venerdì 29 luglio 2011

GOOGLE HACK AGAIN 1

Presented below is just a sample of interesting searches that we can send to google to obtain info. After you get a taste using some of these, try your own crafted searches to find info that you would be interested in.
Try a few of these searches:
intitle:”Index of” passwords modified
allinurl:auth_user_file.txt
“access denied for user” “using password”
“A syntax error has occurred” filetype:ihtml
allinurl: admin mdb
“ORA-00921: unexpected end of SQL command”
inurl:passlist.txt
“Index of /backup”
“Chatologica MetaSearch” “stack tracking:”

put this string in google search:
inurl:microsoft filetype:iso
You can change the string to watever you want, ex. microsoft to adobe, iso to
zip etc…
“AutoCreate=TRUE password=*”
This searches the password for “Website Access Analyzer”, a Japanese software that creates webstatistics. For those who can read Japanese, check out the
author’s site at: coara.or.jp/~passy/ [coara.or.jp/~passy/]
“http://*:*@www” domainname
This is a query to get inline passwords from search engines (not just Google),
you must type in the query followed with the the domain name without the .com
or .net
Another way is by just typing
“http://bob:bob@www”
“sets mode: +k”
This search reveals channel keys (passwords) on IRC as revealed from IRC chat
logs.
allinurl: admin mdb
Not all of these pages are administrator’s access databases containing
usernames, passwords and other sensitive information, but many are!
allinurl:auth_user_file.txt
DCForum’s password file. This file gives a list of (crackable) passwords,
usernames and email addresses for DCForum and for DCShop (a shopping cart
program(!!!). Some lists are bigger than others, all are fun, and all belong to
googledorks. =)
intitle:”Index of” config.php
This search brings up sites with “config.php” files. To skip the technical
discussion, this configuration file contains both a username and a password for
an SQL database. Most sites with forums run a PHP message base. This file gives
you the keys to that forum, including FULL ADMIN access to the database.
eggdrop filetype:user user
These are eggdrop config files. Avoiding a full-blown descussion about eggdrops
and IRC bots, suffice it to say that this file contains usernames and passwords
for IRC users.
-----------------------------------------------------------------------------------------------------------------------------------

filetype:htpasswd htpasswd
intitle:"Index of” “.htpasswd” -intitle:"dist” -apache -htpasswd.c
index.of.private
intitle:index.of master.passwd
inurl:passlist.txt
intitle:"Index of..etc” passwd
intitle:admin intitle:login
“Incorrect syntax near” (SQL script error)
intitle:"the page cannot be found” inetmgr (debilidad en IIS4)
intitle:index.of ws_ftp.ini
“Supplied arguments is not a valid PostgreSQL result” (possible debilidad SQL)
_vti_pvt password intitle:index.of (Frontpage)
inurl:backup intitle:index.of inurl:admin
“Index of /backup”
index.of.password
index.of.winnt
inurl:"auth_user_file.txt”
“Index of /admin”
“Index of /password”
“Index of /mail”
“Index of /” +passwd
Index of /” +.htaccess
Index of ftp +.mdb allinurl:/cgi-bin/ +mailto
allintitle: “index of/admin”
allintitle: “index of/root”
allintitle: sensitive filetype:doc
allintitle: restricted filetype :mail
allintitle: restricted filetype:doc site:gov
administrator.pwd.index
authors.pwd.index
service.pwd.index
filetype:config web
gobal.asax index
inurl:passwd filetype:txt
inurl:admin filetype:db
inurl:iisadmin
inurl:"auth_user_file.txt”
inurl:"wwwroot/*.”
