Inurl:secring ext:skr | ext:pgp | ext:bak Inurl:nf intext:password -sample -test -tutorial -download
LOADING PHOOS EBAY FILE EXCHANGE GODADDY FLASHFXP PASSWORD
Inurl:nf filetype:conf password -tatercounter2000 -bootpwd -man Inurl:”nf” intext:”rootpw” -manpage -“Manual Page” -man: -sample Inurl:”nf” intext:”credentials” -manpage -“Manual Page” -man: -sample Inurl:”editor/list.asp” | inurl:”database_editor.asp” | inurl:”login.asa” “are set” Intitle:index.of intext:”secring.skr”|”secring.pgp”|”secring.bak” Intitle:dupics inurl:(add.asp | default.asp | view.asp | voting.asp) -site: Intitle:”phpinfo()” +”fault_password” +”Zend Scripting Language Engine” “liveice configuration file” ext:cfg -site:ĭuclassified” -site: “DUware All Rights reserved”Įnable password | secret “current configuration” -intext:theĮxt:asa | ext:bak intext:uid intext:pwd -“uid.pwd” database | server | dsnįiletype:bak inurl:”htaccess|passwd|shadow|htusers”įiletype:cfm “cfapplication name” passwordįiletype:config config intext:appSettings “User ID”įiletype:inc mysql_connect OR mysql_pconnectįiletype:properties inurl:db intext:passwordįiletype:reg reg +intext:”defaultusername” +intext:”defaultpassword”įiletype:reg reg HKEY_CURRENT_USER SSHHOSTKEYSįiletype:sql “insert into” (pass|passwd|password)įiletype:sql (“values * MD5” | “values * password” | “values * encrypt”)įiletype:url +inurl:”ftp://” username password email
“index of/” “ws_ftp.ini” “parent directory” “# -FrontPage-” ext:pwd inurl:(service | authors | administrators | users) “# -FrontPage-” inurl:d !Host=*.* intext:enc_UserPassword=* ext:pcf It’s not so hard, you just type 1 of these lines into the search bar at Then you’ll get several links with secret information about different hompages, for example: admin passwords for ftps, ventrilo servers etc.