martes, 12 de julio de 2011

Google Dorks

Saludos Mundo libre.


intext:saved from url
To be precise,
intext:saved from url= (0010)
intext:saved from url= (0012)
filetype:dbx
filetype:pst
filetype:ctt "msn"
inurl:indexFrame.shtml Axis
intitle:phpmyadmin inurl:server_processlist.php
admin backup filetype:sql -trunk -trac -forum
filetype:ste
inurl:"com_hashcash"
inurl:"/_vti_log/"
inurl:"/_private/"
inurl:"/_vti_log/"
Filetype: inc dbconn
Filetype: inc intext: mysql_connect
allinurl: admin mdb
ext:passwd -intext:the -sample -example
"parent directory" +proftpdpasswd
server-dbs "intitle:index of"
filetype:swf inurl:login OR inurl:secure OR inurl:admin
intitle:”EvoCam” inurl:”webcam.html”
intitle:”Live View / – AXIS” | inurl:view/view.shtml^
allintext:”Safe-mode: OFF (not secure)”
"Welcome to phpMyAdmin" AND " Create new database"
allinurl:postscript.php?p_mode=
inurl:index.php?pg=
filetype:pdf file c (htm OR html OR mhtml) site:gov.pk
filetype:inc mysql_connect("localhost","root"
inurl:servlet/com (REF: Apache Tomcat InvokerServlet)
inurl:servlet/mil
inurl:servlet/net
inurl:servlet/com +admin
"index of" "My RoboForm Data"
inurl:phpldapadmin/cmd.php? (REF: http://www.securityfocus.com/bid/37327/exploit)
inurl:/phpmyadmin/scripts/setup.php
/components/com_galleria/galleria.html.php
allinurl:/com_galleria/
inurl:com_galleria
index.php?option=com_galleria
allinurl:com_galleria
com_galleria
allinurl:monatsblatt.php (REF: http://www.securityfocus.com/bid/37327/exploit)
allinurl:datumscalc.php
allinurl:/frontend/x3/files/ (REF: http://www.exploit-db.com/exploits/10519)
allinurl:/chat.ghp?username (REF: http://www.exploit-db.com/exploits/11179)
allinurl:/plugins/editors/tinymce/jscripts/tiny_mce/plugins/tinybrowser/ (REF: http://www.exploit-db.com/exploits/11263)
allinurl:/libraries/joomla/client/ldap.php (REF: http://www.exploit-db.com/exploits/11262)
inurl:passlist.txt
inurl:ViewerFrame?Mode=
inurl:ViewerFrame?Mode=Refresh
inurl:axis-cgi/jpg
inurl:axis-cgi/mjpg
inurl:view/indexFrame.shtml
inurl:view/index.shtml
inurl:view/view.shtml
intitle:”live view” intitle:axis
intitle:liveapplet
allintitle:”Network Camera NetworkCamera”
intitle:axis intitle:”video server”
intitle:liveapplet inurl:LvAppl
intitle:”EvoCam” inurl:”webcam.html”
intitle:”Live NetSnap Cam-Server feed”
intitle:”Live View / – AXIS”
intitle:”Live View / – AXIS 206M”
intitle:”Live View / – AXIS 206W”
intitle:”Live View / – AXIS 210?
inurl:indexFrame.shtml Axis
inurl:”MultiCameraFrame?Mode=Motion”
intitle:start inurl:cgistart
intitle:”WJ-NT104 Main Page”
intext:”MOBOTIX M1? intext:”Open Menu”
intext:”MOBOTIX M10? intext:”Open Menu”
intext:”MOBOTIX D10? intext:”Open Menu”
intitle:snc-z20 inurl:home/
intitle:snc-cs3 inurl:home/
intitle:snc-rz30 inurl:home/
intitle:”sony network camera snc-p1?
intitle:”sony network camera snc-m1?
intitle:”Toshiba Network Camera” user login
intitle:”netcam live image”
intitle:”i-Catcher Console – Web Monitor”
inurl:/view/index.shtml
inurl:viewerframe?mode=
inurl:/view:shtml
inurl:view/indexframe.shtml
inurl:lvappl live webcams
inurl:"viewerframe?mode=motion"
intitle:"snc-rz30 home"
intitle:"WJ-NT104 Main"
inurl:LvAppl
intitle:liveapplet
intitle:"Live View / - AXIS"
inurl:indexFrame.shtml "Axis Video Server"
allinurl:/level/15/exec
inurl:"f?p=" inurl:pls/htmldb
allinurl:WS_FTP.LOG
allinurl=profil.php?id=
inurl:com_jbudgetsmagic (Joomla)
inurl:com_surveymanager
inurl:index.php?option=com_joomlaconnect_be
inurl:"com_joaktree"
allinurl:wp-content/plugins/wp-wall/
allinurl:gitweb.cgi (REF: http://www.exploit-db.com/exploits/11497)
allinurl:search.php?search_type vbulletin (REF: http://inj3ct0r.com/exploits/9697)
Index of / wp-content/plugins/nextgen-gallery/ (REF: http://www.exploit-db.com/exploits/12098)
wordpress inurl:"/?event_id=" (REF: http://www.exploit-db.com/exploits/11302)
site:pastebin.com "-----BEGIN RSA PRIVATE KEY-----"
allinurl:/_layouts/help.aspx (REF: http://www.exploit-db.com/exploits/12450)
allinurl:/owa/(REF: http://www.exploit-db.com/exploits/12728)
inurl:"axis2/services" "list Services" (REF: http://www.exploit-db.com/exploits/12721)
site:cloudshark.org captures
inurl:/scripts/wgate
inurl:"https" outlook web access
intitle:"CRiMEPACK v2"
intitle:"CRiMEPACK v3.0"
intitle:"CRiMEPACK v3.0-delta"
intitle:login "User name:" "Remember (MD5 cookies)"
inurl:"_reports" bot_id
Auth! user: intitle:"Yes 3.0"
intitle:"Rx08.ii36B.Rv"
filetype:swf inurl:admin inurl:login
webserverx index
"C:Documents and Settings" confidential
inurl:com_ezautos
inurl:com_timetrack
inurl:com_restaurantguide
ext:sql ccnumber 'phpmyadmin sql dump'
inurl:"tinybrowser.php?"
inurl:imageview5
"powered by Quick.Cart"
filetype:mobileconfig sharedsecret
inurl:"/plugins/ImageManager/manager.php"
site:facebook.com inurl:"track.php?" inurl:"r="
inurl:/jmx-console/HtmlAdaptor?
intitle:"mBean Inspector" intext:JMX MBean View
BEGIN PGP PRIVATE KEY BLOCK filetype:asc
"php fatal error" inurl:wp-content -error_log -php_errorlog
inurl:uploads/backupbuddy_backups/


Saludos Mundo Libre.

No hay comentarios:

Publicar un comentario