allinurl: winnt/system32/ (get cmd.exe)
allinurl:/bash_history
intitle:"Index of” .sh_history
intitle:"Index of” .bash_history
intitle:"Index of” passwd
intitle:"Index of” people.1st
intitle:"Index of” pwd.db
intitle:"Index of” etc/shadow
intitle:"Index of” spwd
intitle:"Index of” master.passwd
intitle:"Index of” htpasswd
intitle:"Index of” members OR accounts
intitle:"Index of” user_carts OR user _cart
_vti_inf.html
service.pwd
users.pwd
authors.pwd
administrators.pwd
test-cgi
wwwboard.pl
www-sql
pwd.dat
ws_ftp.log 
&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&



allinurl: “proxylist.txt”
allinurl: “proxy.txt”
“index of/root”
“auth_user_file.txt”
“index of/root”
“Index of /admin”
“Index of /password”
“Index of /mail”
“Index of /” +passwd
“Index of /” +password.txt
“Index of /” +.htaccess
index of ftp +.mdb allinurl:/cgi-bin/ +mailto
administrators.pwd.index
authors.pwd.index
service.pwd.index
filetype:config web
gobal.asax index
allintitle: “index of/admin”
allintitle: “index of/root”
allintitle: sensitive filetype oc
allintitle: restricted filetype :mail
allintitle: restricted filetype oc site:gov
for IIS server exlpoit
allinurl: winnt/system32/
and u’ll get many IIS server exploitsú
intitle:r57shell
intitle:”Index of” .sh_history
intitle:”Index of” .bash_history
intitle:”index of” passwd
intitle:”index of” people.lst
intitle:”index of” pwd.db
intitle:”index of” etc/shadow
intitle:”index of” spwd
intitle:”index of” master.passwd
intitle:”index of” htpasswd
intitle:”index of” members OR accounts
intitle:”index of” user_carts OR user_cart
_vti_inf.html
service.pwd
users.pwd
authors.pwd
administrators.pwd
shtml.dll
shtml.exe
fpcount.exe
default.asp
showcode.asp
sendmail.cfm
getFile.cfm
imagemap.exe
test.bat
msadcs.dll
htimage.exe
counter.exe
browser.inc
hello.bat
default.asp\
dvwssr.dll
cart32.exe
add.exe
index.jsp
SessionServlet
glimpse
man.sh
AT-admin.cgi
AT-generate.cgi
inurl:/adpassword.txt
inurl:admin.dat
and even for shop sites:
inurl:/shop/db/
intitle:”index of/ shop” +db
intitle:”index of/” +shopping_cart
“Index of /admin”
“Index of /password”
“Index of /mail”
“Index of /” +passwd
“Index of /” +password.txt
“Index of /” +.htaccess
index of ftp +.mdb allinurl:/cgi-bin/ +mailto
administrators.pwd.index
authors.pwd.index
service.pwd.index
filetype:config web
gobal.asax index
allintitle: “index of/admin”
allintitle: “index of/root”
allintitle: sensitive filetype:doc
allintitle: restricted filetype :mail
allintitle: restricted filetype:doc site:gov
inurlasswd filetype:txt
inurl:admin filetype:db
inurl:iisadmin
inurl:”auth_user_file.txt”
inurl:”wwwroot/*.”

top secret site:mil
confidential site:mil
allinurl: winnt/system32/ (get cmd.exe)
allinurl:/bash_history
intitle:”Index of” .sh_history
intitle:”Index of” .bash_history
intitle:”index of” passwd
intitle:”index of” people.lst
intitle:”index of” pwd.db
intitle:”index of” etc/shadow
intitle:”index of” spwd
intitle:”index of” master.passwd
intitle:”index of” htpasswd
intitle:”index of” members OR accounts
intitle:”index of” user_carts OR user_cart
Ìíîãèå àäìèíû îñòàâëÿþò îòêðûòûìè òàêèå äèðåêòîðèè:
Öèòàòà:/orders
/Order
/Orders
/order
/config
/Admin_files
/mall_log_files
/PDG_Cart
PDG_Cart/order.log
PDG_Cart/shopper.conf
/pw
/store/customers
