Instructions for using jSQL Injection, a multifunctional tool for finding and exploiting SQL injections in Kali Linux. PHP: Inheritance View a list of files in directories

How to search correctly using google.com

Everyone probably knows how to use a search engine like Google =) But not everyone knows that if you correctly compose a search query using special constructions, you can achieve the results of what you are looking for much more efficiently and quickly =) In this article I will try to show that and what you need to do to search correctly

Google supports several advanced search operators that have special meaning when searching on google.com. Typically, these statements change the search, or even tell Google to do completely different types of searches. For example, the design link: is a special operator, and the request link:www.google.com will not give you a normal search, but will instead find all web pages that have links to google.com.
alternative request types

cache: If you include other words in your query, Google will highlight those included words within the cached document.
For example, cache:www.web site will show the cached content with the word "web" highlighted.

link: The search query above will show web pages that contain links to the specified query.
For example: link:www.site will display all pages that have a link to http://www.site

related: Displays web pages that are “related” to the specified web page.
For example, related: www.google.com will list web pages that are similar to Google's home page.

info: Query Information: will present some of the information Google has about the web page you are requesting.
For example, info:website will show information about our forum =) (Armada - Adult Webmasters Forum).

Other information requests

define: The define: query will provide a definition of the words you enter after it, collected from various online sources. The definition will be for the entire phrase entered (that is, it will include all words in the exact query).

stocks: If you start a query with stocks: Google will process the rest of the query terms as stock symbols, and link to a page showing ready-made information for these symbols.
For example, stocks:Intel yahoo will show information about Intel and Yahoo. (Note that you should type breaking news symbols, not the company name)

Query Modifiers

site: If you include site: in your query, Google will limit the results to those websites it finds in that domain.
You can also search by individual zones, such as ru, org, com, etc ( site:com site:ru)

allintitle: If you run a query with allintitle:, Google will limit the results to all the query words in the title.
For example, allintitle: google search will return all Google pages by search such as images, Blog, etc

intitle: If you include intitle: in your query, Google will limit the results to documents containing that word in the title.
For example, intitle:Business

allinurl: If you run a query with allinurl: Google will limit the results to all query words in the URL.
For example, allinurl: google search will return documents with google and search in the title. Also, as an option, you can separate words with a slash (/) then words on both sides of the slash will be searched within the same page: Example allinurl: foo/bar

inurl: If you include inurl: in your query, Google will limit the results to documents containing that word in the URL.
For example, Animation inurl:site

intext: searches only the specified word in the text of the page, ignoring the title and texts of links, and other things not related to. There is also a derivative of this modifier - allintext: those. further, all words in the query will be searched only in the text, which can also be important, ignoring frequently used words in links
For example, intext:forum

daterange: searches in a time frame (daterange:2452389-2452389), dates for times are indicated in Julian format.

Well, and all sorts of interesting examples of queries

Examples of writing queries for Google. For spammers

Inurl:control.guest?a=sign

Site:books.dreambook.com “Homepage URL” “Sign my” inurl:sign

Site:www.freegb.net Homepage

Inurl:sign.asp “Character Count”

“Message:” inurl:sign.cfm “Sender:”

Inurl:register.php “User Registration” “Website”

Inurl:edu/guestbook “Sign the Guestbook”

Inurl:post “Post Comment” “URL”

Inurl:/archives/ “Comments:” “Remember info?”

“Script and Guestbook Created by:” “URL:” “Comments:”

Inurl:?action=add “phpBook” “URL”

Intitle:"Submit New Story"

Magazines

Inurl:www.livejournal.com/users/ mode=reply

Inurl greatestjournal.com/ mode=reply

Inurl:fastbb.ru/re.pl?

Inurl:fastbb.ru /re.pl? "Guest book"

Blogs

Inurl:blogger.com/comment.g?”postID””anonymous”

Inurl:typepad.com/ “Post a comment” “Remember personal info?”

Inurl:greatestjournal.com/community/ “Post comment” “addresses of anonymous posters”

“Post comment” “addresses of anonymous posters” -

Intitle:"Post comment"

Inurl:pirillo.com “Post comment”

Forums

Inurl:gate.html?”name=Forums” “mode=reply”

Inurl:”forum/posting.php?mode=reply”

Inurl:"mes.php?"

Inurl:”members.html”

Inurl:forum/memberlist.php?”

