• Beranda
  • Autosultan
  • Bitcoin
  • Dollar
  • Linux
  • LOKER
  • Printer
  • Sofware
  • sosial
  • TISniper
  • Virus
  • Windows

T.I Sniper

#Expert Advisor for MetaTrader 4 #Expert Advisor for MetaTrader 5 #youtube #google #free dollar business every day #Lowongan #Pekerjaan #Loker #forex #trading Autopilot #mining crypto #Update #Tutorial #Komputer Perbaikan, #Email #Facebook , #whatsapp ,#instagram #telegram ,#Internet ,#Motivasi , #Crypto , #AirDrop, #Bitcoin, #Ethereum, #Binance coin, #Cardano, #Degocoin, #Litecoin #Indodax, #Coinbase, #Nexo Dan Mata Uang Digital Lain , #Website, Perbaikan #Server #Domain , #Hosting, #Whm

    • Beranda
    • Contact Forum
    • Coffee JKs88
    • Tentang Kami
    • Parse Code Html
    • Text Terbalik
    • Privacy Policy

    Ikuti Kami!

    Follow Akun Instagram Kami Dapatkan Notifikasi Terbaru!
    Ikuti Kami di Facebok! Untuk mendapatkan notifikasi terbaru.

    Postingan Populer

    Backlink dengan Google Dork Seo

    Dork Seo
    Januari 01, 2016
    0

    Cara Dapat Backlink dengan Google Dork

    Dork Seo
    Februari 13, 2016
    0

    Cara Dapat Backlink Edu Gratis

    Seo
    Februari 13, 2016
    0

    Download File ISO Windows 11 Dan Bootable USB Rufus

    Sofware Windows
    Desember 02, 2021
    0

    FORUM 

    FORUM
    Desember 31, 2021
    0
    Author
    chmood
    Tautan disalin ke papan klip!
    Share Posts "Dork Pheaking "
  • Salin link
  • Simpan Ke Daftar Bacaan
  • Bagikan ke Facebook
  • Bagikan ke Twitter
  • Bagikan ke Pinterest
  • Bagikan ke Telegram
  • Bagikan ke Whatsapp
  • Bagikan ke Tumblr
  • Bagikan ke Line
  • Bagikan ke Email
  • HomeDorkPheakingDork Pheaking
    Dork Pheaking

    Dork Pheaking

    Simpan Postingan
    1-HISTORY
        The concept of "Google Hacking" dates back to 2002, when Johnny Long began to collect interesting Google search queries that uncovered vulnerable systems and/or sensitive information disclosures - labeling them googleDorks. some people call it googlehacking.
    Google: If you still do not know what is google, then you need to take a crash course in "how to use the internet"
    Dork:Someone who has odd interests, and is often silly at times.
    A dork is also someone who can be themselves and not care what anyone thinks
    In my opinion A Google dork is an employee who unknowingly exposes sensitive corporate information on the Internet.
    As a passive attack method, Google dorking can return usernames and passwords, email lists, sensitive documents, personally identifiable financial information (PIFI) and website vulnerabilities.
    That information can be used for any number of illegal activities, including cyberterrorism, industrial espionage,identity theft and cyberstalking
    2-OPERATORS






    How to Use Google to Hack(Googledorks)

