HACKING ACCOUNT USING DORK !!!




Facebook and different on-line service are employing a misfit to save lots of the login id that's username and positive identification therefore here may be a trick to hack any account mistreatment google misfit for begineers


NOTE:- FOR academic PURPOSE solely. i'm NOT liable for something you are doing !!!



Things required:-

                                        1. a contemporary web browser and a net.
                                         2. Time


Level : Beginner


Method 1: Facebook! we'll be employing a google misfit to search out usernames and passwords of the many accounts together with Facebook!
The Dork: intext:charset_test= email= default_persistent=
Enter that into Google, and you may be given with many sites that have username and passwords lists!



Method 2: WordPress! this can explore for WordPress backup files that do contain the passwords, and every one knowledge for the site!

The Dork: filetype:sql inurl:wpcontent/ backup-*



Method 3: WWWBoard! this can explore for the user and passwords of WWWBoard users.

The Dork: inurl:/wwwboard/passwd.txt



Method 4: FrontPage! this can realize all users and passwords, almost like on top of.

The Dork: ext:pwd inurl:(service | authors | directors | users) "# - FrontPage-"

   
               
Method 5: Symfony!This finds info data and logins.

The Dork: inurl:config/databases.yml -trac -trunk -"Google Code" - supply -repository


 methodology 6: TeamSpeak! (big one!)This can rummage around for the server.dbs file (a Sqlite info file With the SuperAdmin username and password!!!)


The Dork: server-dbs "intitle:index of"



Method 7: TeamSpeak2!!! (this one is additionally big!)This can realize the log file that has the Super Admin user and pass within the prime a hundred lines. explore for "superadmin account info:"

The Dork: "inurl:Teamspeak2_RC2/server.log"



Method 8: Get Admin pass!Simple misfit that appearance for all sorts of admin information.

The Dork: "admin account info" filetype:log



Method 9: personal keys! (not any more!) this can realize any .pem files that contain personal keys.

The Dork: filetype:pem pem intext:private




And the final one, the regular directory packed with passwords....

Method 10: The Dir of Passwords! easy one!

The Dork: intitle:"Index of..etc"  eg:- positive identification 



THANKYOU FOR VISITING.
KEEP VISITING...
Share on Google Plus

About Unknown

This is a short description in the author block about the author. You edit it by entering text in the "Biographical Info" field in the user admin panel.
    Blogger Comment
    Facebook Comment

10 comments:

  1. I am definitely enjoying your posting. Its helpful and impressive.
    Cracked Software Download

    ReplyDelete
  2. Thanks a bunch for sharing this with all folks you actually understand what you are talking approximately! Bookmarked. Please also consult with my website =). We could have a link exchange arrangement between us! Best Low Profile Active Powered Subwoofer

    ReplyDelete
  3. Thank you for taking the time to publish this information very useful! best woofers for your home

    ReplyDelete
  4. i love the Bazooka of Megatron, i don’t understand why they did not include it on the movie:: Zong Facebook Internet Packages Details by Pkmobilereviews

    ReplyDelete
  5. This comment has been removed by the author.

    ReplyDelete
  6. Hiya, Might I copy your photo and use that on my site? Wills and Estate planning

    ReplyDelete
  7. Most of the time I don’t make comments on websites, but I'd like to say that this article really forced me to do so. Really nice post! Debt recovery lawyer

    ReplyDelete
  8. Fantastic goods from you, man. I've understand your stuff previous to and you are just extremely fantastic. I really like what you have acquired here, really like what you are stating and the way in which you say it. You make it entertaining and you still take care of to keep it sensitive. I can't wait to read far more from you. This is really a tremendous site. cash for cars port of brisbane

    ReplyDelete
  9. I encourage you to reconsider the content of your blog post and focus on promoting responsible cybersecurity practices. Let's work together to foster a culture of online security and protect individuals from malicious activities.
    Regards: Damaged Car Removal Sydney

    ReplyDelete
  10. Hacking or exploiting someone's account is illegal and unethical, and it's crucial to prioritize the security and privacy of individuals online. Instead of focusing on hacking techniques, it would be more beneficial to educate users about ways to protect their accounts and stay safe from cyber threats.
    Regards: We Buy any Car Sydney

    ReplyDelete

Thanks A lot for your Feedback. If you have any Problem You will be Helped Soon By the Admins. :D