Focus Technology: Google, you are so nice (Google hack)

Source: Internet
Author: User
Tags docushare

In fact, it should have been released early. I am probably the first batch of people to sort out Google's skills in China. Later, sniper wrote Google hack, which made it even lazy. Now I am helping my wife find a paper, and the keyword matching is so tired. These skills are after I sort them out. If you are interested, you can ask for them directly.

Http: //

By swap

The intra-site search address is:

Http:// Domains = (Here we want to search for the site, such as

You can select WWW and to go in. Of course, you can select the website you want to search!

The hacker's dedicated information and data search address are:

Http:// Hl = XX-hacker

Here is the Google Keyword usage. To set it to Chinese, it is

Http:// Hl = ZH-CN

English is Hl = en

Common Google keywords:

Foo1 foo2 (that is, association, such as searching XX Company XX beauty)

Operator: foo

Filetype: 123 type

Site: is more interesting than directly viewing the website and can get a lot of unexpected information.

Intext: foo

Intitle: fooltitle title

Allinurl: Foo searches for all related connections of XX website. (Required)

Links: Foo. You just need to know its link.


We can help "-" "+" to adjust the search Accuracy

Search for a password directly: (quotes indicate exact search)

Of course, we can extend it to the above results for secondary search.

"Index of" htpasswd/passwd

Filetype: xls Username Password email


"Config. php"

Allinurl: Admin MDB

Service filetype: Pwd... or a pcAnywhere password suffix, such as "CIF"

More and more interesting, and more sensitive information

"Robots.txt" "disallow:" filetype: txt

Inurl: _ vti_cnf (the key index of FrontPage, the CGI library of the scanner generally has a location)

Allinurl:/MSADC/samples/selector/Showcode. asp


/Examples/JSP/SNP/snoop. jsp


Intitle: Index of/admin

Intitle: "documetation"

Inurl: search by multiple keywords such as 5800 (VNC port) or desktop Port

Webmin port 10000

Inurl:/admin/login. asp

Intext: powered by gbook365

Intitle: "php shell *" "enable stderr" filetype: PhP directly searches for phpwebshell filetype: Inc

IPSec filetype: Conf

Intilte: "error occurred" ODBC request where (select | insert) to put it bluntly, that is to say, you can directly look up the database for retrieval, for the current popular SQL injection, it will be developed.

Intitle: "php shell *" "enable stderr" filetype: PHP

"Dumping data for table" Username Password

Intitle: "Error Using hypernews"

"Server software"

Intitle: "http_user_agent = googlebot"

"Http_user_anget = googlebot" ths Admin

Filetype:. Doc site:. Mil classified

Check multiple keywords:

Intitle: config confixx Login Password

"" Nessus report

"Report generated"



Google cache utilization (Hoho, the most influential thing), we recommend that you search for more "select all websites"

Special Recommendation: administrator users and other related things, such as names and birthdays ...... You can also use it as a dictionary.


View similar results

First look for the website management background address:

Site: intext: Management

Site: inurl: Login

Site: intitle: Management

Site: inurl: File

Site: inurl: Load

Site: intext: ftp ://*:*

Site: filetype: ASP

Site: // obtain N second-level domain names

Site: intext: * @ // get n email addresses and the name of the email owner.

Site: intext: Phone Number // n

Intitle: "index of" etc

Intitle: "index of". sh_history

Intitle: "index of". bash_history

Intitle: "index of" passwd

Intitle: "index of" People. lst

Intitle: "index of" PWD. DB

Intitle: "index of" etc/shadow

Intitle: "index of" spwd

Intitle: "index of" Master. passwd

Intitle: "index of" htpasswd

"#-FrontPage-" inurl: Service. pwd

Allinurl: BBS data

Filetype: MDB inurl: Database

Filetype: Inc Conn

Inurl: Data filetype: MDB

Intitle: "index of" data


A collection of tips:

3) "http: // *: * @ www" domainname: Find some ISP sites and check the Virtual Host of the IP address of the other party.


4) auth_user_file.txt is not practical. It is too old.

5) the master list

6) intitle: "Welcome. to. squeezebox" is a special management system. Port 90 is enabled by default.

7) passlist.txt (a better way) Dictionary

8) "A syntax error has occurred" filetype: ihtml

9) Ext: PhP program_listing intitle: mythweb. program. Listing

10) intitle: Index. Of abyss. conf

11) Ext: NBE

12) intitle: "sww link" "Please wait ....."


14) intitle: "freifunk. Net-status"-site:

15) intitle: "WorldClient" intext :"? (2003 | 2004) Alt-N technologies ."

