Government Security
Network Security Resources

Jump to content

Photo

Google Dorks Pack Download

security hacking exploit cgi php sql
  • Please log in to reply
2 replies to this topic

#1 wangluoba

wangluoba

    Private

  • Members
  • 4 posts

Posted 11 January 2012 - 03:34 AM

Google dorks are the center of the Google Hacking. Many hackers use google to find vulnerable webpages and later use these vulnerabilities for hacking. Posted Image
Example Dorks:-
1. CGI directories contain scripts which can often be exploited by attackers.
Click here for the Google search ==> “index of cgi-bin”
This way you will find many CGI directories some of them may be vulnerable. Posted Image
2. Another famous Google Dork is the PhpMyAdmin Dork. phpMyAdmin is a widly spread webfrontend used to mantain sql databases. The default security mechanism is to leave it up to the admin of the website to put a .htaccess file in the directory of the application. Well gues what, obviously some admins are either too lazy or don’t know how to secure their directories.
Click here for the Google search ==> “Welcome to phpMyAdmin” ” Create new database”
This way you may find some vulnerable pages to [color=#0072bc !important][font=inherit !important][color=#0072BC ! important][font=inherit ! important]gain [/font][color=#0072BC ! important][font=inherit ! important]access[/font][/color][/font][/color][/color] to someone’s PhpMyAdmin. Posted Image
Honeypots
Honeypot or Honeypages are webpages designed to attract Google Dorkyz or Google Hackers. If you search for “index of /etc/passwd” on google. The first link you find is a very famous gray-world.net honeypot. Posted Image
The biggest database of Google Dorks is here.

pass:packs

Attached Files



#2 sammybee

sammybee

    Private

  • Members
  • 1 posts

Posted 24 January 2012 - 06:54 AM

what is the password of your package. i mean the google dork.rar.

#3 Glyph

Glyph

    General of the Army

  • GSO Management
  • 1,604 posts

Posted 24 January 2012 - 10:34 AM

Perhaps you should reread the post a bit more carefully??





Also tagged with one or more of these keywords: security, hacking, exploit, cgi, php, sql