Search the Google Hacking Database or browse GHDB categories
|2015-11-26||inurl:trafficcams -intext:trafficcams ext:asp OR ext:htm||Various Online Devices|
|2015-11-23||inurl:index.php?id= intext:"mysql_fetch_array"||Error Messages|
|2015-11-23||-inurl:http | -inurl:https inurl:ftp ext:xls | ext:xlsx bank||Files containing juicy info|
|2015-11-19||intext:"Roundcube Webmail" intitle:"Welcome to Roundcube Webmail" -site:roundcube.net||Pages containing login portals|
|2015-11-19||intitle:Tomcat Status | inurl:/status?full=true||Files containing juicy info|
|2015-11-19||intitle:"Mail - AfterLogic WebMail"||Pages containing login portals|
|2015-11-16||intitle:FootPrints Login | inurl:/MRcgi/MRentrancePage.pl||Pages containing login portals|
|2015-11-13||inurl:.gov/wp-login.php | inurl:.edu/wp-login.php | inurl:.mil/wp-login.php | inurl:.us/wp-login.php||Pages containing login portals|
|2015-11-13||intitle:AP Router New Generation | inurl:/home.asp||Pages containing login portals|
|2015-11-13||" Proudly Served by LiteSpeed Web Server" intitle:index.of./||Advisories and Vulnerabilities|
Google's collection of web sites sharing sensitive directories. The files contained in here will vary from sesitive to uber-secret!
These searches reveal servers with specific vulnerabilities. These are found in a different way than the searches found in the "Vulnerable Files" section.
These pages contain such things as firewall logs, honeypot logs, network information, IDS logs... all sorts of fun stuff!
These files contain usernames, but no passwords... Still, google finding usernames on a web site..
Examples of queries that can reveal online shopping info like customer data, suppliers, orders, creditcard numbers, credit card info, etc
These are login pages for various services. Consider them the front door of a website's more sensitive functions.
These searches locate vulnerable servers. These searches are often generated from various security advisory posts, and in many cases are product or version-specific.