deepakkumarnath

Latest Google Dorks

Nov 23rd, 2017
71
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 8.33 KB | None | 0 0
  1. Latest Google Dorks
  2.  
  3. A../ FTP PASSWORD GOOGLE DORKS
  4. ws_ftp.ini configuration file search:
  5. intitle:index.of ws_ftp.ini
  6.  
  7. ws_ftp.ini configuration file with “Parent Directory” search:
  8. filetype:ini ws_ftp pwd
  9.  
  10. Variation:
  11. ”index of/” “ws_ftp.ini” “parent directory”
  12.  
  13. Variation:
  14. +htpasswd +WS_FTP.LOG filetype:log
  15.  
  16. Variation:
  17. (Substitute vulnerablesite.com with your site you want to search)
  18. ”allinurl: “Vulnerablesite.com” WS_FTP.LOG filetype:log”
  19. B.// XSS GOOGLE DORKS
  20.  
  21. 1.) cart32 executable file.
  22. allinurl:/scripts/cart32.exe
  23. 2.) Cute news php file.
  24. allinurl:/CuteNews/show_archives.php
  25. 3.) phpinfo.php file.
  26. allinurl:/phpinfo.php
  27.  
  28. C.// PHP GOOGLE DORKS
  29.  
  30. 1.) config.php file search:
  31. intitle:index.of config.php
  32. 2.) PHP file contents search:
  33. intitle:”Index of” phpinfo.php
  34. 3.) download.php directory transversal vulneralbilities:
  35. inurl:download.php?=filename
  36. 4.) upload.php search:
  37. intitle:index.of upload.php
  38. inurl:upload.php
  39.  
  40. D.// SQL PASSWORD DUMP DORKS
  41.  
  42. 1.) SQL dumps saved to database search. (Some of the more common passwords for you):
  43. a.) ”123456″ = hashed password
  44. ext:sql intext:@gmail.com intext:e10adc3949ba59abbe56e057f20f883e
  45. b.) ”654321″ = hashed password
  46. ext:sql intext:@gmail.com intext:c33367701511b4f6020ec61ded352059
  47. c.) ”password” = hashed password
  48. ext:sql intext:@gmail.com intext:5f4dcc3b5aa765d61d8327deb882cf99
  49. d.) ”12345678″ = hashed password
  50. ext:sql intext:@gmail.com intext:25d55ad283aa400af464c76d713c07ad
  51. e.) ”iloveyou” = hashed password
  52. ext:sql intext:@gmail.com intext:f25a2fc72690b780b2a14e140ef6a9e0
  53.  
  54. 2.) Variation of above search:
  55. a.) ext:sql intext:”INSERT INTO” intext:@gmail.com intext:password
  56. b.) ext:sql intext:”INSERT INTO” intext:@yahoo.com intext:password
  57. c.) ext:sql intext:”INSERT INTO” intext:@hotmail.com intext:password
  58. d.) ext:sql intext:”INSERT INTO” intext:@att.net intext:password
  59. e.) ext:sql intext:”INSERT INTO” intext:@comcast.net intext:password
  60. f.) ext:sql intext:”INSERT INTO” intext:@verizon.net intext:password
  61.  
  62. 3.) SQLi
  63. allinurl:/privmsg.php
  64.  
  65.  
  66. E.// WORDPRESS GOOGLE DORKS
  67. 1.) Asset Manager Plugin Exploit – Unprotected Remote File Upload Vuleralbility.
  68. inurl:Editor/assetmanager/assetmanager.asp
  69. 2.) Timthumb Plugin Exploit – Attacker can attach a shell to a image file and upload the shell.
  70. (It has been patched, but there are still a lot of webmasters who have NOT updated!)
  71. inurl:index.of thumb.php
  72. inurl:thumb.php
  73. 3.) Search for plugins directory:
  74. inurl:wp-content/plugins/
  75. 4.) Search for themes directory:
  76. inurl:wp-content/themes/
  77.  
  78. F.// PASSWORD FILE GOOGLE DORKS
  79. 1.) Search for Microsoft Excel data file:
  80. ”Login: *” “password =*” filetype: xls
  81. 2.) Search for auth_user_file:
  82. allinurl: auth_user_file.txt
  83. 3.) Search for username/password saved in Microsoft Excel files:
  84. filetype: xls inurl: “password.xls”
  85. 4.) Search for login pages:
  86. intitle: login password
  87. 5.) Search for “master password” page:
  88. intitle: “Index of” master.passwd
  89. 6.) Search for backup directory:
  90. index of /backup
  91. 7.) Search for password backup file index:
  92. intitle:index.of passwd.bak
  93. 8.) Search for password databases:
  94. intitle:index.of pwd.db
  95. intitle:”index of” pwd.db
  96. 9.) Search for /etc/passwd/ index:
  97. intitle:”index of .. etc” passwd
  98. 10.) Search for plaintext password file:
  99. index.of passlist.txt
  100. inurl:passlist.txt
  101. 11.) Search for hidden documents/password files:
  102. index.of.secret
  103. index.of.private
  104. 12.) Search for PhpMyAdmin files:
  105. ”# PhpMyAdmin MySQL-Dump” filetype: txt
  106. 13.) Hidden Superuser (root) data files:
  107. inurl:ipsec.secrets-history-bugs
  108. inurl:ipsec.secrets “holds shared secrets”
  109. 14.) Find the information files:
  110. inurl:ipsec.conf-intitle:manpage
  111. 15.) Search for a stored password in a database:
  112. filetype:ldb admin
  113. 16.) Search for admin.php file:
  114. inurl:search/admin.php
  115. 17.) Search for password log files:
  116. inurl:password.log filetype:log
  117. 18.) Search for Hkey_Current_User in registry files:
  118. filetype: reg HKEY_CURRENT_USER username
  119. 19.) Search for username/password file backups:
  120. ”Http://username: password @ www …” filetype: bak inurl: “htaccess | passwd | shadow | ht users”
  121. 20.) Search for username/password files:
  122. filetype:mdb inurl:”account|users|admin|administrators|passwd|password” mdb files
  123. 21.) Search for Microsoft Frontpage passwords:
  124. ext:pwd inurl:(service|authors|administrators|users) “# -FrontPage-”
  125. 22.) Search for SQL database Code and passwords:
  126. filetype: sql ( “passwd values ****” |” password values ****” | “pass values ****”)
  127. 23.) Search for e-mail account files:
  128. intitle: “Index Of”-inurl: maillog
  129.  
  130. G.// MISC. DORKS
  131. 1.) WebWiz Rich Text Editor (RTE) – Remote file upload vulneralbility:
  132. inurl:rte/my_documents/my_files
  133. 2.) EZFilemanager – Remote file upload vulneralbility:
  134. inurl:ezfilemanager/ezfilemanager.php
  135. 3.) robots.txt – See directories hidden from crawlers. Also sometimes you can pull off a directory transversal with this:
  136. inurl:robots.txt
  137. 4.) Serial Numbers – Look for software serial numbers
  138. ”software name” 94FBR
  139.  
  140. H.// FIND FREE SWAG
  141. 1.) site:*.com intitle:”Thank You For Your Order” intext:Click Here to Download
  142. 2.) site:*.net intitle:”Thank You For Your Order” intext:Click Here to Download
  143. 3.) site:*.co intitle:”Thank You For Your Order” intext:Click Here to Download
  144. 4.) site:*.org intitle:”Thank You For Your Order” intext:Click Here to Download
  145. 5.) site:*.biz intitle:”Thank You For Your Order” intext:Click Here to Download
  146. 6.) site:*.tv intitle:”Thank You For Your Order” intext:Click Here to Download
  147. 7.) site:*.co.uk intitle:”Thank You For Your Order” intext:Click Here to Download
  148. 8.) site:*.org.uk intitle:”Thank You For Your Order” intext:Click Here to Download
  149. 9.) site:*.eu intitle:”Thank You For Your Order” intext:Click Here to Download
  150. 10.) intitle:Thank you for your purchase! intext:PLR OR MRR OR Package OR Bonus
  151. 11.) intitle:Thank you for your order! intext:PLR OR MRR OR Package OR Bonus
  152. 12.) intitle:Thank you for your order! intext:PLR OR MRR
  153. 13.) intitle:Thank you for your Purchase! intext:PLR OR MRR
  154. 14.) inurl:/thankyou*.html intitle:Thank you for your order!
  155. 15.) intext:Click Here To Download
  156. 16.) inurl:thanks intext:”Thank You For Your Order!” “Click Here” filetype:html
  157. 17.) intitle:Thank You For Your Order! intext:Private Label
  158. 18.) intitle:Thank You For Your Purchased! intext:Private Label
  159. 19.) intext:”Thank You For Your Order” intext:PLR
  160. 20.) intitle:”Thank You For Your Order!” intext:download
  161. 21.) intitle:”Thank You For Your Order” intext:Click Here To Download Now
  162. 22.) intitle:Thank you for your purchase! intext:Click Here to Download
  163. 23.) * thank you for your order download
  164. 24.) * intitle:Thank you for your Purchase! intext:PLR OR MRR OR Package OR Bonus
  165. 25.) * intitle:Thank you for your order! intext:PLR OR MRR
  166. 26.) * intitle:Thank You For Your Purchase! intext:Click Here to Download
  167. 27.) * intitle:Thank You For Your Order! intext:download
  168. 28.) inurl:index.of .mp3
  169. 29.) inurl:index.of .mov
  170. 30.) inurl:index.of .iso
  171. 31.) ?intitle:index.of? mp3
  172. 32.) ?intitle:index.of? mov
  173. 33.) ?intitle:index.of? iso
  174. 34.) inurl:”insert filetype”:iso+OR+exe+OR+zip+OR+rar+OR+gzip+OR+tar
  175. 35.) intext:”parent directory” intext:”[EXE]“
  176. 36.) intext:”parent directory” index of:”[EXE]“
  177. 37.) intext:”parent directory” index of:”[RAR]“
  178. 38.) intext:”parent directory” intext:”[VID]“
  179. 39.) intext:”parent directory” index of:”[VID]“
  180. 40.) intext:”parent directory” intext:”[MP3]“
  181. 41.) intext:”parent directory” index of:”[MP3]“
  182. 42.) intext:”parent directory” index of:”[Gamez]“
  183.  
  184.  
  185. I.// WEBCAM GOOGLE DORKS
  186. 1.) inurl:/view.index.shtml
  187. 2.) inurl:/view.shtml
  188. 3.) intitle:”Live View / – AXIS” | inurl:view/view.shtml^
  189. 4.) inurl:ViewerFrame?Mode=
  190. 5.) inurl:ViewerFrame?Mode=Refresh
  191.  
  192. Enjoy.//
  193. Regards
  194. Deepak Kumar Nath
Add Comment
Please, Sign In to add comment