Intitle:”phpinfo()” +”fault_password” +”Zend s?ri?ting Language Engine” “liveice configuration file” ext:cfg -site:ĭuclassified” -site: “DUware All Rights reserved”Įnable password | secret “current configuration” -intext:theĮxt:asa | ext:bak intext:uid intext:pwd -”uid.pwd” database | server | dsnįiletype:bak inurl:”htaccess|passwd|shadow|htusers”įiletype:cfm “cfapplication name” passwordįiletype:config config intext:appSettings “User ID”įiletype:inc mysql_connect OR mysql_pconnectįiletype:properties inurl:db intext:passwordįiletype:reg reg +intext:”defaultusername” +intext:”defaultpassword”įiletype:reg reg HKEY_CURRENT_USER SSHHOSTKEYSįiletype:sql “insert into” (pass|passwd|password)įiletype:sql (“values * MD5″ | “values * password” | “values * encrypt”)įiletype:url +inurl:”ftp://” username password email “index of/” “ws_ftp.ini” “parent directory” “# -FrontPage-” ext:pwd inurl:(service | authors | administrators | users) “# -FrontPage-” inurl:d !Host=*.* intext:enc_UserPassword=* ext:pcf “Nowadays, pretty much any hacking incident most likely begins with Google.”
As Johnny Long, the originator of the “Google Hacking” concept (which began as a joke), states: “Search engines are probably the first step, because they are a really easy way of getting to know the target, and the target has no idea of what you’re doing,” he says. This list is an aggregate of most of the searches you can use to find sensitive information in Google.