This search is a cleanup of a previous entry by J0hnny. It uses "parent directory" to avoid results other than directory listings. WS_FTP.ini is a configuration file for a popular win32 FTP client that stores usernames and weakly encoded passwords.
There is another way to find this file, that was added by Xewan:
Code
filetype:ini ws_ftp pwd
"index of/" "ws_ftp.ini" "parent directory"
Files containing passwords
"index of/" "ws_ftp.ini" "parent directory"
This finds the liveice.cfg file which contains all configuration data for an Icecast server. Passwords are saved unencrypted in this file.
Code
"liveice configuration file" ext:cfg -site:sourceforge.net
Files containing passwords
"liveice configuration file" ext:cfg -site:sourceforge.net
This returns xls files containing login names and passwords.
it works by showing all the xls files with password:(something)so a downside is that u do get stuff like "password protected", "password services" etc. (and the same for login)But...
most of the decent ones have the login and password in the text given to you by google, so its easy to seperate the useful ones from the others.
Code
"login: *" "password: *" filetype:xls
Files containing passwords
"login: *" "password= *" filetype:xls
User names and password hashes from web server backups generated by cpanel for ProFTPd. Password hashes can be cracked, granting direct access to FTP accounts. Unix passwd and shadow files can sometimes be found with this query as well.
Code
"parent directory" +proftpdpasswd
Files containing passwords
"parent directory" +proftpdpasswd
Most duware products use Microsoft Access databases in default locations without instructing the users to change them. The plain text admin passwords are just a click away for any attacker who knows how to type an URL.
For Ducalendar it's: /ducalendar/_private/ducalendar.mdb
Code
"powered by ducalendar" -site:duware.com
Files containing passwords
"powered by ducalendar" -site:duware.com
Most duware products use Microsoft Access databases in default locations without instructing the users to change them. The plain text admin passwords are just a click away for any attacker who knows how to type an URL.
For Duclassified it's: /duclassified/_private/duclassified.mdb
Code
"Powered by Duclassified" -site:duware.com
Files containing passwords
"Powered by Duclassified" -site:duware.com