Google Hacking allintitle:Brains, Corp. camera allintitle:"index of/admin" allintitle:"index of/root" allintitle:restricted filetype:doc site:gov allintitle:restricted filetype :mail allintitle:sensitive filetype:doc allinurl:/bash_history allinurl:winnt/system32/ (get cmd.exe) ext:ini eudora.ini ext:pwd inurl:(service|authors|administrators |users) "# -FrontPage-" filetype:bak inurl:"htaccess|passwd|shadow|htusers" filetype:conf slapd.conf filetype:ctt "msn" filetype:mdb inurl:"account|users|admin|administrators|passwd|password" filetype:mdb inurl:users.mdb filetype:QDF QDF filetype:pdf "Host Vulnerability Summary Report" "Assessment Report" filetype:sql ("passwd values ****" | "password values ****" | "pass values ****" ) filetype:xls inurl:"email.xls" filetype:user eggdrop user "Index of /admin" "Index of /" +.htaccess "Index of /mail" "Index of /" "Parent Directory" "WS_FTP.ini" filetype:ini "Index of /" +passwd "Index of /password" "Index of /" +password.txt intext:"BiTBOARD v2.0" "BiTSHiFTERS Bulletin Board" intext:centreware inurl:status intext:"MOBOTIX M1" intext:"MOBOTIX M10" intext:"Open Menu" intext:"powered by Web Wiz Journal" intext:"Tobias Oetiker" "traffic analysis" intitle:index.of "Apache/1.3.28 Server at" intitle:index.of "Apache/2.0 Server at" intitle:index.of "Apache/* Server at" intitle:index.of "HP Apache-based Web Server/*" intitle:index.of "IBM _ HTTP _ Server/* * Server at" intitle:index.of "Microsoft-IIS/4.0 Server at" intitle:index.of "Microsoft-IIS/5.0 Server at" intitle:index.of "Microsoft-IIS/6.0 Server at" intitle:index.of "Microsoft-IIS/* Server at" intitle:index.of "Netscape/* Server at" intitle:index.of "Oracle HTTP Server/* Server at" intitle:index.of "Red Hat Secure/*" intitle:"Apache::Status" (inurl:server-status | inurl:status.html | inurl:apache.html) intitle:"Welcome to IIS 4.0!" intitle:"Welcome to Windows 2000 Internet Services" intitle:"Welcome to Windows XP Server Internet Services" intitle:"Welcome to Your New Home Page!" intitle:"Test Page for Apache Installation" "It worked!" "this Web site!" intitle:"Test Page for Apache Installation" "Seeing this instead" intitle:"Test Page for Apache Installation" "You are free" intitle:"Test Page for the Apache Http Server on Fedora Core" intitle:"Test Page for the Apache Web Server on RedHat Linux" intitle:"Test Page for the SSL/TLS-aware Apache Installation" "Hey, it worked!" intitle:"index of" .bash_history intitle:"index of" etc/shadow intitle:"index.of" finances.xls intitle:"index of" htpasswd intitle:"Index Of" inurl:maillog intitle:"index of" master.passwd intitle:"index of" members OR accounts intitle:"index.of" mystuff.xml intitle:"index of" passwd intitle:"index of" people.lst intitle:"index of" pwd.db intitle:"Index of" pwd.db intitle:"Index of" .sh_history intitle:"index of" spwd intitle:"index.of" trillian.ini intitle:"index of" user_carts OR user_cart intitle:"active webcam page" intitle:"ASP Stats Generator *.*" "ASP Stats Generator" "2003-2004 weppos" intitle:"curriculum vitae" "phone * * *" "address *" intitle:"Dell Laser Printer" ews intitle:"EvoCam" inurl:"webcam.html" intitle:liveapplet inurl:LvAppl intitle:"Multimon UPS status page" intitle:"my webcamXP server!" inurl:":8080" intitle:"statistics of" "advanced web statistics" intitle:"System Statistics" +"System and Network Information Center" intitle:"Terminal Services Web Connection" intitle:"Usage Statistics for" "Generated by Webalizer" intitle:"VNC Desktop" inurl:5800 intitle:"Web Server Statistics for ****" inurl:admin filetype:db inurl:admin inurl:backup intitle:index.of inurl:"auth_user_file.txt" inurl:"/axs/ax-admin.pl" -script inurl:"/cricket/grapher.cgi" inurl:hp/device/this.LCDispatcher inurl:iisadmin inurl:indexFrame.shtml Axis inurl:"main.php" "phpMyAdmin" "running on" inurl:passwd filetype:txt inurl:"printer/main.html" intext:"settings" inurl:server-info "Apache Server Information" inurl:"ViewerFrame?Mode=" inurl:"wvdial.conf" intext:"password" inurl:"wwwroot/*." site:gov confidential site:mil confidential site:mil "top secret" "Copyright (c) Tektronix, Inc." "printer status" "Host Vulnerability Summary Report" "http://*:*@www" "Network Vulnerability Assessment Report" "not for distribution" "Output produced by SysWatch *" "These statistics were produced by getstats" "This file was generated by Nessus" "This report was generated by WebLog" "This summary was generated by wwwstat" "Generated by phpSystem" "Host Vulnerability Summary Report" "my webcamXP server!" sample/LvAppl/ "TOSHIBA Network Camera - User Login" /home/homeJ.html /ViewerFrame?Mode=Motion This reveals mySQL database dumps. These database dumps list the structure and content of databases, which can reveal many different types of sensitive information. http://www.google.com/search?hl=en&lr=&ie=UTF-8&oe=UTF-8&q=%22%23mysql+dump%22+filetype%3Asql&btnG=Search These log files record info about the SSH client PUTTY. These files contain usernames, site names, IP addresses, ports and various other information about the SSH server connected to. http://www.google.com/search?hl=en&lr=&ie=UTF-8&q=filetype%3Alog+username+putty These files contain cleartext usernames and passwords, as well as the sites associated with those credentials. Attackers can use this information to log on to that site as that user. http://www.google.com/search?hl=en&lr=&ie=UTF-8&q=filetype%3Alog+inurl%3A%22password.log%22 This file contains port number, version number and path info to MySQL server. http://www.google.com/search?hl=en&lr=&ie=UTF-8&q=intitle%3A%22index+of%22+mysql.conf+OR+mysql_config This search reveals sites which may be using Shockwave (Flash) as a login mechanism for a site. The usernames and passwords for this type of login mechanism are often stored in plaintext inside the source of the .swl file. http://www.google.com/search?hl=en&lr=&q=inurl%3Alogin+filetype%3Aswf+swf These are oulook express email files which contain emails, with full headers. The information in these emails can be useful for information gathering about a target. http://www.google.com/search?hl=en&lr=&q=filetype%3Aeml+eml+%2Bintext%3A%22Subject%22+%2Bintext%3A%22From%22+%2Bintext%3A%22To%22 This google search reveals users names, pop3 passwords, email addresses, servers connected to and more. The IP addresses of the users can also be revealed in some cases. http://www.google.com/search?num=100&hl=en&lr=&q=filetype%3Areg+reg+%2Bintext%3A%22internet+account+manager Footprinting Websites and Information Gathering Resources A hacker or pen tester may also do a Google search or a site search to locate information about employees. Some sites useful to find more information about an organization and its employees include: www.trula.com - real estate www.zillow.com - real estate www.netronline.com - real estate www.whosarat.com - informants www.zabaseach.com - name, address, location info www.zoominfo.com - person & company data www.vitalrec.com - people info www.pipl.com - people search www.skipease.com/blog/ - people search www.pretrieve.com - people search www.publicdata.com - people search www.urapi.com - people search https://addons.mozilla.org/en-US/firefox/addon/1912 (who is this person) www.nndb.com – people activity tracker www.willyancey.com/finding.htm online info www.courthousedirect.com - property records www.turboscout.com - multisearch engine tool www.theultimates.com - phone number lookup http://skipease.whitepages.com/reverse_address - address lookup www.thevault.com - company search / profile www.blogsearchengine.com - search blogs for info or person www.ccrs.info - China based company search /profile www.hoovers.com - company search / profile www.lexisnexis.com - company search / profile www.topix.net - region specific news articles www.pacer.uscourts.gov/natsuit.html - Court records www.oihweb.com - online investigation techniques www.linkedin.com - business person's network Footprinting Links Google Hacking Database A search that finds password hashes Nessus Reports from Google More Passwords from Google Google Hacks Volume III by Halla G-Zapper Blocks the Google Cookie to Search Anonymously SiteDigger 2.0 searches Google’s cache to look for vulnerabilities BeTheBot - View Pages as the Googlebot Sees Them An experts-exchange page to demonstrate the Googlebot HTTP Header Viewer Masquerading Your Browser User Agent Switcher :: Firefox Add-ons Modify Headers :: Firefox Add-ons User Agent Sniffer for Project 1 GNU Wget - Tool to Mirror Websites Teleport Pro - Tool to Mirror Websites Google Earth Finding Subdomains (Zone Transfers) Dakota Judge rules that Zone Transfers are Hacking Internet Archive - Wayback Machine Wikto - Web Server Assessment Tool - With Google Hacking VeriSign Whois Search from VeriSign, Inc. whois.com ARIN: WHOIS Database Search Border Gateway Protocol (BGP) and AS Numbers Internic | Whois - the only one that finds hackthissite.org Teenager admits eBay domain hijack NeoTrace VisualRoute traceroute: connection test, trace IP address, IP trace, IP address locations