Techware Labs Header

Forums have moved

See this announcement for more details, or just go directly there.


Go Back   Techwarelabs Community > Tech > General Board

Reply
 
Thread Tools Search this Thread Display Modes
  #1  
Old 01-24-2004, 12:02 AM
Prometheus Prometheus is offline
Chronique Technique
Lab Master Techie
 
Join Date: Sep 2002
Location: Bellingham,WA
Posts: 3,058
Send a message via AIM to Prometheus
Default google is a dream come true(again not mine)

Google a Dream come true


****************************** ComSec ***********************************

article by: ComSec

date: 25.5.2003

Simplified



INTRO=========

a week or so back i had an e-mail from a friend (FLW) asking me if i had any info on google search tips

he was surprised on the amount of info available and open via google...this got me thinking , well i have seen many various search strings in several papers....so i thought i would put them all together on the one page...and up-date as new one are discovered...so if i missed any to be added to the list please let me know and i shall add some more....



*********************************************************************************************************************************************
WARNING:::i hold no responsibility for what you do via the information supplied here...this is for educational purpose only , use at your own risk you have been warned
*********************************************************************************************************************************************

thanks

ComSec aka ZSL


SUMMERY=======

Everyone knows google in the security sector...and what a powerful tool it is , just by entering certain search strings you can gain a vast amount of knowledge and information of your chosen target...often revealing sensitive data...this is all down to badly configured systems...brought on by sloppy administration allowing directory indexing and accessing , password files , log entrys , files , paths ,etc , etc


Search Tips

so how do we start ?

the common search inputs below will give you an idea...for instance if you want to search for the an index of "root"

in the search box put in exactly as you see it below

==================

example 1:


allintitle: "index of/root"


result:

http://www.google.com/search?hl=en&i...=Google+Search

what it reveals is 2,510 pages that you can possible browse at your will...

====================

example 2


inurl:"auth_user_file.txt"

http://www.google.com/search?num=100...=Google+Search

this result spawned 414 possible files to access

here is an actual file retrieved from a site and edited , we know who the admin is and we have the hashes thats a job for JTR (john the ripper)

txUKhXYi4xeFs|master|admin|Worasit|Junsawang|xxx@xxx|on
qk6GaDj9iBfNg|tomjang||Bug|Tom|xxx@xxx|on

with the many variations below it should keep you busy for a long time mixing them reveals many different permutations

*************************************

SEARCH PATHS....... more to be added

*************************************

"Index of /admin"
"Index of /password"
"Index of /mail"
"Index of /" +passwd
"Index of /" +password.txt
"Index of /" +.htaccess
index of ftp +.mdb allinurl:/cgi-bin/ +mailto

administrators.pwd.index
authors.pwd.index
service.pwd.index
filetype:config web
gobal.asax index

allintitle: "index of/admin"
allintitle: "index of/root"
allintitle: sensitive filetype:doc
allintitle: restricted filetype :mail
allintitle: restricted filetype:doc site:gov

inurlasswd filetype:txt
inurl:admin filetype:db
inurl:iisadmin
inurl:"auth_user_file.txt"
inurl:"wwwroot/*."


top secret site:mil
confidential site:mil

allinurl: winnt/system32/ (get cmd.exe)
allinurl:/bash_history

intitle:"Index of" .sh_history
intitle:"Index of" .bash_history
intitle:"index of" passwd
intitle:"index of" people.lst
intitle:"index of" pwd.db
intitle:"index of" etc/shadow
intitle:"index of" spwd
intitle:"index of" master.passwd
intitle:"index of" htpasswd
intitle:"index of" members OR accounts
intitle:"index of" user_carts OR user_cart