    as well as programming, google dorks also has its operators, I will not be able to show all operators but here are the most commonly used Operators.
    Lets take a look at the special google search operators that are used to construct those high powered google hack search terms.
    intitle
    Specifying intitle, will tell google to show only those pages that have the term in their html title. For example intitle:"login page" will show those pages which have the term "login page" in the title text.
    allintitle
    Similar to intitle, but looks for all the specified terms in the title.
    inurl
    Searches for the specified term in the url. For example inurl:"login.php".
    allinurl
    Same as inurl, but searches for all terms in the url.
    filetype
    Searches for specific file types. filetype:pdf will looks for pdf files in websites. Similarly filetype:txt looks for files with extension .txt
    ext
    Similar to filetype. ext:pdf finds pdf extension files.
    intext
    Searches the content of the page. Somewhat like a plain google search. For example intext:"index of /".
    allintext
    Similar to intext, but searches for all terms to be present in the text.
    site
    Limits the search to a specific site only. site:nullbyte.com
    3- THE FORMULA OF GOOGLE DORKS
    Dorks : They are like search criteria in which a search engine returns results related to your dork.
    The process can be a little time consuming, but the outcome will be worth it after learning on how to use dorks.
    Basic Formula of dork,
    “inurl:.”domain”/”dorks” “
    So you would normally understand it like this:
    “inurl” = input URL
    “domain” = your desired domain ex. .gov
    “dorks” = your dork of your choice
    Here is another example of that
    You can use following words instead of inurl :
    intitle:
    inurl:
    intext:
    define:
    site:
    phonebook:
    maps:
    book:
    froogle:
    info:
    movie:
    weather:
    related:
    link:
    All these also help yo find other things then vulnerables.
    Anyway now I am going to explain you how to use some for finding vulnerability in websites.
    INTITLE:
    You can use the intitle to find anything in the title of the website. Which also could be usefull to find downloads or anything else.
    intitle: index of mp3
    This is an example to download mp3 songs for free.






    How to Use Google to Hack(Googledorks)

    INURL:
    The inurl basicly looks for anything after the : in the site urls.
    inurl:index.php?id=
    INTEXT:
    you can find literally everything using intext, you could even use the inurl dorks whit this.
    intext:"Design & Developed By Seawind Solution Pvt.Ltd."
    Google will give you all the websites created by IT Masons taht recently has bypass Admin Page Vulnerability in some websites,
    to try just choose a target from google and add this to the url /adminpanel/
    And fill username and password like the information below :
    Username : '=' 'OR'
    Password : '=' 'OR'
    and you will get the admin panel of the website some example:
    http://www.vulnerablewebsite.com/adminpanel/index.php
    DEFINE
    Google will define this massage and will look for what had this error for example,
    define:”sql syntax error”
    SITE:
    Obvious, when we will use it, google will looks for a site .
    site:wonderhowto.com
    Google will look for any site related with wonderhowto.






    How to Use Google to Hack(Googledorks)

    PHONEBOOK:
    It will look for the phone number related to me, so use your victims name or yours instead.
    phonebook:Mrnakupenda
    MAPS:
    Google will look on google maps for your search.
    BOOKS:
    Google has an online library store. If you want to find interesting books use this dork.
    book:java language
    This will look for any book gogole hase indexed whith java language in it.
    FROOGLE:
    Used for froogle search instead of google.
    INFO:
    google looks for anything you inputted but only information about string which you have puted next to info: .
    info:firefox
    Above dork will show you alot off things about firefox like what is firefox etc.
    MOVIE:
    You can find information about movies on google using this dork.
    movie:watch Transformers online
    WEATHER:
    You can find information about weather on google using this dork.
    weather: 01/08/2015 london






    How to Use Google to Hack(Googledorks)

    RELATED:
    This will look for anything related to what you have entered next to related: .
    related:hacking
    Google responds whith sites about hacking stuffs.
    LINK:
    This one will works better instead of only looking in search url, it will also look in the site for urls that possibly are vulnerable.
    link:index.php?id=
    This is verry usefull I would say even more then inurl.
    Vulnerability Approach :
    Once you search website using above dorks, now its time to check whether the website is vulnerable to SQL injection or not, we simply put in a quote “ ‘ ” at the end of the url address.
    So our site will look like this,
    http://www.site.com/index.php?id=123;
    i will explain how to proceed advanced sqli in the next tutorial
    4-SOME EXTRAS






    How to Use Google to Hack(Googledorks)

    As far as i researched Google Dorks can help us getting the data of many websites.
    These are some Google Dorks which can affect our online business:
    site:.com intitle:”Thank You For Your Order” intext:Click Here to Download
    site:.com intitle:”Thank You For Your Purchase” intext:Click Here to Download
    intitle:Thank you for your Purchase! intext:PLR OR MRR OR Package OR Bonus
    inurl:/thankyou
    .html intitle:Thank you for your order! intext:Click Here to Download
    5-CONCLUSION






