这里是一些关于Google Hack方面的整理

黑客专用信息和资料搜索地址为: 
http://www.google.com/custom?hl=xx-hacker 
这里是google关键字的用法,要设置它为中文,则是 
http://www.google.com/custom?hl=zh-CN 
英文则是http://www.google.com/custom?hl=en

常用的google关键字: 
foo1 foo2 (也就是关联,比如搜索xx公司 xx美女) 
operator:foo 
filetype:123 类型 
site:foo.com 相对直接看网站更有意思,可以得到许多意外的信息 
intext:foo 
intitle: fooltitle 标题哦 
allinurl:foo 搜索xx网站的所有相关连接。(踩点必备) 
links:foo 不要说就知道是它的相关链接 
allintilte:foo.com

我们可以辅助"-" "+"来调整搜索的精确程度

直接搜索密码:(引号表示为精确搜索) 
当然我们可以再延伸到上面的结果里进行二次搜索 
"index of" htpasswd / passwd 
filetype:xls username password email 
"ws_ftp.log" 
"config.php" 
allinurl:admin mdb 
service filetype:pwd ….或者某个比如pcanywhere的密码后缀cif等

越来越有意思了,再来点更敏感信息 
"robots.txt" "Disallow:" filetype:txt 
inurl:_vti_cnf (FrontPage的关键索引啦,扫描器的CGI库一般都有地) 
allinurl: /msadc/Samples/selector/showcode.asp 
/../../../passwd 
/examples/jsp/snp/snoop.jsp 
phpsysinfo 
intitle:index of /admin 
intitle:"documetation" 
inurl: 5800(vnc的端口)或者desktop port等多个关键字检索 
webmin port 10000 
inurl:/admin/login.asp 
intext:Powered by GBook365 
intitle:"php shell*" "Enable stderr" filetype:php 直接搜索到phpwebshell

foo.org filetype:inc

ipsec filetype:conf 
intilte:"error occurred" ODBC request WHERE (select|insert) 说白了就是说,可以直接试着查查数据库检索,针对目前流行的sql注射,会发达哦 
intitle:"php shell*" "Enable stderr" filetype:php 
"Dumping data for table" username password 
intitle:"Error using Hypernews" 
"Server Software" 
intitle:"HTTP_USER_AGENT=Googlebot" 
"HTTP_USER_ANGET=Googlebot" THS ADMIN 
filetype:.doc site:.mil classified 直接搜索军方相关word

检查多个关键字: 
intitle:config confixx login password

"mydomain.com" nessus report 
"report generated by" 
"ipconfig" 
"winipconfig"

google缓存利用(hoho,最有影响力的东西)推荐大家搜索时候多"选搜索所有网站" 
特别推荐:administrator users 等相关的东西,比如名字,生日等……最惨也可以拿来做字典嘛 
cache:foo.com

可以查阅类似结果

先找找网站的管理后台地址: 
site:xxxx.com intext:管理 
site:xxxx.com inurl:login 
site:xxxx.com intitle:管理 
site:a2.xxxx.com inurl:file 
site:a3.xxxx.com inurl:load 
site:a2.xxxx.com intext:ftp://*:* 
site:a2.xxxx.com filetype:asp 
site:xxxx.com //得到N个二级域名 
site:xxxx.com intext:*@xxxx.com //得到N个邮件地址,还有邮箱的主人的名字什么的 
site:xxxx.com intext:电话 //N个电话 
intitle:"index of" etc 
intitle:"Index of" .sh_history 
intitle:"Index of" .bash_history 
intitle:"index of" passwd 
intitle:"index of" people.lst 
intitle:"index of" pwd.db 
intitle:"index of" etc/shadow 
intitle:"index of" spwd 
intitle:"index of" master.passwd 
intitle:"index of" htpasswd 
"# -FrontPage-" inurl:service.pwd

allinurl:bbs data 
filetype:mdb inurl:database 
filetype:inc conn 
inurl:data filetype:mdb 
intitle:"index of" data 
……

一些技巧集合:

3) "http://*:*@www" domainname 找一些ISP站点,可以查对方ip的虚拟主机 

4) auth_user_file.txt 不实用了,太老了

5) The Master List 寻找邮件列表的

6) intitle:"welcome.to.squeezebox" 一种特殊的管理系统,默认开放端口90 
7) passlist.txt (a better way) 字典

8) "A syntax error has occurred" filetype:ihtml

9) ext:php program_listing intitle:MythWeb.Program.Listing 
10) intitle:index.of abyss.conf 
11)ext:nbe nbe

12)intitle:"SWW link" "Please wait….." 
13)

14) intitle:"Freifunk.Net – Status" -site:commando.de

15) intitle:"WorldClient" intext:"? (2003|2004) Alt-N Technologies."

17) intitle:open-xchange inurl:login.pl

20) intitle:"site administration: please log in" "site designed by emarketsouth" 
21) ORA-00921: unexpected end of SQL command

22)intitle:"YALA: Yet Another LDAP Administrator" 
23)welcome.to phpqladmin "Please login" -cvsweb 
24)intitle:"SWW link" "Please wait….." 
25)inurl:"port_255" -htm

27)intitle:"WorldClient" intext:"? (2003|2004) Alt-N Technologies."

这些是新的一些漏洞技巧,在0days公告公布

ext:php program_listing intitle:MythWeb.Program.Listing

inurl:preferences.ini "[emule]"

intitle:"Index of /CFIDE/" administrator

"access denied for user" "using password"

ext:php intext:"Powered by phpNewMan Version" 可以看到:path/to/news/browse.php?clang=../../../../../../file/i/want

inurl:"/becommunity/community/index.php?pageurl="

intitle:"ASP FileMan" Resend -site:iisworks.com

"Enter ip" inurl:"php-ping.php"

ext:conf inurl:rsyncd.conf -cvs -man

intitle: private, protected, secret, secure, winnt

intitle:"DocuShare" inurl:"docushare/dsweb/" -faq -gov -edu 
"#mysql dump" filetype:sql

"allow_call_time_pass_reference" "PATH_INFO"

"Certificate Practice Statement" inurl:(PDF | DOC)

LeapFTP intitle:"index.of./" sites.ini modified 
master.passwd

mysql history files 
NickServ registration passwords 
passlist 
passlist.txt (a better way) 
passwd 
passwd / etc (reliable) 
people.lst 
psyBNC config files 
pwd.db 
signin filetype:url 
spwd.db / passwd 
trillian.ini 
wwwboard WebAdmin inurl:passwd.txt wwwboard|webadmin

"# -FrontPage-" ext:pwd inurl:(service | authors | administrators | users) "# -FrontPage-"

inurl:service.pwd 
"AutoCreate=TRUE password=*" 
"http://*:*@www" domainname 
"index of/" "ws_ftp.ini" "parent directory" 
"liveice configuration file" ext:cfg -site:sourceforge.net 
"powered by ducalendar" -site:duware.com 
"Powered by Duclassified" -site:duware.com 
"Powered by Duclassified" -site:duware.com "DUware All Rights reserved" 
"powered by duclassmate" -site:duware.com 
"Powered by Dudirectory" -site:duware.com 
"powered by dudownload" -site:duware.com 
"Powered By Elite Forum Version *.*" 
"Powered by Link Department" 
"sets mode: +k" 
"Powered by DUpaypal" -site:duware.com 
allinurl: admin mdb 
auth_user_file.txt 
config.php 
eggdrop filetype:user user 
etc (index.of) 
ext:ini eudora.ini 
ext:ini Version=… password 
ext:txt inurl:unattend.txt

filetype:bak inurl:"htaccess|passwd|shadow|htusers"

filetype:cfg mrtg "target

  • " -sample -cvs -example

filetype:cfm "cfapplication name" password

filetype:conf oekakibbs 
filetype:conf sc_serv.conf

filetype:conf slapd.conf

filetype:config config intext:appSettings "User ID"

filetype:dat "password.dat"

filetype:dat wand.dat

filetype:inc dbconn

filetype:inc intext:mysql_connect 
filetype:inc mysql_connect OR mysql_pconnect

filetype:inf sysprep

filetype:ini inurl:"serv-u.ini" 
filetype:ini inurl:flashFXP.ini 
filetype:ini ServUDaemon 
filetype:ini wcx_ftp 
filetype:ini ws_ftp pwd

filetype:ldb admin

filetype:log "See `ipsec copyright"

filetype:log inurl:"password.log"

filetype:mdb inurl:users.mdb

filetype:mdb wwforum

filetype:netrc password

filetype:pass pass intext:userid

filetype:pem intext:private

filetype:properties inurl:db intext:password

filetype:pwd service 
filetype:pwl pwl

filetype:reg reg +intext:"defaultusername" +intext:"defaultpassword" 
filetype:reg reg HKEY_CURRENT_USER SSHHOSTKEYS 
filetype:sql ("values * MD" | "values * password" | "values * encrypt") 
filetype:sql ("passwd values" | "password values" | "pass values" ) 
filetype:sql +"IDENTIFIED BY" -cvs 
filetype:sql password

filetype:url +inurl:"ftp://" +inurl:";@"

filetype:xls username password email

htpasswd 
htpasswd / htgroup 
htpasswd / htpasswd.bak

intext:"enable secret $" 
intext:"powered by Web Wiz Journal"

intitle:"index of" intext:connect.inc 
intitle:"index of" intext:globals.inc 
intitle:"Index of" passwords modified

intitle:dupics inurl:(add.asp | default.asp | view.asp | voting.asp) -site:duware.com 
———————————————————————————————————————-

intitle:index.of intext:"secring.skr"|"secring.pgp"|"secring.bak"

inurl:"GRC.DAT" intext:"password"

inurl:"slapd.conf" intext:"credentials" -manpage -"Manual Page" -man: -sample

inurl:"slapd.conf" intext:"rootpw" -manpage -"Manual Page" -man: -sample

inurl:"wvdial.conf" intext:"password"

inurl:/db/main.mdb

inurl:chap-secrets -cvs

inurl:config.php dbuname dbpass 
inurl:filezilla.xml -cvs

inurl:lilo.conf filetype:conf password -tatercounter -bootpwd -man

inurl:nuke filetype:sql

inurl:ospfd.conf intext:password -sample -test -tutorial -download 路由配置 
inurl:pap-secrets -cvs

inurl:perform filetype:ini 
inurl:secring ext:skr | ext:pgp | ext:bak

inurl:vtund.conf intext:pass -cvs

inurl:zebra.conf intext:password -sample -test -tutorial -download

"Generated by phpSystem" 
"generated by wwwstat"

"Host Vulnerability Summary Report" ]

"HTTP_FROM=googlebot" googlebot.com "Server_Software="

"Index of" / "chat/logs" 聊天室 
"Installed Objects Scanner" inurl:default.asp

"Mecury Version" "Infastructure Group" 
"Microsoft (R) Windows * (TM) Version * DrWtsn Copyright (C)" ext:log

"Most Submitted Forms and Scripts" "this section"

"Network Vulnerability Assessment Report"

"not for distribution" confidential 
"phone * * *" "address *" "e-mail" intitle:"curriculum vitae"

"phpMyAdmin" "running on" inurl:"main.php"

"produced by getstats" 
"Request Details" "Control Tree" "Server Variables" 
"robots.txt" "Disallow:" filetype:txt

"Running in Child mode"

"sets mode: +p" 
"sets mode: +s" 
"Thank you for your order" +receipt 
"This is a Shareaza Node" 
"This report was generated by WebLog" 
( filetype:mail | filetype:eml | filetype:mbox | filetype:mbx ) intext:password|subject