Inheritance is an object-oriented programming mechanism that allows you to describe a new class based on an existing one (parent).

A class that is obtained by inheriting from another is called a subclass. This relationship is usually described using the terms "parent" and "child". A child class is derived from the parent and inherits its characteristics: properties and methods. Typically, a subclass adds new functionality to the functionality of the parent class (also called a superclass).

To create a subclass, you must use the extends keyword in the class declaration, followed by the name of the class from which you are inheriting:

age = $age;
) function add_age () ( $this->age++; ) ) // declare an inherited class class my_Cat extends Cat ( // define our own subclass method function sleep() ( echo "

Zzzzz..."; ) ) $kitty = new my_Cat(10); // call the inherited method $kitty->add_age(); // read the value of the inherited property echo $kitty->age; // call the subclass's own method $ kitty->sleep();

The subclass inherits access to all methods and properties of the parent class, since they are of type public . This means that for instances of the my_Cat class, we can call the add_age() method and access the $age property, even though they are defined in the cat class. Also in the example above, the subclass does not have its own constructor. If the subclass does not declare its own constructor, then when creating instances of the subclass, the superclass constructor will be automatically called.

Please note that subclasses can override properties and methods. By defining a subclass, we ensure that its instance is defined by the characteristics of first the child and then the parent class. To understand this better, consider an example:

When calling $kitty->foo(), the PHP interpreter cannot find such a method in the my_Cat class, so the implementation of this method defined in the Cat class is used. However, the subclass defines its own $age property, so when it is accessed in the $kitty->foo() method, the PHP interpreter finds that property in the my_Cat class and uses it.

Since we have already covered the topic of specifying the type of arguments, it remains to say that if the parent class is specified as the type, then all descendants for the method will also be available for use, look at the following example:

foo(new my_Cat); ?>

We can treat an instance of the class my_Cat as if it were an object of type Cat, i.e. we can pass an object of type my_Cat to the foo() method of the Cat class, and everything will work as expected.

parent operator

In practice, subclasses may need to extend the functionality of parent class methods. By extending functionality by overriding superclass methods, subclasses retain the ability to first execute the parent class's code and then add code that implements the additional functionality. Let's look at how this can be done.

To call the desired method from a parent class, you will need to access this class itself through a descriptor. PHP provides the parent keyword for this purpose. The parent operator allows subclasses to access the methods (and constructors) of the parent class and add to their existing functionality. To refer to a method in the context of a class, use the symbols "::" (two colons). The parent operator syntax is:

Parent::parent_class method

This construct will call a method defined in the superclass. Following such a call, you can place your program code, which will add new functionality:

title = $title;
$this->price = $price;
) ) class new_book extends book ( public $pages; function __construct($title, $price, $pages) ( // call the constructor method of the parent class parent::__construct($title, $price); // initialize the property defined in subclass $this->pages = $pages; ) ) $obj = new new_book("ABC", 35, 500);

When a child class defines its own constructor, PHP does not automatically call the parent class's constructor. This must be done manually in the subclass constructor. The subclass first calls the constructor of its parent class in its constructor, passing the necessary arguments for initialization, executes it, and then executes the code that implements additional functionality, in this case initializing a property of the subclass.

The parent keyword can be used not only in constructors, but also in any other method whose functionality you want to extend, this can be achieved by calling a method of the parent class:

name)."; return $str; ) ) class my_Cat extends Cat ( public $age = 5; function getstr() ( $str = parent::getstr(); $str .= "
Age: ($this->age) years."; return $str; ) ) $obj = new my_Cat; echo $obj->getstr(); ?>

Here, the getstr() method from the superclass is first called, the value of which is assigned to a variable, and after that the rest of the code defined in the subclass method is executed.

Now that we've covered the basics of inheritance, we can finally look at the issue of visibility of properties and methods.

public, protected and private: access control

Up to this point, we have explicitly declared all properties as public. And this type of access is set by default for all methods.

Members of a class can be declared as public, protected, or private. Let's look at the difference between them:

  • TO public(public) properties and methods can be accessed from any context.
  • TO protected(protected) properties and methods can be accessed either from the containing class or from its subclass. No external code is allowed access to them.
  • You can make class data unavailable to the calling program using the keyword private(closed). Such properties and methods can only be accessed from the class in which they are declared. Even subclasses of this class do not have access to such data.

public - open access:

hello"; ) ) $obj = new human; // access from the calling program echo "$obj->age"; // Valid $obj->say(); // Valid?>

private - access only from class methods:

age"; ) ) $obj = new human; // there is no direct access to private data from the calling program echo "$obj->age"; // Error! access denied! // however, using the method you can display private data $obj ->say(); // Acceptable?>

protected - protected access:

The protected modifier, from the point of view of the calling program, looks exactly the same as private: it prohibits access to the object's data from the outside. However, unlike private, it allows you to access data not only from methods of your class, but also from methods of a subclass.

Search operators (special characters that are added to a search query) help you get a huge amount of useful information about a site. With their help, you can significantly narrow your search range and find the information you need. Basically, the operators in different search engines are the same, but there are also differences. Therefore, we will consider operators for Google and Yandex separately.

Google Operators

Let's first consider the simplest operators:

+ - The plus operator is used to find words in the same sentence, just insert this symbol between the words. For example, by making a request like “winter + tires + for + Nissan”, you will get in the search results those sites that have sentences with a full set of all the words from the query.

- - the “minus” operator will help exclude unwanted words from the query. For example, if you make a request “The Godfather -online”, you will be given sites with information about the film, review, review, etc., but will exclude sites with online viewing.

.. - will help to find results containing numbers in the specified range.

@ And #- symbols for searching by tags and hashtags of social networks.

OR- the “or” operator, with its help you can find pages on which at least one of several words appears.

« » - quotation marks tell the search engine that you need to find sites where the entered words are in the specified order - exact occurrence.

Complex Operators:

site: will help you find the necessary information on a specific site.

cache: a useful operator if the content of a page has changed or been blocked. Shows the cached version. Example: cache:site

info: serves to display all information about the address.

related: An excellent operator for finding sites with similar content.

allintitle: pages are displayed that have the words specified in the request in their title tag

allinurl: an excellent operator with which you can find the pages you really need. Shows sites that contain the specified words in the page address. Unfortunately, there are still few sites in the Russian segment of the Internet that use the Cyrillic alphabet, so you will have to use either transliteration, for example, allinurl:steklopakety, or Latin.

inurl: does the same thing as the operator above, but the selection occurs only for one word.

allintext: The pages are selected based on the content of the page. It may be useful if you are looking for some information, but the site address has simply been forgotten.

intext: the same thing for only one word.

allinanchor: the operator shows pages that have keywords in their description. For example: allinanchor: wristwatch.

inanchor: the same thing for only one keyword.

Yandex operators

Simple Operators:

! - is placed in front of the keyword and the search results show pages where exactly the same word is indicated (without changing the word form).

+ - just like Google, pages are displayed with all the words indicated between the plus sign.

« » - shows the exact match of the phrase.

() - used to group words in complex queries.

& - needed to search for pages in which words combined by this operator occur in one sentence.

* - serves to search for missing words in quotes. For example: Russia * soul. One * operator replaces one word.

The following operators are already built into the Yandex advanced search, so there is no point in remembering them, but we will still explain what each of them does.

title: search by site page titles

url: search for pages located at a given address, for example url:site/blog/*

host: searches the entire host.

site: here the search is carried out across all subdomains and pages of the site.

inurl: search through pages of only this domain using keywords. For example, inurl: blog site

mime: search for documents of a given type, for example mime:xls.

cat: search for sites that are present in the Yandex.Catalogue, as well as the region and category of which coincides with the specified one. For example: car cat:ID_category

Here's what these operators look like in the search engine itself:

Thus, by correctly selecting and using Google and Yandex search engine operators, you can independently create a semantic core for the site, find shortcomings and errors in the work, do an analysis of competitors, and also find out where and what external links go to your site.

If you use any other operators in your work that we did not take into account, share them in the comments. Let's discuss =)

This article will be primarily useful to beginner optimizers, because more advanced ones should already know everything about them. In order to use this article with maximum efficiency, it is advisable to know exactly which words need to be raised to the right positions. If you are not yet sure of the list of words, or use the keyword suggestion service, it is a little confusing, but you can figure it out.

Important! Rest assured, Google understands perfectly well that ordinary users will not use them and only promotion specialists will resort to their help. Therefore, Google may slightly distort the information provided

Intitle operator:

Usage: intitle:word
Example: intitle:site promotion
Description: When using this operator, you will receive a list of pages whose title contains the word you are interested in, in our case this is the phrase “site promotion” in its entirety. Please note that there should not be a space after the colon. The page title is important when ranking, so be careful when writing your titles. By using this variable, you can estimate the approximate number of competitors who also want to be in the leading positions for this word.

