TGS Forum
Hello Guest,

You are currently viewing our boards as a guest, which gives you limited access to view most discussions and access our other features.

By joining this community for FREE, you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content, & many other special features.

Registration is fast, simple & absolutely free, so please, join our community today!
TGS Forum
Hello Guest,

You are currently viewing our boards as a guest, which gives you limited access to view most discussions and access our other features.

By joining this community for FREE, you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content, & many other special features.

Registration is fast, simple & absolutely free, so please, join our community today!
TGS Forum
Would you like to react to this message? Create an account in a few clicks or log in to continue.


 
PortalHomeLatest imagesRegisterLog in

 

 Dorks to Find Vulnerable Servers

Go down 
2 posters
AuthorMessage
Malay Akechan
Administrator
Administrator
Malay Akechan


Points : 676
Posts : 244
Join date : 2011-04-04
Location : Muzaffarpur, New Delhi
OS Used : Windows 7 & XP
Mobile : Nokia 5233, Samsung Galaxy Tab
Browser : Google Chrome Plus

Dorks to Find Vulnerable Servers  Empty
PostSubject: Dorks to Find Vulnerable Servers    Dorks to Find Vulnerable Servers  Icon_minitimeWed Sep 21, 2011 10:03 pm

These searches reveal servers with specific vulnerabilities.

IMPORTANT :- These dorks are exclusive property of TGS Forum & cannot be copied elsewhere under any circumstances.

1. This Google dork possibly exposes sites with the Article Directory (index.php page) Remote File Inclusion Vulnerability.

Code:
inurl:index.php?pagedb=rss

2. Exposes setup pages to the ultraboard system.

Code:
filetype:pl intitle:"Ultraboard Setup"

3. Using this, you can find sites with a Pivot weblog installed but not set up. The default set up screen on Pivot has you create an administrator account, so, using this, you can create an account on someone else's weblog, post, and manage the blog.

Code:
"set up the administrator user" inurl:pivot

4. This is a "double dork" which finds two different shopping carts, both vulnerable.

Code:
(inurl:/shop.cgi/page=) | (inurl:/shop.pl/page=)

5. NatterChat is a webbased chat system written in ASP. An SQL injection vulnerability is identified in the application that may allow attackers to pass malicious input to database queries, resulting in the modification of query logic or other attacks. This allows the attacker to gain admin access.

Code:
natterchat inurl:home.asp -site:natterchat.co.uk

6. phpMyAdmin is a tool written in PHP intended to handle the administration of MySQL over the Web. Currently it can create and drop databases, create/drop/alter tables, delete/edit/add fieldsThe servers found here can be acessed without authentication. This search is restricted to NON-ROOT users!

Code:
intitle:phpMyAdmin "Welcome to phpMyAdmin ***" "running on * as root@*"

7. This brings up alot of insecure as well as secure filemanagers. These software solutions are often used by companies offering a "simple" but "cost effective" way to their users who don't know unix or html. There is a problem sometimes with this specific filemanager due to insecure use of the session ID that can be found in the unprotected "fileman.log" logfile. It has been reported that an attacker can abuse the last document-edit-url of the logfile. By copy pasting that line in a new window it gives the attacker valid user credentials on the server, at least for a while.. (think hours not seconds).

Code:
filetype:cgi inurl:"fileman.cgi"


More updates coming soon..................stay tuned. yes
Back to top Go down
http://www.tgsforum.in
Malay Akechan
Administrator
Administrator
Malay Akechan


Points : 676
Posts : 244
Join date : 2011-04-04
Location : Muzaffarpur, New Delhi
OS Used : Windows 7 & XP
Mobile : Nokia 5233, Samsung Galaxy Tab
Browser : Google Chrome Plus

Dorks to Find Vulnerable Servers  Empty
PostSubject: Re: Dorks to Find Vulnerable Servers    Dorks to Find Vulnerable Servers  Icon_minitimeTue Sep 27, 2011 8:17 am

Here are more such dorks. sarcastic

8. Unprotected EasyPHP Admin page detection.

Code:
intitle:"[EasyPHP] - Administration"

9. Vbulletin installation wizards allow users to modify installation parameters. These may also reveal sql username, password and table installations.

Code:
inurl:/vb/install/install.php

10. File upload servers.

Code:
intitle:"Uploader - Uploader v6" -pixloads.com
Back to top Go down
http://www.tgsforum.in
Thewrath
Newbie
Newbie



Points : 1
Posts : 1
Join date : 2013-01-14

Dorks to Find Vulnerable Servers  Empty
PostSubject: Re: Dorks to Find Vulnerable Servers    Dorks to Find Vulnerable Servers  Icon_minitimeMon Jan 14, 2013 4:25 pm

really awesome dorks ........thanx for the share
Back to top Go down
Sponsored content





Dorks to Find Vulnerable Servers  Empty
PostSubject: Re: Dorks to Find Vulnerable Servers    Dorks to Find Vulnerable Servers  Icon_minitime

Back to top Go down
 
Dorks to Find Vulnerable Servers
Back to top 
Page 1 of 1
 Similar topics
-
» How to find a vulnerable website?
» Google+ 'Find My Face' Facial Recognition Feature

Permissions in this forum:You cannot reply to topics in this forum
TGS Forum :: Hacking Section :: Hacking Resources-
Jump to:  
Make a forum | ©phpBB | Free forum support | Report an abuse | Cookies | Forumotion.com