site, stored as the string "http://username:password@www..."
filetype:bak inurl:"htaccess|passwd|shadow|htusers" file backups, potentially containing user names and passwords
filetype:mdb inurl:"account|users|admin|administrators|passwd|password" mdb files, potentially containing password information
intitle:"Index of" pwd.db pwd.db files, potentially containing user names and encrypted passwords
inurl:admin inurl:backup intitle:index.of directories whose names contain the words admin and backup
"Index of/" "Parent Directory" "WS _ FTP.ini"filetype:ini WS _ FTP PWD WS_FTP configuration files, potentially containing FTP server access passwords
ext:pwd inurl:(service|authors|administrators|users) "# -FrontPage-" files containing Microsoft FrontPage passwords
filetype:sql ("passwd values ****" |"password values ****" | "pass values ****" ) files containing SQL code and passwords inserted into a database
intitle:index.of trillian.ini configuration files for the Trillian IM
eggdrop filetype:user user configuration files for the Eggdrop ircbot
filetype:conf slapd.conf configuration files for OpenLDAP
inurl:"wvdial.conf" intext:"password" configuration files for WV Dial
ext:ini eudora.ini configuration files for the Eudora mail client
filetype:mdb inurl:users.mdb Microsoft Access files, potentially containing user account information
"Apache/1.3.28 Server at" intitle:index.of Apache 1.3.28
"Apache/2.0 Server at" intitle:index.of Apache 2.0
"Apache/* Server at" intitle:index.of Any version of Apache
"Microsoft-IIS/4.0 Server at" intitle:index.of Microsoft Internet Information Services 4.0
"Microsoft-IIS/5.0 Server at" intitle:index.of Microsoft Internet Information Services 5.0
"Microsoft-IIS/6.0 Server at" intitle:index.of Microsoft Internet Information Services 6.0
"Microsoft-IIS/* Server at" intitle:index.of Any version of Microsoft Internet Information Services
"Oracle HTTP Server/* Server at" intitle:index.of Any version of Oracle HTTP Server
"IBM _ HTTP _ Server/* * Server at" intitle:index.of Any version of IBM HTTP Server
"Netscape/* Server at" intitle:index.of Any version of Netscape Server
"Red Hat Secure/*" intitle:index.of Any version of the Red Hat Secure server
"HP Apache-based Web Server/*" intitle:index.of Any version of the HP server
1000s of other random Google Dorks for SQLi etc can be found Here
As I will learn more useful and intresting dorks I will keep adding them. If ou know some intresting dorks do not forget to mention them in your comment, and do not forget to mention your comment on how to felt reading this post and what you think about this blog. Keep Learning and Keep Sharing.
No comments:
Post a Comment