Académique Documents
Professionnel Documents
Culture Documents
One of the easiest ways to find vulnerable sites is known as Google Dorking. In
this context, a dork is a specific search query that finds websites meeting the
parameters of the advanced query you input. Some examples of dorks you can use t
o find sites vulnerable to a SQL injection attack include:
inurl:index.php?id=
inurl:trainers.php?id=
inurl:buy.php?category=
inurl:article.php?ID=
inurl:play_old.php?id=
inurl:declaration_more.php?decl_id=
inurl:pageid=
inurl:games.php?id=
inurl:page.php?file=
inurl:newsDetail.php?id=
inurl:gallery.php?id=
inurl:article.php?id=
inurl:show.php?id=
inurl:staff_id=
inurl:newsitem.php?num= andinurl:index.php?id=
inurl:trainers.php?id=
inurl:buy.php?category=
inurl:article.php?ID=
inurl:play_old.php?id=
inurl:declaration_more.php?decl_id=
inurl:pageid=
inurl:games.php?id=
inurl:page.php?file=
inurl:newsDetail.php?id=
inurl:gallery.php?id=
inurl:article.php?id=
inurl:show.php?id=
inurl:staff_id=
inurl:newsitem.php?num=
Of course, there are many others as well. The key component of these specialized
search queries is that they all focus on websites that rely on PHP scripts to g
enerate dynamic content from a SQL database somewhere on the backend of the serv
er. You can learn more about advanced Google search techniques in Unleash Google
Search.
Remember that a SQL injection attack can work on any SQL database, but PHP-based
websites are usually your best targets because they can be set up by just about
anyone (i.e. WordPress) and often contain lots of valuable information about cu
stomers within the database you are attempting to hack.
However, just because Google pops up with a result using these dorks does not me
an it is vulnerable to attack. The next step is to test each site until you find
one that is vulnerable.
Navigate to one of the websites you found. For this example, assume that one of
the search results is http://www.udemy.com/index.php?catid=1. To find out if thi
Using this information, you can search for vulnerabilities within your own websi
tes and perform penetration testing for others. Remember that what you do with t
his information is solely your responsibility. Hacking is a lot of fun
but it do
esn t mean you have to break the law to have a good time.
Filed Under: For Students, Technology