Google Search Engine Optimisation-Part 2

Google is a double edge sword and you can use it either ways. if you choose to be a bad person then Google will be very useful to …


googleGoogle is a double edge sword and you can use it either ways. if you choose to be a bad person then Google will be very useful to you , it can sometimes be a hackers best friend. You will be surprise on the amount of restricted info available and open via Google, by using the appropriate search strings one can have a lot of restricted access due to carelessness of system administrators. One thing to keep in mind is that people have been exploiting the Google algorithm lately, a lot of false positives get brought back and you end up with sites linking to other sites in a constant loop.

Try some of this stuffs

In the search box put in exactly as you see it in bold

Example 1:

allintitle: “index of/root”


What it reveals is 2,510 pages that you can possible browse at your will…

Example 2


This result spawned 414 possible files to access

Here is an actual file retrieved from a site and edited , we know who the admin is and we have the hashes, that’s a job for JTR (john the ripper)

txUKhXYi4xeFs|master|admin|Worasit|Junsawang|xxx@xxx|on qk6GaDj9iBfNg|tomjang||Bug|Tom|xxx@xxx|on

intitle:index.of + mp3 -asp -html -htm -php -pls -txt

In the above example, when entered into Google this search result looks for any index of MP3 files that does not contain the standard web pages like HTML, PHP, etc. or any other non-related pages. In the above example you can replace mp3 with avi or other file extension to search for these types of files.

intitle:index.of + mp3 “<artist name / track / group>” -asp -html -htm -php -pls -txt

In the above example you could replace “<artist name / track / group>” with the artists name, track, group, or name of the MP3 you’re looking for. Keep in mind when downloading MP3 that you should own the track or song you’re downloading otherwise it’s considered illegal.


In the above simple example, Google will return results of insecure live web cams and with some of the services even allow you to control the cameras over the Internet.

Below are some other stringe and you can have many different permutations.

“Index of /admin”

“Index of /password”

“Index of /mail”

“Index of /” +passwd

“Index of /” +password.txt

“Index of /” +.htaccess

index of ftp +.mdb allinurl:/cgi-bin/ +mailto




filetype:config web

gobal.asax index

allintitle: “index of/admin”

allintitle: “index of/root”

allintitle: sensitive filetype:doc

allintitle: restricted filetype :mail

allintitle: restricted filetype:doc site:gov

inurl:passwd filetype:txt

inurl:admin filetype:db




top secret site:mil

confidential site:mil

allinurl: winnt/system32/ (get cmd.exe)


intitle:”Index of” .sh_history

intitle:”Index of” .bash_history

intitle:”index of” passwd

intitle:”index of” people.lst

intitle:”index of” pwd.db

intitle:”index of” etc/shadow

intitle:”index of” spwd

intitle:”index of” master.passwd

intitle:”index of” htpasswd

intitle:”index of” members OR accounts

intitle:”index of” user_carts OR user_cart

There are codes I chose not to disclose for fear of abuse, and you would be wondering why I am exposing some of these codes. The bad guys already know of these codes centuries ago, it is the good guys and innocent users that don’t know them.

The important part here is not to show how to attack something, but to show how attackers take advantage of your mistakes. This will enable you to protect your network by avoiding the pitfalls attackers use. Let me make one thing absolutely clear: I neither condone nor will I ever aid or defend those who attack networks or systems they do not own or that they have not been asked to attack.

One of the greatest challenges the security community faces is lack of information on the enemy. Questions like who is the threat, why do they attack, how do they attack, what are their tools, and possibly when will they attack? It is questions like these the security community often cannot answer.

For centuries military organizations have focused on information gathering to understand and protect against an enemy. To defend against a threat, you have to first know about it. However, in the information security world we have little such information.

Our lives is about securing networks, not distributing tools to break them. In addition, to stop a criminal hacker requires the ability to think like a criminal. After all, the objective is to demonstrate what an attacker would do.

Most of us have been taught from a very early age to be good law-abiding people and are simply not good at thinking up very plausible and innovative criminal schemes.

I hold no responsibility for what you do via the information supplied here, this is for educational purpose only, use at your own risk. You have been warned.

In this article

Join the Conversation