google queries

Master Google Dorking with a Practical Example | Boost Your Online Security Today

Table Of Contents :

Digging the internet with google dorks

1.Google queries for locating various Web servers

Query Server
"Apache/1.3.28 Server at" intitle:index.of
Apache 1.3.28
"Apache/2.0 Server at" intitle:index.of
Apache 2.0
"Apache/* Server at" intitle:index.of
Any version of Apache
"Microsoft-IIS/4.0 Server at" intitle:index.of
Microsoft Internet Information Services 4.0
"Microsoft-IIS/5.0 Server at" intitle:index.of
Microsoft Internet Information Services 5.0
"Microsoft-IIS/6.0 Server at" intitle:index.of
Microsoft Internet Information Services 6.0
"Microsoft-IIS/* Server at" intitle:index.of
Any version of Microsoft Internet Information Services
"Oracle HTTP Server/* Server at" intitle:index.of
Any version of Oracle HTTP Server
"IBM _ HTTP _ Server/* * Server at" intitle:index.of
Any version of IBM HTTP Server
"Netscape/* Server at" intitle:index.of
Any version of Netscape Server
"Red Hat Secure/*" intitle:index.of
Any version of the Red Hat Secure server
"HP Apache-based Web Server/*" intitle:index.of
Any version of the HP server

2. Queries for discovering standard post-installation Web server pages

Query Server
intitle:"Test Page for Apache Installation" "You are free
" Apache 1.2.6
intitle:"Test Page for Apache Installation" "It worked!" "this Web site!"
Apache 1.3.0 – 1.3.9
intitle:"Test Page for Apache Installation" "Seeing this instead"
Apache 1.3.11 – 1.3.33, 2.0
intitle:"Test Page for the SSL/TLS-aware Apache Installation" "Hey, it worked!"
Apache SSL/TLS
intitle:"Test Page for the Apache Web Server on Red Hat Linux"
Apache on Red Hat
intitle:"Test Page for the Apache Http Server on Fedora Core"
Apache on Fedora
intitle:"Welcome to Your New Home Page!"
Debian Apache on Debian
intitle:"Welcome to IIS 4.0!"
IIS 4.0
intitle:"Welcome to Windows 2000 Internet Services"
IIS 5.0
intitle:"Welcome to Windows XP Server Internet Services"
IIS 6.0

3.Querying for application-generated system reports

Query Server
"Generated by phpSystem"
Operating system type and version, hardware configura- tion, logged users, open connections, free memory and disk space, mount points
"This summary was generated by wwwstat"
web server statistics, system file structure
"These statistics were produced by getstats"
web server statistics, system file structure
"This report was generated by WebLog"
web server statistics, system file structure
intext:"Tobias Oetiker" "traffic analysis"
system performance statistics as MRTG charts, network configuration
intitle:"Apache::Status" (inurl:server-status | inurl: status.html | inurl:apache.html)
server version, operating system type, child process list, current connections
intitle:"ASP Stats Generator *.*" "ASP
Stats Generator" "2003-2004 weppos" web server activity, lots of visitor information
intitle:"Multimon UPS status page"
UPS device performance statistics
intitle:"statistics of" "advanced web statistics"
web server statistics, visitor information
intitle:"System Statistics" +"System and Network Information Center"
system performance statistics as MRTG charts, hardware configuration, running services
intitle:"Usage Statistics for" "Generated by Webalizer"
web server statistics, visitor information, system file structure
intitle:"Web Server Statistics for ****"
web server statistics, visitor information
inurl:"/axs/ax-admin.pl" -script
web server statistics, visitor information
inurl:"/cricket/grapher.cgi"
MRTG charts of network interface performance
inurl:server-info "Apache Server Information"
web server version and configuration, operating system type, system file structure
"Output produced by SysWatch *"
operating system type and version, logged users, free memory and disk space, mount points, running proc- esses, system logs

4. Error message queries

Query Results
"A syntax error has occurred" filetype:ihtml
Informix database errors, potentially containing function names, filenames, file structure information, pieces of SQL code and passwords
"Access denied for user" "Using password"
authorisation errors, potentially containing user names, function names, file structure information and pieces of SQL code
"The script whose uid is " "is not allowed to access"
access-related PHP errors, potentially containing filenames, function names and file structure information
"ORA-00921: unexpected end of SQL command"
Oracle database errors, potentially containing filenames, function names and file structure information
intext:"Tobias Oetiker" "traffic analysis"
Cocoon errors, potentially containing Cocoon version information, filenames, function names and file structure information
"Invision Power Board Database Error"
Invision Power Board bulletin board errors, potentially containing function names, filenames, file structure information and piece of SQL code
"Warning: mysql _ query()" "invalid query"
MySQL database errors, potentially containing user names, function names, filenames and file structure information
"Error Message : Error loading required libraries."
CGI script errors, potentially containing information about operating system and program versions, user names, filenames and file structure information
"#mysql dump" filetype:sql
MySQL database errors, potentially containing information about database structure and contents

