Google is a query based search engine for finding websites throughout the web by keywords or file types. What most people don't realize is that there are some gaping holes in their system that can be used to do some pretty neat (and dangerous) things. Before we start I want you to know that I do not approve or condemn any actions used with this knowledge and I am sharing it for educational purposes only. Lets begin!
1. Watch and Manipulate Security Cameras
Many security cameras now a days are network based. Being URL supported makes these cameras viewable from any computer with Internet access. This also however, makes them search-able in a web query. In order to view live security cameras, and even move them around, search the following in google:
inurl:”viewerframe?mode=motion”
2. View/Download Personal Information and Confidential Documents
Many companies use online database networks and MySQL to keep personal information and even confidential documents. When applying for jobs, employee's information Address, Phone, DOB, Education, Work experience etc.) is entered into this database and can be hacked and viewed by searching:intitle:”curriculum vitae” “phone * * *” “address *” “e-mail”
To find Excel documents containing email addresses of hundreds of workers, simply search:
filetype:xls inurl:”email.xls”
Also it’s possible to gain access to documents potentially containing information on bank accounts, financial summaries and credit card numbers using the following search query:
intitle:index.of finances.xls
3. Find Free Downloads
If you are looing for free music, videos, or software you can use the following search:?intitle:index.of? mp3
All you need to do is add the company or artist after words to use as a keyword. An example would be "?intitle:ndex.of?mp3 eminem". Also if you are looking for software or videos and not music, replace "mp3" with the file type extension.
4. A Few More...
“# -FrontPage-” inurl:service.pwd
Frontpage passwords listings
allinurl: admin mdb
Pages containing administrator’s access databases containing usernames, passwords and other sensitive information
allinurl:authuserfile.txt
DCForum’s password file. This file gives a list of passwords, usernames and email addresses for DCForum and for DCShop
intitle:”Index of” config.php
This search brings up sites with “config.php” files.This configuration file contains both a username and a password for an SQL database.
filetype:bak inurl:”htaccess|passwd|shadow|htusers”
This will search for backup files (*.bak) created by some editors or even by the administrator himself (before activating a new version). Every attacker knows that changing the extension of a file on a web server can have ugly consequences.
If you have any ideas or suggestions you can comment below. Also don't forget to follow this blog by becoming a subscribed member in the sidebar. Lastly, if you want, you can receive blog updates via twitter by becoming a member through your twitter account.