Google
is a search engine which is very unusual, a lot of scripts are hidden and only
certain people who know. Keyword
Script is mostly used for hacking. Here's How to
use Script hidden keywords on Google:
"Intitle:" syntax restricts the search only produces headers that contain information on the topic in question. For example in the search, "intitle:
password is admin "(without the quotes). The search will find pages that contain the word "password" as its title with the highest priority "admin".
If the search query there are two main search, use the syntax allintitle: to search completely. For example the search "allintitle: admin mdb". Then the search will be restricted to two main subject headings of "admin" and "mdb".
"Inurl:" syntax restricts the search results to those URLs containing the keyword information is intended. For example a search in the search, "inurl: passwd". The search will produce all URLs that contain only information about the "passwd".
The same thing applies to this syntax, if there are two main search query, use the syntax "allinurl:" to get the url list.
For example search "allinurl: etc / passwd", will search for the URLs containing "etc" and "passwd". Slash slash ("/") between the two words etc and passwd are ignored by the search engine Google.
"Site:"
syntax restricts Google to query information based on a particular site or
domain. For
example in information retrieval: "exploits site: itb.ac.id" (without
the quotes). The
search will look for topics about exploits that are available on all pages on
the domain itb.ac.id.
"Cache:" will show a list of the web which have been entered into Google's index database. For example:
"Cache: deffcon.org", the search will show the list that is stored on Google to page deffcon .. org
"Filetype:" syntax on Google to search the data on the internet with particular extensions (ie doc, pdf or ppt etc). For example in the search: "filetype: doc site: go.id confidential" (without the quotes). The search will produce a data file with the extension ". Doc" in all domains go.id that contains the information "confidential".
"Link:" syntax on Google that will show a list of list webpages that have links on a special webpage. For example: "link: www.securityfocus.com" will menunjuukan points list webpage that has links on the page SecurityFocus.
"Related:" syntax will list web pages that are similar to that on the web page indicated.
For example: "related: www [dot] lintanxs [dot] com", the search will list web pages similar to homepage Securityfocus.
"Intext:" syntax of this command will look for certain words on the website. This command ignores links or URLs and page titles. For example:
"Intext: admin" (without quotation marks), the search will produce a link on a web page that has the keywords that have keyword admin.
Some of the query syntax above will greatly assist in the search for more detailed data and information.
Google can be a search engine to dig up some information and confidential information that is not expected to notify the weak side of a system. It is used by some individuals to penetrate a server or system information.
Syntax "index of" can be used to get a site that displays the index directory browsing.
Webserver with Index browsing enabled means anyone can access the webserver directories like ordinary local directories in general.
On this occasion, described how the use the syntax "index of" to get links to webserver directory browsing can be accessed .. This is a simple source of information can be obtained, but the content of information is often a very important information. Such information can only be a password or access online data transactions and other very important thing.
Below are some examples using "index of" to get the information important and sensitive nature.
ex:
Index of / admin
Index of / passwd
Index of / password
Index of / mail
"Index of /" + passwd
"Index of /" + password.txt
"Index of /" +. Htaccess
"Index of / secret"
"Index of / confidential"
"Index of / root"
"Index of / cgi-bin"
"Index of / credit-cards"
"Index of / logs"
"Index of / config"
"Index of / admin.asp
"Index of / login.asp
Looking for vulnerable systems or servers that use the syntax "inurl:" or "allinurl:"
1. Using the syntax "allinurl: winnt/system32 /"
(Without quotes) will list all the links on the server which gives access to restricted directories like "system32". Sometimes it can be obtained access to the cmd.exe in the directory "system32" which allows someone to take over control of the system on those servers.
2. Using "allinurl: WWWboard / passwd.txt" (without quotes) will list all the links on the server which are vulnerable to "WWWboard Password". Further discussion of vulnerability "WWWboard Password" can be seen on network security site like www [dot] lintanxs [dot] com.
3. Using the syntax "inurl: bash history" (without quotes) will list links to the server which gives access to the file "bash history" through the web. The file is a command history file containing a list of commands executed by the administrator, which sometimes includes sensitive information such as system passwords. Often the encrypted passwords on the system, to obtain the original form of the encrypted password must be decrypted using a password cracker program. Long time to get the decryption depends on the reliability of the program and the many characters that are encrypted.
4. Using the "inurl: config.txt" (without quotes) will list all the links on the server which gives access to the file "config.txt. This file contains important information including the hash value of the password and authenticate the administrator of a database.