/store/temp_customers
/WebShop
/webshop
/WebShop/templates
/WebShop/logs
/cgi/PDG_Cart/order.log
/PDG_Cart/authorizenets.txt
/cgi-bin/PDG_Cart/mc.txt
/PDG/order.txt
/cgi-bin/PDG_cart/card.txt
/PDG_Cart/shopper.conf
/php/mlog.phtml
/php/mylog.phtml
/webcart/carts
/cgi-bin/orders.txt
/WebShop/logs
/cgi-bin/AnyForm2
/cgi-bin/mc.txt
/ccbill/secure/ccbill.log
/cgi-bin/orders/mc.txt
/WebCart/orders.txt
/cgi-bin/orders/cc.txt
/cvv2.txt
/cgi-bin/orderlog.txt
/WebShop/logs
/orderb/shop.mdb
/_private/shopping_cart.mdb
/scripts/iisadmin/tools/mkilog.exe
/cool-logs/mylog.html
/cool-logs/mlog.html
/easylog/easylog.html
/HyperStat/stat_what.log
/mall_log_files/
/scripts/weblog
/super_stats/access_logs
/trafficlog
/wwwlog
/Admin_files/order.log
/bin/orders/orders.txt
/cgi/orders/orders.txt
/cgi-bin/orders/orders.txt
/cgi-sys/orders/orders.txt
/cgi-local/orders/orders.txt
/htbin/orders/orders.txt
/cgibin/orders/orders.txt
/cgis/orders/orders.txt
/scripts/orders/orders.txt
/cgi-win/orders/orders.txt
/bin/pagelog.cgi
/cgi/pagelog.cgi
/cgi-bin/pagelog.cgi
/cgi-sys/pagelog.cgi
/cgi-local/pagelog.cgi
/cgibin/pagelog.cgi
/cgis/pagelog.cgi
/scripts/pagelog.cgi
/cgi-win/pagelog.cgi
/bin/DCShop/auth_data/auth_user_file.txt
/cgi/DCShop/auth_data/auth_user_file.txt
/cgi-bin/DCShop/auth_data/auth_user_file.txt
/cgi-sys/DCShop/auth_data/auth_user_file.txt
/cgi-local/DCShop/auth_data/auth_user_file.txt
/htbin/DCShop/auth_data/auth_user_file.txt
/cgibin/DCShop/auth_data/auth_user_file.txt
/cgis/DCShop/auth_data/auth_user_file.txt
/scripts/DCShop/auth_data/auth_user_file.txt
/cgi-win/DCShop/auth_data/auth_user_file.txt
/bin/DCShop/orders/orders.txt
/cgi/DCShop/orders/orders.txt
/cgi-bin/DCShop/orders/orders.txt
/cgi-sys/DCShop/orders/orders.txt
/cgi-local/DCShop/orders/orders.txt
/htbin/DCShop/orders/orders.txt
/cgibin/DCShop/orders/orders.txt
/cgis/DCShop/orders/orders.txt
/scripts/DCShop/orders/orders.txt
/cgi-win/DCShop/orders/orders.txt
/dc/auth_data/auth_user_file.txt
/dcshop/orders/orders.txt
/dcshop/auth_data/auth_user_file.txt
/dc/orders/orders.txt
/orders/checks.txt
/orders/mountain.cfg
/cgi-bin/shopper.cgi&TEMPLATE=ORDER.LOG
/webcart/carts
/webcart-lite/orders/import.txt
/webcart/config
/webcart/config/clients.txt
/webcart/orders
/webcart/orders/import.txt
/WebShop/logs/cc.txt
/WebShop/templates/cc.txt
/bin/shop/auth_data/auth_user_file.txt
/cgi/shop/auth_data/auth_user_file.txt
/cgi-bin/shop/auth_data/auth_user_file.txt
/cgi-sys/shop/auth_data/auth_user_file.txt
/cgi-local/shop/auth_data/auth_user_file.txt
/htbin/shop/auth_data/auth_user_file.txt
/cgibin/shop/auth_data/auth_user_file.txt
/cgis/shop/auth_data/auth_user_file.txt
/scripts/shop/auth_data/auth_user_file.txt
/cgi-win/shop/auth_data/auth_user_file.txt
/bin/shop/orders/orders.txt
/cgi/shop/orders/orders.txt
/cgi-bin/shop/orders/orders.txt
/cgi-sys/shop/orders/orders.txt
/cgi-local/shop/orders/orders.txt
/htbin/shop/orders/orders.txt
/cgibin/shop/orders/orders.txt
/cgis/shop/orders/orders.txt
/scripts/shop/orders/orders.txt
/cgi-win/shop/orders/orders.txt
/bin/shop.pl/page=;cat%20shop.pl
/cgi/shop.pl/page=;cat%20shop.pl
/cgi-bin/shop.pl/page=;cat%20shop.pl
/cgi-sys/shop.pl/page=;cat%20shop.pl
/cgi-local/shop.pl/page=;cat%20shop.pl
/htbin/shop.pl/page=;cat%20shop.pl
