Google Search: +intext:”powered by MyBulletinBoard”
GOOGLE HACKING TRICKS, LEARN SECRETS OF HACKING
Etiam tincidunt lobortis massa et tincidunt. Vivamus commodo feugiat turpis, in pulvinar felis elementum vel. Vivamus mollis tempus odio, ac imperdiet enim adipiscing non. Nunc iaculis sapien at felis posuere at posuere massa pellentesque. Suspendisse a viverra tellus. Nam ut arcu et leo rutrum porttitor. Integer ut nulla eu magna adipiscing ornare. Vestibulum quis diam velit, vitae euismod ipsum? Quisque ...
Proin ac leo eget nibh interdum egestas? Aliquam vel dolor vitae dui tempor sollicitudin! Integer sollicitudin, justo non posuere condimentum, mauris libero imperdiet urna, a porttitor metus lorem ac arcu. Curabitur sem nulla, rutrum ut elementum at, malesuada quis nisl. Suspendisse potenti. In rhoncus ipsum convallis mauris adipiscing aliquam. Etiam quis dolor sed orci vestibulum venenatis auctor non ligula. Nulla ...
Etiam ultrices felis sed ante tincidunt pharetra. Morbi sit amet orci at lorem tincidunt viverra. Donec varius posuere leo et iaculis. Pellentesque ultricies, ante at dignissim rutrum, nisi enim tempor leo, id iaculis sapien risus quis neque. Ut sed mauris sit amet eros tincidunt adipiscing eu vitae lectus. Class aptent taciti sociosqu ad litora torquent per conubia nostra, per inceptos ...
Google Search: +intext:”powered by MyBulletinBoard”
Google Search: inurl:”/login.asp?folder=” “Powered by: i-Gallery 3.3″
Google Search: “powered by PhpBB 2.0.15″ -site:phpbb.com
Google Search: intitle:guestbook inurl:guestbook “powered by Adva
Google Search: inurl:chitchat.php “choose graphic”
Google Search: “Calendar programming by AppIdeas.com” filetype:php
Google Search: “Powered by MD-Pro” | “made with MD-Pro”
Google Search: “Software PBLang” 4.65 filetype:php
Google Search: “Powered by and copyright class-1″ 0.24.4
Google Search: “Powered by AzDg” (2.1.3 | 2.1.2 | 2.1.1)
Google Search: “powered by Gallery v” “[slideshow]“|”images” inurl:gallery
Google Search: “Copyright 2004 © Digital Scribe v.1.4″
PHP Advanced Transfer Manager v1.30 underlying system disclosure / remote command execution / cross site scripting rgod site: http://rgod.altervista.org mail: retrogod at aliceposta it
Google Search: “Powered by PHP Advanced Transfer Manager v1.30″
Google Search: “Powered by CuteNews”
Google Search: “Powered by autolinks pro 2.1″ inurl:register.php
Google Search: intitle:”PHP TopSites FREE Remote Admin”
Google Search: “Powered By: lucidCMS 1.0.11″
Google Search: “Cyphor (Release:” -www.cynox.ch
Google Search: “Powered by XOOPS 2.2.3 Final”
Google Search: inurl:”wfdownloads/viewcat.php?list=”
Google Search: “This website was created with phpWebThings 1.4″
Google Search: “Powered by UPB” (b 1.0)|(1.0 final)|(Public Beta 1.0b)
Google Search: “powered by GuppY v4″|”Site créé avec GuppY v4″
Google Search: “Powered by Xaraya” “Copyright 2005″
Google Search: “This website powered by PHPX” -demo
Google Search: “Based on DoceboLMS 2.0″
Google Search: “Powered By phpCOIN 1.2.2″
Google Search: intext:”Powered by SimpleBBS v1.1″*
Google Search: “Site powered By Limbo CMS”
Google Search: inurl:install.pl intitle:GTchat
Google Search: “index of” intext:fckeditor inurl:fckeditor
Google Search: intext:”LinPHA Version” intext:”Have fun”
Google Search: intitle:admbook intitle:version filetype:php
Google Search: inurl:*.exe ext:exe inurl:/*cgi*/
this is for PHPList 2.10.2 arbitrary local inclusion, discovered by me: advisory/poc exploit: http://retrogod.altervista.org/phplist_2102_incl_xpl.html
Google Search: “powered by phplist” | inurl:”lists/?p=subscribe” | inurl:”lists/index.php?p=subscribe” -ubbi -bugs +phplist -tincan.co.uk
Google Search: “powered by ubbthreads”
Google Search: “Powered by mnoGoSearch - free web search engine software”
Google Search: filetype:asp inurl:”shopdisplayproducts.asp”
vBulletin is a customizable forums package for web sites. It has been written in PHP and is complimented with MySQL. While a user is previewing the post, both newreply.php and newthread.php correctly sanitize the input in ‘Preview’, but not Edit-panel. Malicious code can be injected by an attacker through this flaw. More information at http://www.securityfocus.com/bid/10612/.
Google Search: “Powered by: vBulletin * 3.0.1″ inurl:newreply.php
ASP Nuke is an open-source software application for running a community-based web site on a web server. By open-source, we mean the code is freely available for others to read, modify and use in accordance with the software license. The requirements for the ASP Nuke content management system are: 1. Microsoft SQL Server 2000 and 2. Microsoft Internet Information Server (IIS) 5.0 (http://www.aspnuke.com/) On 30 Dec. 2003 the hackers Cobac and Alnitak discovered a bug in Asp Nuke (version 1.2, 1.3, and 1.4) Problem : the file addurl-inc.asp included in the file gotourl.asp does not sanitize the input vars and make SQL injection possible. For a examples check the original advisory posted to a spanish forum: http://66.102.11.104/search?q=cache:10-ze5DIJ-UJ:www.elhacker.net/ foro/index.php%3Ftopic%3D11830.0%3Bprev_next%3Dprev%22&hl=en (link broken in two lines, glue them together first An attacker can obtain the user and admin passwords by crafting a SQL statement.
Google Search: inurl:gotoURL.asp?url=