Excellent tricks and techniques of Google Hacks

tip and trick googleThese files contain cleartext usernames and passwords, as well as the sites associated with those credentials. Attackers can use this information to log on to that site as that user.
To see results; just write in the (http://www.google.com/) search engine the code:
 
filetype:log inurl:"password.log"
==============================================
 
linux vpns store their usernames and passwords for CHAP authentification in a file called "chap-secrets" where the usernames and the passwords are in cleartext.
 
To see results; just write in the search engine the code:
 
inurl:chap-secrets -cvs
 
==============================================
 
These lock files often contain usernames of the user that has locked the file. Username harvesting can be done using this technique.
 
To see results; just write in the search engine the code:
 
"index of" / lck
 
==============================================
 
A standard FTP configuration file that provides far too many details about how the server is setup, including installation paths, location of logfiles, generic username and associated group, etc.
 
To see results; just write in the search engine the code:
 
filetype:conf inurl:proftpd.conf -sample
 
==============================================
 
This search finds registry files from the Windows Operating system. Considered the "soul" of the system, these files, and snippets from these files contain sensitive information, in this case usernames and/or passwords.
 
To see results; just write in the search engine the code:
 
filetype:reg reg HKEY_CURRENT_USER username
 
==============================================
 
Allows an attacker to create an account on a server running Argosoft mail server pro for windows with unlimited disk quota (but a 5mb per message limit should you use your account to send mail).
 
To see results; just write in the search engine the code:
 
"adding new user" inurl:addnewuser -"there are no domains"
 
==============================================
 
The famous Sun linux appliance. The default page displays this text:
 
"Congratulations on Choosing a Cobalt RaQ - the premier server appliance platform for web hosting. This page can easily be replaced with your own page. To replace this page, transfer your new content to the directory /home/sites/home/web".
 
To see results; just write in the search engine the code:
 
(inurl:81/cgi-bin/.cobalt/) | (intext:"Welcome to the Cobalt RaQ")
 
==============================================
 
WS_FTP.LOG can be used in many ways to find more information about a server. This query is very flexible, just substitute "+htpasswd" for "+FILENAME" and you may get several hits that you hadn't seen with the 'normal' search.
 
Filenames suggested by the forum to explore are: phpinfo, admin, MySQL, password, htdocs, root, Cisco, Oracle, IIS, resume, inc, sql, users, mdb, frontpage, CMS, backend, https, editor, intranet . The list goes on and on..
 
A different approach might be "allinurl: "some.host.com" WS_FTP.LOG filetype:log" which tells you more about who's uploading files to a specific site.
 
To see results; just write in the search engine the code:
 
+htpasswd +WS_FTP.LOG filetype:log
 
==============================================
 
The Web Data Administrator is a utility program implemented in ASP.NET that enables you to easily manage your SQL Server data wherever you are. Using its built-in features, you can do the following from Internet Explorer or your favorite Web browser.
Create and edit databases in Microsoft SQL Server 2000 or Microsoft SQL Server 2000 Desktop Engine (MSDE) Perform ad-hoc queries against databases and save them to your file system Export and import database schema and data.
 
To see results; just write in the search engine the code:
 
intitle:"Web Data Administrator - Login"
 
==============================================
 
The Aanval Intrusion Detection Console is an advanced intrusion detection monitor and alerting system. Currently supporting modules for Snort and syslog - Aanval provides real-time monitoring, reporting, alerting and stability. Aanval's web-browser interface provides real-time event viewing and system/sensor management.
 
To see results; just write in the search engine the code:
 
intitle:"remote assessment" OpenAanval Console
 
==============================================
 
Google is so smart, it’s scary sometimes. I has found another interesting (to say the least) Google use.
I just ran across a pretty scary new google trick. It seems they have just recently added number span searching to their engine. Take a look at this example:
 
To see results; just write in the search engine the code:
 
visa 4356000000000000..4356999999999999
 
Basically, what this search does is search for the word “visa” [credit card] with any numbers that fit within your query. i.e. any Visa credit card number with the first four digits 4356.
As you can see, Google has searched the entire range against its DB. Within minutes I found some crazy sites like this one. Now please know that Google didn’t create this tool to be used like this. It’s actually quite handy when used correctly. Just an FYI for all of you.
 
