Selasa, 28 Desember 2010

kumpulan dork hacking use google

admin account info" filetype:log

!Host=*.* intext:enc_UserPassword=* ext:pcf

"# -FrontPage-" ext:pwd inurl:(service
authors
administrators
users) "# -FrontPage-" inurl:service.pwd
na
"AutoCreate=TRUE password=*"

"http://*:*@www" domainname

"index of/" "ws_ftp.ini" "parent directory"

"liveice configuration file" ext:cfg -site:sourceforge.net

"parent directory" +proftpdpasswd

Duclassified" -site:duware.com "DUware All Rights reserved"

duclassmate" -site:duware.com

Dudirectory" -site:duware.com

dudownload" -site:duware.com

Elite Forum Version *.*"

Link Department"

"sets mode: +k"

"your password is" filetype:log

DUpaypal" -site:duware.com

allinurl: admin mdb

auth_user_file.txt

config.php

eggdrop filetype:user user

enable password
secret "current configuration" -intext:the

etc (index.of)

ext:asa
ext:bak intext:uid intext:pwd -"uid..pwd" database
server
dsn

ext:inc "pwd=" "UID="

ext:ini eudora.ini

ext:ini Version=4.0.0.4 password

ext:passwd -intext:the -sample -example

ext:txt inurl:unattend.txt

ext:yml database inurl:config

filetype:bak createobject sa

filetype:bak inurl:"htaccess
passwd
shadow
htusers"

filetype:cfg mrtg "target

filetype:cfm "cfapplication name" password

filetype:conf oekakibbs

filetype:conf slapd.conf

filetype:config config intext:appSettings "User ID"

filetype:dat "password.dat"

filetype:dat inurl:Sites.dat

filetype:dat wand.dat

filetype:inc dbconn

filetype:inc intext:mysql_connect

filetype:inc mysql_connect OR mysql_pconnect

filetype:inf sysprep

filetype:ini inurl:"serv-u.ini"

filetype:ini inurl:flashFXP.ini

filetype:ini ServUDaemon

filetype:ini wcx_ftp

filetype:ini ws_ftp pwd

filetype:ldb admin

filetype:log "See `ipsec --copyright"

filetype:log inurl:"password.log"

filetype:mdb inurl:users.mdb

filetype:mdb wwforum

filetype:netrc password

filetype:pass pass intext:userid

filetype:pem intext:private

filetype:properties inurl:db intext:password

filetype:pwd service

filetype:pwl pwl

filetype:reg reg +intext:"defaultusername" +intext:"defaultpassword"

filetype:reg reg +intext:â? WINVNC3â?

filetype:reg reg HKEY_CURRENT_USER SSHHOSTKEYS

filetype:sql "insert into" (pass
passwd
password)

filetype:sql ("values * MD5"
"values * password"
"values * encrypt")

filetype:sql +"IDENTIFIED BY" -cvs

filetype:sql password

filetype:url +inurl:"ftp://" +inurl:";@"

filetype:xls username password email