    How to Use Google to Hack(Googledorks)

    Google dorks are very important, so I advise before you start your exploits against a particular victim the best way is to use google and see what you can find about the victim, and believe me, byt using google, a lot of times I did not even turn on Linux kali, by simple search on google, I found the password of my victim.
    6- USEFUL WEBSITES






    How to Use Google to Hack(Googledorks)

    As far as i researched the best website for fresh google dorks is the exploit db website https://ww.exploit-db.com
    here you will find fresh google dorks and you can also submits yours.
    another cool website is http://www.google-dorking.com
    you can also mention some websites here
    to say that the best way to learn is by teaching, so I'm here to share what I know, and as always
    I hope you will make correction where I'm wrong, because it is from mistakes that we learn ..
    or
    inurl:coranto.cgi intitle:Login (Authorized Users Only)
    inurl:csCreatePro.cgi
    inurl:default.asp intitle:"WebCommander"
    inurl:exchweb/bin/auth/owalogon.asp
    inurl:gnatsweb.pl
    inurl:ids5web
    inurl:irc filetype:cgi cgi:irc
    inurl:login filetype:swf swf
    inurl:login.asp
    inurl:login.cfm
    inurl:login.php "SquirrelMail version"
    inurl:metaframexp/default/login.asp | intitle:"Metaframe XP Login"
    inurl:mewebmail
    inurl:names.nsf?opendatabase
    inurl:ocw_login_username
    inurl:orasso.wwsso_app_admin.ls_login
    inurl:postfixadmin intitle:"postfix admin" ext:php
    inurl:search/admin.php
    inurl:textpattern/index.php
    inurl:WCP_USER
    inurl:webmail./index.pl "Interface"
    inurl:webvpn.html "login" "Please enter your"
    Login ("
    Jetbox One CMS â?¢" | "
    Jetstream ? *")
    Novell NetWare intext:"netware management portal version"
    Outlook Web Access (a better way)
    PhotoPost PHP Upload
    PHPhotoalbum Statistics
    PHPhotoalbum Upload
    phpWebMail
    Please enter a valid password! inurl:polladmin
    Ultima Online loginservers
    W-Nailer Upload Area
    intitle:"DocuShare" inurl:"docushare/dsweb/" -faq -gov -edu
    "mysql dump" filetype:sql
    "mysql dump" filetype:sql 21232f297a57a5a743894a0e4a801fc3
    "allow_call_time_pass_reference" "PATH_INFO"
    "Certificate Practice Statement" inurl:(PDF | DOC)
    "Generated by phpSystem"
    "generated by wwwstat"
    "Host Vulnerability Summary Report"
    "HTTP_FROM=googlebot" googlebot.com "Server_Software="
    "Index of" / "chat/logs"
    "Installed Objects Scanner" inurl:default.asp
    "MacHTTP" filetype:log inurl:machttp.log
    "Mecury Version" "Infastructure Group"
    "Microsoft (R) Windows * (TM) Version * DrWtsn32 Copyright (C)" ext:log
    "Most Submitted Forms and s?ri?ts" "this section"
    "Network Vulnerability Assessment Report"
    "not for distribution" confidential
    "not for public release" -.edu -.gov -.mil
    "phone * * *" "address *" "e-mail" intitle:"curriculum vitae"
    "phpMyAdmin" "running on" inurl:"main.php"
    "produced by getstats"
    "Request Details" "Control Tree" "Server Variables"
    "robots.txt" "Disallow:" filetype:txt
    "Running in Child mode"
    "sets mode: +p"
    "sets mode: +s"
    "Thank you for your order" +receipt
    "This is a Shareaza Node"
    "This report was generated by WebLog"
    ( filetype:mail | filetype:eml | filetype:mbox | filetype:mbx ) intext:password|subject
