| Mobile| RSS

google Dorks

martes, 10 de agosto de 2010 | Tags: | 0 Comentarios


intext:saved from url
To be precise,
intext:saved from url= (0010)
intext:saved from url= (0012)
March 29th 2009
filetype:dbx
filetype:pst
April 19th 2009
filetype:ctt "msn"
inurl:indexFrame.shtml Axis
intitle:phpmyadmin inurl:server_processlist.php
April 26th 2009
admin backup filetype:sql -trunk -trac -forum
filetype:ste
May 20th 2009
inurl:"com_hashcash"
May 26th 2009
inurl:"/_vti_log/"
inurl:"/_private/"
inurl:"/_vti_log/"
June 23rd 2009
Filetype: inc dbconn
Filetype: inc intext: mysql_connect
allinurl: admin mdb
July 07th 2009
ext:passwd -intext:the -sample -example
"parent directory" +proftpdpasswd
server-dbs "intitle:index of"
July 16th 2009
inurl:"tinymce.xml"
July 27th 2009
filetype:swf inurl:login OR inurl:secure OR inurl:admin
August 06th 2009
intitle:”EvoCam” inurl:”webcam.html”
intitle:”Live View / – AXIS” | inurl:view/view.shtml^
August 07th 2009
allintext:”Safe-mode: OFF (not secure)”
"Welcome to phpMyAdmin" AND " Create new database"
October 30th 2009
allinurl:postscript.php?p_mode=
inurl:index.php?pg=
November 03rd 2009
filetype:pdf file c (htm OR html OR mhtml) site:gov.pk
November 23rd 2009
filetype:inc mysql_connect("localhost","root"
November 25th 2009
inurl:servlet/com (REF: Apache Tomcat InvokerServlet)
inurl:servlet/mil
inurl:servlet/net
inurl:servlet/com +admin
December 11th 2009
"index of" "My RoboForm Data"
December 13th 2009
inurl:phpldapadmin/cmd.php? (REF: http://www.securityfocus.com/bid/37327/exploit)
December 23rd 2009

inurl:/phpmyadmin/scripts/setup.php
December 28th 2009
/components/com_galleria/galleria.html.php
allinurl:/com_galleria/
inurl:com_galleria
index.php?option=com_galleria
allinurl:com_galleria
com_galleria
January 5th 2010
allinurl:monatsblatt.php (REF: http://www.securityfocus.com/bid/37327/exploit)
allinurl:datumscalc.php
allinurl:/frontend/x3/files/ (REF: http://www.exploit-db.com/exploits/10519)
January 21st 2009
allinurl:/chat.ghp?username (REF: http://www.exploit-db.com/exploits/11179)
allinurl:/plugins/editors/tinymce/jscripts/tiny_mce/plugins/tinybrowser/ (REF: http://www.exploit-db.com/exploits/11263)
allinurl:/libraries/joomla/client/ldap.php (REF: http://www.exploit-db.com/exploits/11262)
inurl:passlist.txt
inurl:ViewerFrame?Mode=
inurl:ViewerFrame?Mode=Refresh
inurl:axis-cgi/jpg
inurl:axis-cgi/mjpg
inurl:view/indexFrame.shtml
inurl:view/index.shtml
inurl:view/view.shtml
intitle:”live view” intitle:axis
intitle:liveapplet
allintitle:”Network Camera NetworkCamera”
intitle:axis intitle:”video server”
intitle:liveapplet inurl:LvAppl
intitle:”EvoCam” inurl:”webcam.html”
intitle:”Live NetSnap Cam-Server feed”
intitle:”Live View / – AXIS”
intitle:”Live View / – AXIS 206M”
intitle:”Live View / – AXIS 206W”
intitle:”Live View / – AXIS 210?
inurl:indexFrame.shtml Axis
inurl:”MultiCameraFrame?Mode=Motion”
intitle:start inurl:cgistart
intitle:”WJ-NT104 Main Page”
intext:”MOBOTIX M1? intext:”Open Menu”
intext:”MOBOTIX M10? intext:”Open Menu”
intext:”MOBOTIX D10? intext:”Open Menu”
intitle:snc-z20 inurl:home/
intitle:snc-cs3 inurl:home/
intitle:snc-rz30 inurl:home/
intitle:”sony network camera snc-p1?
intitle:”sony network camera snc-m1?
intitle:”Toshiba Network Camera” user login
intitle:”netcam live image”
intitle:”i-Catcher Console – Web Monitor”
inurl:/view/index.shtml
inurl:viewerframe?mode=
inurl:/view:shtml
inurl:view/indexframe.shtml
inurl:lvappl live webcams
inurl:"viewerframe?mode=motion"
intitle:"snc-rz30 home"
intitle:"WJ-NT104 Main"
inurl:LvAppl
intitle:liveapplet
intitle:"Live View / - AXIS"
inurl:indexFrame.shtml "Axis Video Server"
January 27th 2010
allinurl:/level/15/exec
February 6th 2010
inurl:"f?p=" inurl:pls/htmldb
allinurl:WS_FTP.LOG
March 6th 2010
allinurl=profil.php?id=
inurl:com_jbudgetsmagic (Joomla)
inurl:com_surveymanager
inurl:index.php?option=com_joomlaconnect_be
inurl:"com_joaktree"
allinurl:wp-content/plugins/wp-wall/
March 9th 2010
allinurl:gitweb.cgi (REF: http://www.exploit-db.com/exploits/11497)
March 21st 2010
allinurl:search.php?search_type vbulletin (REF: http://inj3ct0r.com/exploits/9697)
March 24th 2010
Index of / wp-content/plugins/nextgen-gallery/ (REF: http://www.exploit-db.com/exploits/12098)
April 07th 2010
wordpress inurl:"/?event_id=" (REF: http://www.exploit-db.com/exploits/11302)
April 08th 2010
site:pastebin.com "-----BEGIN RSA PRIVATE KEY-----"
allinurl:/_layouts/help.aspx (REF: http://www.exploit-db.com/exploits/12450)
April 30th 2010
allinurl:/owa/(REF: http://www.exploit-db.com/exploits/12728)
inurl:"axis2/services" "list Services" (REF: http://www.exploit-db.com/exploits/12721)
May 26th 2010
site:cloudshark.org captures
June 28th 2010
inurl:/scripts/wgate
July 02nd 2010
inurl:"https" outlook web access
July 09th 2010
intitle:"CRiMEPACK v2"
intitle:"CRiMEPACK v3.0"
intitle:"CRiMEPACK v3.0-delta"
intitle:login "User name:" "Remember (MD5 cookies)"
inurl:"_reports" bot_id
Auth! user: intitle:"Yes 3.0"
July 15th 2010
intitle:"Rx08.ii36B.Rv"
July 21st 2010
filetype:swf inurl:admin inurl:login
July 27th 2010

0 Respondiendo

Publicar un comentario

Ciber Protesta

Blog Archive

Labels

Blogumulus by Roy Tanck and Amanda Fazani

Twitter