Language:EN
Pages: 5
Rating : ⭐⭐⭐⭐⭐
Price: $10.99
Page 1 Preview
intitle merchant administration login inurl malbor

Intitle merchant administration login inurl malboro admin

filetype:png -.gov-.edu -.mil -
opendarwin

.edu -.mil -opendarwin

intitle:"Sony SNT-V304 Video
Network Station" inurl:hsrindex.sht ml

intitle:"Sony SNT-V304 Video Network Station"
inurl:hsrindex.shtml

inurl:wp-mail.php + "There doesn't seem to be any
new mail."

inurl:wp-mail.php + "There doesn't seem to be any new mail."

on Categories"
"Featured
Stories")|("default 2, 3column,
Romance,
eFiction")

3column, Romance, eFiction")

"Welcome to the directory listing of"
"NetworkActiv-Web-Server"

"Welcome to the directory listing of" "NetworkActiv-Web-Server"

this is for NetworkActiv-Web-Server directory listing

was found by golfo on sep 8th, but he forgot to submit it (ouch).. Before that mlynch was the first to discover it.

See:http://johnny.ihackstuff.com/index. php?name=PNphpBB2&file=viewtopic &t=2784&highlight=snap+serverhttp:// johnny.ihackstuff.com/index.php?mod ule=prodreviews&func=showcontent& id=180

"parent directory" +proftpdpasswd

User names and password hashes from web server backups generated by
cpanel for ProFTPd. Password hashes can be cracked, granting direct access to FTP accounts. Unix passwd and
shadow files can sometimes be found with this query as well.

"Warning: Installation directory exists at" "Powered by Zen Cart" -demo

by this dork you can find fresh
installations of Zen-Cartsee Full Disclosure forums fore details... ;)

"2005 SugarCRM Inc. All Rights Reserved" "Powered By
SugarCRM"

this is the dork for Sugar Suite 3.5.2a & 4.0beta remote code execution issue, advisory & poc
exploit:http://rgod.altervista.org/sugar_ suite_40beta.html

"Powered By phpCOIN 1.2.2"

PhpCOIN 1.2.2 arbitrary remote\local inclusion / blind sql injection / path
disclosureadvisory:http://rgod.altervista .org/phpcoin122.htmlmore
generic:"Powered By phpCOIN"to see previous verions (not tested)

"Site powered By Limbo CMS"

this is the dork for Limbo Cms

inurl:ventrilo_srv.i ni adminpassword

A sql vulnerability has been reported in a Techno Dreams asp script, login.asp. http://search.securityfocus.com/archive /1/414708/30/0/threadedSeveral ways of finding the vulnerable
file:Guestbook (the above dork):
inurl:guestbook/guestbooklist.asp "Post Date" From Country Results 1 - 21 of 123Announcement:
inurl:MainAnnounce1.asp "show all" Results 1 -20 of 86WebDirectory:
inurl:webdirectory "Total Available Web Sites" Search Results 1 - 4 of
5MailingList:
inurl:maillinglist/emailsadd.asp Results 1 - 6 of 6note these dorks don't find the vulnerable script; to find it change the

url to /admin/login.asp or
/login.asp.The default admin user/pass is admin/admin. Some results leave this info on the page and others load the page with this info already filled out.

intitle:"Admin login" "Web Site Administration" "Copyright"

sift Group makes a web site
administration product which can be accessed via a web browser. This dork locates their admin login.

(intitle:WebStatistica
inurl:main.php) |
(intitle:"WebSTATISTICA server")-inurl:statsoft -inurl:statsoftsa -
inurl:statsoftinc.com -edu -software-rob

WebStatistica provides detailed
statistics about a web page. Normally you would have to login to view these statistics but the sites have put
autologin on.

inurl:/cgi-bin/pass.txt

Passwords

You are viewing 1/3rd of the document.Purchase the document to get full access instantly

Immediately available after payment
Both online and downloadable
No strings attached
How It Works
Login account
Login Your Account
Place in cart
Add to Cart
send in the money
Make payment
Document download
Download File
img

Uploaded by : James Allen

PageId: ELI46DDE7D