mercoledì 3 agosto 2011

GOOGLE HACKING 2

Google Hacking

allintitle:Brains, Corp. camera

allintitle:"index of/admin"
allintitle:"index of/root"
allintitle:restricted filetype:doc site:gov
allintitle:restricted filetype :mail
allintitle:sensitive filetype:doc

allinurl:/bash_history
allinurl:winnt/system32/ (get cmd.exe)

ext:ini eudora.ini
ext:pwd inurl:(service|authors|administrators |users) "# -FrontPage-"

filetype:bak inurl:"htaccess|passwd|shadow|htusers"
filetype:conf slapd.conf
filetype:ctt "msn"
filetype:mdb inurl:"account|users|admin|administrators|passwd|password"
filetype:mdb inurl:users.mdb
filetype:QDF QDF
filetype:pdf "Host Vulnerability Summary Report" "Assessment Report"
filetype:sql ("passwd values ****" | "password values ****" | "pass values ****" )
filetype:xls inurl:"email.xls"
filetype:user eggdrop user

"Index of /admin"
"Index of /" +.htaccess
"Index of /mail"
"Index of /" "Parent Directory" "WS_FTP.ini" filetype:ini
"Index of /" +passwd
"Index of /password"
"Index of /" +password.txt
intext:"BiTBOARD v2.0" "BiTSHiFTERS Bulletin Board"
intext:centreware inurl:status
intext:"MOBOTIX M1"
intext:"MOBOTIX M10"
intext:"Open Menu"
intext:"powered by Web Wiz Journal"
intext:"Tobias Oetiker" "traffic analysis"

intitle:index.of "Apache/1.3.28 Server at"
intitle:index.of "Apache/2.0 Server at"
intitle:index.of "Apache/* Server at"
intitle:index.of "HP Apache-based Web Server/*"
intitle:index.of "IBM _ HTTP _ Server/* * Server at"
intitle:index.of "Microsoft-IIS/4.0 Server at"
intitle:index.of "Microsoft-IIS/5.0 Server at"
intitle:index.of "Microsoft-IIS/6.0 Server at"
intitle:index.of "Microsoft-IIS/* Server at"
intitle:index.of "Netscape/* Server at"
intitle:index.of "Oracle HTTP Server/* Server at"
intitle:index.of "Red Hat Secure/*"

intitle:"Apache::Status" (inurl:server-status | inurl:status.html | inurl:apache.html)
intitle:"Welcome to IIS 4.0!"
intitle:"Welcome to Windows 2000 Internet Services"
intitle:"Welcome to Windows XP Server Internet Services"
intitle:"Welcome to Your New Home Page!"
intitle:"Test Page for Apache Installation" "It worked!" "this Web site!"
intitle:"Test Page for Apache Installation" "Seeing this instead"
intitle:"Test Page for Apache Installation" "You are free"
intitle:"Test Page for the Apache Http Server on Fedora Core"
intitle:"Test Page for the Apache Web Server on RedHat Linux"
intitle:"Test Page for the SSL/TLS-aware Apache Installation" "Hey, it worked!"

intitle:"index of" .bash_history
intitle:"index of" etc/shadow
intitle:"index.of" finances.xls
intitle:"index of" htpasswd
intitle:"Index Of" inurl:maillog
intitle:"index of" master.passwd
intitle:"index of" members OR accounts
intitle:"index.of" mystuff.xml
intitle:"index of" passwd
intitle:"index of" people.lst
intitle:"index of" pwd.db
intitle:"Index of" pwd.db
intitle:"Index of" .sh_history
intitle:"index of" spwd
intitle:"index.of" trillian.ini
intitle:"index of" user_carts OR user_cart
intitle:"active webcam page"
intitle:"ASP Stats Generator *.*" "ASP Stats Generator" "2003-2004 weppos"
intitle:"curriculum vitae" "phone * * *" "address *"
intitle:"Dell Laser Printer" ews
intitle:"EvoCam" inurl:"webcam.html"
intitle:liveapplet inurl:LvAppl
intitle:"Multimon UPS status page"
intitle:"my webcamXP server!" inurl:":8080"
intitle:"statistics of" "advanced web statistics"
intitle:"System Statistics" +"System and Network Information Center"
intitle:"Terminal Services Web Connection"
intitle:"Usage Statistics for" "Generated by Webalizer"
intitle:"VNC Desktop" inurl:5800
intitle:"Web Server Statistics for ****"
inurl:admin filetype:db
inurl:admin inurl:backup intitle:index.of
inurl:"auth_user_file.txt"
inurl:"/axs/ax-admin.pl" -script
inurl:"/cricket/grapher.cgi"
inurl:hp/device/this.LCDispatcher
inurl:iisadmin
inurl:indexFrame.shtml Axis
inurl:"main.php" "phpMyAdmin" "running on"
inurl:passwd filetype:txt
inurl:"printer/main.html" intext:"settings"
inurl:server-info "Apache Server Information"
inurl:"ViewerFrame?Mode="
inurl:"wvdial.conf" intext:"password"
inurl:"wwwroot/*."

