Disini kita akan menggunakan google kalo mau coba di bing juga bisa.
Berikut beberapa dork yang bisa sobat pakai buat mencari alamat link shell injection yang sudah tertanam di website. o iya dari survey yang sudah saya lakukan kebanyakan shell injection terbaru sudah memakai password buat melindungi jln masuknya. jadi kalo sobat ketemu terus shellnya memakai password maka sobat di anjurkan untuk mencari yang lain lagi :v
caranya : copi dork dibawah ini trus pastekan ke kolom pencarian google.
intitle:webr00t cgi shell
“inurl:.root”.”webr00t cgi shell”
“intitle:Index of */sym”.”inurl:/sym”
“5.2.17 Safe mode:”
“5.2.11 Safe mode:”
“5.2.12 Safe mode:”
“Sifre=webr00t”
“5.2.11 Safe mode:”
“5.2.10 Safe mode:”
“5.2.1 Safe mode:”
intxt:”webadmin.php”
inurl:webadmin.php”
intitle: Linux * 2.6.18-348.1.1.el5PAE
intitle: – WSO 2.3
intitle: – WSO 2.4
intitle: – WSO 2.5
intitle: – WSO 2.5.1
5.2.16 Safe mode: OFF [ phpinfo ] Datetime:
2009 i686 Server IP:
2010 i686 Server IP:
2011 i686 Server IP:
2012 i686 Server IP:
2013 i686 Server IP:
“Userful: gcc, cc, ld, make, php, perl, python, tar, gzip, bzip2, nc, locate”
“Downloaders: wget, lynx, links, curl, lwp-mirror”
“Type Host Login Password Database”
“Execution PHP-code”
“reverse (login -> nigol)”.”/etc/passwd”
” Bind port to /bin/sh [perl]“
“drwxr-xr-x [ home ]“
inurl:wso2.php
inurl:wso2.4.php
inurl:wso2.5.php
inurl:wso2.5.1.php
“Filesystem Size Used Avail Use% Mounted on”
“# Do not remove the following line, or various programs”
inurl:wso.php uid=0(root)
“posix_getpwuid (“Read” /etc/passwd)”
“captain crunch security team” inurl:wso
download wso2.php
download wso2.5.1.php
inurl:sym.php
allinurl: wsotest.php
inurl:wso.php
“-:[ User & Domains & Symlink ]:-“
allinurl: wso.php
inurl:”/wso.php”
allinurl: wso2.5.php
inurl:wso.php
inurl:”sym.php” Symlink Sa 3.0
inurl:wso.php uid=0(root)
“Symlink Sa 3.0″
intitle:Symlink Sa 3.0
inurl:”/wso.php”
inurl:wso.php
inurl:wso2.php
inurl:wso2.5.php
inurl:wso2.5.1.php
wso shell v.1.0 (roots)
inurl:wso.php
allintitle: “[ Home ] [ User & Domains & Symlink ] [ Domains & Script ] [ Symlink File ] [ Symlink Bypass ] “
inurl:”[ Home ] [ User & Domains & Symlink ] [ Domains & Script ] [ Symlink File ] [ Symlink Bypass ] “
intxt:[ Bypass Read ] [ Mass Joomla ] [ Mass WordPress ] [ Mass vBulletin ] [ Help ]
intitle:B-F Config_cPanel
intitle:Blind SQL Injection
intitle:Bypass Disable function
intitle:Carbylamine PHP Encoder
intitle:Change Joomla Index
intitle:Change WP Index
intitle:Converter Havij To Pro
intitle:Cpanel Brute Forcer 2012
intitle:Cpanel Brute Forcer 2011
intitle:Cpanel Brute Forcer 2013
intitle:Cpanel Webmail Brute Forcer
intitle:Face Book Brute Forcer
intitle:zip Filez Server ScaNNer v1.0
“Saudi Sh3ll v1.0″
inurl:wso.php#
Allinurl:wso2.5.1.php#
Allinurl:wso2.5.php#
Allinurl:wso2.4.php#
intitle:wsec_wp GUI v1.0
intitle:Symlink Sa v3.0
intitle:Symlink Sa v2.0
intitle:Symlink Sa v1.0
intitle:king B_F v1.0 Brute Forcer script
intitle:r00t4Lif t00lkit v0.2
allinurl: “wso.php”
“inurl:.root”.”webr00t cgi shell”
“intitle:Index of */sym”.”inurl:/sym”
“5.2.17 Safe mode:”
“5.2.11 Safe mode:”
“5.2.12 Safe mode:”
“Sifre=webr00t”
“5.2.11 Safe mode:”
“5.2.10 Safe mode:”
“5.2.1 Safe mode:”
intxt:”webadmin.php”
inurl:webadmin.php”
intitle: Linux * 2.6.18-348.1.1.el5PAE
intitle: – WSO 2.3
intitle: – WSO 2.4
intitle: – WSO 2.5
intitle: – WSO 2.5.1
5.2.16 Safe mode: OFF [ phpinfo ] Datetime:
2009 i686 Server IP:
2010 i686 Server IP:
2011 i686 Server IP:
2012 i686 Server IP:
2013 i686 Server IP:
“Userful: gcc, cc, ld, make, php, perl, python, tar, gzip, bzip2, nc, locate”
“Downloaders: wget, lynx, links, curl, lwp-mirror”
“Type Host Login Password Database”
“Execution PHP-code”
“reverse (login -> nigol)”.”/etc/passwd”
” Bind port to /bin/sh [perl]“
“drwxr-xr-x [ home ]“
inurl:wso2.php
inurl:wso2.4.php
inurl:wso2.5.php
inurl:wso2.5.1.php
“Filesystem Size Used Avail Use% Mounted on”
“# Do not remove the following line, or various programs”
inurl:wso.php uid=0(root)
“posix_getpwuid (“Read” /etc/passwd)”
“captain crunch security team” inurl:wso
download wso2.php
download wso2.5.1.php
inurl:sym.php
allinurl: wsotest.php
inurl:wso.php
“-:[ User & Domains & Symlink ]:-“
allinurl: wso.php
inurl:”/wso.php”
allinurl: wso2.5.php
inurl:wso.php
inurl:”sym.php” Symlink Sa 3.0
inurl:wso.php uid=0(root)
“Symlink Sa 3.0″
intitle:Symlink Sa 3.0
inurl:”/wso.php”
inurl:wso.php
inurl:wso2.php
inurl:wso2.5.php
inurl:wso2.5.1.php
wso shell v.1.0 (roots)
inurl:wso.php
allintitle: “[ Home ] [ User & Domains & Symlink ] [ Domains & Script ] [ Symlink File ] [ Symlink Bypass ] “
inurl:”[ Home ] [ User & Domains & Symlink ] [ Domains & Script ] [ Symlink File ] [ Symlink Bypass ] “
intxt:[ Bypass Read ] [ Mass Joomla ] [ Mass WordPress ] [ Mass vBulletin ] [ Help ]
intitle:B-F Config_cPanel
intitle:Blind SQL Injection
intitle:Bypass Disable function
intitle:Carbylamine PHP Encoder
intitle:Change Joomla Index
intitle:Change WP Index
intitle:Converter Havij To Pro
intitle:Cpanel Brute Forcer 2012
intitle:Cpanel Brute Forcer 2011
intitle:Cpanel Brute Forcer 2013
intitle:Cpanel Webmail Brute Forcer
intitle:Face Book Brute Forcer
intitle:zip Filez Server ScaNNer v1.0
“Saudi Sh3ll v1.0″
inurl:wso.php#
Allinurl:wso2.5.1.php#
Allinurl:wso2.5.php#
Allinurl:wso2.4.php#
intitle:wsec_wp GUI v1.0
intitle:Symlink Sa v3.0
intitle:Symlink Sa v2.0
intitle:Symlink Sa v1.0
intitle:king B_F v1.0 Brute Forcer script
intitle:r00t4Lif t00lkit v0.2
allinurl: “wso.php”
tambahan: dork diatas bebas untuk sobat kembangkan lagi biar bisa dapat hasil yang memuaskan.
Untuk berlangganan Artikel silahkan Masukkan email anda kemudian cek inbox email |
Author : Unknown
Setelah anda membaca artikel tentang Shell Dork Searching Google SQL Shell Bug Searching c99 r58 wso2 linux cgi shell jika bermanfaat, silahkan tekan tombol Share. Anda juga boleh menyalin / menyebarluaskan artikel ini, namun jangan lupa untuk meletakkan link dibawah ini sebagai sumbernya :
Baca Juga:
Judul: Shell Dork Searching Google SQL Shell Bug Searching c99 r58 wso2 linux cgi shell
Rating: 100% based on 99998 ratings. 5 user reviews.
Ditulis Oleh Unknown
klik disini untuk menambahkan komentar blogger
Rating: 100% based on 99998 ratings. 5 user reviews.
Ditulis Oleh Unknown
klik disini untuk menambahkan komentar blogger
0 comments
"Komentar anda menunjukkan pribadi Anda".
Silahkan tinggalkan komentar bijak yang bersifat kesan/pesan/kritik dan saran terhadap postingan!