Docstoc

google_hacking

Document Sample
google_hacking Powered By Docstoc
					Google Hacking




These methods will be easily understood by the Hackers

Any help for the Novice Hackers Please drop in your Comments : Vikas



u can also drop in ur E - Mail Id's to be mailed a detailed Presentation on
Google HACKING



Click Here to Drop Comments, Requests n Suggestions




Using Google, and some finely crafted searches we can find a lot of interesting
information.
For Example we can find:


Credit Card Numbers


Passwords


Software / MP3's



...... (and on and on and on) Presented below is just a sample of interesting searches
that we can send to google to obtain info that some people might not want us
having.. After you get a taste using some of these, try your own crafted searches to
find info that you would be interested in.


Try a few of these searches:
More searches which Mother Nature never intended! Most of these are handy for finding
security exploits on your own site; simply add a string from your own domain’s URL to
check. But really, why limit ourselves? If it has an evil purpose, I’m including it. By the
way, there is nothing illegal about typing in a search string; it is up to the website to
secure this data. It’s what you DO with this information that you find which makes all of
the difference. signin filetype:url - OK, class, this is how we do NOT use Javascript to
manage our passwords. Any questions?




“index of /” ( upload.cfm | upload.asp | upload.php | upload.cgi | upload.jsp |
upload.pl ) - A great way to find file upload pages on websites. Most of these will be
password protected; every now and then you find one that isn’t! Like this German
Spanish site…                                                                       I guess
some civic-minded folk want to provide you with free file storage…
(intitle:”WordPress › Setup Configuration File”)|(inurl:”setup-config.php?step=1″)
- WordPress has become one of the leading blog systems out there. So you should be
aware that if you run WordPress, there are black-hat hackers out there working around
the clock to find a vulnerability on your site. Some of the hits returned from this search
will be people who never configured it after they installed it, so it’s waiting for anyone to
find it and take over. Now that we’re done plowing through all of the boring security
research stuff, here’s a couple of cute tricks. In these last two cases, these may not be
security violations at all; they might be intentionally giving the stuff away and the worst
you’re doing is bypassing an ad or two. DSC00001.JPG - This was in a lot of bookmark
sites lately. What you do is search Google images for this string… and if nobody else is
looking, turn “safe search” off! What this is is the default naming scheme for image files
taken on Sony digital cameras. People post the picture without renaming it. And don’t
forget DSC00002.JPG, DSC00003.JPG, and so on. Judging by my browsing so far, the
first thing most people photograph is their girlfriend. intitle:”index of” ”last modified”
”parent directory” (wmv|mp3) - At last the one everybody was waiting for: finding free
media! Now, this example gives you directories with movie files in either MWV
(Windows Media Viewer) or MP3. To find files on a particular subject, just enter the
name of that subject. I’ll not speculate on what kind of movies you might be looking for -
but I’m sure you’ll think of something! To change that to some other media file, you can
try replacing wmv with jpg for images, wav for sounds, etc. The trouble is, this hack is so
old that a number of adult porn sites have deliberately set up their web pages to mimic
this result, where, of course, you end up with a pop-up demanding credit card data or
getting link-jacked to a malware site. Have fun, and remember that I gave you all this
handy info in the good faith that you’ll only use it responsibly.


intitle:"Index of" passwords modified
allinurl:auth_user_file.txt
"access denied for user" "using password"
"A syntax error has occurred" filetype:ihtml
allinurl: admin mdb
"ORA-00921: unexpected end of SQL command"
inurl:passlist.txt
"Index of /backup"
"Chatologica MetaSearch" "stack tracking:"



Amex Numbers: 300000000000000..399999999999999
MC Numbers: 5178000000000000..5178999999999999

visa 4356000000000000..4356999999999999

"parent directory " /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
"parent directory " DVDRip -xxx -html -htm -php -shtml -opendivx -md5 -
md5sums
"parent directory "Xvid -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
"parent directory " Gamez -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
"parent directory "MP3-xxx -html -htm -php -shtml -opendivx -md5 -md5sums
"parent directory " Name of Singer or album -xxx -html -htm -php -shtml -
opendivx -md5 -md5sums
Notice that I am only changing the word after the parent directory, change it to
what you want and you will get a lot of stuff.




METHOD 2


put this string in google search:

?intitle:index.of? mp3

You only need add the name of the song/artist/singer.

Example: ?intitle:index.of? mp3 jackson




METHOD 3
put this string in google search:

inurl:microsoft filetype:iso

You can change the string to watever you want, ex. microsoft to adobe, iso to zip
etc…

"# -FrontPage-" inurl:service.pwd

Frontpage passwords.. very nice clean search results listing !!
"AutoCreate=TRUE password=*"
This searches the password for "Website Access Analyzer"
, a Japanese software that creates webstatistics. For those who can read Japanese,
check out the author's site at: http://www.coara.or.jp/~passy/
"http://*:*@www" domainname
This is a query to get inline passwords from search engines (not just Google), you
must type in the query followed with the the domain name without the .com or .net
"http://*:*@www" bangbus or "http://*:*@www"bangbus
Another way is by just typing
"http://bob:bob@www"
"sets mode: +k"



This search reveals channel keys (passwords) on IRC as revealed from IRC chat
logs.


allinurl: admin mdb

Not all of these pages are administrator's access databases containing usernames,
passwords and other sensitive information, but many are!
allinurl:auth_user_file.txt

DCForum's password file. This file gives a list of (crackable) passwords, usernames
and email addresses for DCForum and for DCShop (a shopping cart program(!!!).
Some lists are bigger than others, all are fun, and all belong to googledorks. =)


intitle:"Index of" config.php
This search brings up sites with "config.php" files. To skip the technical discussion,
this configuration file contains both a username and a password for an SQL
database. Most sites with forums run a PHP message base. This file gives you the
keys to that forum, including FULL ADMIN access to the database.
eggdrop filetype:user user



These are eggdrop config files. Avoiding a full-blown descussion about eggdrops and
IRC bots, suffice it to say that this file contains usernames and passwords for IRC
users.

intitle:index.of.etc



This search gets you access to the etc directory, where many many many types of
password files can be found. This link is not as reliable, but crawling etc directories
can be really fun!


filetype:bak inurl:"htaccess|passwd|shadow|htusers"



This will search for backup files (*.bak) created by some editors or even by the
administrator himself (before activating a new version).

Every attacker knows that changing the extenstion of a file on a webserver can have
ugly consequences.

Let's pretend you need a serial number for windows xp pro.

In the google search bar type in just like this - "Windows XP Professional" 94FBR

the key is the 94FBR code.. it was included with many MS Office registration codes
so this will help you dramatically reduce the amount of 'fake' porn sites that trick
you.
or if you want to

find the serial for winzip 8.1 - "Winzip 8.1"

				
DOCUMENT INFO
Shared By:
Categories:
Tags:
Stats:
views:7
posted:9/23/2011
language:English
pages:6