{"id":954,"date":"2014-08-10T08:39:56","date_gmt":"2014-08-10T08:39:56","guid":{"rendered":"http:\/\/ixyzero.com\/blog\/?p=954"},"modified":"2014-08-10T08:39:56","modified_gmt":"2014-08-10T08:39:56","slug":"%e5%85%b3%e4%ba%8eghdbgooglehackingdatabase","status":"publish","type":"post","link":"https:\/\/ixyzero.com\/blog\/archives\/954.html","title":{"rendered":"\u5173\u4e8eGHDB(GoogleHackingDataBase)"},"content":{"rendered":"<p>\u9996\u5148\u8981\u8bf4\u660e\u7684\u4e00\u70b9\u5c31\u662f\uff0cGHDB\u5176\u5b9e\u672c\u8eab\u5e76\u6ca1\u6709\u4e00\u4e2a\u660e\u786e\u7684\u5b9a\u4e49\uff0c\u5927\u6982\u610f\u601d\u5c31\u662f\uff1a\u5229\u7528Google\u53bb\u83b7\u53d6\u5165\u4fb5\u76ee\u6807\u7684\u76f8\u5173\u4fe1\u606f\u3001Hack\u6240\u9700\u6280\u672f\uff0c\u7136\u540e\u8fbe\u5230\u5165\u4fb5\u6307\u5b9a\u76ee\u6807\u7684\u76ee\u7684\uff08\u4e3b\u8981\u5176\u5b9e\u662f\u4e00\u79cd\u601d\u8def\uff0c\u4ee5\u53ca\u4e92\u8054\u7f51\u65f6\u4ee3\u7684\u7279\u70b9\uff1a\u5f88\u591a\u65f6\u5019\u53ea\u8981\u4f60\u60f3\uff0c\u5927\u90e8\u5206\u7684\u4fe1\u606f\/\u8d44\u6599\u4f60\u90fd\u53ef\u4ee5\u901a\u8fc7Google\u7b49\u641c\u7d22\u5f15\u64ce\u83b7\u53d6\u5f97\u5230\uff09\u3002<\/p>\n<p>\u5728Exploit-db\u7f51\u7ad9\u4e0a\u5bf9\u4e8egoogle-dorks\u7684\u89e3\u91ca\u5982\u4e0b\uff1a<\/p>\n<h6 style=\"text-align: center;\">Welcome to the google hacking database<\/h6>\n<p>We call them \u2018googledorks\u2019: Inept or foolish people as revealed by Google. Whatever you call these fools, you\u2019ve found the center of the Google Hacking Universe!<\/p>\n<p>\u4e3b\u8981\u5185\u5bb9\u5c31\u662f\u5229\u7528Google\u641c\u7d22\u4e00\u4e9b\u7279\u5b9a\u7684\u5173\u952e\u5b57\u4ee5\u627e\u5230\u7f51\u7ad9\u7684\u6f0f\u6d1e\u3002<\/p>\n<p>\u4e4b\u524d\u5728Freebuf\u4e0a\u770b\u5230\u8fc7\u4e00\u7bc7\u6587\u7ae0\uff1a<a href=\"http:\/\/www.freebuf.com\/articles\/web\/6846.html\" target=\"_blank\">[\u89c6\u9891]\u6559\u4f60\u5982\u4f55\u4e0b\u8f7dGHDB(Google Hacking Database)<\/a>\u00a0\u91cc\u9762\u7ed9\u51fa\u4e86\u4e00\u4e2abash\u811a\u672c\u7528\u4e8e\u4e0b\u8f7dexploit-db.com\u4e0a\u7684GHDB\u6240\u6709\u5173\u952e\u8bcd\uff0c\u6700\u540e\u751f\u6210html\u6587\u4ef6\uff0c\u8fd8\u662f\u975e\u5e38\u6709\u7528\u7684\uff0c\u540e\u6765\u6211\u81ea\u5df1\u7a0d\u5fae\u4fee\u6539\u4e86\u4e00\u4e0b\uff0c\u53bb\u6389\u4e86\u4e00\u4e9b\u4e0d\u5fc5\u8981\u7684\u529f\u80fd\uff08\u539f\u59cb\u811a\u672c\u7684\u5206\u4eab\u4e5f\u88ab\u53d6\u6d88\u4e86\uff0c\u6240\u4ee5\u7ecf\u5e38\u53ca\u65f6\u5907\u4efd\u662f\u975e\u5e38\u6709\u5fc5\u8981\u7684\uff01\uff09<\/p>\n<pre class=\"lang:default decode:true\">#! \/bin\/bash\n# Filename: exploit-db-ghdb-html.sh\n# Author:Seckev\n# Download google hacking keywords from http:\/\/www.exploit-db.com\/ghdb\/1, 2 , 3, *\n\necho\n\nfor page in `seq $1 $2`; do\nwget -q www.exploit-db.com\/ghdb\/$page -O $page\necho -e \"Page [\u000033[31;2m$page\u000033[0m] download successfully!!!\"\ndone\n\necho\n\ntouch ghdb.html\nfor filter in `seq $1 $2`; do\necho \"$filter `cat $filter | grep h2 | sed -n 's\/&lt;h2&gt;Google search: \/\/p'`&lt;br&gt;`cat $filter | grep &lt;p&gt; | grep Submited`&lt;br&gt;\" &gt;&gt; ghdb.html\necho -e \"[\u000033[31;5m$filter\u000033[0m] Keywords save to ghdb.html successfully!!!\"\ndone\n\nfor i in `seq $1 $2`; do\nrm $i\ndone\n\necho\necho \"Complete!!!\"<\/pre>\n<p>&#8212;-\u811a\u672c\u672c\u8eab\u5e76\u4e0d\u590d\u6742\uff0c\u5c31\u662f\u5148\u7528wget\u5faa\u73af\u4e0b\u8f7d\u5355\u4e2a\u9875\u9762\u6587\u4ef6\uff0c\u7136\u540e\u5bf9\u4e0b\u8f7d\u7684\u6587\u4ef6\u5185\u5bb9\u8fdb\u884c\u8fc7\u6ee4\u5e76\u5bfc\u5165HTML\u6587\u4ef6\u4e2d\u5373\u53ef&#8212;-<br \/>\n\u6700\u540e\u51fa\u6765\u7684HTML\u6587\u4ef6\u7684\u9875\u9762\u6548\u679c\u5982\u4e0b\uff1a<\/p>\n<blockquote><p>1 \u201ccacheserverreport for\u201d \u201cThis analysis was produced by calamaris\u201d<br \/>\nSubmited: 2003-06-24<\/p>\n<p>2 intitle:\u201dGanglia\u201d \u201cCluster Report for\u201d<br \/>\nSubmited: 2003-06-24<br \/>\n\u2026\u2026<\/p><\/blockquote>\n<p>\u5c31\u662f\u628a\u539f\u59cb\u9875\u9762\u4e2d\u7684\uff1a<span style=\"color: #ff0000;\"><strong>Google search<\/strong><\/span> \u548c <span style=\"color: #ff0000;\"><strong>Submited<\/strong><\/span> \u90a3\u4e00\u884c\u622a\u53d6\u51fa\u6765\u4e86\uff1a<\/p>\n<blockquote><p><span style=\"color: #ff0000;\"><strong>Google search<\/strong><\/span>: \u201ccacheserverreport for\u201d \u201cThis analysis was produced by calamaris\u201d<br \/>\nHits: 3732<br \/>\n<span style=\"color: #ff0000;\">Submited<\/span>: 2003-06-24<\/p><\/blockquote>\n<p>Exploit-db\u4e0a\u6700\u8fd1\u7684\u4e00\u4e2agoogle-dork\uff08<a href=\"http:\/\/www.exploit-db.com\/ghdb\/3958\/\" target=\"_blank\">\u7f16\u53f7\uff1a3958<\/a>\uff09\u662f\uff1a<\/p>\n<p>Google search: intitle:\u201dindex\u201d intext:\u201dLogin to the Administrative Interface\u201d<br \/>\nSubmited: 2014-08-09<\/p>\n<hr \/>\n<p>\u6700\u540e\uff0c\u518d\u5206\u4eab\u4e00\u4e2a\u521a\u521a\u53d1\u73b0\u7684google-dorks\u5408\u96c6\uff1a<br \/>\n<a href=\"https:\/\/github.com\/JohnTroony\/Google-dorks\" target=\"_blank\">https:\/\/github.com\/JohnTroony\/Google-dorks<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u9996\u5148\u8981\u8bf4\u660e\u7684\u4e00\u70b9\u5c31\u662f\uff0cGHDB\u5176\u5b9e\u672c\u8eab\u5e76\u6ca1\u6709\u4e00\u4e2a\u660e\u786e\u7684\u5b9a\u4e49\uff0c\u5927\u6982\u610f\u601d\u5c31\u662f\uff1a\u5229\u7528Google\u53bb\u83b7\u53d6\u5165\u4fb5\u76ee\u6807\u7684\u76f8\u5173 [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23,25,12],"tags":[310,311],"class_list":["post-954","post","type-post","status-publish","format-standard","hentry","category-knowledgebase-2","category-security","category-tools","tag-ghdb","tag-google-dorks"],"views":3865,"_links":{"self":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts\/954","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/comments?post=954"}],"version-history":[{"count":0,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts\/954\/revisions"}],"wp:attachment":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/media?parent=954"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/categories?post=954"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/tags?post=954"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}