Welcome To suyashjain.blogspot.com

For Latest and more contents visit http://www.i3w.in

Tuesday, September 30, 2008

Google Hacking

Query : intitle:"Welcome to IIS 4.0"
A listing of Windows IIS 4.0 servers, which have had a plethora of security vulnerabilities, and are usually easy pickings for most attackers.

Query: "VNC Desktop" inurl:5800
VNC Server allows remote users to connect and control a user's desktop. It is possible for this service to be configured without a password and allow direct access to the desktop.

Query: filetype:pwd service

A quick click on one of the links reveals several usernames and UNIX passwords:
# -FrontPage-
ekendall:bYld1Sr73NLKo
louisa:5zm94d7cdDFiQ

Query: filetype:bak inurl:"htaccess|passwd|shadow|htusers"

reveals all kinds of information related to password files that store usernames and encrypted passwords (which can easily be cracked).

Query : filetype:properties inurl:db intext:password

A quick click on one of the results reveals database passwords in clear text!drivers=sun.jdbc.odbc.JdbcOdbcDriver jdbc.idbDriver
logfile=D:\\user\\src\\java\\DBConnectionManager\\log.txt
idb.url=jdbc:idb:c:\\local\\javawebserver1.1\\db\\db.prp
 
 
idb.maxconn=2
 
 
access.url=jdbc:odbc:demo
access.user=demo
access.password=demopw

Query: "not for distribution" confidential site:edu

Over 100 confidential documents are revealed at the click of a button. Too bad that university left their students' social security numbers in that PDF document.

Query: This file was generated by Nessus

Nessus is a very popular vulnerability scanner that many administrators use. Unfortunately for the unsuspecting victims, Joe Hacker has now located hundreds of Nessus reports that have inadvertently been left on users' systems. This is an amazing bounty of systems accessible via the Internet that provides a blueprint of all their vulnerabilities!.

Note : This information is taken from Hacking Exposed 5th Edition.

No comments: