|2017-04-19||inurl:"/HtmlAdaptor?action="||Various Online Devices|
|2017-04-19||"LGD_CARDNUM" ext:log -site:camper.com||Files Containing Juicy Info|
|2017-04-19||"Logfile of Trend Micro HijackThis" ext:log||Files Containing Juicy Info|
|2017-04-19||inurl:"/load.cgi" ext:cgi||Advisories and Vulnerabilities|
|2017-04-17||inurl:"exit.php?site="||Advisories and Vulnerabilities|
|2017-04-17||"SERVER_ADDR" "SERVER_PORT" "SERVER_NAME" ext:log||Files Containing Juicy Info|
|2017-04-17||intitle:"Nessus Scan Report" ext:html||Network or Vulnerability Data|
|2017-04-17||"%@" ext:ascx||Files Containing Juicy Info|
|2017-04-17||inurl:"mail" ext:mai||Files Containing Juicy Info|
|2017-04-17||"[boot loader]" "WINNT" ext:ini||Network or Vulnerability Data|
Googles collection of web sites sharing sensitive directories. The files contained in here will vary from sensitive to über-secret!
These searches reveal servers with specific vulnerabilities. These are found in a different way than the searches found in the "Vulnerable Files" section.
These pages contain such things as firewall logs, honeypot logs, network information, IDS logs... All sorts of fun stuff!
These files contain usernames, but no passwords... Still, Google finding usernames on a web site.
Examples of queries that can reveal online shopping infomation like customer data, suppliers, orders, credit card numbers, credit card info, etc
These are login pages for various services. Consider them the front door of a websites more sensitive functions.
These searches locate vulnerable servers. These searches are often generated from various security advisory posts, and in many cases are product or version-specific.