/cgibin/shop.pl/page=;cat%20shop.pl
/cgis/shop.pl/page=;cat%20shop.pl
/scripts/shop.pl/page=;cat%20shop.pl
/cgi-win/shop.pl/page=;cat%20shop.pl
/bin/cart.pl
/cgi/cart.pl
/cgi-bin/cart.pl
/cgi-sys/cart.pl
/cgi-local/cart.pl
/htbin/cart.pl
/cgibin/cart.pl
/scripts/cart.pl
/cgi-win/cart.pl
/cgis/cart.pl
/bin/cart.pl
/cgi/cart.pl
/cgi-bin/cart.pl
/cgi-sys/cart.pl
/cgi-local/cart.pl
/htbin/cart.pl
/cgibin/cart.pl
/cgis/cart.pl
/scripts/cart.pl
/cgi-win/cart.pl
/bin/cart32.exe
/cgi/cart32.exe
/cgi-bin/cart32.exe
/cgi-sys/cart32.exe
/cgi-local/cart32.exe
/htbin/cart32.exe
/cgibin/cart32.exe
/cgis/cart32.exe
/scripts/cart32.exe
/cgi-win/cart32.exe
/cgi-bin/www-sql;;;
/server%20logfile;;;
/cgi-bin/pdg_cart/order.log
/cgi-bin/shopper.exe?search
/orders/order.log
/orders/import.txt
/orders/checks.txt
/orders/orders.txt
/Orders/order.log
/order/order.log
/WebShop/logs/ck.log
/WebShop/logs/cc.txt
/WebShop/templates/cc.txt
/_private/orders.txt
â
ýòèõ äèðåêòîðèÿõ ìû çà ÷àñòóþ ìîæåì íàéòè òàêèå ôàéëû êàê
Öèòàòà:orders.txt
order.txt
import.txt
checks.txt
order_log
order.log
orders.log
orders_log
log_order
log_orders
temp_order
temp_orders
order_temp
robots.txt
admin.mdb
user_file.txt
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@

comment:advisories and vulnerabilities*—–
“1999-2004 FuseTalk Inc” -site:fusetalk.com
“2003 DUware All Rights Reserved”
“Active Webcam Page” inurl:8080
“BlackBoard 1.5.1-f | © 2003-4 by Yves Goergen”
“BosDates Calendar System ” “powered by BosDates v3.2 by BosDev”
“Copyright © 2002 Agustin Dondo Scripts”
“delete entries” inurl:admin/delete.asp
“driven by: ASP Message Board”
“Enter ip” inurl:”php-ping.php”
“IceWarp Web Mail 5.3.0″ “Powered by IceWarp”
“Ideal BB Version: 0.1″ -idealbb.com
“inurl:/site/articles.asp?idcategory=”
“Obtenez votre forum Aztek” -site:forum-aztek.com
“Online Store – Powered by ProductCart”
“Powered *: newtelligence” (”dasBlog 1.6″| “dasBlog 1.5″| “dasBlog 1.4″|”dasBlog 1.3″)
“Powered by A-CART”
“Powered by AJ-Fork v.167″
“powered by antiboard”
“Powered by Coppermine Photo Gallery”
“Powered by CubeCart”
“Powered by DCP-Portal v5.5″
“Powered by DMXReady Site Chassis Manager” -site:dmxready.com
“Powered by FUDforum”
“Powered by Gallery v1.4.4″
“Powered by IceWarp Software” inurl:mail
“Powered by Ikonboard 3.1.1″
“Powered by Megabook *” inurl:guestbook.cgi
“Powered by MercuryBoard [v1″
“powered by minibb” -site:[??? ????????? ?????? ?????? ????? ??????????????????] -intext:1.7f
“Powered by My Blog” intext:”FuzzyMonkey.org”
“Powered by ocPortal” -demo -ocportal.com
“powered by phpWebSite” 0.9-3-2…4
“Powered by PowerPortal v1.3″
“powered by vbulletin 3.0″
“Powered by WordPress” -html filetype:php -demo -wordpress.org -bugtraq
“Powered by WowBB” -site:wowbb.com
“Powered by YaPig V0.92b”
“Powered by yappa-ng”
“running: Nucleus v3.1″ -.nucleuscms.org -demo
“SquirrelMail version 1.4.4″ inurl:src ext:php
“This page has been automatically generated by Plesk Server Administrator”
+”Powered by Invision Power Board v2.0.0..2″
+”Powered by phpBB 2.0.6..10″ -phpbb.com -phpbb.pl
inurl:”dispatch.php?atknodetyp e” | inurl:class.at —–Achievo webbased project management—–
allintitle:aspjar.com guestbook
inurl:”/becommunity/community/index.php?pageurl=” —–E-market remote code execution—–
inurl:custva.asp —–EarlyImpact Productcart—–
ext:php intext:”Powered by phpNewMan Version”
ext:pl inurl:cgi intitle:”FormMail *” -”*Referrer” -”* Denied” -sourceforge -error -cvs -input
filetype:cgi inurl:nbmember.cgi
filetype:cgi inurl:pdesk.cgi
filetype:cgi inurl:tseekdir.cgi
filetype:php inurl:index.php inurl:”module=subjects” inurl:”func=*” (listpages| viewpage | listcat)
intext”UBB.threads™ 6.2″|”UBB.threads™ 6.3″) intext:”You * not logged *” -site:ubbcentral.com
intitle:”EMUMAIL – Login” “Powered by EMU Webmail”
intitle:”MRTG/RRD” 1.1* (inurl:mrtg.cgi | inurl:14all.cgi |traffic.cgi)
intitle:”View Img” inurl:viewimg.php
intitle:”WebJeff – FileManager” intext:”login” intext:Pass|PAsse
intitle:”WordPress > * > Login form” inurl:”wp-login.php”
intitle:guestbook “advanced guestbook 2.2 powered”
intitle:welcome.to.horde
inurl:”/cgi-bin/loadpage.cgi?user_id=”
inurl:”/site/articles.asp?idcategory=”
inurl:”comment.php?serendipity “
inurl:”messageboard/Forum.asp?”
inurl:”slxweb.dll”
inurl:/SiteChassisManager/
inurl:cal_make.pl
inurl:citrix/metaframexp/default/login.asp? ClientDetection=On
inurl:comersus_message.asp
inurl:directorypro.cgi
inurl:gotoURL.asp?url=
inurl:technote inurl:main.cgi*filename=*
inurl:ttt-webmaster.php
inurl:wiki/MediaWiki
“Powered by Invision Power Board(U) v1.3 Final” —–Invision Power Board SSI.PHP SQL Injection—–
“Powered by mnoGoSearch – free web search engine software” —–nGoSearch vulnerability—–
“FC Bigfeet” -inurl:mail —–Quicksite demopages for Typo3—–
inurl:com_remository —–ReMOSitory module for Mambo—–
uploadpics.php?did= -forumintext:Generated.by.phpix .1.0? inurl:$mode=album
“Powered by: vBulletin * 3.0.1″ inurl:newreply.php —–vBulletin version 3.0.1 newreply.php XSS—–
filetype:asp inurl:”shopdisplayproducts.asp ” —–VP-ASP Shopping Cart XSS—–
inurl:/cgi-bin/index.cgi inurl:topics inurl:viewcat= +intext:”WebAPP” -site:web-app.org —–WebAPP directory traversal—–
“FrontPage-” inurl:service.pwd
” Dumping data for table”
“phpMyAdmin MySQL-Dump” filetype:txt
“1999-2004 FuseTalk Inc” -site:fusetalk.com
“4images Administration Control Panel”
“ASP.NET_SessionId” “data source=”
“Active Webcam Page” inurl:8080
“AnWeb/1.42h” intitle:index.of
“BlackBoard 1.5.1-f | © 2003-4 by Yves Goergen”
“CERN httpd 3.0B (VAX VMS)”
“Certificate Practice Statement” inurlPDF | DOC)
“Copyright (c) Tektronix, Inc.” “printer status”
“Enter ip” inurl:”php-ping.php”
“FC Bigfeet” -inurl:mail
“File Upload Manager v1.3″ “rename to”
“HTTP_FROM=googlebot” googlebot.com “Server_Software=”
“IMail Server Web Messaging” intitle:login
“Ideal BB Version: 0.1″ -idealbb.com
“Incorrect syntax near”
“Index of /backup”
“Index of” rar r01 nfo Modified 2004
“Internal Server Error” “server at”
“JRun Web Server” intitle:index.of
“Login to Usermin” inurl:20000
“MaXX/3.1″ intitle:index.of
“Microsoft (R) Windows * (TM) Version * DrWtsn32 Copyright (C)” ext:log
“Microsoft-IIS/* server at” intitle:index.of
“Microsoft-IIS/5.0 server at”
“More Info about MetaCart Free”
“Netware * Home” inurl:nav.html
“Network Vulnerability Assessment Report”
“OPENSRS Domain Management” inurl:manage.cgi
“ORA-00933: SQL command not properly ended”
“ORA-12541: TNS:no listener” intitle:”error occurred”
“OmniHTTPd/2.10″ intitle:index.of
“OpenSA/1.0.4″ intitle:index.of