(inurl:"robot.txt" | inurl:"robots.txt" ) intext:disallow filetype:txt

-site:php.net -"The PHP Group" inurl:source inurl:url ext:pHp

FBR "ADOBE PHOTOSHOP" 
AIM buddy lists 
allinurl:/examples/jsp/snp/snoop.jsp 
allinurl:servlet/SnoopServlet 
cgiirc.conf

data filetype:mdb -site:gov -site:mil

exported email addresses

ext:asp inurl:pathto.asp

ext:cgi inurl:editcgi.cgi inurl:file=

ext:conf inurl:rsyncd.conf -cvs -man 
ext:conf NoCatAuth -cvs

ext:dat bpk.dat 
ext:gho gho

ext:ini intext:env.ini 
ext:ldif ldif

ext:log "Software: Microsoft Internet Information Services *.*" 
—————————————————————————————— 
ext:mdb inurl:*.mdb inurl:fpdb shop.mdb

filetype:bkf bkf 
filetype:blt "buddylist" 
filetype:blt blt +intext:screenname

filetype:cfg auto_inst.cfg

filetype:conf inurl:firewall -intitle:cvs 
filetype:config web.config -CVS

filetype:ctt ctt messenger

filetype:fp fp 
filetype:fp fp -site:gov -site:mil -"cvs log"

filetype:inf inurl:capolicy.inf 
filetype:lic lic intext:key

filetype:myd myd -CVS 
filetype:ns ns 
filetype:ora ora 
filetype:ora tnsnames 
filetype:pdb pdb backup (Pilot | Pluckerdb)

filetype:pot inurl:john.pot 
—————————————————————————————————————— 
filetype:pst inurl:"outlook.pst" 
filetype:pst pst -from -to -date 
filetype:qbb qbb 
filetype:rdp rdp

filetype:reg "Terminal Server Client" 
filetype:vcs vcs 
filetype:wab wab

filetype:xls -site:gov inurl:contact 
filetype:xls inurl:"email.xls" 
Financial spreadsheets: finance.xls 
Financial spreadsheets: finances.xls

Ganglia Cluster Reports

haccess.ctl (one way) 
haccess.ctl (VERY reliable) 
ICQ chat logs, please…

iletype:log cron.log 
intext:"Session Start * * * *:*:* *" filetype:log 
intext:"Tobias Oetiker" "traffic analysis"

intext:(password | passcode) intext:(username | userid | user) filetype:csv 
intext:gmail invite intext:http://gmail.google.com/gmail/a

intext:SQLiteManager inurl:main.php

intitle:"Apache::Status" (inurl:server-status | inurl:status.html | inurl:apache.html)

intitle:"AppServ Open Project" -site:www.appservnetwork.com 
intitle:"ASP Stats Generator *.*" "ASP Stats Generator" "- weppos"

intitle:"FTP root at" 
intitle:"index of" +myd size

intitle:"Index Of" -inurl:maillog maillog size

intitle:"Index Of" cookies.txt size

intitle:"index of" mysql.conf OR mysql_config 
intitle:"Index of" upload size parent directory

intitle:"index.of" .diz .nfo last modified 
intitle:"Multimon UPS status page" 
intitle:"PHP Advanced Transfer" (inurl:index.php | inurl:showrecent.php ) 
intitle:"PhpMyExplorer" inurl:"index.php" -cvs 
——————————————————————— 
intitle:"statistics of" "advanced web statistics" 
intitle:"System Statistics" +"System and Network Information Center" 
intitle:"Usage Statistics for" "Generated by Webalizer" 
intitle:"wbem" compaq login "Compaq Information Technologies Group"

intitle:"Web Server Statistics for ****" 
intitle:"web server status" SSH Telnet 
intitle:"welcome.to.squeezebox"

intitle:admin intitle:login 
intitle:index.of "Apache" "server at" 
intitle:index.of cleanup.log 
intitle:index.of dead.letter 
intitle:index.of inbox 
intitle:index.of inbox dbx

intitle:intranet inurl:intranet +intext:"phone" 
inurl:"/axs/ax-admin.pl" -script 
inurl:"/cricket/grapher.cgi" 
inurl:"bookmark.htm"

inurl:"cacti" +inurl:"graph_view.php" +"Settings Tree View" -cvs -RPM 
inurl:"newsletter/admin/" 
inurl:"newsletter/admin/" intitle:"newsletter admin" 
inurl:"putty.reg" 
inurl:"smb.conf" intext:"workgroup" filetype:conf conf 
———————————————————————————————————-

Welcome to ntop!

"adding new user" inurl:addnewuser -"there are no domains" 
(inurl:/cgi-bin/.cobalt/) | (intext:"Welcome to the Cobalt RaQ")

filetype:php HAXPLORER "Server Files Browser" 
intitle:"Web Data Administrator – Login"

inurl:ConnectComputer/precheck.htm | inurl:Remote/logon.aspx 
PHP Shell (unprotected) 
PHPKonsole PHPShell filetype:php -echo 
Public PHP FileManagers

"index of" / picasa.ini 
"index of" inurl:recycler 
"Index of" rar r nfo Modified 
"intitle:Index.Of /" stats merchant cgi-* etc 
"Powered by Invision Power File Manager" (inurl:login.php) | (intitle:"Browsing directory /" ) 
"Web File Browser" "Use regular expression"

filetype:ini Desktop.ini intext:mydocs.dll

intext:"d.aspx?id" || inurl:"d.aspx?id" 
intext:"Powered By: TotalIndex" intitle:"TotalIndex" 
intitle:"album permissions" "Users who can modify photos" "EVERYBODY" 
intitle:"Directory Listing For" intext:Tomcat -intitle:Tomcat 
intitle:"HFS /" +"HttpFileServer" 
intitle:"Index of *" inurl:"my shared folder" size modified 
——————————————————————————————————————-

"File Upload Manager v." "rename to"

ext:asp "powered by DUForum" inurl:(messages|details|login|default|register) -site:duware.com 
ext:asp inurl:DUgallery intitle:"." -site:dugallery.com -site:duware.com 
ext:cgi inurl:ubb_test

ezBOO "Administrator Panel" -cvs

filetype:cgi inurl:cachemgr.cgi 
filetype:cnf my.cnf -cvs -example 
filetype:inc inc intext:setcookie

filetype:php inurl:"viewfile" -"index.php" -"idfil 
filetype:wsdl wsdl

intitle:"ASP FileMan" Resend -site:iisworks.com

intitle:"Index of /" modified php.exe

intitle:"phpremoteview" filetype:php "Name, Size, Type, Modify"

inurl:" WWWADMIN.PL" intitle:"wwwadmin" 
inurl:"nph-proxy.cgi" "Start browsing through this CGI-based proxy" 
inurl:"plog/register.php" 
inurl:cgi.asx?StoreID

inurl:robpoll.cgi filetype:cgi

The Master List

"More Info about MetaCart Free"

Google Hack的一些整理的更多相关文章

  1. Google Hack搜索技巧

    想了解更多搜索技巧,点击下面网站了解http://exploit-db.com/google-dorks Google Hack的一些整理 这里是google关键字的用法,要设置它为中文,则是 htt ...

  2. google hack使用集锦

    转载:https://blog.csdn.net/weixin_42127015/article/details/84472777 关于google hack的几个基础过滤器使用[请务必谨记,过滤器虽 ...

  3. Kali Linux Web 渗透测试视频教程— 第四课 google hack 实战

    Kali Linux Web 渗透测试— 第四课 google hack 实战 文/玄魂 目录 shellKali Linux Web 渗透测试— 第四课 google hack 实战 课程目录 Go ...

  4. google hack 之 查询语法

    google hack 之 查询语法 文/玄魂   前言 谷歌网页搜索技术,大部分在百度等搜索引擎中也适用.同样,这些搜索技术是来源于传统数据库检索技术,因而,对这部分的学习,能为后续章节的数据库检索 ...

  5. Monyer's game Google Hack关的BT玩法

    玩Monyer's game的朋友都知道里面有Google Hack这关,其实这里本来应该用到的技术是逆向回溯搜索,但因为有好几个人都说利用其他方式看到的密码,所以Monyer不得不重新站在玩家的角度 ...

  6. Google高级技巧—google Hack★★★★

    google hacking事实上并算不上什么新东西,当时并没有重视这样的技术,觉得webshell什么的,并无太大实际用途.google hacking事实上并非如此简单... 经常使用的googl ...

  7. Google hack语法

    基础语法: 1.语法说明: inurl: 在url地址栏中显示的信息页面 intext: 显示在正文信息中的内容页面 site: 限制显示你某个域名的所有页面 filetype: 搜索文件的后缀或者扩 ...

  8. google hack 语法

    google hack a b c 自动对词进行拆分匹配 拆分标准 空格 "a b c " 把a b c 当成一个整体去查 " a*b" *通配符 里面是一个或 ...

  9. Google Guava 库用法整理<转>

    参考: http://codemunchies.com/2009/10/beautiful-code-with-google-collections-guava-and-static-imports- ...

随机推荐

  1. DIOCP

    DIOCP GITHUB: https://github.com/ymofen/diocp-v5.git diocp5====== ## 快速开始 从那里得到: git更新(推荐同步更新) 1.htt ...

  2. VC6 下 libpng 库的编译与初步使用

      VC6 下 libpng 库的编译与初步使用 目录 libong 库的介绍 VC6 下 libpng 的编译 下载 libpng 与 zlib 进行编译 得到 .lib 文件 初步使用 对 VC6 ...

  3. 基尼系数(Gini coefficient),洛伦茨系数

    20世纪初意大利经济学家基尼,于1922年提出的定量测定收入分配差异程度的指标.它是根据洛伦茨曲线找出了判断分配平等程度的指标(如下图). 设实际收入分配曲线和收入分配绝对平等曲线之间的面积为A,实际 ...

  4. 【BZOJ】【2434】【NOI2011】阿狸的打字机

    AC自动机+DFS序+BIT 好题啊……orz PoPoQQQ 大爷 一道相似的题目:[BZOJ][3172][TJOI2013]单词 那道题也是在fail树上数有多少个点,只不过这题是在x的fail ...

  5. Centos下运行cp命令式提示略过目录

    今天在复制一个目录到还有一个目录的时候cp ./res /usr 的时候出现了问题,提示我的是: cp略过了目录 后来我找了一下 在网上search了一下CP命令的使用方法: CP命令 该命令的功能是 ...

  6. JDBC在Java Web中的应用——分页查询

    分页查询 通过JDBC实现分页查询的方法有很多种,而且不同的数据库机制也提供了不同的分页方式,在这里介绍两种非常典型的分页方法. 通过ResultSet的光标实现分页 通过ResultSet的光标实现 ...

  7. 如何在Window 7 64位 PL/SQL 访问oracle 数据库

    一般 PLSQL Developer 没有64位版本,所以在64位系统上运行该程链接64位Oracle时就会报错.解决的方法如下: 第零步:在windows 7 中安装Oracle 11g 64 数据 ...

  8. Apache PHP Mysql 开发环境快速配置

    学习PHP开发要配置各种环境,一般会用到apache作为服务器.Mysql数据库.如何快速的配置环境成为困扰大家的烦恼,之前自己也配过,比较繁琐. 最新发现一款集成安装软件“phpStudy”.真可谓 ...

  9. 用js做一个简单的留言板效果

    html部分: 1: <!DOCTYPE> 2: <html lang="zh-en"> 3: <head> 4: <title>j ...

  10. 设计模式之十五:訪问者模式(Visitor Pattern)

    訪问者模式(Visitor Pattern)是GoF提出的23种设计模式中的一种,属于行为模式. 据<大话设计模式>中说算是最复杂也是最难以理解的一种模式了. 定义(源于GoF<De ...