Inurl operator:

Usage: inurl:phrase
Example: inurl:calculating the cost of search engine optimization
Description: This command shows sites or pages that have the original keyword in their URL. Please note that there should not be a space after the colon.

Inanchor operator:

Usage: inanchor:phrase
Example: inanchor:seo books
Description: Using this operator will help you see pages that are linked to the keyword you are using. This is a very important command, but unfortunately search engines are reluctant to share this information with SEOs for obvious reasons. There are services, Linkscape and Majestic SEO, that will provide you with this information for a fee, but rest assured, the information is worth it.

Also, it is worth remembering that now Google is paying more and more attention to the “trust” of the site and less and less to the link mass. Of course, links are still one of the most important factors, but “trust” is playing an increasingly significant role.

A combination of two variables gives good results, for example intitle: promotion inanchor: site promotion. And what do we see, the search engine will show us the main competitors, whose page title contains the word “promotion” and incoming links with the anchor “site promotion”.

Unfortunately, this combination does not allow you to find out the “trust” of the domain, which, as we have already said, is a very important factor. For example, many older corporate sites do not have as many links as their younger competitors, but they do have a lot of old links, which pull these sites to the top of the search results.

Site operator:

Usage: site:site address
Example: site:www.aweb.com.ua
Description: With this command you can see a list of pages that are indexed by the search engine and that it knows about. It is mainly used to find out about competitors' pages and analyze them.

Cache operator:

Usage: cache:page address
Example: cache:www.aweb.com.ua
Description: This command shows a “snapshot” of the page from the moment the robot last visited the site and in general how it sees the contents of the page. By checking the page cache date, you can determine how often robots visit the site. The more authoritative the site, the more often robots visit it and, accordingly, the less authoritative (according to Google) the site, the less often robots take pictures of the page.

Cache is very important when buying links. The closer the page cache date is to the link purchase date, the faster your link will be indexed by the Google search engine. Sometimes it was possible to find pages with a cache age of 3 months. By purchasing a link on such a site, you will only waste your money, because it is quite possible that the link will never be indexed.

Link operator:

Usage: link:url
Example: link:www.aweb.com.ua
Description: Link operator: Finds and displays pages that link to the specified url. This can be either the main page of the site or the internal one.

Related operator:

Usage: related:url
Example: related:www.aweb.com.ua
Description: Related operator: Returns pages that the search engine thinks are similar to the specified page. For a person, all the pages received may not have anything similar, but for a search engine this is so.

Operator Info:

Usage: info:url
Example: info:www.aweb.com.ua
Description: When using this operator, we will be able to obtain information about the page that is known to the search engine. This could be the author, publication date, and much more. Additionally, on the search page, Google offers several actions that it can do with this page. Or, to put it simply, it will suggest using some of the operators that we described above.

Allintitle operator:

Usage: allintitle:phrase
Example: allintitle:aweb promotion
Description: If we start a search query with this word, we will get a list of pages that have the entire phrase in the title. For example, if we try to search for the word allintitle:aweb promotion, we will get a list of pages whose title mentions both of these words. And they don’t necessarily have to go one after another; they can be located in different places in the header.

Allintext operator:

Usage: allintext:word
Example: allintext:optimization
Description: This operator searches for all pages that have the specified word in their body text. If we try to use allintext: aweb optimization, we will see a list of pages in the text of which these words appear. That is, not the entire phrase “aweb optimization”, but both words “optimization” and “aweb”.

Any search for vulnerabilities on web resources begins with reconnaissance and information collection.
Intelligence can be either active - brute force of files and directories of the site, running vulnerability scanners, manually browsing the site, or passive - searching for information in different search engines. Sometimes it happens that a vulnerability becomes known even before opening the first page of the site.

How is this possible?
Search robots, constantly roaming the Internet, in addition to information useful to the average user, often record things that can be used by attackers to attack a web resource. For example, script errors and files with sensitive information (from configuration files and logs to files with authentication data and database backups).
From the point of view of a search robot, an error message about executing an sql query is plain text, inseparable, for example, from the description of products on the page. If suddenly a search robot came across a file with the .sql extension, which for some reason ended up in the site’s working folder, then it will be perceived as part of the site’s content and will also be indexed (including, possibly, the passwords specified in it).