“Phaser 6250″ “Printer Neighborhood” “XEROX CORPORATION”
“Phaser® 740 Color Printer” “printer named: “
“Phorum Admin” “Database Connection” inurl:forum inurl:admin
“Powered *: newtelligence” (”dasBlog 1.6″| “dasBlog 1.5″| “dasBlog 1.4″|”dasBlog 1.3″)
“Powered by A-CART”
“Powered by Coppermine Photo Gallery”
“Powered by DCP-Portal v5.5″
“Powered by Duclassified” -site:duware.com
“Powered by Dudirectory” -site:duware.com
“Powered by Gallery v1.4.4″
“Powered by Ikonboard 3.1.1″
“Powered by Invision Power File Manager” (inurl:login.php) | (intitle:”Browsing directory /” )
“Powered by Link Department”
“Powered by MercuryBoard [v1″
“Powered by PHPFM” filetype:php -username
“Powered by WordPress” -html filetype:php -demo -wordpress.org -bugtraq
“Powered by YaPig V0.92b”
“Powered by ocPortal” -demo -ocportal.com
“Powered by yappa-ng”
“Red Hat Secure/2.0″
“Request Details” “Control Tree” “Server Variables”
“select a database to view” intitle:”filemaker pro”
“SquirrelMail version 1.4.4″ inurl:src ext:php
“Supplied argument is not a valid MySQL result resource”
“Switch to table format” inurl:table|plain
“SysCP - login”
“The script whose uid is ” “is not allowed to access”
“This file was generated by Nessus”
“This page has been automatically generated by Plesk Server Administrator”
“This report was generated by WebLog”
“Unclosed quotation mark before the character string”
“VNC Desktop” inurl:5800
“Warning: Cannot modify header information - headers already sent”
“Warning: pg_connect(): Unable to connect to PostgreSQL server: FATAL”
allinurl:/examples/jsp/snp/snoop.jsp
allinurl:index.htm?cus?audio
allinurl:install/install.php
allinurl:intranet admin
allinurl:servlet/SnoopServlet
axis storpoint “file view” inurl:/volumes/
buddylist.blt
camera linksys inurl:main.cgi
comment:Files containing juicy info***]
comment:Files containing usernames
comment:Pages containing login portals
comment:Sensitive Directories***]
comment:Various online devices
comment:Vulnerable servers
comment:advisories and vulnerabilities
data filetype:mdb -site:gov -site:mil
databasetype. Code : 80004005. Error Description
e-mail address filetype:csv csv
eggdrop filetype:user user
etc (index.of)
ext:asp inurlUgallery intitle:”3.0″ -site:dugallery.com -site:duware.com
ext:asp inurl:pathto.asp
ext:cgi intext:”nrg-” ” This web page was created on “
ext:cgi inurl:editcgi.cgi inurl:file=
ext:cgi inurl:ubb6_test.cgi
ext:conf inurl:rsyncd.conf -cvs -man
ext:gho gho
ext:ini eudora.ini
ext:ini intext:env.ini
ext:ldif ldif
ext:log “Software: Microsoft Internet Information Services *.*”
ext:mdb inurl:*.mdb inurl:fpdb shop.mdb
ext:nsf nsf -gov -mil
ext:php intext:”Powered by phpNewMan Version”
ext:pl inurl:cgi intitle:”FormMail *” -”*Referrer” -”* Denied” -sourceforge -error -cvs -input
ext:reg “username=*” putty
ext:txt inurl:dxdiag
ext:vmx vmx
ezBOO “Administrator Panel” -cvs
filetype:QDF QDF
filetype:asp “Custom Error Message” Category Source
filetype:asp DBQ=” * Server.MapPath(”*.mdb”)





Note: This is for informational purposes only. Do not use any of this
information for illegal uses. Again, this is for demonstrational purposes.
PECUNIA NON OLET is not responsible for your actions and does not promote illegal or
malicious actvities.

2 commenti: