Advertisement
Guest User

Untitled

a guest
May 16th, 2018
596
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 8.11 KB | None | 0 0
  1. Just for some skids, which dont understanding how google-dorks work.
  2.  
  3. A.) FTP PASSWORD GOOGLE DORKS
  4. B.) XSS GOOGLE DORKS
  5. C.) PHP GOOGLE DORKS
  6. D.) SQL DORKS
  7. E.) WORDPRESS DORKS
  8. F.) PASSWORD FILE DORKS
  9. G.) MISC. DORKS
  10. H.) FREE SWAG DORKS
  11. I.) WEBCAM DORKS
  12. A.) FTP PASSWORD GOOGLE DORKS
  13. 1.) ws_ftp.ini configuration file search:
  14. intitle:index.of ws_ftp.ini
  15. 2.) ws_ftp.ini configuration file with “Parent Directory” search:
  16. filetype:ini ws_ftp pwd
  17. 3.) Variation:
  18. ”index of/” “ws_ftp.ini” “parent directory”
  19. 4.) Variation:
  20. +htpasswd +WS_FTP.LOG filetype:log
  21. 5.) Variation:
  22. (Substitute vulnerablesite.com with your site you want to search)
  23. ”allinurl: “Vulnerablesite.com” WS_FTP.LOG filetype:log”
  24. B.) XSS GOOGLE DORKS
  25. 1.) cart32 executable file.
  26. allinurl:/scripts/cart32.exe
  27. 2.) Cute news php file.
  28. allinurl:/CuteNews/show_archives.php
  29. 3.) phpinfo.php file.
  30. allinurl:/phpinfo.php
  31. C.) PHP GOOGLE DORKS
  32. 1.) config.php file search:
  33. intitle:index.of config.php
  34. 2.) PHP file contents search:
  35. intitle:”Index of” phpinfo.php
  36. 3.) download.php directory transversal vulneralbilities:
  37. inurl:download.php?=filename
  38. 4.) upload.php search:
  39. intitle:index.of upload.php
  40. inurl:upload.php
  41. D.) SQL PASSWORD DUMP DORKS
  42. 1.) SQL dumps saved to database search. (Some of the more common passwords for you):
  43. a.) ”123456″ = hashed password
  44. ext:sql intext:@gmail.com intext:e10adc3949ba59abbe56e057f20f883e
  45. b.) ”654321″ = hashed password
  46. ext:sql intext:@gmail.com intext:c33367701511b4f6020ec61ded352059
  47. c.) ”password” = hashed password
  48. ext:sql intext:@gmail.com intext:5f4dcc3b5aa765d61d8327deb882cf99
  49. d.) ”12345678″ = hashed password
  50. ext:sql intext:@gmail.com intext:25d55ad283aa400af464c76d713c07ad
  51. e.) ”iloveyou” = hashed password
  52. ext:sql intext:@gmail.com intext:f25a2fc72690b780b2a14e140ef6a9e0
  53. 2.) Variation of above search:
  54. a.) ext:sql intext:”INSERT INTO” intext:@gmail.com intext:password
  55. b.) ext:sql intext:”INSERT INTO” intext:@yahoo.com intext:password
  56. c.) ext:sql intext:”INSERT INTO” intext:@hotmail.com intext:password
  57. d.) ext:sql intext:”INSERT INTO” intext:@att.net intext:password
  58. e.) ext:sql intext:”INSERT INTO” intext:@comcast.net intext:password
  59. f.) ext:sql intext:”INSERT INTO” intext:@verizon.net intext:password
  60. 3.) SQLi
  61. allinurl:/privmsg.php
  62.  
  63.  
  64. E.) WORDPRESS GOOGLE DORKS
  65. 1.) Asset Manager Plugin Exploit – Unprotected Remote File Upload Vuleralbility.
  66. inurl:Editor/assetmanager/assetmanager.asp
  67. 2.) Timthumb Plugin Exploit – Attacker can attach a shell to a image file and upload the shell. (It has been patched, but there are still a lot of webmasters who have NOT updated!)
  68. inurl:index.of thumb.php
  69. inurl:thumb.php
  70. 3.) Search for plugins directory:
  71. inurl:wp-content/plugins/
  72. 4.) Search for themes directory:
  73. inurl:wp-content/themes/
  74.  
  75.  
  76. F.) PASSWORD FILE GOOGLE DORKS
  77. 1.) Search for Microsoft Excel data file:
  78. ”Login: *” “password =*” filetype: xls
  79. 2.) Search for auth_user_file:
  80. allinurl: auth_user_file.txt
  81. 3.) Search for username/password saved in Microsoft Excel files:
  82. filetype: xls inurl: “password.xls”
  83. 4.) Search for login pages:
  84. intitle: login password
  85. 5.) Search for “master password” page:
  86. intitle: “Index of” master.passwd
  87. 6.) Search for backup directory:
  88. index of /backup
  89. 7.) Search for password backup file index:
  90. intitle:index.of passwd.bak
  91. 8.) Search for password databases:
  92. intitle:index.of pwd.db
  93. intitle:”index of” pwd.db
  94. 9.) Search for /etc/passwd/ index:
  95. intitle:”index of .. etc” passwd
  96. 10.) Search for plaintext password file:
  97. index.of passlist.txt
  98. inurl:passlist.txt
  99. 11.) Search for hidden documents/password files:
  100. index.of.secret
  101. index.of.private
  102. 12.) Search for PhpMyAdmin files:
  103. ”# PhpMyAdmin MySQL-Dump” filetype: txt
  104. 13.) Hidden Superuser (root) data files:
  105. inurl:ipsec.secrets-history-bugs
  106. inurl:ipsec.secrets “holds shared secrets”
  107. 14.) Find the information files:
  108. inurl:ipsec.conf-intitle:manpage
  109. 15.) Search for a stored password in a database:
  110. filetype:ldb admin
  111. 16.) Search for admin.php file:
  112. inurl:search/admin.php
  113. 17.) Search for password log files:
  114. inurl:password.log filetype:log
  115. 18.) Search for Hkey_Current_User in registry files:
  116. filetype: reg HKEY_CURRENT_USER username
  117. 19.) Search for username/password file backups:
  118. ”Http://username: password @ www …” filetype: bak inurl: “htaccess | passwd | shadow | ht users”
  119. 20.) Search for username/password files:
  120. filetype:mdb inurl:”account|users|admin|administrators|passwd|password” mdb files
  121. 21.) Search for Microsoft Frontpage passwords:
  122. ext:pwd inurl:(service|authors|administrators|users) “# -FrontPage-”
  123. 22.) Search for SQL database Code and passwords:
  124. filetype: sql ( “passwd values ****” |” password values ****” | “pass values ****”)
  125. 23.) Search for e-mail account files:
  126. intitle: “Index Of”-inurl: maillog
  127.  