17) intitle: Open-Xchange inurl: Login. pl

20) intitle: "site administration: Please log in" "site designed by emarketsouth"

21) ORA-00921: unexpected end of SQL command

22) intitle: "Yala: yet another LDAP administrator"

23) Welcome. To phpqladmin "Please login"-Cvsweb

24) intitle: "sww link" "Please wait ....."

25) inurl: "port_255"-htm

27) intitle: "WorldClient" intext :"? (2003 | 2004) Alt-N technologies ."

These are some new vulnerability techniques announced in 0days

Ext: PhP program_listing intitle: mythweb. program. Listing

Inurl: preferences. ini "[eMule]"

Intitle: "index of/cfide/" Administrator

"Access denied for user" "Using password"

Ext: PhP intext: "powered by phpnewman version": path/to/news/browse. php? Clang =.../../file/I/want

Inurl: "/becommunity/community/index. php? Pageurl ="

Intitle: "ASP fileman" resend-site:

"Enter IP" inurl: "php-ping.php"

Ext: conf inurl: rsyncd. conf-CVS-man

Intitle: private, protected, secret, secure, winnt

Intitle: "DocuShare" inurl: "DocuShare/dsweb/"-FAQ-gov-edu

"# MySQL dump" filetype: SQL

"Allow_call_time_pass_reference" "path_info"

"Certificate practice statement" inurl :( PDF | DOC)

LeapFTP intitle: "index. Of./" sites. ini modified

Master. passwd

MySQL history files

Nickserv registration passwords


Passlist.txt (a better way)


Passwd/etc (reliable)

People. lst

Psybnc config files


Signin filetype: URL

Spwd. DB/passwd

Trillian. ini

WWWBoard WebAdmin inurl: passwd.txt wwwboard | Webadmin

"#-FrontPage-" Ext: Pwd inurl :( service | authors | Administrators | users) "#-FrontPage -"

Inurl: Service. pwd

"Autocreate = true Password = *"

"Http: // *: * @ www" domainname

"Index of/" "ws_ftp.ini" "parent directory"

"Liveice configuration file" Ext: CFG-site:

"Powered by ducalendar"-site:

"Powered by duclassified"-site:

"Powered by duclassified"-site: "duware All rights reserved"

"Powered by duclassmate"-site:

"Powered by dudirectory"-site:

"Powered by dudownload"-site:

"Powered by elite Forum version *.*"

"Powered by link Department"

"Sets mode: + K"

"Powered by dupaypal"-site:

Allinurl: Admin MDB


Config. php

Eggdrop filetype: User user

Etc (index.)

Ext: ini Eudora. ini

Ext: ini version =... Password

Ext: TXT inurl: unattend.txt

Filetype: Bak inurl: "htaccess | passwd | shadow | htusers"

Filetype: cfg mrtg "target [*]"-Sample-CVS-Example

Filetype: cfm "cfapplication name" Password

Filetype: conf oekakibbs

Filetype: conf SC _serv.conf

Filetype: conf slapd. conf

Filetype: config intext: appsettings "User ID"

Filetype: dat "password. dat"

Filetype: DAT wand. dat

Filetype: Inc dbconn

Filetype: Inc intext: mysql_connect

Filetype: Inc mysql_connect or mysql_pconnect

Filetype: INF sysprep

Filetype: inurl: "serv-u.ini"

Filetype: ini inurl: flashfxp. ini

Filetype: ini servudaemon

Filetype: ini wcx_ftp

Filetype: ini WS_FTP pwd

Filetype: LDB Admin

Filetype: log "see 'ipsec copyright"

Filetype: log inurl: "password. log"

Filetype: MDB inurl: users. MDB

Filetype: MDB wwforum

Filetype: netrc Password

Filetype: Pass pass intext: userid

Filetype: PEM intext: Private

Filetype: Properties inurl: DB intext: Password

Filetype: Pwd Service

Filetype: PWL

Filetype: Reg + intext: "DefaultUserName" + intext: "defaultpassword"

Filetype: Reg HKEY_CURRENT_USER sshhostkeys

Filetype: SQL ("values * MD" | "values * password" | "values * encrypt ")

Filetype: SQL ("passwd values" | "password values" | "Pass values ")

Filetype: SQL + "identified by"-CVS

Filetype: SQL Password

Filetype: URL + inurl: "ftp: //" + inurl :";@"

Filetype: xls Username Password email



Htpasswd/htpasswd. Bak

Intext: "enable secret $"

Intext: "powered by web wiz journal"

Intitle: "index of" intext: connect. inc

Intitle: "index of" intext: globals. inc

Intitle: "index of" passwords modified

Intitle: dupics inurl :( Add. asp | default. asp | view. asp | voting. asp)-site:

Bytes ----------------------------------------------------------------------------------------------------------------------

Intitle: Index. Of intext: "secring. SKr" | "secring. PGP" | "secring. Bak"

Inurl: "GRC. dat" intext: "password"

Inurl: "slapd. conf" intext: "credentials"-manpage-"manual page"-MAN:-Sample

Inurl: "slapd. conf" intext: "rootpw"-manpage-"manual page"-MAN:-Sample

Inurl: "wvdial. conf" intext: "password"

Inurl:/DB/Main. MDB

Inurl: chap-secrets-CVS

Inurl: config. php dbuname dbpass

Inurl: filezilla. XML-CVS

Inurl: Lilo. conf filetype: conf password-tatercounter-bootpwd-man

Inurl: nuke filetype: SQL

Inurl: ospfd. conf intext: Password-Sample-test-tutorial-download route Configuration

Inurl: pap-secrets-CVS

Inurl: Perform filetype: ini

Inurl: secring Ext: Skr | Ext: PGP | Ext: Bak

Inurl: vtund. conf intext: Pass-CVS

Inurl: Zebra. conf intext: Password-Sample-test-tutorial-Download

"Generated by phpsystem"

"Generated by wwwstat"

"Host vulnerability Summary Report"]

"Http_from = googlebot" "server_software ="

"Index of"/"chat/logs" chat room

"Installed objects" inurl: Default. asp

"Mecury version" "infastructure group"

"Microsoft (r) Windows * (TM) version * drwtsn copyright (c)" Ext: Log

"Most submitted forms and scripts" "This section"

"Network Vulnerability Assessment Report"

"Not for distribution" Confidential

"Phone ***" "Address *" "E-mail" intitle: "curriculum vitae"

"PhpMyAdmin" "running on" inurl: "Main. php"

"Produced by getstats"

"Request details" "Control tree" "server variables"

"Robots.txt" "disallow:" filetype: txt

"Running in child mode"

"Sets mode: + P"

"Sets mode: + S"

"Thank you for your order" + receept

"This is a zooaza node"

"This report was generated by weblog"

(Filetype: Mail | filetype: EML | filetype: mbox | filetype: mbx) intext: Password | subject

(Inurl: "robot.txt" | inurl: "robots.txt") intext: disallow filetype: txt

-Site:"the PHP Group" inurl: Source inurl: URL Ext: PHP

FBR "Adobe Photoshop"

AIM Buddy lists

Allinurl:/examples/JSP/SNP/snoop. jsp

Allinurl: Servlet/snoopservlet

Cgiirc. conf

Data filetype: MDB-site: Gov-site: Mil

Exported email addresses

Ext: ASP inurl: pathto. asp

Ext: CGI inurl: editcgi. cgi inurl: file =

Ext: conf inurl: rsyncd. conf-CVS-man

Ext: conf nocatauth-CVS

Ext: dat bpk. dat

Ext: gho

Ext: ini intext: ENV. ini

Ext: ldif

Ext: log "software: Microsoft Internet Information Services *.*"

Bytes ------------------------------------------------------------------------------------------

Ext: MDB inurl: *. mdb inurl: fpdb shop. MDB

Filetype: BKF

Filetype: BLT "buddylist"

Filetype: BLT + intext: screenname

Filetype: CFG auto_inst.cfg

Filetype: conf inurl: firewall-intitle: CVs

Filetype: config web. config-CVS

Filetype: CTT messenger

Filetype: FP fp

Filetype: FP-site: Gov-site: Mil-"CVS log"

Filetype: INF inurl: capolicy. inf

Filetype: LIC intext: Key

Filetype: MYD-CVS

Filetype: NS

Filetype: ora

Filetype: ora tnsnames

Filetype: PDB backup (pilot | pluckerdb)

Filetype: Pot inurl: John. Pot

Bytes ------------------------------------------------------------------------------------------------------------------

Filetype: PST inurl: "Outlook. Pst"

Filetype: PSt-from-to-date

Filetype: qbb

Filetype: RDP

Filetype: Reg "Terminal Server Client"

Filetype: VCs

Filetype: WAB wab

Filetype: xls-site: Gov inurl: Contact

Filetype: xls inurl: "email.xls"

Financial spreadsheets: finance.xls

Financial spreadsheets: finances.xls

Ganglia cluster reports

Haccess. CTL (one way)

Haccess. CTL (very reliable)

ICQ Chat logs, please...