Such information can be found by knowing strong, often unique, keywords that help separate “vulnerable pages” from pages that do not contain vulnerabilities.
A huge database of special queries using keywords (so-called dorks) exists on exploit-db.com and is known as the Google Hack Database.

Why google?
Dorks are primarily targeted at Google for two reasons:
− the most flexible syntax of keywords (shown in Table 1) and special characters (shown in Table 2);
− the Google index is still more complete than that of other search engines;

Table 1 - Main Google keywords

Keyword
Meaning
Example
site
Search only on the specified site. Only takes into account url
site:somesite.ru - will find all pages on a given domain and subdomains
inurl
Search by words present in the uri. Unlike cl. words “site”, searches for matches after the site name
inurl:news - finds all pages where the given word appears in the uri
intext
Search in the body of the page
intext:”traffic jams” - completely similar to the usual request for “traffic jams”
intitle
Search in the page title. Text between tags <br></td> <td width="214">intitle:”index of” - will find all pages with directory listings <br></td> </tr><tr><td width="214">ext <br></td> <td width="214">Search for pages with a specified extension <br></td> <td width="214">ext:pdf - finds all pdf files <br></td> </tr><tr><td width="214">filetype <br></td> <td width="214">Currently, completely similar to class. the word “ext” <br></td> <td width="214">filetype:pdf - similar <br></td> </tr><tr><td width="214">related <br></td> <td width="214">Search for sites with similar topics <br></td> <td width="214">related:google.ru - will show its analogues <br></td> </tr><tr><td width="214">link <br></td> <td width="214">Search for sites that link to this <br></td> <td width="214">link:somesite.ru - will find all sites that have a link to this <br></td> </tr><tr><td width="214">define <br></td> <td width="214">Show word definition <br></td> <td width="214">define:0day - definition of the term <br></td> </tr><tr><td width="214">cache <br></td> <td width="214">Show page contents in cache (if present) <br></td> <td width="214">cache:google.com - will open a cached page <br></td> </tr></tbody></table><p>Table 2 - Special characters for Google queries <br></p><table><tbody><tr><td width="214"><b>Symbol</b><br></td> <td width="214"><b>Meaning</b><br></td> <td width="214"><b>Example</b><br></td> </tr><tr><td width="214">“<br></td> <td width="214">Exact phrase <br></td> <td width="214">intitle:“RouterOS router configuration page” - search for routers <br></td> </tr><tr><td width="214">*<br></td> <td width="214">Any text <br></td> <td width="214">inurl: “bitrix*mcart” - search for sites on bitrix with a vulnerable mcart module <br></td> </tr><tr><td width="214">.<br></td> <td width="214">Any character <br></td> <td width="214">Index.of - similar to the index of request <br></td> </tr><tr><td width="214">-<br></td> <td width="214">Delete a word <br></td> <td width="214">error -warning - show all pages that have an error but no warning <br></td> </tr><tr><td width="214">..<br></td> <td width="214">Range <br></td> <td width="214">cve 2006..2016 - show vulnerabilities by year starting from 2006 <br></td> </tr><tr><td width="214">|<br></td> <td width="214">Logical "or" <br></td> <td width="214">linux | windows - show pages where either the first or second word occurs <br></td> </tr></tbody></table><br>It is worth understanding that any request to a search engine is a search only by words. <br>It is useless to look for meta-characters on the page (quotes, parentheses, punctuation marks, etc.). Even a search for the exact phrase specified in quotation marks is a word search, followed by a search for an exact match in the results. <p>All Google Hack Database dorks are logically divided into 14 categories and are presented in Table 3. <br>Table 3 – Google Hack Database Categories <br></p><table><tbody><tr><td width="168"><b>Category</b><br></td> <td width="190"><b>What allows you to find</b><br></td> <td width="284"><b>Example</b><br></td> </tr><tr><td width="168">Footholds <br></td> <td width="190">Web shells, public file managers <br></td> <td width="284">Find all hacked sites where the listed webshells are uploaded: <br>(intitle:"phpshell" OR intitle:"c99shell" OR intitle:"r57shell" OR intitle:"PHP Shell" OR