    (intitle:"PRTG Traffic Grapher" inurl:"allsensors")|(intitle:"PRTG Traffic Grapher - Monitoring Results")
    (intitle:WebStatistica inurl:main.php) | (intitle:"WebSTATISTICA server") -inurl:statsoft -inurl:statsoftsa -inurl:statsoftinc.com -edu -software -rob
    (inurl:"robot.txt" | inurl:"robots.txt" ) intext:disallow filetype:txt
    +":8080" +":3128" +":80" filetype:txt
    +"HSTSNR" -"netop.com"
    -site:php.net -"The PHP Group" inurl:source inurl:url ext:pHp
    94FBR "ADOBE PHOTOSHOP"
    AIM buddy lists
    allinurl:/examples/jsp/snp/snoop.jsp
    allinurl:cdkey.txt
    allinurl:servlet/SnoopServlet
    cgiirc.conf
    cgiirc.conf
    contacts ext:wml
    data filetype:mdb -site:gov -site:mil
    exported email addresses
    ext:(doc | pdf | xls | txt | ps | rtf | odt | sxw | psw | ppt | pps | xml) (intext:confidential salary | intext:"budget approved") inurl:confidential
    ext:asp inurl:pathto.asp
    ext:ccm ccm -catacomb
    ext:CDX CDX
    ext:cgi inurl:editcgi.cgi inurl:file=
    ext:conf inurl:rsyncd.conf -cvs -man
    ext:conf NoCatAuth -cvs
    ext:dat bpk.dat
    ext:gho gho
    ext:ics ics
    ext:ini intext:env.ini
    ext:jbf jbf
    ext:ldif ldif
    ext:log "Software: Microsoft Internet Information Services *.*"
    ext:mdb inurl:*.mdb inurl:fpdb shop.mdb
    ext:nsf nsf -gov -mil
    ext:plist filetype:plist inurl:bookmarks.plist
    ext:pqi pqi -database
    ext:reg "username=*" putty
    ext:txt "Final encryption key"
    ext:txt inurl:dxdiag
    ext:vmdk vmdk
    ext:vmx vmx
    filetype:asp DBQ=" * Server.MapPath("*.mdb")
    filetype:bkf bkf
    filetype:blt "buddylist"
    filetype:blt blt +intext:screenname
    filetype:cfg auto_inst.cfg
    filetype:cnf inurl:_vti_pvt access.cnf
    filetype:conf inurl:firewall -intitle:cvs
    filetype:config web.config -CVS
    filetype:ctt Contact
    filetype:ctt ctt messenger
    filetype:eml eml +intext:"Subject" +intext:"From" +intext:"To"
    filetype:fp3 fp3
    filetype:fp5 fp5 -site:gov -site:mil -"cvs log"
    filetype:fp7 fp7
    filetype:inf inurl:capolicy.inf
    filetype:lic lic intext:key
    filetype:log access.log -CVS
    filetype:log cron.log
    filetype:mbx mbx intext:Subject
    filetype:myd myd -CVS
    filetype:ns1 ns1
    filetype:ora ora
    filetype:ora tnsnames
    filetype:pdb pdb backup (Pilot | Pluckerdb)
    filetype:php inurl:index inurl:phpicalendar -site:sourceforge.net
    filetype:pot inurl:john.pot
    filetype:PS ps
    filetype:pst inurl:"outlook.pst"
    filetype:pst pst -from -to -date
    filetype:qbb qbb
    filetype:QBW qbw
    filetype:rdp rdp
    filetype:reg "Terminal Server Client"
    filetype:vcs vcs
    filetype:wab wab
    filetype:xls -site:gov inurl:contact
    filetype:xls inurl:"email.xls"
    Financial spreadsheets: finance.xls
    Financial spreadsheets: finances.xls
    Ganglia Cluster Reports
    haccess.ctl (one way)
    haccess.ctl (VERY reliable)
    ICQ chat logs, please...
    intext:"Session Start * * * *:*:* *" filetype:log
    intext:"Tobias Oetiker" "traffic analysis"
    intext:(password | passcode) intext:(username | userid | user) filetype:csv
    intext:gmail invite intext:http://gmail.google.com/gmail/a
    intext:SQLiteManager inurl:main.php
    intext:ViewCVS inurl:Settings.php
    intitle:"admin panel" +"
    RedKernel"
    intitle:"Apache::Status" (inurl:server-status | inurl:status.html | inurl:apache.html)
    intitle:"AppServ Open Project" -site:www.appservnetwork.com
    intitle:"ASP Stats Generator *.*" "ASP Stats Generator" "2003-2004 weppos"
    intitle:"Big Sister" +"OK Attention Trouble"
    intitle:"curriculum vitae" filetype:doc
    intitle:"edna:mp3 server" -forums
    intitle:"FTP root at"
    intitle:"index of" +myd size
    intitle:"Index Of" -inurl:maillog maillog size
    intitle:"Index Of" cookies.txt size
    intitle:"index of" mysql.conf OR mysql_config
    intitle:"Index of" upload size parent directory
    intitle:"index.of *" admin news.asp configview.asp
    intitle:"index.of" .diz .nfo last modified
    intitle:"Joomla - Web Installer"
    intitle:"LOGREP - Log file reporting system" -site:itefix.no
    intitle:"Multimon UPS status page"
    intitle:"PHP Advanced Transfer" (inurl:index.php | inurl:showrecent.php )
    intitle:"PhpMyExplorer" inurl:"index.php" -cvs
    intitle:"statistics of" "advanced web statistics"
    intitle:"System Statistics" +"System and Network Information Center"
    intitle:"urchin (5|3|admin)" ext:cgi
    intitle:"Usage Statistics for" "Generated by Webalizer"
    intitle:"wbem" compaq login "Compaq Information Technologies Group"
    intitle:"Web Server Statistics for ****"
    intitle:"web server status" SSH Telnet
    intitle:"Welcome to F-Secure Policy Manager Server Welcome Page"
    intitle:"welcome.to.squeezebox"
    intitle:admin intitle:login
    intitle:Bookmarks inurl:bookmarks.html "Bookmarks
    intitle:index.of "Apache" "server at"
    intitle:index.of cleanup.log
    intitle:index.of dead.letter
    intitle:index.of inbox
    intitle:index.of inbox dbx
    intitle:index.of ws_ftp.ini
    intitle:intranet inurl:intranet +intext:"phone"
    inurl:"/axs/ax-admin.pl" -s?ri?t
    inurl:"/cricket/grapher.cgi"
    inurl:"bookmark.htm"
    inurl:"cacti" +inurl:"graph_view.php" +"Settings Tree View" -cvs -RPM
    inurl:"newsletter/admin/"
    inurl:"newsletter/admin/" intitle:"newsletter admin"
    inurl:"putty.reg"
    inurl:"smb.conf" intext:"workgroup" filetype:conf conf
    inurl:*db filetype:mdb
    inurl:/cgi-bin/pass.txt
    inurl:/_layouts/settings
    inurl:admin filetype:xls
    inurl:admin intitle:login
    inurl:backup filetype:mdb
    inurl:build.err
    inurl:cgi-bin/printenv
    inurl:cgi-bin/testcgi.exe "Please distribute TestCGI"
    inurl:changepassword.asp
    inurl:ds.py
    inurl:email filetype:mdb
    inurl:fcgi-bin/echo
    inurl:forum filetype:mdb
    inurl:forward filetype:forward -cvs
    inurl:getmsg.html intitle:hotmail
    inurl:log.nsf -gov
    inurl:main.php phpMyAdmin
    inurl:main.php Welcome to phpMyAdmin
    inurl:netscape.hst
    inurl:netscape.hst
    inurl:netscape.ini
    inurl:odbc.ini ext:ini -cvs
    inurl:perl/printenv
    inurl:php.ini filetype:ini
    inurl:preferences.ini "[emule]"
    inurl:profiles filetype:mdb
    inurl:report "EVEREST Home Edition "
    inurl:server-info "Apache Server Information"
    inurl:server-status "apache"
    inurl:snitz_forums_2000.mdb
    inurl:ssl.conf filetype:conf
    inurl:tdbin
    inurl:vbstats.php "page generated"
    inurl:wp-mail.php + "There doesn't seem to be any new mail."
    inurl:XcCDONTS.asp
    ipsec.conf
    ipsec.secrets
    ipsec.secrets
    Lotus Domino address books
    mail filetype:csv -site:gov intext:name
    Microsoft Money Data Files
    mt-db-pass.cgi files
    MySQL tabledata dumps
    mystuff.xml - Trillian data files
    OWA Public Folders (direct view)
    Peoples MSN contact lists
    php-addressbook "This is the addressbook for *" -warning
    phpinfo()
    phpMyAdmin dumps
    phpMyAdmin dumps
    private key files (.csr)
    private key files (.key)
    Quicken data files
    rdbqds -site:.edu -site:.mil -site:.gov
    robots.txt
    site:edu admin grades
    site:www.mailinator.com inurl:ShowMail.do
    SQL data dumps
    Squid cache server reports
    Unreal IRCd
    WebLog Referrers
    Welcome to ntop!
    Fichier contenant des informations sur le r?seau :
    filetype:log intext:"ConnectionManager2"
    "apricot - admin" 00h
    "by Reimar Hoven. All Rights Reserved. Disclaimer" | inurl:"log/logdb.dta"
    "Network Host Assessment Report" "Internet Scanner"
    "Output produced by SysWatch *"
    "Phorum Admin" "Database Connection" inurl:forum inurl:admin
    phpOpenTracker" Statistics
    "powered | performed by Beyond Security's Automated Scanning" -kazaa -example
    "Shadow Security Scanner performed a vulnerability assessment"
    "SnortSnarf alert page"
    "The following report contains confidential information" vulnerability -search
    "The statistics were last upd?t?d" "Daily"-microsoft.com
    "this proxy is working fine!" "enter *" "URL***" * visit
    "This report lists" "identified by Internet Scanner"
    "Traffic Analysis for" "RMON Port * on unit *"
    "Version Info" "Boot Version" "Internet Settings"
    ((inurl:ifgraph "Page generated at") OR ("This page was built using ifgraph"))
    Analysis Console for Incident Databases
    ext:cfg radius.cfg
    ext:cgi intext:"nrg-" " This web page was created on "
    filetype:pdf "Assessment Report" nessus
    filetype:php inurl:ipinfo.php "Distributed Intrusion Detection System"
    filetype:php inurl:nqt intext:"Network Query Tool"
    filetype:vsd vsd network -samples -examples
    intext:"Welcome to the Web V.Networks" intitle:"V.Networks [Top]" -filetype:htm
    intitle:"ADSL Configuration page"
    intitle:"Azureus : Java BitTorrent Client Tracker"
    intitle:"Belarc Advisor Current Profile" intext:"Click here for Belarc's PC Management products, for large and small companies."
    intitle:"BNBT Tracker Info"
    intitle:"Microsoft Site Server Analysis"
    intitle:"Nessus Scan Report" "This file was generated by Nessus"
    intitle:"PHPBTTracker Statistics" | intitle:"PHPBT Tracker Statistics"
    intitle:"Retina Report" "CONFIDENTIAL INFORMATION"
    intitle:"start.managing.the.device" remote pbx acc
    intitle:"sysinfo * " intext:"Generated by Sysinfo * written by The Gamblers."
    intitle:"twiki" inurl:"TWikiUsers"
    inurl:"/catalog.nsf" intitle:catalog
    inurl:"install/install.php"
    inurl:"map.asp?" intitle:"WhatsUp Gold"
    inurl:"NmConsole/Login.asp" | intitle:"Login - Ipswitch WhatsUp Professional 2005" | intext:"Ipswitch WhatsUp Professional 2005 (SP1)" "Ipswitch, Inc"
    inurl:"sitescope.html" intitle:"sitescope" intext:"refresh" -demo
    inurl:/adm-cfgedit.php
    inurl:/cgi-bin/finger? "In real life"
    inurl:/cgi-bin/finger? Enter (account|host|user|username)
    inurl:/counter/index.php intitle:"+PHPCounter 7.*"
    inurl:CrazyWWWBoard.cgi intext:"detailed debugging information"
    inurl:login.jsp.bak
    inurl:ovcgi/jovw
    inurl:phpSysInfo/ "created by phpsysinfo"
    inurl:portscan.php "from Port"|"Port Range"
    inurl:proxy | inurl:wpad ext:pac | ext:dat findproxyforurl
    inurl:statrep.nsf -gov
    inurl:status.cgi?host=all
    inurl:testcgi xitami
    inurl:webalizer filetype:png -.gov -.edu -.mil -opendarwin
    inurl:webutil.pl
    Looking Glass
    site:netcraft.com intitle:That.Site.Running Apache
    "A syntax error has occurred" filetype:ihtml
    "access denied for user" "using password"
    "An illegal character has been found in the statement" -"previous message"
    "ASP.NET_SessionId" "data source="
    "Can't connect to local" intitle:warning
    "Chatologica MetaSearch" "stack tracking"
    "detected an internal error [IBM][CLI Driver][DB2/6000]"
    "error found handling the request" cocoon filetype:xml
    "Fatal error: Call to undefined function" -reply -the -next
    "Incorrect syntax near"
    "Incorrect syntax near"
    "Internal Server Error" "server at"
    "Invision Power Board Database Error"
    "ORA-00933: SQL command not properly ended"
    "ORA-12541: TNS:no listener" intitle:"error occurred"
    "Parse error: parse error, unexpected T_VARIABLE" "on line" filetype:php
    "PostgreSQL query failed: ERROR: parser: parse error"
    "Supplied argument is not a valid MySQL result resource"
    "Syntax error in query expression " -the
    "The s?ri?t whose uid is " "is not allowed to access"
    "There seems to have been a problem with the" " Please try again by clicking the Refresh button in your web browser."
    "Unable to jump to row" "on MySQL result index" "on line"
    "Unclosed quotation mark before the character string"
    "Warning: Bad arguments to (join|implode) () in" "on line" -help -forum
    "Warning: Cannot modify header information - headers already sent"
    "Warning: Division by zero in" "on line" -forum
    "Warning: mysql_connect(): Access denied for user: '*@*" "on line" -help -forum
    "Warning: mysql_query()" "invalid query"
    "Warning: pg_connect(): Unable to connect to PostgreSQL server: FATAL"
    "Warning: Supplied argument is not a valid File-Handle resource in"
    "Warning:" "failed to open stream: HTTP request failed" "on line"
    "Warning:" "SAFE MODE Restriction in effect." "The s?ri?t whose uid is" "is not allowed to access owned by uid 0 in" "on line"
    "SQL Server Driver][SQL Server]Line 1: Incorrect syntax near"
    An unexpected token "END-OF-STATEMENT" was found
    Coldfusion Error Pages
    filetype:asp + "[ODBC SQL"
    filetype:asp "Custom Error Message" Category Source
    filetype:log "PHP Parse error" | "PHP Warning" | "PHP Error"
    filetype:php inurl:"logging.php" "Discuz" error
    ht://Dig htsearch error
    IIS 4.0 error messages
    IIS web server error messages
    Internal Server Error
    intext:"Error Message : Error loading required libraries."
    intext:"Warning: Failed opening" "on line" "include_path"
    intitle:"Apache Tomcat" "Error Report"
    intitle:"Default PLESK Page"
    intitle:"Error Occurred While Processing Request" +WHERE (SELECT|INSERT) filetype:cfm
    intitle:"Error Occurred" "The error occurred in" filetype:cfm
    intitle:"Error using Hypernews" "Server Software"
    intitle:"Execution of this s?ri?t not permitted"
    intitle:"Under construction" "does not currently have"
    intitle:Configuration.File inurl:softcart.exe
    MYSQL error message: supplied argument....
    mysql error with query
    Netscape Application Server Error page
    ORA-00921: unexpected end of SQL command
    ORA-00921: unexpected end of SQL command
    ORA-00936: missing expression
    PHP application warnings failing "include_path"
    sitebuildercontent
    sitebuilderfiles
    sitebuilderpictures
    Snitz! forums db path error
    SQL syntax error
    Supplied argument is not a valid PostgreSQL result
    warning "error on line" php sablotron
    Windows 2000 web server error messages
    "ftp://" "www.eastgame.net"
    "html allowed" guestbook
    : vBulletin Version 1.1.5"
    "Select a database to view" intitle:"filemaker pro"
    "set up the administrator user" inurl:pivot
    "There are no Administrators Accounts" inurl:admin.php -mysql_fetch_row
    "Welcome to Administration" "General" "Local Domains" "SMTP Authentication" inurl:admin
    "Welcome to Intranet"
    "Welcome to PHP-Nuke" congratulations
    "Welcome to the Prestige Web-Based Configurator"
    "YaBB SE Dev Team"
    "you can now password" | "this is a special page only seen by you. your profile visitors" inurl:imchaos
    ("Indexed.By"|"Monitored.By") hAcxFtpScan
    (inurl:/shop.cgi/page=) | (inurl:/shop.pl/page=)
    allinurl:"index.php" "site=sglinks"
    allinurl:install/install.php
    allinurl:intranet admin
    filetype:cgi inurl:"fileman.cgi"
    filetype:cgi inurl:"Web_Store.cgi"
    filetype:php inurl:vAuthenticate
    filetype:pl intitle:"Ultraboard Setup"
    Gallery in configuration mode
    Hassan Consulting's Shopping Cart Version 1.18
    intext:"Warning: * am able * write ** configuration file" "includes/configure.php" -
    intitle:"Gateway Configuration Menu"
    intitle:"Horde :: My Portal" -"[Tickets"
    intitle:"Mail Server CMailServer Webmail" "5.2"
    intitle:"MvBlog powered"
    intitle:"Remote Desktop Web Connection"
    intitle:"Samba Web Administration Tool" intext:"Help Workgroup"
    intitle:"Terminal Services Web Connection"
    intitle:"Uploader - Uploader v6" -pixloads.com
    intitle:osCommerce inurl:admin intext:"redistributable under the GNU" intext:"Online Catalog" -demo -site:oscommerce.com
    intitle:phpMyAdmin "Welcome to phpMyAdmin ***" "running on * as root@*"
    intitle:phpMyAdmin "Welcome to phpMyAdmin ***" "running on * as root@*"
    inurl:"/NSearch/AdminServlet"
    inurl:"index.php? module=ew_filemanager"
    inurl:aol*/_do/rss_popup?blogID=
    inurl:footer.inc.php
    inurl:info.inc.php
    inurl:ManyServers.htm
    inurl:newsdesk.cgi? inurl:"t="
    inurl:pls/admin_/gateway.htm
    inurl:rpSys.html
    inurl:search.php vbulletin
    inurl:servlet/webacc
    natterchat inurl:home.asp -site:natterchat.co.uk
    XOOPS Custom Installation
    inurl:htpasswd filetype:htpasswd
    inurl:yapboz_detay.asp + View Webcam User Accessing
    allinurl:control/multiview
    inurl:"ViewerFrame?Mode="
    intitle:"WJ-NT104 Main Page"
    inurl:netw_tcp.shtml
    intitle:"supervisioncam protocol"Full Service Team T.I Sniper            

                       
    Dork Pheaking
    Oktober 04, 2015 • 0 komentar
    Disclaimer: gambar, artikel ataupun video yang ada di web ini terkadang berasal dari berbagai sumber media lain. Hak Cipta sepenuhnya dipegang oleh sumber tersebut. Jika ada masalah terkait hal ini, Anda dapat menghubungi kami di halaman ini.
    Isi dari komentar adalah tanggung jawab dari pengirim. T.I Sniper mempunyai hak untuk tidak memperlihatkan komentar yang tidak etis atau kasar. Jika ada komentar yang melanggar aturan ini, tolong dilaporkan.

    T.I Sniper

    Your description here

    • Follow
    • Autosultan
    • Wa Admin Bisnis
    Copyright ©2010 - 2022 🔥 T.I Sniper.
    • Beranda
    • Cari
    • Posting
    • Trending
    • Tersimpan