ALTERNATIVE INPUTS====================

_vti_inf.html
service.pwd
users.pwd
authors.pwd
administrators.pwd
shtml.dll
shtml.exe
fpcount.exe
default.asp
showcode.asp
sendmail.cfm
getFile.cfm
imagemap.exe
test.bat
msadcs.dll
htimage.exe
counter.exe
browser.inc
hello.bat
default.asp\
dvwssr.dll
cart32.exe
add.exe
index.jsp
SessionServlet
shtml.dll
index.cfm
page.cfm
shtml.exe
web_store.cgi
shop.cgi
upload.asp
default.asp
pbserver.dll
phf
test-cgi
finger
Count.cgi
jj
php.cgi
php
nph-test-cgi
handler
webdist.cgi
webgais
websendmail
faxsurvey
htmlscript
perl.exe
wwwboard.pl
www-sql
view-source
campas
aglimpse
glimpse
man.sh
AT-admin.cgi
AT-generate.cgi
filemail.pl
maillist.pl
info2www
files.pl
bnbform.cgi
survey.cgi
classifieds.cgi
wrap
cgiwrap
edit.pl
perl
names.nsf
webgais
dumpenv.pl
test.cgi
submit.cgi
guestbook.cgi
guestbook.pl
cachemgr.cgi
responder.cgi
perlshop.cgi
query
w3-msql
plusmail
htsearch
infosrch.cgi
publisher
ultraboard.cgi
db.cgi
formmail.cgi
allmanage.pl
ssi
adpassword.txt
redirect.cgi
cvsweb.cgi
login.jsp
dbconnect.inc
admin
htgrep
wais.pl
amadmin.pl
subscribe.pl
news.cgi
auctionweaver.pl
.htpasswd
acid_main.php
access.log
log.htm
log.html
log.txt
logfile
logfile.htm
logfile.html
logfile.txt
logger.html
stat.htm
stats.htm
stats.html
stats.txt
webaccess.htm
wwwstats.html
source.asp
perl
mailto.cgi
YaBB.pl
mailform.pl
cached_feed.cgi
global.cgi
Search.pl
build.cgi
common.php
show
global.inc
ad.cgi
WSFTP.LOG
index.html~
index.php~
index.html.bak
index.php.bak
print.cgi
register.cgi
webdriver
bbs_forum.cgi
mysql.class
sendmail.inc
CrazyWWWBoard.cgi
search.pl
way-board.cgi
webpage.cgi
pwd.dat
adcycle
post-query
help.cgi


there are to many people to thank for the bits of information cut and pasted and added to form this paper
most have been collected from various forums , txt , doc's etc...like to thank you all, its not intended to rip anyone
its just a combo of various search inputs...put on the one Paper to use as a reference.


EOF

====================================

http://comsec.governmentsecurity.org

http://governmentsecurity.org/forum

******* new members welcome ********

====================================
Reply With Quote
  #2  
Old 01-27-2004, 10:20 AM
StinkyMojo StinkyMojo is offline
Mad Techie
 
Join Date: Dec 2002
Location: Black Mesa Research Facility
Posts: 2,935
Default

Where the hell do you find these crazy articles? lol
__________________

Asus A8N SLI - Opteron 148 @ 2.8 under a Zalman 7000cu LED - XFX 7800GT oc'd - 1gb Kingston Hyper X pc3000 BH5 2-2-2 - OCZ ModStream 450watt - WD 36gb Raptor - WD 320gb Storage Drive - Antec Super LanBoy - NEC 3550A 16x DVD Burner
Accessories:
ViewSonic VA1912wb 19" 8ms Widescreen - Plantronics Audio 90 - Logitech Z-640 5.1 - Razer Diamondback Plasma LE on a Ratpadz GS
Linux Box:
Pending..
Reply With Quote
  #3  
Old 01-27-2004, 10:29 AM
Prometheus Prometheus is offline
Chronique Technique
Lab Master Techie
 
Join Date: Sep 2002
Location: Bellingham,WA
Posts: 3,058
Send a message via AIM to Prometheus
Default

I joined astalavista.net

the Internet Security Portal

lots of nifty files
Reply With Quote
Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump


All times are GMT -5. The time now is 06:06 AM. Powered by vBulletin® Version 3.6.5
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
Forum style by ForumMonkeys.