==============================================
 
Notice I am only changing the word after the parent directory, change it to what you want and you will get a lot of stuff.
 
To see results; just write in the search engine the code:
 
"parent directory " /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
 
And
 
"parent directory " DVDRip -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
 
And
 
"parent directory "Xvid -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
 
And
 
"parent directory " Gamez -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
 
And
"parent directory " MP3 -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
 
And
 
"parent directory " Name of Singer or album -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
 
Or
 
?intitle:index.of? mp3
 
You only need add the name of the song/artist/singer.
Example: ?intitle:index.of? mp3 jackson
==============================================
 
You can change the string to watever you want, ex. microsoft to adobe, iso to zip etc…
 
To see results; just write in the search engine the code:
 
inurl:microsoft filetype:iso
 
==============================================
 
This search reveals channel keys (passwords) on IRC as revealed from IRC chat logs.
 
To see results; just write in the search engine the code:
 
"sets mode: +k"
==============================================
These are eggdrop config files. Avoiding a full-blown descussion about eggdrops and IRC bots, suffice it to say that this file contains usernames and passwords for IRC users.
 
To see results; just write in the search engine the code:
 
eggdrop filetype:user user
 
==============================================
 
This will search for backup files (*.bak) created by some editors or even by the administrator himself (before activating a new version).
 
Every attacker knows that changing the extenstion of a file on a webserver can have ugly consequences.
 
see results; just write in the search engine the code:
 
filetype:bak inurl:"htaccess|passwd|shadow|htusers"
 
==============================================
 
Let's pretend you need a serial number for windows xp pro. The key is the 94FBR code.. it was included with many MS Office registration codes so this will help you dramatically reduce the amount of 'fake' porn sites that trick you.
To see results; just write in the search engine the code:
 
"Windows XP Professional" 94FBR
 
By the way, don't forget to change "Window sXP Professional" to any product you need its serial number.
 
==============================================
 
At first glance, this search reveals even more examples of operating system users enabling the operating system default web server software. This is generally accepted to be a Bad Idea(TM) as mentioned in the previous example. However, the googleDork index on this particular category gets quite a boost from the fact that this particular screen should NEVER be seen by the general public. To quote the default index screen: "Any users attempting to connect to this site are currently receiving an 'Under Construction page'" THIS is not the 'Under Construction page.' I was only able to generate this screen while sitting at the console of the server. The fact that this screen is revealed to the general public may indicate a misconfiguration of a much more insidious nature...
 
 
To see results; just write in the search engine the code:
 
intitle:"Welcome to Windows 2000 Internet Services"
 
==============================================
 
This is a fabulous link. This is the secret link of the web site "Google" to search for any "Crack" you need.
 
Just write the following link in the address bar:
 
 
==============================================
 
By the way, for anyone who needs to have an account in the google mail for "One GigaByte", go to the following address bar. You will receive within "36 hours" the confirmation mail for your registration:
 
 
Or from:
 
 
By the way, you can open your Google mail from your browser through this link:
 
 
==============================================
Imagine that you can connect to another computer remotely through the internet from the feature called "Remote Desktop Web Connection".
To see results; just write in the (http://www.google.com/) search engine the code:
 
intitle:"Remote Desktop Web Connection"
 
==============================================
 
Through this query you can find every web page "Google" has crawled for a specific site.
 
To see results; just write in the search engine the code:
 
Site: Microsoft.com
 
==============================================
Through this query, you can see web servers with default pages can serve as juicy targets.
 
To see results; just write in the search engine the code:
 
Intitle:test.page.for.apache "it worked"
 
==============================================
 
No one can deny that the directory listings can be a source of great information.
 
To see results; just write in the search engine the code:
 
Intitle:index.of/admin
 
==============================================
 
We will use this query to locate additional servers, subtract common hostnames from the query.
 
To see results; just write in the search engine the code:
 
Site: Microsoft.com - Site:www.Microsoft.com
 
==============================================
 
From this query you can get huge user names and passwords from huge sites for free.
 
To see results; just write in the search engine the code:
 
"Welcome to *" "Your password is *"
 
==============================================
 
From this query you can collect many numbers of ".PST" files, which contain all E-mail folders, addresses or anything else that Outlook 97, 2000, xp or 2003 collects.
 
To see results; just write in the search engine the code:
 
outlook filetype:pst
 
==============================================
 
allinurl:gmail.google.com
 
"NetLife" Exclusive: Security hole found in "Gmail"
An Israeli hacker reveals: A security hole in "Gmail" allows the compromise of users' email boxes – without the need of a password Nitzan Weidenfeld, Nana NetLife Magazine.
 
So you’ve got a "Gmail" mail account? Or maybe you’ve just received an invitation? Well, we have some bad news for you: Your mail box is exposed. A major security hole in Google's mail service, allows full access to user accounts, without the need of a password.
 
"Everything could get publicly exposed – your received mails might be readable, as well as all of your sent mail, and furthermore – anyone could send and receive mail under your name", thus reveals Nir Goldshlagger, an Israeli hacker, on an exclusive interview with "Nana NetLife" Magazine. "Even more alarming", he explains, "is the fact that the hack itself is quite simple. All that is needed of the malicious hacker, beside knowledge of the specific technique, is quite basic computer knowledge, the victim's username – and that’s it, he's inside".
 
When approached, Google admitted to the security flaw. Google also assured us that this matter is being resolved, and that "the company will go to any length to protect its users".
 
The flaw which was discovered by Goldshlagger and was tested many times by Nana's editorial board had shown an alarming success rate. In order not to further jeopardize mail boxes' owners, we will only disclose that the process is based upon a security breach in the service's identity authentication. It allows the hacker to "snatch" the victims cookie file (a file planted in the victim's computer used to identify him) using a seemingly innocent link (which directs to Gmail's site itself). Once stolen, this cookie file allows the hacker to identify himself as the victim, without the need of a password. Even if the victim does change his password afterwards, it will be to no avail. "The system authenticates the hacker as the victim, using the stolen cookie file. Thus no password is involved in the authentication process. The victim can change his password as many times as he pleases, and it still won't stop the hacker from using his box", explains Goldshlagger.
 
Whether hackers have already used this method to compromise users' accounts is unclear at the moment.
 
Matters are several times worse when it comes to a service such as "Gmail". Besides the obvious blow to Google's seemingly spotless image, we're looking here at a major threat to anyone who has turned to "Gmail" as his major email box. "Because "Gmail" offers a gigabyte of storage, several times bigger than most other web based mail services, users hardly delete any old correspondence", says Goldshlagger. "The result is a huge amount of mail accumulating in the users' boxes, which frequently include bank notices, passwords, private documents and other files the user wanted to backup. Who ever takes a hold of this data, could literally take over the victim's life and identity".
 
"Ofer Elzam", a security expert for "Aladdin", who examined the security hole at "Nana's Netlife" request, explains: "This is a major threat, for the following reasons: First – the users have no way of protecting themselves. Second – it's quite easy to carry out, and third – it allows identity theft, which is nothing less than a serious danger to the victim".
 
"On the bright side", he adds, "its a good thing that this hole was found now, before the service was officially announced and offered to millions of users world-wide. I reckon it's just a matter of time before an automatic tool is made, which would allow even the less computer-savvy people to exploit this hack. The damage, needless to say, could be huge"
 
Is there a way, after all, to protect ourselves in the face of this danger? Elzam does not bear good news on the matter. "The only immediate solution that comes to mind is not using "Gmail" to store any messages or files that might be maliciously used. At least until Google attends to this problem".
 
I received a weird email last week and I forwarded it to the bug report. Guess that was the cookie link I talked about. I put it here:
 
Date: Tue, 26 Oct 2004 08:22:16 -0700 (PDT)
Subject: Google Password Assistance
Reply | Reply to all | Forward | Print | Add sender to contacts list | Trash this message | Show original
 
To initiate the process for resetting the password for your
xxxxx@gmail.com Google Account, visit the link below
 
 
Thank you for using Google.
 
For questions or concerns regarding your account, please send mail to
 
This is a post-only mailing. Replies to this message are not monitored
or answered.
 
 
And this is the explanation to what mentioned earlier:
 
Last Monday reported that a vulnerability in "GSuite". A local user can obtain the target user's "GMail" password.
 
It is reported that a local user with access to the target user's 'documents and settings\user name\Application Data\GSuite\' folder can view the 'settings.xml' file, which contains the target user's password in ASCII value encoded form. The password can be readily decoded.
 
Impact: A local user can obtain a target user's GMail password.
Solution: No solution was available at the time of this entry. The vendor plans to include a fix in the next release.
 
==============================================
 
The Cisco VPN 3000 concentrator is a remote access VPN. This web-based logon portal is for remote management of the Concentrator; by submitting a correct UID and PASS you will '0wn' their concentrator. I. E. is able to delete, copy, and configure whatever your heart desires. You would be in control of all of their VPN's that concentrator has control of.
 
To see results; just write in the search engine the code:
 
intitle:Cisco Systems, Inc. VPN 3000 Concentrator
 
==============================================
 
This query searches for open root directories of servers running online shopping carts. This shopping cart has an online store 'manager'; in /online-store/StoreManager where you can edit everything from product lists, databases, taxes and passwords.
 
To see results; just write in the search engine the code:
 
intitle:Index.Of /" stats merchant online-store cgi-local etc | cgi-bin
 
==============================================
 
Sometimes people make mistakes and post their Cisco configurations on "help sites" and don't edit info. So we might be able to find the enable passwords.
 
To see results; just write in the search engine the code:
 
intext:"enable secret 5 $"
 
 
Or, for more specifications
 
intext:"enable secret 5 $" "Current configuration:"
 
==============================================
 
This query searches for the following in the servers:
Network Statistics
General Info
Total disk space/memory
Php environment!!!
Current network connections!!!
Running services...
 
To see results; just write in the search engine the code:
 
intitle:"sysinfo * " intext:"Generated by Sysinfo *
 
==============================================
 
Imagine that when you enter any web site, and you are surprised that when searching for any program in it you can not find it. By this fabulous trick, you can find the link for downloading any program in this site through any search engine.
 
For example, suppose you want to search for the program "norton" in the web site www.download.com ; when you go to www.google.com and write the following code, you will be surprised that the "google" search engine searches only in the site www.download.com. To do this:
 
Write in the address bar of the web browser this address: www.google.com.
When opening the web site; write in the search engine this code: "norton site:www.download.com", and press the button search or "ÃÈÍË".
As mentioned earlier: the code is easy, just write in the place of the word "norton"; any word you need to search for in the site followed in the code.
 
The code again is ....
 
norton site:www.download.com
 
By the way, you can practise this code at any seach engine.
 
-------------------------------------------------------------------------------------
 
Another trick is that you can force the search engine of the "google" web site to search for a certain category like "Linux" topics. when you add any category after the google link and write any thing in the search engine, you will surprised that the site searched for linux only. For example, if you wrote the following code:
 
 
 
 
As we mentioned in the code earlier, the site followed by the word "linux". So the web site is forced for searching for the linux topics only all over the internet.
_________________
Best Regards,
Mahmoud Hany,
Country: Egypt,
Title: IT instructor,
Mobile: 0106354485
 
View user's profile Send private message
blackwood
Kiddie
Kiddie
 
 
Joined: 21 Sep 2004
Posts: 22
Location: Egypt
 
PostPosted: Thu Nov 18, 2004 1:14 pm    Post subject: Continue........... Reply with quoteBack to top
Imagine that you can connect to another computer remotely through the internet from the feature called "Remote Desktop Web Connection".
 
To see results; just write in the  search engine the code:
 
intitle:"Remote Desktop Web Connection"
 
==============================================
 
Through this query you can find every web page "Google" has crawled for a specific site.
 
To see results; just write in the search engine the code:
 
Site: Microsoft.com
 
==============================================
Through this query, you can see web servers with default pages can serve as juicy targets.
 
To see results; just write in the search engine the code:
 
Intitle:test.page.for.apache "it worked"
 
==============================================
 
No one can deny that the directory listings can be a source of great information.
 
To see results; just write in the search engine the code:
 
Intitle:index.of/admin
 
==============================================
 
We will use this query to locate additional servers, subtract common hostnames from the query.
 
To see results; just write in the search engine the code:
 
Site: Microsoft.com - Site:www.Microsoft.com
 
==============================================
 
From this query you can get huge user names and passwords from huge sites for free.
 
To see results; just write in the search engine the code:
 
"Welcome to *" "Your password is *"
 
==============================================
 
From this query you can collect many numbers of ".PST" files, which contain all E-mail folders, addresses or anything else that Outlook 97, 2000, xp or 2003 collects.
 
To see results; just write in the search engine the code:
 
outlook filetype:pst
 
==============================================
 
allinurl:gmail.google.com
 
"NetLife" Exclusive: Security hole found in "Gmail"
An Israeli hacker reveals: A security hole in "Gmail" allows the compromise of users' email boxes – without the need of a password Nitzan Weidenfeld, Nana NetLife Magazine.
 
So you’ve got a "Gmail" mail account? Or maybe you’ve just received an invitation? Well, we have some bad news for you: Your mail box is exposed. A major security hole in Google's mail service, allows full access to user accounts, without the need of a password.
 
"Everything could get publicly exposed – your received mails might be readable, as well as all of your sent mail, and furthermore – anyone could send and receive mail under your name", thus reveals Nir Goldshlagger, an Israeli hacker, on an exclusive interview with "Nana NetLife" Magazine. "Even more alarming", he explains, "is the fact that the hack itself is quite simple. All that is needed of the malicious hacker, beside knowledge of the specific technique, is quite basic computer knowledge, the victim's username – and that’s it, he's inside".
 
When approached, Google admitted to the security flaw. Google also assured us that this matter is being resolved, and that "the company will go to any length to protect its users".
 
The flaw which was discovered by Goldshlagger and was tested many times by Nana's editorial board had shown an alarming success rate. In order not to further jeopardize mail boxes' owners, we will only disclose that the process is based upon a security breach in the service's identity authentication. It allows the hacker to "snatch" the victims cookie file (a file planted in the victim's computer used to identify him) using a seemingly innocent link (which directs to Gmail's site itself). Once stolen, this cookie file allows the hacker to identify himself as the victim, without the need of a password. Even if the victim does change his password afterwards, it will be to no avail. "The system authenticates the hacker as the victim, using the stolen cookie file. Thus no password is involved in the authentication process. The victim can change his password as many times as he pleases, and it still won't stop the hacker from using his box", explains Goldshlagger.
 
Whether hackers have already used this method to compromise users' accounts is unclear at the moment.
 
Matters are several times worse when it comes to a service such as "Gmail". Besides the obvious blow to Google's seemingly spotless image, we're looking here at a major threat to anyone who has turned to "Gmail" as his major email box. "Because "Gmail" offers a gigabyte of storage, several times bigger than most other web based mail services, users hardly delete any old correspondence", says Goldshlagger. "The result is a huge amount of mail accumulating in the users' boxes, which frequently include bank notices, passwords, private documents and other files the user wanted to backup. Who ever takes a hold of this data, could literally take over the victim's life and identity".
 
"Ofer Elzam", a security expert for "Aladdin", who examined the security hole at "Nana's Netlife" request, explains: "This is a major threat, for the following reasons: First – the users have no way of protecting themselves. Second – it's quite easy to carry out, and third – it allows identity theft, which is nothing less than a serious danger to the victim".
 
"On the bright side", he adds, "its a good thing that this hole was found now, before the service was officially announced and offered to millions of users world-wide. I reckon it's just a matter of time before an automatic tool is made, which would allow even the less computer-savvy people to exploit this hack. The damage, needless to say, could be huge"
 
Is there a way, after all, to protect ourselves in the face of this danger? Elzam does not bear good news on the matter. "The only immediate solution that comes to mind is not using "Gmail" to store any messages or files that might be maliciously used. At least until Google attends to this problem".
 
I received a weird email last week and I forwarded it to the bug report. Guess that was the cookie link I talked about. I put it here:
 
Date: Tue, 26 Oct 2004 08:22:16 -0700 (PDT)
Subject: Google Password Assistance
Reply | Reply to all | Forward | Print | Add sender to contacts list | Trash this message | Show original
 
To initiate the process for resetting the password for your
xxxxx@gmail.com Google Account, visit the link below
 
 
Thank you for using Google.
 
For questions or concerns regarding your account, please send mail to
 
This is a post-only mailing. Replies to this message are not monitored
or answered.
 
 
And this is the explanation to what mentioned earlier:
 
Last Monday reported that a vulnerability in "GSuite". A local user can obtain the target user's "GMail" password.
 
It is reported that a local user with access to the target user's 'documents and settings\user name\Application Data\GSuite\' folder can view the 'settings.xml' file, which contains the target user's password in ASCII value encoded form. The password can be readily decoded.
 
Impact: A local user can obtain a target user's GMail password.
Solution: No solution was available at the time of this entry. The vendor plans to include a fix in the next release.
 
==============================================
 
The Cisco VPN 3000 concentrator is a remote access VPN. This web-based logon portal is for remote management of the Concentrator; by submitting a correct UID and PASS you will '0wn' their concentrator. I. E. is able to delete, copy, and configure whatever your heart desires. You would be in control of all of their VPN's that concentrator has control of.
 
To see results; just write in the search engine the code:
 
intitle:Cisco Systems, Inc. VPN 3000 Concentrator
 
==============================================
 
This query searches for open root directories of servers running online shopping carts. This shopping cart has an online store 'manager'; in /online-store/StoreManager where you can edit everything from product lists, databases, taxes and passwords.
 
To see results; just write in the (http://www.google.com/) search engine the code:
 
intitle:Index.Of /" stats merchant online-store cgi-local etc | cgi-bin
 
==============================================
 
Sometimes people make mistakes and post their Cisco configurations on "help sites" and don't edit info. So we might be able to find the enable passwords.
 
To see results; just write in the search engine the code:
 
intext:"enable secret 5 $"
 
 
Or, for more specifications
 
intext:"enable secret 5 $" "Current configuration:"
 
==============================================
 
This query searches for the following in the servers:
Network Statistics
General Info
Total disk space/memory
Php environment!!!
Current network connections!!!
Running services...
 
To see results; just write in the search engine the code:
 
intitle:"sysinfo * " intext:"Generated by Sysinfo *
 
==============================================

Similar Content

Dec. 21 2012 - Here's what will happen today ...

According to the Mayan calendar today should be the end

of the world as we have known it.
 
But the world is already finished, and no one has noticed it,
we really are living in a limbo hidden
without memory.
 
I have this certainty.
 
You just need make connections and strive to remember
some nights in which you find yourself placed during sleep, and
as it is recurrent, and how, by asking around,
this happens to more people than you think.
 
This year has seen everything, we realized
that religion, politics, the structure
society are all based on deception and
manipulation.

Best Wordpress Plugins with regard to eCommerce Websites

WordPress continues to be the world’s hottest content material management program (CMS), along with more than 74 million websites utilizing the system as a foundation.
 
Far more than a blogger’s favorite tool just, WordPress is just about the CMS of option for countless small enterprises plus sole entrepreneurs.
Development: 

Anonymous condemn and leave WikiLeaks

anonymousThere was a time in which the site of counter-information WikiLeaks had as its best ally the hacktivist group Anonymous, and now a recent message written by the spokesman of the latter - "Have you lost your last allies. You must die I hope in a fire "- suggests that the time is finally concluded.
News Magazine: 

Download Exynos Fix: How to install Android 4.1.2 on Galaxy S3 with Exynos problem solved

samsung s3 ekynos fixAfter having announced so here that Samsung updates its Galaxy S III to the new firmware version I9300XXELLA, which is based on Android 4.1.2 and is also equipped with the fix for the vulnerability that in recent days had come to light.

News Magazine: