The role of Intitle,inurl,filetype,site and its use in Google

Source: Internet
Author: User
Tags parent directory
Speaking of Google, no one knows nobody. As the world's first search engine, its powerful search function allows you to find everything you want in an instant. But for ordinary computer users, Google is a powerful search engine, and for hackers, it may be an excellent hacker tool. Because of Google's powerful search capabilities, hackers can construct special keywords and use Google to search for relevant privacy information on the Internet. Through Google, hackers can even hack a Web site in a matter of seconds. The process of using Google to search for relevant information and to invade it is called Google Hack.

Search is also an art

In our usual use of the search engine process, usually will need to search the keyword input search engine, and then began a lengthy process of information extraction. In fact, Google for the search keyword provides a variety of syntax, the rational use of these syntax, will make our search results more accurate. Of course, Google allows users to use these syntaxes for more precise results, but hackers can use these syntaxes to construct special keywords that make most of the search results a vulnerable web site.

Now let's take a look at some of Google's syntax:
Intitle: Searches the page title for pages that contain specific characters. For example, enter "INTITLE:CBI" so that pages with the CBI in the title of the page are searched.
Inurl: Searches for URLs that contain specific characters. For example, if you enter "INURL:CBI", you can find a URL with a CBI character.
Intext: Searches for a specified character in the body content of a Web page, such as entering "INTEXT:CBI". This syntax is similar to the "article content search" feature that we usually use in some websites.
Filetype: Searches for files of the specified type. For example, entering "FILETYPE:CBI" will return all file URLs that end with CBI.
Site: Locate the URL that is associated with the specified Web site. For example, enter "Site:family.chinaok.com". All URLs associated with this site will be displayed.
These are the common syntax of Google and the hack syntax of Google. While this is only a small part of Google's syntax, the rational use of these syntaxes will have unintended effects.

The role of grammar in Google hack

Having learned about Google's basic syntax, let's take a look at how hackers use these syntaxes for Google hack, and how these syntaxes will work in the process of intrusion.
Intitle
Intitle syntax is often used to search the background of the site, special pages and files, through Google search "intitle: Login", "intitle: Management" can find a lot of Web site's background login page. In addition, intitle syntax can also be used on search files, such as search "intitle:" indexof "Etc/shadow" can be found in Linux because the configuration is unreasonable and leaked user password files.
Inurl
Google hack, inurl play the role of the largest, can be divided into the following two aspects: Look for Web site background login address, search special URL.
Looking for Web site background login address: And intitle is different, inurl can specify the keyword in the URL, we all know that the background URL of the site is similar to Login.asp, admin.asp for the end, then we just to "inurl:login.asp", " inurl:admin.asp "Search for keywords, you can also find a lot of web site backstage." In addition, we can also search the site's database address, "Inurl:data", "inurl:db" for the keyword search can be.

1. Looking for the website's Backstage login page
Search for special URLs: Search for special URLs through inurl syntax, we can find a lot of Web site program vulnerabilities, such as the first IIS in the Uncode directory traversal vulnerability, we can construct "Inurl:/winnt/system32/cmd Exe?/c+dir" Search for such a keyword, but it is difficult to search for a site with such an antique vulnerability. Again such as the previous days very fire upload loophole, we use "inurl:upload.asp" or "inurl:upload_soft.asp" can find a lot of upload page, at this time and then use the tool to upload the Trojan can complete the invasion.


Intext
Intext's role is to search the specified characters in the Web page, which seems to have little effect in Google hack, but after searching with "intext:to parent directory" For the keyword, we are surprised to find that the directories of countless sites are exposed to our eyes. We can switch directories and browse through files at random, just like having a simple webshell. This behavior is caused by the configuration negligence of IIS. Similarly, the Chinese IIS configuration negligence may also have a similar vulnerability, we use "intext: Go to the parent directory" can find a lot of vulnerable Chinese web sites.


2. Browse the files in the website at random
Filetype
The filetype function is to search for the specified file. If we want to search the site's database files, then can be "filetype:mdb" for the keyword search, will soon be able to download a number of Web site database files. Of course, the role of filetype grammar is not only this, but also more powerful when used in conjunction with other grammars.
Site
Hackers use site, usually is to do before the intrusion of information spying. Site syntax can display all and the target site has links to the page, from which more or less there are some information about the target site, which is the breakthrough for hackers, is a detailed report on the target site.

Combination of grammar, double power

Although the syntax described above can be used to complete some of the steps in an intrusion, it is inefficient to use only one syntax for intrusion. The power of Google hack is the ability to combine multiple syntaxes so that we can quickly find what we need. Let's simulate how hackers use the Google syntax combination to invade a Web site.

Information spying
Hackers want to invade a website, usually the first step is to the target site for information spying. At this point, you can use the "site: the target site" to get the relevant web pages from which to extract useful information.


3. Search related pages
Download the database for the Web site
Search "site: target site Filetype:mdb" can find the target site's database, where the site syntax limits the search scope, Filetype determine the search target. One drawback with this approach is that the success rate of downloading to a database is low. Here we can also use another syntax combination, if the target site has IIS configuration flaw, that is, you can browse the site folder, we search "site: Target site intext:to parent directory" to determine whether this vulnerability exists. After you identify the vulnerability, you can use the site: Target Web site intext:to parent Directory+intext.mdb to perform a database search.

4. Locate the Web site database


Login Background Admin
After downloading to the database, we can find the site's administrator account and password, and login to the background of the site. For site background lookup, you can use the syntax combination "site: Target site intitle: Management" or "site: target site inurl:login.asp" to search, of course, we can do Lenovo here, with different characters to search, This will have a great probability to find the site's background management address. Next hackers can upload webshll in the background, further enhance the permissions, no longer elaborated here.


    exploit other vulnerabilities
         if the download database is unsuccessful, we can also try other intrusion methods. For example, look for upload vulnerabilities, search "site: Target site inurl:upload.asp." In addition, we can customize the statements of Google hack according to the characteristics of some bugs.
         Google Hack has the flexibility to combine French, and a logical combination of syntax will make it easy to invade, and then add your own search characters, Google can be your unique hacker tool.

Reasonable setting to guard against Google Hack
    
5. Reasonable settings site
          Google hack seemingly pervasive, but in fact nothing is the use of our site when the negligence of the configuration. For example, search for "intext:to parent directory" above to find a lot of Web sites can browse the directory files, this is due to the lack of set the site permissions caused. In IIS, setting up a user's access to a Web site has an option called directory browsing, and if you accidentally select the item, the result is as described above, allowing the hacker to skim through the files on your site.
         the way to prevent this vulnerability is simple, do not select the Directory browsing option when setting user permissions.

6. Do not select this item
Writing robots.txt files
Robot.txt is a pure text file specially written for search engine robot robot. We can in this file to explain the site does not want to be robot access to the part, so that some or all of our site can not be included in the search engine, or let the search engine only included the specified content. So we can use robots.txt to let Google's robot access to our site's important documents, Google hack threat is not there.


The robots.txt document was prepared as follows:
User-agent: *
Disallow:/data/
Disallow:/db/


The "disallow" parameter is followed by the robot included part of the path, for example, we want to let robot prohibit the inclusion of the site directory under the "Data" folder, simply add "/data/" after the disallow parameters. If you want to add additional catalogs, simply continue adding them in this format. When the file is written and uploaded to the root of the website, it can keep the site away from Google hack.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.