The syntax "inurl:" or "allinurl:" can be combined with other syntax as listed below:
Inurl: / cgi-bin/cart32.exe
inurl: admin filetype: txt
inurl: admin filetype: db
inurl: admin filetype: cfg
inurl: mysql filetype: cfg
inurl: passwd filetype: txt
inurl: IISAdmin
inurl: auth_user_file.txt
inurl: Orders.txt
inurl: "wwwroot / *."
inurl: adpassword.txt
inurl: webeditor.php
inurl: file_upload.php
inurl: gov filetype: xls "restricted"
index of ftp +. mdb allinurl: / cgi-bin / + mailto allinurl: / scripts/cart32.exe allinurl: / CuteNews / show_archives.php
allinurl: / phpinfo.php
allinurl: / privmsg.php
allinurl: / privmsg.php
inurl: cgi-bin/go.cgi? go =*
allinurl:. cgi? page =*. txt
allinurul: / modules / My_eGallery
Looking for a system or server that has a weakness with the syntax "intitle:" or "allintitle:"
1. Using allintitle: "index of / root" (without the quotes) will show
List of links on a web server which gives access to a restricted directory as the root directory.
2. Using allintitle: "index of / admin" (without the quotes) will display links on the site which has an index browsing enabled for restricted directories like the directory "admin".
Another use of syntax "intitle:" or "allintitle:" combined with other syntax, among others:
intitle: "Index of". sh_history
intitle: "Index of". bash_history
intitle: "index of" passwd
intitle: "index of" people.lst
intitle: "index of" pwd.db
intitle: "index of" etc / shadow
intitle: "index of" spwd
intitle: "index of" master.passwd
intitle: "index of" htpasswd
intitle: "index of" members OR accounts
intitle: "index of" user_carts OR user_cart
allintitle: sensitive filetype: doc
allintitle: restricted filetype: mail
allintitle: restricted filetype: doc site: gov
allintitle: *. php? filename =*
allintitle: *. php? page =*
allintitle: *. php? logon =*
The use and combination of the syntax is not only limited to the examples above exposure. There are many more combinations of syntax syntax with a variety of keywords that can be used. It depends on the creativity and willingness to try. It is better to use a discourse that has been presented which is used for the benefit of not causing harm or damage.
Weakness in a system or server that is known to be a good idea-sharing with the relevant system administrators that can benefit all parties. Due to the likely outcome of the search information can provide sensitive information, which often involves the security aspect of a system or server.
Here are some examples of cases:
(Please try ... all risks relating to security websites that target ... is the responsibility of each)
Basic operators
+, -, ~,., *, "", |, OR
Additional Operators
allintext:, allintitle:, allinurl:, bphonebook:, cache:, define:, filetype:, info:, intext:, intitle:, inurl:, link:, phonebook:, related:, rphonebook:, site:, numrange: , daterange
Extension which can be searched:
HyperText Markup Language (html)
Microsoft PowerPoint (ppt)
Adobe Portable Document Format (pdf)
Microsoft Word (doc)
Adobe PostScript (ps)
Microsoft Works (wks, wps, wdb)
Lotus 1-2-3 (wk1, wk2, wk3, wk4, wk5, WKI, wks, wku)
Microsoft Excel (xls)
Microsoft Write (WRI)
Lotus WordPro (lwp)
Rich Text Format (rtf)
MacWrite (mw)
Shockwave Flash (swf)
Text (ans, txt)
Search by range
Rp5000000 computer .. 7 million
Search salaries
Salary filetype: xls site: edu
Salary filetype: xls site: edu
Financial information
Filetype: xls "checking account" "credit card"-intext: Application-intext: Form
Intitle: "Index of" finances.xls
Looking for an e-mail inbox
Intitle: index.of inurl: Inbox (456) (mit mailbox)
Intitle: index.of inurl: Inbox (inurl: User OR inurl: Mail) (220)
Detecting OS
"Microsoft-IIS/5.0 server at"
Intitle: "Welcome to Windows 2000 Internet Services" IIS 5.0
Intitle: Test.Page.for.Apache seeing.this.instead
Intitle: Test.page "SSL / TLS-aware"
Looking for passwords
Inurl: etc inurl: passwd
Intitle: "Index of .. etc" passwd
"#-FrontPage-" inurl: service.pwd
Inurl: admin.pwd filetype: pwd
Filetype: inc dbconn
Filetype: inc intext: mysql_connect
Filetype: this + + pwd WS_FTP
Filetype: log inurl: "password.log"
Looking for User Name
+ Intext: "webalizer" + intext: "Total Usernames" + intext: "Usage Statistics for"
Looking for License Key
Filetype: lic lic intext: key
Sensitve Directories Listing
Intitle: "Index of" cfide
Intitle: index.of.winnt
Intitle: "index of" iissamples
Discourse about the syntax is very helpful in the search for such information ultimately depends on the intent and purpose of the data search. Was really really done for data discovery needs, gather information from a target machine penetration. The goal ultimately depends on the intention of the individual concerned so that the author is not responsible for misuse of the information has been presented. As the old saying? the risk borne by the passengers?
"Intitle:" syntax restricts the search only produces headers that contain information on the topic in question. For example in the search, "intitle:
password is admin "(without the quotes). The search will find pages that contain the word "password" as its title with the highest priority "admin".
If the search query there are two main search, use the syntax allintitle: to search completely. For example the search "allintitle: admin mdb". Then the search will be restricted to two main subject headings of "admin" and "mdb".
"Inurl:" syntax restricts the search results to those URLs containing the keyword information is intended. For example a search in the search, "inurl: passwd". The search will produce all URLs that contain only information about the "passwd".
The same thing applies to this syntax, if there are two main search query, use the syntax "allinurl:" to get the url list.
For example search "allinurl: etc / passwd", will search for the URLs containing "etc" and "passwd". Slash slash ("/") between the two words etc and passwd are ignored by the search engine Google.
"Cache:" will show a list of the web which have been entered into Google's index database. For example:
"Cache: deffcon.org", the search will show the list that is stored on Google to page deffcon .. org
"Filetype:" syntax on Google to search the data on the internet with particular extensions (ie doc, pdf or ppt etc). For example in the search: "filetype: doc site: go.id confidential" (without the quotes). The search will produce a data file with the extension ". Doc" in all domains go.id that contains the information "confidential".
"Link:" syntax on Google that will show a list of list webpages that have links on a special webpage. For example: "link: www.securityfocus.com" will menunjuukan points list webpage that has links on the page SecurityFocus.
"Related:" syntax will list web pages that are similar to that on the web page indicated.
For example: "related: www [dot] lintanxs [dot] com", the search will list web pages similar to homepage Securityfocus.
"Intext:" syntax of this command will look for certain words on the website. This command ignores links or URLs and page titles. For example:
"Intext: admin" (without quotation marks), the search will produce a link on a web page that has the keywords that have keyword admin.
Some of the query syntax above will greatly assist in the search for more detailed data and information.
Google can be a search engine to dig up some information and confidential information that is not expected to notify the weak side of a system. It is used by some individuals to penetrate a server or system information.
Syntax "index of" can be used to get a site that displays the index directory browsing.
Webserver with Index browsing enabled means anyone can access the webserver directories like ordinary local directories in general.
On this occasion, described how the use the syntax "index of" to get links to webserver directory browsing can be accessed .. This is a simple source of information can be obtained, but the content of information is often a very important information. Such information can only be a password or access online data transactions and other very important thing.
Below are some examples using "index of" to get the information important and sensitive nature.
ex:
Index of / admin
Index of / passwd
Index of / password
Index of / mail
"Index of /" + passwd
"Index of /" + password.txt
"Index of /" +. Htaccess
"Index of / secret"
"Index of / confidential"
"Index of / root"
"Index of / cgi-bin"
"Index of / credit-cards"
"Index of / logs"
"Index of / config"
"Index of / admin.asp
"Index of / login.asp
Looking for vulnerable systems or servers that use the syntax "inurl:" or "allinurl:"
1. Using the syntax "allinurl: winnt/system32 /"
(Without quotes) will list all the links on the server which gives access to restricted directories like "system32". Sometimes it can be obtained access to the cmd.exe in the directory "system32" which allows someone to take over control of the system on those servers.
2. Using "allinurl: WWWboard / passwd.txt" (without quotes) will list all the links on the server which are vulnerable to "WWWboard Password". Further discussion of vulnerability "WWWboard Password" can be seen on network security site like www [dot] lintanxs [dot] com.
3. Using the syntax "inurl: bash history" (without quotes) will list links to the server which gives access to the file "bash history" through the web. The file is a command history file containing a list of commands executed by the administrator, which sometimes includes sensitive information such as system passwords. Often the encrypted passwords on the system, to obtain the original form of the encrypted password must be decrypted using a password cracker program. Long time to get the decryption depends on the reliability of the program and the many characters that are encrypted.
4. Using the "inurl: config.txt" (without quotes) will list all the links on the server which gives access to the file "config.txt. This file contains important information including the hash value of the password and authenticate the administrator of a database.
The syntax "inurl:" or "allinurl:" can be combined with other syntax as listed below:
Inurl: / cgi-bin/cart32.exe
inurl: admin filetype: txt
inurl: admin filetype: db
inurl: admin filetype: cfg
inurl: mysql filetype: cfg
inurl: passwd filetype: txt
inurl: IISAdmin
inurl: auth_user_file.txt
inurl: Orders.txt
inurl: "wwwroot / *."
inurl: adpassword.txt
inurl: webeditor.php
inurl: file_upload.php
inurl: gov filetype: xls "restricted"
index of ftp +. mdb allinurl: / cgi-bin / + mailto allinurl: / scripts/cart32.exe allinurl: / CuteNews / show_archives.php
allinurl: / phpinfo.php
allinurl: / privmsg.php
allinurl: / privmsg.php
inurl: cgi-bin/go.cgi? go =*
allinurl:. cgi? page =*. txt
allinurul: / modules / My_eGallery
Looking for a system or server that has a weakness with the syntax "intitle:" or "allintitle:"
1. Using allintitle: "index of / root" (without the quotes) will show
List of links on a web server which gives access to a restricted directory as the root directory.
2. Using allintitle: "index of / admin" (without the quotes) will display links on the site which has an index browsing enabled for restricted directories like the directory "admin".
Another use of syntax "intitle:" or "allintitle:" combined with other syntax, among others:
intitle: "Index of". sh_history
intitle: "Index of". bash_history
intitle: "index of" passwd
intitle: "index of" people.lst
intitle: "index of" pwd.db
intitle: "index of" etc / shadow
intitle: "index of" spwd
intitle: "index of" master.passwd
intitle: "index of" htpasswd
intitle: "index of" members OR accounts
intitle: "index of" user_carts OR user_cart
allintitle: sensitive filetype: doc
allintitle: restricted filetype: mail
allintitle: restricted filetype: doc site: gov
allintitle: *. php? filename =*
allintitle: *. php? page =*
allintitle: *. php? logon =*
The use and combination of the syntax is not only limited to the examples above exposure. There are many more combinations of syntax syntax with a variety of keywords that can be used. It depends on the creativity and willingness to try. It is better to use a discourse that has been presented which is used for the benefit of not causing harm or damage.
Weakness in a system or server that is known to be a good idea-sharing with the relevant system administrators that can benefit all parties. Due to the likely outcome of the search information can provide sensitive information, which often involves the security aspect of a system or server.
Here are some examples of cases:
(Please try ... all risks relating to security websites that target ... is the responsibility of each)
Basic operators
+, -, ~,., *, "", |, OR
Additional Operators
allintext:, allintitle:, allinurl:, bphonebook:, cache:, define:, filetype:, info:, intext:, intitle:, inurl:, link:, phonebook:, related:, rphonebook:, site:, numrange: , daterange
Extension which can be searched:
HyperText Markup Language (html)
Microsoft PowerPoint (ppt)
Adobe Portable Document Format (pdf)
Microsoft Word (doc)
Adobe PostScript (ps)
Microsoft Works (wks, wps, wdb)
Lotus 1-2-3 (wk1, wk2, wk3, wk4, wk5, WKI, wks, wku)
Microsoft Excel (xls)
Microsoft Write (WRI)
Lotus WordPro (lwp)
Rich Text Format (rtf)
MacWrite (mw)
Shockwave Flash (swf)
Text (ans, txt)
Search by range
Rp5000000 computer .. 7 million
Search salaries
Salary filetype: xls site: edu
Salary filetype: xls site: edu
Financial information
Filetype: xls "checking account" "credit card"-intext: Application-intext: Form
Intitle: "Index of" finances.xls
Looking for an e-mail inbox
Intitle: index.of inurl: Inbox (456) (mit mailbox)
Intitle: index.of inurl: Inbox (inurl: User OR inurl: Mail) (220)
Detecting OS
"Microsoft-IIS/5.0 server at"
Intitle: "Welcome to Windows 2000 Internet Services" IIS 5.0
Intitle: Test.Page.for.Apache seeing.this.instead
Intitle: Test.page "SSL / TLS-aware"
Looking for passwords
Inurl: etc inurl: passwd
Intitle: "Index of .. etc" passwd
"#-FrontPage-" inurl: service.pwd
Inurl: admin.pwd filetype: pwd
Filetype: inc dbconn
Filetype: inc intext: mysql_connect
Filetype: this + + pwd WS_FTP
Filetype: log inurl: "password.log"
Looking for User Name
+ Intext: "webalizer" + intext: "Total Usernames" + intext: "Usage Statistics for"
Looking for License Key
Filetype: lic lic intext: key
Sensitve Directories Listing
Intitle: "Index of" cfide
Intitle: index.of.winnt
Intitle: "index of" iissamples
Discourse about the syntax is very helpful in the search for such information ultimately depends on the intent and purpose of the data search. Was really really done for data discovery needs, gather information from a target machine penetration. The goal ultimately depends on the intention of the individual concerned so that the author is not responsible for misuse of the information has been presented. As the old saying? the risk borne by the passengers?
thanks gan buat info nya yang sangat membantu ^>^
ReplyDeleteReview Agen Judi Online Terpercaya
Bonus Cashback Tertinggi
Bonus New Member SBOBET
Bandar Judi Bola Online Teraman
Agen Judi Slot Gaming Online Terbaik
Agen Live Casino Online Menguntungkan
Agen Capsa Susun Online Terpercaya
Judi Poker Online Resmi
ReplyDeleteHello,
we provide affordable and result-oriented SEO services, please give a chance to serve you.
Thanks
Admin: E07.net