  128.  
  129. G.) MISC. DORKS
  130. 1.) WebWiz Rich Text Editor (RTE) – Remote file upload vulneralbility:
  131. inurl:rte/my_documents/my_files
  132. 2.) EZFilemanager – Remote file upload vulneralbility:
  133. inurl:ezfilemanager/ezfilemanager.php
  134. 3.) robots.txt – See directories hidden from crawlers. Also sometimes you can pull off a directory transversal with this:
  135. inurl:robots.txt
  136. 4.) Serial Numbers – Look for software serial numbers
  137. ”software name” 94FBR
  138.  
  139.  
  140. H.) FIND FREE SWAG
  141. 1.) site:*.com intitle:”Thank You For Your Order” intext:Click Here to Download
  142. 2.) site:*.net intitle:”Thank You For Your Order” intext:Click Here to Download
  143. 3.) site:*.co intitle:”Thank You For Your Order” intext:Click Here to Download
  144. 4.) site:*.org intitle:”Thank You For Your Order” intext:Click Here to Download
  145. 5.) site:*.biz intitle:”Thank You For Your Order” intext:Click Here to Download
  146. 6.) site:*.tv intitle:”Thank You For Your Order” intext:Click Here to Download
  147. 7.) site:*.co.uk intitle:”Thank You For Your Order” intext:Click Here to Download
  148. 8.) site:*.org.uk intitle:”Thank You For Your Order” intext:Click Here to Download
  149. 9.) site:*.eu intitle:”Thank You For Your Order” intext:Click Here to Download
  150. 10.) intitle:Thank you for your purchase! intext:PLR OR MRR OR Package OR Bonus
  151. 11.) intitle:Thank you for your order! intext:PLR OR MRR OR Package OR Bonus
  152. 12.) intitle:Thank you for your order! intext:PLR OR MRR
  153. 13.) intitle:Thank you for your Purchase! intext:PLR OR MRR
  154. 14.) inurl:/thankyou*.html intitle:Thank you for your order!
  155. 15.) intext:Click Here To Download
  156. 16.) inurl:thanks intext:”Thank You For Your Order!” “Click Here” filetype:html
  157. 17.) intitle:Thank You For Your Order! intext:Private Label
  158. 18.) intitle:Thank You For Your Purchased! intext:Private Label
  159. 19.) intext:”Thank You For Your Order” intext:PLR
  160. 20.) intitle:”Thank You For Your Order!” intext:download
  161. 21.) intitle:”Thank You For Your Order” intext:Click Here To Download Now
  162. 22.) intitle:Thank you for your purchase! intext:Click Here to Download
  163. 23.) * thank you for your order download
  164. 24.) * intitle:Thank you for your Purchase! intext:PLR OR MRR OR Package OR Bonus
  165. 25.) * intitle:Thank you for your order! intext:PLR OR MRR
  166. 26.) * intitle:Thank You For Your Purchase! intext:Click Here to Download
  167. 27.) * intitle:Thank You For Your Order! intext:download
  168. 28.) inurl:index.of .mp3
  169. 29.) inurl:index.of .mov
  170. 30.) inurl:index.of .iso
  171. 31.) ?intitle:index.of? mp3
  172. 32.) ?intitle:index.of? mov
  173. 33.) ?intitle:index.of? iso
  174. 34.) inurl:”insert filetype”:iso+OR+exe+OR+zip+OR+rar+OR+gzip+OR+tar
  175. 35.) intext:”parent directory” intext:”[EXE]“
  176. 36.) intext:”parent directory” index of:”[EXE]“
  177. 37.) intext:”parent directory” index of:”[RAR]“
  178. 38.) intext:”parent directory” intext:”[VID]“
  179. 39.) intext:”parent directory” index of:”[VID]“
  180. 40.) intext:”parent directory” intext:”[MP3]“
  181. 41.) intext:”parent directory” index of:”[MP3]“
  182. 42.) intext:”parent directory” index of:”[Gamez]“
  183.  
  184.  
  185.  
  186.  
  187. I.) WEBCAM GOOGLE DORKS
  188. 1.) inurl:/view.index.shtml
  189. 2.) inurl:/view.shtml
  190. 3.) intitle:”Live View / – AXIS” | inurl:view/view.shtml^
  191. 4.) inurl:ViewerFrame?Mode=
  192. 5.) inurl:ViewerFrame?Mode=Refresh
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement