--- tag:研習,google hacking --- Google hacking 2023/04 --- ### 課程 * 資料外洩的案例 * https://pastebin.com/U5QCqjwe * 公開的資訊 * 網路時光機 * https://archive.org/ * Google search--住宿 * [搜尋引擎網頁排名佔比](https://newscanpic.tw/n/seo_03.jpg) * Google運算及繪圖功能 * sin(x) * y=x^2+5 * y=x^3+8 * graph for 100-3/sqrt(x^2+y^2)+sin(sqrt(x^2+y^2))+sqrt(200-x^2+y^2+10*sin(x)+10*sin(y))/1000 * 5 + (-sqrt(1-x^2-(y-abs(x))^2))*cos(30*((1-x^2-(y-abs(x))^2))), x is from -1 to 1, y is from -1 to 1.5, z is from 1 to 6 * 100-3/(sqrt(x^2+y^2))+sin(sqrt(x^2+y^2))+sqrt(200-(x^2+y^2)+10*sin(x)+10sin(y))/1000, x is from -15 to 15, y is from -15 to 15, z is from 90 to 101 * 進階Google Search * 密碼 filetype:xls site:edu.tw * 行銷 小論文 filetype:pdf * Hacked by site:.edu.tw * "Index of /" +password.txt * "Hacked by" site:.edu.tw * "Hacked by" site:.tw 強制以"Hacked by"為字詞 * http://sc-cctv.com.tw/about.php?pk=4&lang=en * https://www.sanchuen.com.tw/swf/ * https://www.stroke.com.tw/ipage.php?Key=10&iPage=318 * http://www.xianyun.hoseo.tw/news.php?n_ID=6 * inurl:login.php site:.edu.tw 登入畫面 * https://aps.ncue.edu.tw/cee/login.php * https://sso.nuu.edu.tw/login.php * inurl:admin.php site:.edu.tw 登入畫面 * https://www.bio.fju.edu.tw/biobox/admin.php * http://wmap.tcrc.edu.tw/flow/admin.php * http://tech.ccjhs.tp.edu.tw/blog2/admin.php * http://cte.ndhu.edu.tw/cen3/fix/admin.php * inurl:admin.asp site:.edu.tw * inurl:login.asp site:.edu.tw * 以上都是經常被使用於找出系統管理或登入管理頁面使用的搜尋 * inurl:phpinfo site:.edu.tw * http://ms.dkes.ntpc.edu.tw/phpinfo.php * https://www.cvedetails.com/vulnerability-list/vendor_id-45/product_id-66/version_id-416227/Apache-Http-Server-1.3.34.html * https://www.cvedetails.com/vulnerability-list/vendor_id-217/product_id-383/version_id-389895/Openssl-Openssl-0.9.8.html * http://www.1491.com.tw/phpinfo.php * intext:”mysql_fetch_array” site:.edu.tw * https://www.phys.sinica.edu.tw/~nanopublic/oa/reservation.php * http://www.bm.nsysu.edu.tw/seawoun/ * GHDB https://www.exploit-db.com/google-hacking-database * "enable password" ext:cfg -git -cisco.com * http://www.opus1.com/nac/lv06configs/nap_cisco3550.cfg * http://www.opus1.com/nac/lv06configs/nap_lkdwncisco3550.cfg * intitle:"Asus Login" inurl:Main_Login.asp * https://demoui.asus.com/Main_Login.asp * https://46.227.199.245:8443/Main_Login.asp * site:pastebin.com "*@gmail.com password" * https://pastebin.com/yb80YQUQ * intitle:"Index of" .sh_history * intitle:"Index of" .bash_history * inurl:upsstats.cgi?host "UPS Model” * https://132.247.103.142/cgi-bin/upsstats.cgi?host=127.0.0.1&img1=1&img2=6&img3=5&refresh=30&temp=F * http://voit.li/cgi-bin/upsstats.cgi * "hacked by kingskrupellos" site:.edu.tw * https://user211.lms.fju.edu.tw/hp/device/this.LCDispatcher?nav=hp.Alerts * SHODAN https://www.shodan.io/ * default password * default password country:"TW" * default password country:"TW" org:"Ministry of Education Computer Center" * port:3389 country:"TW" org:"Ministry of Education Computer Center" * sharp country:"TW" * https://210.240.47.65/main.html * epson country:"TW" * * Insecam http://www.insecam.org/ * http://www.insecam.org/en/view/1007212/ 台南安平 * https://haveibeenpwned.com/
×
Sign in
Email
Password
Forgot password
or
By clicking below, you agree to our
terms of service
.
Sign in via Facebook
Sign in via Twitter
Sign in via GitHub
Sign in via Dropbox
Sign in with Wallet
Wallet (
)
Connect another wallet
New to HackMD?
Sign up