Query : intitle:"Welcome to IIS 4.0"
A listing of Windows IIS 4.0 servers, which have had a plethora of security vulnerabilities, and are usually easy pickings for most attackers.
Query: "VNC Desktop" inurl:5800
VNC Server allows remote users to connect and control a user's desktop. It is possible for this service to be configured without a password and allow direct access to the desktop.
Query: filetype:pwd service
A quick click on one of the links reveals several usernames and UNIX passwords:
# -FrontPage-
ekendall:bYld1Sr73NLKo
louisa:5zm94d7cdDFiQ
Query: filetype:bak inurl:"htaccess|passwd|shadow|htusers"
reveals all kinds of information related to password files that store usernames and encrypted passwords (which can easily be cracked).
Query : filetype:properties inurl:db intext:password
A quick click on one of the results reveals database passwords in clear text!drivers=sun.jdbc.odbc.JdbcOdbcDriver jdbc.idbDriver
logfile=D:\\user\\src\\java\\DBConnectionManager\\log.txt
idb.url=jdbc:idb:c:\\local\\javawebserver1.1\\db\\db.prp
idb.maxconn=2
access.url=jdbc:odbc:demo
access.user=demo
access.password=demopw
Query: "not for distribution" confidential site:edu
Over 100 confidential documents are revealed at the click of a button. Too bad that university left their students' social security numbers in that PDF document.
Query: This file was generated by Nessus
Nessus is a very popular vulnerability scanner that many administrators use. Unfortunately for the unsuspecting victims, Joe Hacker has now located hundreds of Nessus reports that have inadvertently been left on users' systems. This is an amazing bounty of systems accessible via the Internet that provides a blueprint of all their vulnerabilities!.
Note : This information is taken from Hacking Exposed 5th Edition.
No comments:
Post a Comment