How to hack Passwords with Google?
Google is your best friend when it comes to hacking.
The search engine giant has crawled loads of data which was intended to
be protected by webmasters, but is being exploited and mined by smart
users using Google dorks. Today I will be discussing some practical
dorks which will help you gain passwords, databases and vulnerable
directories. The basic
methodology remains the same, query Google using specialized dorks with
precise parameters and you are good to go. I assume you have basic
working knowledge of google dorks.Lets start, shall we ?
FTP passwordsws_ftp.ini is a configuration file for a popular win32 FTP client that stores usernames, (weakly) encoded passwords, sites and directories that the user can store for later reference.
You can also this dork which uses “parent directory” to avoid results other than directory listingsintitle:index.of ws_ftp.ini
even if the site or file has been taken offlline, you can still search the contents in the Google cache using the following dorkfiletype:ini ws_ftp pwdOr
“index of/” “ws_ftp.ini” “parent directory”
“cache:www.abc.com/ws_ftp.ini”
where
The ws_ftp password uses quite weak encryption algorithm, hence once you get the password, you can break it using the decryptor provided here. http://lab.artlung.com/www.abc.com is the site you want to check the dork for.
PHP HackingSites made in PHP have a file known as “config.php” which stores configuration and the username and password for the sql database the site is hosting. This password is required only once per transaction (i.e when ever admin logins or a transaction is committed at administrator level) and hence will be specified by the ‘require_once’ parameter in the config file or in index file.
to view php file contentsintitle:index.of config.php
you can also try the directory traversal attack in php using the following dorkintitle:”Index of” phpinfo.php
if you are lucky, substitute the filename with ‘index.php’, download it, read it and get the password (hint:if you are not able to find it, try looking for globals.php).Since most websites today deny this trick, but you may get lucky with someinurl:download.php?=filename
SQL DumpsWe will be hunting for SQL password dumps saved in database, here ext:sql specifies the type of password dump, e10adc3949ba59abbe56e057f20f88
ext:sql intext:@gmail.com intext:e10adc3949ba59abbe56e057f20f883e
Remember kidsext:sql intext:”INSERT INTO” intext:@somemail.com intext:password
- Use different email providers, substitute g mail/yahoo mail instead of some mail ,or try custom domain mail providers.
- Use different file extensions.
- Use different type of hashes, some older ones might be using md4 and some others might be using other prominent encryption algorithms.
- just mix everything up and try different combinations
A very flexible query can be used to hunt for WS_FTP.log which in turn can disclose valuable information about the server.
You can substitute “+htpasswd” for “+FILENAME” & you may get several results not mentioned before using the normal search. You can further explore filenames by using keywords like+htpasswd +WS_FTP.LOG filetype:log
The list goes on and on.. Also you cam try this dork to data mine information about the uploaderphpinfo, admin, MySQL, password, htdocs, root, Cisco, Oracle, IIS, resume, inc, sql, users, mdb, frontpage, CMS, backend, https, editor, intranet
which tells you more about who’s uploading files to a specific site, quite handy for some passive reconnaissance.“allinurl: “some.host.com” WS_FTP.LOG filetype:log”
http://
Post a Comment