Iletype: log cron. Log

Intext: "session start *****: *: **" filetype: Log

Intext: "Tobias oetiker" "Traffic Analysis"

Intext :( password | passcode) intext :( username | userid | user) filetype: CSV

Intext: Gmail invite intext:

Intext: sqlitemanager inurl: Main. php

Intitle: "Apache: status" (inurl: Server-status | inurl: status.html | inurl: apache.html)

Intitle: "appserv open project"-site:

Intitle: "ASP stats Generator *. *" "ASP stats generator" "-weppos"

Intitle: "FTP root"

Intitle: "index of" + MYD size

Intitle: "index of"-inurl: maillog size

Intitle: "index of" cookies.txt size

Intitle: "index of" mysql. conf or mysql_config

Intitle: "index of" upload size parent directory

Intitle: "index. Of". Diz. nfo last modified

Intitle: "multimon ups status page"

Intitle: "php advanced transfer" (inurl: index. php | inurl: showrecent. php)

Intitle: "PHPMyExplorer" inurl: "index. php"-CVS


Intitle: "Statistics of" "advanced web statistics"

Intitle: "system Statistics" + "system and Network Information Center"

Intitle: "usage statistics for" "generated by Webalizer"

Intitle: "WBEM" Compaq login "Compaq Information Technologies Group"

Intitle: "Web server statistics ****"

Intitle: "Web Server Status" ssh Telnet

Intitle: "Welcome. to. squeezebox"

Intitle: Admin intitle: Login

Intitle: Index. Of "Apache" "server"

Intitle: Index. of cleanup. Log

Intitle: Index. Of dead. Letter

Intitle: Index. Of inbox

Intitle: Index. Of inbox dbx

Intitle: Intranet inurl: Intranet + intext: "phone"

Inurl: "/axs/"-script

Inurl: "/cricket/Grapher. cgi"

Inurl: "bookmark.htm"

Inurl: "cacti" + inurl: "graph_view.php" + "Settings Tree View"-CVS-rpm

Inurl: "newsletter/admin /"

Inurl: "newsletter/admin/" intitle: "newsletter admin"

Inurl: "putty. Reg"

Inurl: "smb. conf" intext: "workgroup" filetype: conf Conf

Bytes ----------------------------------------------------------------------------------------------------------

Welcome to ntop!

"Adding new user" inurl: addnewuser-"There are no domains"

(Inurl:/cgi-bin/. Cobalt/) | (intext: "Welcome to the Cobalt RaQ ")

Filetype: PhP haxplorer "server files Browser"

Intitle: "Web Data Administrator-login"

inurl: connectcomputer/precheck.htm | inurl: Remote/logon. aspx
PHP shell (unprotected)
phpkonsole phpshell filetype: PHP-echo
Public PHP filemanagers

"index of"/Picasa. INI
"index of" inurl: recycler
"index of" rar r nfo modified
"intitle: Index. of/"stats merchant CGI-* ETC
" powered by invision power File Manager "(inurl: login. PHP) | (intitle: "browsing directory/")
"Web file browser" "use regular expression"
filetype: ini desktop. INI intext: mydocs. DLL
intext: "D. aspx? ID "| inurl:" D. aspx? ID "
intext:" powered by: totalindex "intitle:" totalindex "
intitle: "album Permissions" "users who can modify photos" "everybody"
intitle: "directory listing for" intext: tomcat-intitle: tomcat
intitle: "HFS/" + "httpfileserver"
intitle: "index of *" inurl: "My shared folder" size modified
"File Upload Manager v. "" RENAME to "

Ext: ASP "powered by duforum" inurl :( messages | details | login | default | register)-site:

Ext: ASP inurl: dugallery intitle: "."-site:

Ext: CGI inurl: ubb_test

Ezboo "Administrator panel"-CVS

Filetype: CGI inurl: cachemgr. cgi

Filetype: CNF my. CNF-CVS-Example

Filetype: Inc intext: setcookie

Filetype: PhP inurl: "viewfile"-"index. php"-"idfil

Filetype: WSDL

Intitle: "ASP fileman" resend-site:

Intitle: "index of/" modified php.exe

Intitle: "phpremoteview" filetype: PhP "name, size, type, modify"

Inurl: "wwwadmin. pl" intitle: "wwwadmin"

Inurl: "nph-proxy.cgi" "start browsing through this CGI-based proxy"

Inurl: "plog/register. php"

Inurl: CGI. ASX? Storeid

Inurl: robpoll. cgi filetype: CGI

The master list

"More info about metacart free"

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.