Blogroll

Secret of Google Search Engine

Google is a search engine which is very unusual, a lot of scripts are hidden and only certain people who know. Keyword Script is mostly used for hacking. Here's How to use Script hidden keywords on Google:

"Intitle:" syntax restricts the search only produces headers that contain information on the topic in question. For example in the search, "intitle:

password is admin "(without the quotes). The search will find pages that contain the word "password" as its title with the highest priority "admin".

If the search query there are two main search, use the syntax allintitle: to search completely. For example the search "allintitle: admin mdb". Then the search will be restricted to two main subject headings of "admin" and "mdb".

"Inurl:" syntax restricts the search results to those URLs containing the keyword information is intended. For example a search in the search, "inurl: passwd". The search will produce all URLs that contain only information about the "passwd".

The same thing applies to this syntax, if there are two main search query, use the syntax "allinurl:" to get the url list.

For example search "allinurl: etc / passwd", will search for the URLs containing "etc" and "passwd". Slash slash ("/") between the two words etc and passwd are ignored by the search engine Google.

 
"Site:" syntax restricts Google to query information based on a particular site or domain. For example in information retrieval: "exploits site: itb.ac.id" (without the quotes). The search will look for topics about exploits that are available on all pages on the domain itb.ac.id.

"Cache:" will show a list of the web which have been entered into Google's index database. For example:

"Cache: deffcon.org", the search will show the list that is stored on Google to page deffcon .. org

"Filetype:" syntax on Google to search the data on the internet with particular extensions (ie doc, pdf or ppt etc). For example in the search: "filetype: doc site: go.id confidential" (without the quotes). The search will produce a data file with the extension ". Doc" in all domains go.id that contains the information "confidential".

"Link:" syntax on Google that will show a list of list webpages that have links on a special webpage. For example: "link: www.securityfocus.com" will menunjuukan points list webpage that has links on the page SecurityFocus.

"Related:" syntax will list web pages that are similar to that on the web page indicated.

For example: "related: www [dot] lintanxs [dot] com", the search will list web pages similar to homepage Securityfocus.

"Intext:" syntax of this command will look for certain words on the website. This command ignores links or URLs and page titles. For example:

"Intext: admin" (without quotation marks), the search will produce a link on a web page that has the keywords that have keyword admin.

Some of the query syntax above will greatly assist in the search for more detailed data and information.

Google can be a search engine to dig up some information and confidential information that is not expected to notify the weak side of a system. It is used by some individuals to penetrate a server or system information.

Syntax "index of" can be used to get a site that displays the index directory browsing.

Webserver with Index browsing enabled means anyone can access the webserver directories like ordinary local directories in general.

On this occasion, described how the use the syntax "index of" to get links to webserver directory browsing can be accessed .. This is a simple source of information can be obtained, but the content of information is often a very important information. Such information can only be a password or access online data transactions and other very important thing.

Below are some examples using "index of" to get the information important and sensitive nature.

ex:

Index of / admin

Index of / passwd

Index of / password

Index of / mail

"Index of /" + passwd

"Index of /" + password.txt

"Index of /" +. Htaccess

"Index of / secret"

"Index of / confidential"

"Index of / root"

"Index of / cgi-bin"

"Index of / credit-cards"

"Index of / logs"

"Index of / config"

"Index of / admin.asp

"Index of / login.asp

Looking for vulnerable systems or servers that use the syntax "inurl:" or "allinurl:"

1. Using the syntax "allinurl: winnt/system32 /"

(Without quotes) will list all the links on the server which gives access to restricted directories like "system32". Sometimes it can be obtained access to the cmd.exe in the directory "system32" which allows someone to take over control of the system on those servers.

2. Using "allinurl: WWWboard / passwd.txt" (without quotes) will list all the links on the server which are vulnerable to "WWWboard Password". Further discussion of vulnerability "WWWboard Password" can be seen on network security site like www [dot] lintanxs [dot] com.

3. Using the syntax "inurl: bash history" (without quotes) will list links to the server which gives access to the file "bash history" through the web. The file is a command history file containing a list of commands executed by the administrator, which sometimes includes sensitive information such as system passwords. Often the encrypted passwords on the system, to obtain the original form of the encrypted password must be decrypted using a password cracker program. Long time to get the decryption depends on the reliability of the program and the many characters that are encrypted.

4. Using the "inurl: config.txt" (without quotes) will list all the links on the server which gives access to the file "config.txt. This file contains important information including the hash value of the password and authenticate the administrator of a database.

The syntax "inurl:" or "allinurl:" can be combined with other syntax as listed below:

Inurl: / cgi-bin/cart32.exe

inurl: admin filetype: txt

inurl: admin filetype: db

inurl: admin filetype: cfg

inurl: mysql filetype: cfg

inurl: passwd filetype: txt

inurl: IISAdmin

inurl: auth_user_file.txt

inurl: Orders.txt

inurl: "wwwroot / *."

inurl: adpassword.txt

inurl: webeditor.php

inurl: file_upload.php

inurl: gov filetype: xls "restricted"

index of ftp +. mdb allinurl: / cgi-bin / + mailto allinurl: / scripts/cart32.exe allinurl: / CuteNews / show_archives.php

allinurl: / phpinfo.php

allinurl: / privmsg.php

allinurl: / privmsg.php

inurl: cgi-bin/go.cgi? go =*

allinurl:. cgi? page =*. txt

allinurul: / modules / My_eGallery

Looking for a system or server that has a weakness with the syntax "intitle:" or "allintitle:"

1. Using allintitle: "index of / root" (without the quotes) will show

List of links on a web server which gives access to a restricted directory as the root directory.

2. Using allintitle: "index of / admin" (without the quotes) will display links on the site which has an index browsing enabled for restricted directories like the directory "admin".

Another use of syntax "intitle:" or "allintitle:" combined with other syntax, among others:

intitle: "Index of". sh_history

intitle: "Index of". bash_history

intitle: "index of" passwd

intitle: "index of" people.lst

intitle: "index of" pwd.db

intitle: "index of" etc / shadow

intitle: "index of" spwd

intitle: "index of" master.passwd

intitle: "index of" htpasswd

intitle: "index of" members OR accounts

intitle: "index of" user_carts OR user_cart

allintitle: sensitive filetype: doc

allintitle: restricted filetype: mail

allintitle: restricted filetype: doc site: gov

allintitle: *. php? filename =*

allintitle: *. php? page =*

allintitle: *. php? logon =*

The use and combination of the syntax is not only limited to the examples above exposure. There are many more combinations of syntax syntax with a variety of keywords that can be used. It depends on the creativity and willingness to try. It is better to use a discourse that has been presented which is used for the benefit of not causing harm or damage.

Weakness in a system or server that is known to be a good idea-sharing with the relevant system administrators that can benefit all parties. Due to the likely outcome of the search information can provide sensitive information, which often involves the security aspect of a system or server.

Here are some examples of cases:

(Please try ... all risks relating to security websites that target ... is the responsibility of each)

Basic operators

+, -, ~,., *, "", |, OR

Additional Operators

allintext:, allintitle:, allinurl:, bphonebook:, cache:, define:, filetype:, info:, intext:, intitle:, inurl:, link:, phonebook:, related:, rphonebook:, site:, numrange: , daterange

Extension which can be searched:

HyperText Markup Language (html)

Microsoft PowerPoint (ppt)

Adobe Portable Document Format (pdf)

Microsoft Word (doc)

Adobe PostScript (ps)

Microsoft Works (wks, wps, wdb)

Lotus 1-2-3 (wk1, wk2, wk3, wk4, wk5, WKI, wks, wku)

Microsoft Excel (xls)

Microsoft Write (WRI)

Lotus WordPro (lwp)

Rich Text Format (rtf)

MacWrite (mw)

Shockwave Flash (swf)

Text (ans, txt)

Search by range

Rp5000000 computer .. 7 million

Search salaries

Salary filetype: xls site: edu

Salary filetype: xls site: edu

Financial information

Filetype: xls "checking account" "credit card"-intext: Application-intext: Form

Intitle: "Index of" finances.xls

Looking for an e-mail inbox

Intitle: index.of inurl: Inbox (456) (mit mailbox)

Intitle: index.of inurl: Inbox (inurl: User OR inurl: Mail) (220)

Detecting OS

"Microsoft-IIS/5.0 server at"

Intitle: "Welcome to Windows 2000 Internet Services" IIS 5.0

Intitle: Test.Page.for.Apache seeing.this.instead

Intitle: Test.page "SSL / TLS-aware"

Looking for passwords

Inurl: etc inurl: passwd

Intitle: "Index of .. etc" passwd

"#-FrontPage-" inurl: service.pwd

Inurl: admin.pwd filetype: pwd

Filetype: inc dbconn

Filetype: inc intext: mysql_connect

Filetype: this + + pwd WS_FTP

Filetype: log inurl: "password.log"

Looking for User Name

+ Intext: "webalizer" + intext: "Total Usernames" + intext: "Usage Statistics for"

Looking for License Key

Filetype: lic lic intext: key

Sensitve Directories Listing

Intitle: "Index of" cfide

Intitle: index.of.winnt

Intitle: "index of" iissamples

Discourse about the syntax is very helpful in the search for such information ultimately depends on the intent and purpose of the data search. Was really really done for data discovery needs, gather information from a target machine penetration. The goal ultimately depends on the intention of the individual concerned so that the author is not responsible for misuse of the information has been presented. As the old saying? the risk borne by the passengers?

2 komentar: