Advertisement
Googleinurl

[INFO]=> Menu SCANNER INURLBR - en

Aug 3rd, 2014
1,826
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.49 KB | None | 0 0
  1. _ _ ______ _ _____
  2. | | | | ____| | | __ \
  3. | |__| | |__ | | | |__) |
  4. | __ | __| | | | ___/
  5. | | | | |____| |____| |
  6. |_| |_|______|______|_|
  7. ----------------------------------------------------------------------------------------------------------------------------------
  8. -h
  9. --help Alternative long length help command.
  10. --ajuda Command to specify Help.
  11. -q Choose which search engine you want through [1...13]:
  12. [options]:
  13. 1 - www.google.com.br
  14. 2 - www.bing.com
  15. 3 - br.search.yahoo.com
  16. 4 - www.ask.com
  17. 5 - search.hao123.com.br
  18. 6 - ajax.googleapis.com
  19. 7 - search.lycos.com
  20. 8 - busca.uol.com.br
  21. 9 - us.yhs4.search.yahoo.com
  22. 10 - pesquisa.sapo.pt
  23. 11 - www.dmoz.org
  24. 12 - www.gigablast.com
  25. 13 - web.search.naver.com
  26. all - All search engines
  27. Default: 1
  28. Example: -q {op}
  29. Usage: -q 1
  30. -q 5
  31. Using more than one engine: -q 1,2,5,6,11
  32. Using all engines: -q all
  33.  
  34. -p Choose which proxy you want to use through the search engine:
  35. Example: -p {proxy:port}
  36. Usage: -p localhost:8118
  37. -p socks5://googleinurl@localhost:9050
  38. -p http://admin:12334@172.16.0.90:8080
  39.  
  40. --tor-random Enables the TOR function, each usage links an unique IP.
  41.  
  42. -t Choose the validation type: op 1, 2, 3
  43. [options]:
  44. 1 - The first type uses default errors considering the script:
  45. It establishes connection with the exploit through the get method.
  46. demonstrativo: www.alvo.com.br/pasta/index.php?id={exploit}
  47.  
  48. 2 - The second type tries to valid the error defined by: -a='ALGO_DENTRO_ALVO'
  49. It also establishes connection with the exploit through the get method
  50. demonstrativo: www.alvo.com.br/pasta/index.php?id={exploit}
  51.  
  52. 3 - The third type combine both first and second types:
  53. Then, of course, it also establishes connection with the exploit through the get method
  54. Demo: www.alvo.com.br{exploit}
  55. Default: 1
  56. Example: -t {op}
  57. Usage: -t 1
  58.  
  59. DEFAULT ERRORS:
  60. CMS WORDPRESS, JDBC ERROR, MYSQL ERROR, MICROSOFT ERROR, ORACLE ERROR, POSTGRESQL ERROR,
  61. ZEND FRAMEWORK ERROR, PHP ERROR, ASP ERROR, LUA ERROR, INDEFINITE ERROR
  62.  
  63. --dork Defines which dork the search engine will use.
  64. Example: --dork {dork}
  65. Usage: --dork 'site:.gov.br inurl:php? id'
  66. - Using multiples dorks:
  67. Example: --dork {[DORK]dork1[DORK]dork2[DORK]dork3}
  68. Usage: --dork '[DORK]site:br[DORK]site:ar inurl:php[DORK]site:il inurl:asp'
  69.  
  70. --exploit-get Defines which exploit will be injected through the GET method to each URL found.
  71. Example: --exploit-get {exploit_get}
  72. Usage: --exploit-get '?´0x27;'
  73.  
  74. --exploit-post Defines which exploit will be injected through the POST method to each URL found.
  75. Example: --exploit-post {exploit_post}
  76. Usage: --exploit-post 'field1=valor1&field2=valor2&field3=?´0x273exploit;&botao=ok'
  77.  
  78. --exploit-comand Defines which exploit/parameter will be executed in the options: --comand-vul/--comand-all.
  79. The exploit-comand will be identified by the paramaters: --comand-vul/--comand-all como _EXPLOIT_
  80. Ex --exploit-comand '/admin/config.conf' --comand-all 'curl -v _TARGET__EXPLOIT_'
  81. _TARGET_ is the specified URL/TARGET obtained by the process
  82. _EXPLOIT_ is the exploit/parameter defined by the option --exploit-comand.
  83. Example: --exploit-comand {exploit-comand}
  84. Usage: --exploit-comand '/admin/config.conf'
  85.  
  86. -a Specify the string that will be used on the search script:
  87. Example: -a {string}
  88. Usage: -a '<title>hello world</title>'
  89.  
  90. -d Specify the script usage op 1, 2, 3, 4, 5, 6.
  91. Example: -d {op}
  92. Usage: -d 1 /URL of the search engine.
  93. -d 2 /Show all the url.
  94. -d 3 /Detailed request of every URL.
  95. -d 4 /Shows the HTML of every URL.
  96. -d 5 /Detailed request of all URLs.
  97.  
  98. -s Specify the output file where it will be saved the vulnerable URLs.
  99.  
  100. Example: -s {file}
  101. Usage: -s your_file.txt
  102.  
  103. -o Manually manage the vulnerable URLs you want to use from a file, without using a search engine.
  104. Example: -o {file_where_my_urls_are}
  105. Usage: -o tests.txt
  106.  
  107. -m Enable the search for emails on the urls specified.
  108.  
  109.  
  110. -u Enables the search for URL lists on the url specified.
  111.  
  112. --comand-vul Every vulnerable URL found will execute this command parameters.
  113. Example: --comand-vul {command}
  114. Usage: --comand-vul 'nmap sV -p 22,80,21 _TARGET_'
  115. --comand-vul './exploit.sh _TARGET_ output.txt'
  116.  
  117. --comand-all Use this commmand to specify a single command to EVERY URL found.
  118. Example: --comand-all {command}
  119. Usage: --comand-all 'nmap sV -p 22,80,21 _TARGET_'
  120. --comand-all './exploit.sh _TARGET_ output.txt'
  121.  
  122. Observation:
  123.  
  124. _TARGET_ will be replaced by the URL/target found, although if the user
  125. doesn't input the get, only the domain will be executed.
  126.  
  127. _TARGETFULL_ will be replaced by the original URL / target found.
  128.  
  129. _EXPLOIT_ will be replaced by the specified command argument --exploit-comand.
  130. The exploit-comand will be identified by the parameters --comand-vul / --comand-all as _EXPLOIT_
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement