话不多少,看内容~


1目录遍历漏洞  

语法为: site:www.je2se.com  intitle:index.of

2 配置文件泄露  

语法为: site:www.je2se.com ext:xml | ext:conf | ext:cnf | ext:reg | ext:inf | ext:rdp | ext:cfg | ext:txt | ext:ora | ext:ini

3数据库文件泄露

site:www.je2se.com ext:sql | ext:dbf | ext:mdb

4日志文件泄露

site:www.je2se.com ext:log

5备份和历史文件

site:www.je2se.com ext:bkf | ext:bkp | ext:bak | ext:old | ext:backup

6 SQL错误  

site:www.je2se.com intext:”sql syntax near” | intext:”syntax error has occurred” | intext:”incorrect syntax near” | intext:”unexpected end of SQL command” | intext:”Warning: mysql_connect()” | intext:”Warning: mysql_query()” | intext:”Warning: pg_connect()”

7 公开文件信息  

site:www.je2se.com ext:doc | ext:docx | ext:odt | ext:pdf | ext:rtf | ext:sxw | ext:psw | ext:ppt | ext:pptx | ext:pps | ext:csv

8  phpinfo()
site:www.je2se.com ext:php intitle:phpinfo “published by the PHP Group”