site:gov confidential
site:mil confidential
site:mil "top secret"
"Copyright (c) Tektronix, Inc." "printer status"
"Host Vulnerability Summary Report"
"http://*:*@www"
"Network Vulnerability Assessment Report"
"not for distribution"
"Output produced by SysWatch *"
"These statistics were produced by getstats"
"This file was generated by Nessus"
"This report was generated by WebLog"
"This summary was generated by wwwstat"
"Generated by phpSystem"
"Host Vulnerability Summary Report"
 "my webcamXP server!"
 sample/LvAppl/
"TOSHIBA Network Camera - User Login"
/home/homeJ.html
/ViewerFrame?Mode=Motion
This reveals mySQL database dumps. These database dumps list the structure and content of databases, which can reveal many different types of sensitive information. http://www.google.com/search?hl=en&lr=&ie=UTF-8&oe=UTF-8&q=%22%23mysql+dump%22+filetype%3Asql&btnG=Search

These log files record info about the SSH client PUTTY. These files contain usernames, site names, IP addresses, ports and various other information about the SSH server connected to. http://www.google.com/search?hl=en&lr=&ie=UTF-8&q=filetype%3Alog+username+putty

These files contain cleartext usernames and passwords, as well as the sites associated with those credentials. Attackers can use this information to log on to that site as that user. http://www.google.com/search?hl=en&lr=&ie=UTF-8&q=filetype%3Alog+inurl%3A%22password.log%22

This file contains port number, version number and path info to MySQL server. http://www.google.com/search?hl=en&lr=&ie=UTF-8&q=intitle%3A%22index+of%22+mysql.conf+OR+mysql_config

This search reveals sites which may be using Shockwave (Flash) as a login mechanism for a site. The usernames and passwords for this type of login mechanism are often stored in plaintext inside the source of the .swl file. http://www.google.com/search?hl=en&lr=&q=inurl%3Alogin+filetype%3Aswf+swf

These are oulook express email files which contain emails, with full headers. The information in these emails can be useful for information gathering about a target. http://www.google.com/search?hl=en&lr=&q=filetype%3Aeml+eml+%2Bintext%3A%22Subject%22+%2Bintext%3A%22From%22+%2Bintext%3A%22To%22

This google search reveals users names, pop3 passwords, email addresses, servers connected to and more. The IP addresses of the users can also be revealed in some cases. http://www.google.com/search?num=100&hl=en&lr=&q=filetype%3Areg+reg+%2Bintext%3A%22internet+account+manager

 
 

Footprinting Websites and Information Gathering Resources

A hacker or pen tester  may also do a Google search or a site search to locate information about employees. Some sites useful to find more information about an organization and its employees include:

www.trula.com - real estate

www.zillow.com - real estate

www.netronline.com - real estate

www.whosarat.com - informants

www.zabaseach.com - name, address, location info

www.zoominfo.com - person & company data

www.vitalrec.com - people info

www.pipl.com - people search

www.skipease.com/blog/ - people search

www.pretrieve.com - people search

www.publicdata.com - people search

www.urapi.com - people search

https://addons.mozilla.org/en-US/firefox/addon/1912 (who is this person)

www.nndb.com – people activity tracker

www.willyancey.com/finding.htm  online info

www.courthousedirect.com  - property records

www.turboscout.com - multisearch engine tool

www.theultimates.com - phone number lookup

http://skipease.whitepages.com/reverse_address - address lookup

www.thevault.com - company search / profile

www.blogsearchengine.com - search blogs for info or person

www.ccrs.info - China based company search /profile

www.hoovers.com - company search / profile

www.lexisnexis.com - company search / profile

www.topix.net - region specific news articles

www.pacer.uscourts.gov/natsuit.html - Court records

www.oihweb.com - online investigation techniques

www.linkedin.com - business person's network

 
Footprinting Links

Google Hacking Database
A search that finds password hashes
Nessus Reports from Google
More Passwords from Google
Google Hacks Volume III by Halla
G-Zapper Blocks the Google Cookie to Search Anonymously
SiteDigger 2.0 searches Google’s cache to look for vulnerabilities
BeTheBot - View Pages as the Googlebot Sees Them
An experts-exchange page to demonstrate the Googlebot
HTTP Header Viewer
Masquerading Your Browser
User Agent Switcher :: Firefox Add-ons
Modify Headers :: Firefox Add-ons
User Agent Sniffer for Project 1
GNU Wget - Tool to Mirror Websites
Teleport Pro - Tool to Mirror Websites
Google Earth
Finding Subdomains (Zone Transfers)
Dakota Judge rules that Zone Transfers are Hacking
Internet Archive - Wayback Machine
Wikto - Web Server Assessment Tool - With Google Hacking
VeriSign Whois Search from VeriSign, Inc.
whois.com
ARIN: WHOIS Database Search
Border Gateway Protocol (BGP) and AS Numbers
Internic | Whois - the only one that finds hackthissite.org
Teenager admits eBay domain hijack
NeoTrace
VisualRoute traceroute: connection test, trace IP address, IP trace, IP address locations

Nessun commento:

Posta un commento