... Statistics
Practically any Web-based network statistics package can be located with Google. Table
8.10 reveals several examples from the Google Hacking Database (GHDB) that show
searches for various network ... network
+”Settings Tree View” -cvs -RPM information including architecture,
hosts, and services.
inurl:fcgi-bin/echo fastcgi echo program reveals detailed
server information....
... got
Google all confused, and it coughed up a blank page.
Notes from the Underground…
But That’s What I Wanted!
As you grom in your Google- Fu, you will undoubtedly want to perform a search that
Google s ... fuel the fire for further exploration.
Notes from the Underground…
Googleturds
So, what about that link that Google returned to r&besk.tr.cx? What is that thing? I
coined the te...
... better for this purpose because we can account for
potential variations in how a Web site is ultimately displayed. For example, some administra-
tors might modify the format of a vendor-supplied ... Targets
452 _Google_ 2e_06.qxd 10/5/07 12:52 PM Page 240
Figure 6.7 Google s Malware Wrapping Page
So this is certainly a handy feature, but since this book is about Google Hacking, not...
... operator. For example, if we wanted to search for the PDF
extension, we might use a query like filetype:PDF to get the number of known results on the
Internet.This type of Google query was performed for ... desk workers will (or should) ask for identifying information such as user-
names, Social Security numbers, employee numbers, and even PIN numbers to properly vali-
date callers’...
... and the text
that might appear on the error page:
grep -h -r "Content-language: en" * -A 10 | grep -A5 "TITLE" | grep -v virtual
This Linux bash shell command, when run against ... these
pages as the “HTTP_FROM=googlebot” line. We can search for pages like this with a query
such as “HTTP_FROM=googlebot“ googlebot.com “Server_Software”. These pages are dynami-
cally gener...
... an attacker can often gain access to other infor-
mation about the target.The Outlook Web Access portal is particularly renowned for this
type of information leak, because it provides an anonymous ... soft-
ware. For example, Apache Web servers ship with documentation in HTML format, as
shown in Figure 8.17.
304 Chapter 8 • Tracking Down Web Servers, Login Portals, and Network Hardware
45...
... prog + ' -u username -p [password] -P blog ' \
'-t title -c [content] -a author'
print ' ' + prog + ' -u username -p [password] -l'
print '-u username ... inline:
python GoogleSplogger.py -u username -p password -P blog_name_here -t
title _for_ the_post -a author -c << EOF
Once you are done writing the post type EOF on a new line. A post can...