# Google Dork:
inurl:elmah.axd intext:"Powered by ELMAH" -inurl:detail
# Date:
13.08.2018
# Exploit Author:
NSIDE Attack Logic GmbH
# Vendor Homepage:
https://elmah.github.io/
#Description:
This dorks can be used to identify public ELMAH (Error Logging Modules and Handlers) instances that provide sensitive Information, from the application path to the session token of an authenticated user.