5. Google queries for locating passwords

Query Results
"http://*:*@www" site
passwords for site, stored as the string "http://username: password@www..."
filetype:mdb inurl:"account|users|admin|admin istrators|passwd|password"
mdb files, potentially containing password information
intitle:"Index of" pwd.db
pwd.db files, potentially containing user names and encrypted passwords
inurl:admin inurl:backup intitle:index.of
directories whose names contain the words admin and backup
"Index of/" "Parent Directory" "WS _ FTP.ini" filetype:ini WS _ FTP PWD
WS_FTP configuration files, potentially containing FTP server access passwords
ext:pwd inurl:(service|authors|administrators |users) "# -FrontPage-"
files containing Microsoft FrontPage passwords
filetype:conf slapd.conf
configuration files for OpenLDAP
filetype:sql ("passwd values ****" | "password values ****" | "pass values ****" )
files containing SQL code and passwords inserted into a database
intitle:index.of trillian.ini
configuration files for the Trillian IM
eggdrop filetype:user
user configuration files for the Eggdrop ircbot
inurl:"wvdial.conf" intext:"password"
configuration files for WV Dial
ext:ini eudora.ini
configuration files for the Eudora mail client
filetype:mdb inurl:users.mdb
Microsoft Access files, potentially containing user account infor- mation
intext:"powered by Web Wiz Journal"
websites using Web Wiz Journal, which in its standard con- figuration allows access to the passwords file – just enter http: ///journal/journal.mdb instead of the default http:/// journal/

"Powered by DUclassified" -site:duware.com

"Powered by DUcalendar" -site:duware.com

"Powered by DUdirectory" -site:duware.com

"Powered by DUclassmate" -site:duware.com

"Powered by DUdownload" -site:duware.com

"Powered by DUpaypal" -site:duware.com

"Powered by DUforum" -site:duware.com

intitle:dupics inurl:(add.asp | default.asp |

view.asp | voting.asp) -site:duware.com

websites using the DUclassified, DUcalendar, DUdirectory, DU- classmate, DUdownload, DUpaypal, DUforum or DUpics applications, which by default make it possible to obtain the passwords file – for DUclassified, just enter http://<host>/duClassified/ _ private/duclassified.mdb instead of http://<host>/duClassified/

intext:"BiTBOARD v2.0" "BiTSHiFTERS Bulletin Board"
websites using the Bitboard2 bulletin board application, which on default settings allows the passwords file to be obtained – enter http:///forum/admin/data _ passwd.dat instead of the default http:///forum/forum.php

6. Searching for personal data and confidential documents

Query Results
filetype:xls inurl:"email.xls" email.xls
files, potentially containing contact information
"phone * * *" "address *" "e-mail" intitle: "curriculum vitae"
CVs
"not for distribution" confidential
documents containing the confidential clause
buddylist.blt
AIM contacts list
intitle:index.of mystuff.xml
Trillian IM contacts list
filetype:ctt "msn"
MSN contacts list
filetype:QDF
QDF database files for the Quicken financial application
intitle:index.of finances.xls
finances.xls files, potentially containing information on bank accounts, financial summaries and credit card numbers
intitle:"Index Of" -inurl:maillog
maillog size maillog files, potentially containing e-mails

"Network Vulnerability Assessment Report"

"Host Vulnerability Summary Report"

filetype:pdf "Assessment Report"

"This file was generated by Nessus"

reports for network security scans, penetration tests etc.

7. Queries for locating network devices

Query Device
"Copyright (c) Tektronix, Inc." "printer status"
PhaserLink printers
inurl:"printer/main.html" intext:"settings"
Brother HL printers
intitle:"Dell Laser Printer"
ews Dell printers with EWS technology
intext:centreware inurl:status
Xerox Phaser 4500/6250/8200/8400 printers
inurl:hp/device/this.LCDispatcher
HP printers
intitle:liveapplet inurl:LvAppl
Canon Webview webcams
intitle:"EvoCam" inurl:"webcam.html"
Evocam webcams
inurl:"ViewerFrame?Mode="
Panasonic Network Camera webcams
intext:"MOBOTIX M1" | intext:"MOBOTIX M10") intext:"Open Menu" Shift-Reload
Mobotix webcams
inurl:indexFrame.shtml
Axis Axis webcams
SNC-RZ30 HOME
Sony SNC-RZ30 webcams
intitle:"my webcamXP server!" inurl:":8080"
webcams accessible via WebcamXP Server
allintitle:Brains, Corp.
camera webcams accessible via mmEye
intitle:"active webcam page"
USB webcams
Spread the love

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top
www.thecyberblogs.com