intitle:"phpRemoteView") `rwx` "uname" <br></td> </tr><tr><td width="168">Files containing usernames <br></td> <td width="190">Registry files, configuration files, logs, files containing the history of entered commands <br></td> <td width="284">Find all registry files containing account information: <br><i>filetype:reg reg +intext:“internet account manager”</i><br></td> </tr><tr><td width="168">Sensitive Directories <br></td> <td width="190">Directories with various information (personal documents, vpn configs, hidden repositories, etc.) <br></td> <td width="284">Find all directory listings containing VPN-related files: <br><i>"Config" intitle:"Index of" intext:vpn</i><br>Sites containing git repositories: <br><i>(intext:"index of /.git") ("parent directory")</i><br></td> </tr><tr><td width="168">Web Server Detection <br></td> <td width="190">Version and other information about the web server <br></td> <td width="284">Find JBoss server administrative consoles: <br><i>inurl:"/web-console/" intitle:"Administration Console"</i><br></td> </tr><tr><td width="168">Vulnerable Files <br></td> <td width="190">Scripts containing known vulnerabilities <br></td> <td width="284">Find sites that use a script that allows you to upload an arbitrary file from the server: <br><i>allinurl:forcedownload.php?file=</i><br></td> </tr><tr><td width="168">Vulnerable Servers <br></td> <td width="190">Installation scripts, web shells, open administrative consoles, etc. <br></td> <td width="284">Find open PHPMyAdmin consoles running as root: <br><i>intitle:phpMyAdmin "Welcome to phpMyAdmin ***" "running on * as root@*"</i><br></td> </tr><tr><td width="168">Error Messages <br></td> <td width="190">Various errors and warnings often reveal important information - from CMS version to passwords <br></td> <td width="284">Sites that have errors in executing SQL queries to the database: <br><i>"Warning: mysql_query()" "invalid query"</i><br></td> </tr><tr><td width="168">Files containing juicy info <br></td> <td width="190">Certificates, backups, emails, logs, SQL scripts, etc. <br></td> <td width="284">Find initialization sql scripts: <br><i>filetype:sql and “insert into” -site:github.com</i><br></td> </tr><tr><td width="168">Files containing passwords <br></td> <td width="190">Anything that can contain passwords - logs, sql scripts, etc. <br></td> <td width="284">Logs mentioning passwords: <br><i>filetype:</i><i>log</i><i>intext:</i><i>password |</i><i>pass |</i><i>pw</i><br>sql scripts containing passwords: <br><i>ext:</i><i>sql</i><i>intext:</i><i>username</i><i>intext:</i><i>password</i><br></td> </tr><tr><td width="168">Sensitive Online Shopping Info <br></td> <td width="190">Information related to online purchases <br></td> <td width="284">Find pincodes: <br><i>dcid=</i><i>bn=</i><i>pin</i><i>code=</i><br></td> </tr><tr><td width="168">Network or vulnerability data <br></td> <td width="190">Information not directly related to the web resource, but affecting the network or other non-web services <br></td> <td width="284">Find automatic proxy configuration scripts containing information about the internal network: <br><i>inurl:proxy | inurl:wpad ext:pac | ext:dat findproxyforurl</i><br></td> </tr><tr><td width="168">Pages containing login portals <br></td> <td width="190">Pages containing login forms <br></td> <td width="284">saplogon web pages: <br><i>intext:"2016 SAP AG. All rights reserved." intitle:"Logon"</i><br></td> </tr><tr><td width="168">Various Online Devices <br></td> <td width="190">Printers, routers, monitoring systems, etc. <br></td> <td width="284">Find the printer configuration panel: <br><i>intitle:"</i><i>hp</i><i>laserjet"</i><i>inurl:</i><i>SSI/</i><i>Auth/</i><i>set_</i><i>config_</i><i>deviceinfo.</i><i>htm</i><br></td> </tr><tr><td width="168">Advisories and Vulnerabilities <br></td> <td width="190">Websites on vulnerable CMS versions <br></td> <td width="284">Find vulnerable plugins through which you can upload an arbitrary file to the server: <br><i>inurl:fckeditor -intext:"ConfigIsEnabled = False" intext:ConfigIsEnabled</i><br></td> </tr></tbody></table><br>Dorks are more often focused on searching across all Internet sites. But nothing prevents you from limiting the search scope on any site or sites. <br>Each Google query can be focused on a specific site by adding the keyword “site:somesite.com” to the query. This keyword can be added to any dork. <p><b>Automating the search for vulnerabilities</b><br>This is how the idea was born to write a simple utility that automates the search for vulnerabilities using a search engine (google) and relies on the Google Hack Database.</p><p>The utility is a script written in nodejs using phantomjs. To be precise, the script is interpreted by phantomjs itself. <br>Phantomjs is a full-fledged web browser without a GUI, controlled by js code and with a convenient API. <br>The utility received a quite understandable name - dorks. By running it on the command line (without options), we get short help with several examples of use:</p><p>Figure 1 - List of main dorks options</p><p>The general syntax of the utility is: dork “command” “option list”. <br>A detailed description of all options is presented in Table 4.</p><p>Table 4 - Dorks syntax <br></p><table border="1"><tbody><tr><td width="214"><b>Team</b><br></td> <td width="214"><b>Option</b><br></td> <td width="214"><b>Description</b><br></td> </tr><tr><td rowspan="4" width="214">ghdb <br></td> <td width="214">-l <br></td> <td width="214">Display a numbered list of dork categories Google Hack Database <br></td> </tr><tr><td width="214">-c “category number or name” <br></td> <td width="214">Load doors of the specified category by number or name <br></td> </tr><tr><td width="214">-q "phrase" <br></td> <td width="214">Download dorks found by request <br></td> </tr><tr><td width="214">-o "file" <br></td> <td width="214">Save the result to a file (only with -c|-q options) <br></td> </tr><tr><td rowspan="8" width="214">google <br></td> <td width="214">-d "dork" <br></td> <td width="214">Set an arbitrary dork (the option can be used many times, combination with the -D option is allowed) <br></td> </tr><tr><td width="214">-D "file" <br></td> <td width="214">Use dorks from file <br></td> </tr><tr><td width="214">-s "site" <br></td> <td width="214">Set site (option can be used many times, combination with option -S is allowed) <br></td> </tr><tr><td width="214">-S "file" <br></td> <td width="214">Use sites from a file (dorks will be searched for each site independently) <br></td> </tr><tr><td width="214">-f "filter" <br></td> <td width="214">Set additional keywords (will be added to each dork) <br></td> </tr><tr><td width="214">-t "number of ms" <br></td> <td width="214">Interval between requests to google <br></td> </tr><tr><td width="214">-T "number of ms" <br></td> <td width="214">Timeout if a captcha is encountered <br></td> </tr><tr><td width="214">-o "file" <br></td> <td width="214">Save the result to a file (only those tracks for which something was found will be saved) <br></td> </tr></tbody></table><br>Using the ghdb command, you can get all the dorks from exploit-db by arbitrary request, or specify the entire category. If you specify category 0, the entire database will be unloaded (about 4.5 thousand dorks). <p>The list of categories currently available is presented in Figure 2. <br><br><img src='https://i0.wp.com/habrastorage.org/getpro/habr/post_images/b8f/b11/ffe/b8fb11ffeaced5066fd2fd9e43be67fb.jpg' width="100%" loading=lazy loading=lazy></p><p>Figure 2 - List of available GHDB dork categories</p><p>The google team will substitute each dork into the google search engine and analyze the result for matches. The paths where something was found will be saved to a file. <br>The utility supports different search modes: <br>1 dork and 1 site; <br>1 dork and many sites; <br>1 site and many dorks; <br>many sites and many dorks; <br>The list of dorks and sites can be specified either through an argument or through a file.</p><p><b>Demonstration of work</b><br>Let's try to look for any vulnerabilities using the example of searching for error messages. By command: dorks ghdb –c 7 –o errors.dorks all known dorks of the “Error Messages” category will be loaded as shown in Figure 3. <br><br><img src='https://i1.wp.com/habrastorage.org/getpro/habr/post_images/28c/386/641/28c386641d1528652f7f8e8b8089097a.jpg' width="100%" loading=lazy loading=lazy><br>Figure 3 – Loading all known dorks of the “Error Messages” category</p><p>Dorks are downloaded and saved to a file. Now all that remains is to “set” them on some site (see Figure 4). <br><br><img src='https://i0.wp.com/habrastorage.org/getpro/habr/post_images/8e0/a8a/3af/8e0a8a3af4f26544da1faa584813dbff.jpg' width="100%" loading=lazy loading=lazy><br>Figure 4 – Search for vulnerabilities of the site of interest in the Google cache</p><p>After some time, several pages containing errors are discovered on the site under study (see Figure 5).</p><p><img src='https://i2.wp.com/habrastorage.org/getpro/habr/post_images/10b/e83/ba3/10be83ba38f172213ba06b3f9ad05a58.jpg' width="100%" loading=lazy loading=lazy><br>Figure 5 – Error messages found</p><p>As a result, in the result.txt file we get a complete list of dorks that lead to the error. <br>Figure 6 shows the result of searching for site errors. <br><br>Figure 6 – Error search result</p><p>In the cache for this dork, a complete backtrace is displayed, revealing the absolute paths of the scripts, the site content management system and the database type (see Figure 7). <br><br><img src='https://i1.wp.com/habrastorage.org/getpro/habr/post_images/0a9/455/588/0a9455588496d6609f5e13d598cb5a48.jpg' width="100%" loading=lazy loading=lazy><br>Figure 7 – disclosure of information about the site design</p><p>However, it is worth considering that not all dorks from GHDB give true results. Also, Google may not find an exact match and show a similar result.</p><p>In this case, it is wiser to use your personal list of dorks. For example, it is always worth looking for files with “unusual” extensions, examples of which are shown in Figure 8. <br><br><img src='https://i0.wp.com/habrastorage.org/getpro/habr/post_images/d7f/865/693/d7f865693f7fcf13137598eeed0ecb58.jpg' width="100%" loading=lazy loading=lazy><br>Figure 8 – List of file extensions that are not typical for a regular web resource</p><p>As a result, with the command dorks google –D extensions.txt –f bank, from the very first request Google begins to return sites with “unusual” file extensions (see Figure 9). <br><br><img src='https://i0.wp.com/habrastorage.org/getpro/habr/post_images/107/e1f/a2f/107e1fa2f41c4169bcc254cba2f2f4b6.jpg' width="100%" loading=lazy loading=lazy><br>Figure 9 – Search for “bad” file types on banking websites</p><p>It is worth keeping in mind that Google does not accept queries longer than 32 words.</p><p>Using the command dorks google –d intext:”error|warning|notice|syntax” –f university <br>You can look for PHP interpreter errors on educational websites (see Figure 10). <br><br><img src='https://i1.wp.com/habrastorage.org/getpro/habr/post_images/717/74f/e36/71774fe3656bfc058c42d43262fdec4a.jpg' width="100%" loading=lazy loading=lazy><br>Figure 10 – Finding PHP runtime errors</p><p>Sometimes it is not convenient to use one or two categories of dorks. <br>For example, if it is known that the site runs on the Wordpress engine, then we need WordPress-specific modules. In this case, it is convenient to use the Google Hack Database search. The command dorks ghdb –q wordpress –o wordpress_dorks.txt will download all dorks from Wordpress, as shown in Figure 11: <br><br><img src='https://i1.wp.com/habrastorage.org/getpro/habr/post_images/dcb/ac9/a4e/dcbac9a4eb12f6ec775d9cccc2fdee87.jpg' width="100%" loading=lazy loading=lazy><br>Figure 11 – Search for Dorks related to Wordpress</p><p>Let's go back to the banks again and use the command dorks google –D wordpress_dords.txt –f bank to try to find something interesting related to Wordpress (see Figure 12). <br><br><img src='https://i1.wp.com/habrastorage.org/getpro/habr/post_images/042/0c2/c43/0420c2c435931704288b171f725ccc6a.jpg' width="100%" loading=lazy loading=lazy><br>Figure 12 – Search for Wordpress vulnerabilities</p><p>It is worth noting that the search on Google Hack Database does not accept words shorter than 4 characters. For example, if the site's CMS is not known, but the language is known - PHP. In this case, you can filter what you need manually using the pipe and the system search utility dorks –c all | findstr /I php > php_dorks.txt (see Figure 13): <br><br><img src='https://i1.wp.com/habrastorage.org/getpro/habr/post_images/4c1/2f8/6e1/4c12f86e111074293c14d6a939c6ebab.jpg' width="100%" loading=lazy loading=lazy><br>Figure 13 – Search all dorks where PHP is mentioned</p><p>Searching for vulnerabilities or some sensitive information in a search engine should only be done if there is a significant index on this site. For example, if a site has 10-15 pages indexed, then it’s stupid to search for anything in this way. Checking the index size is easy - just enter “site:somesite.com” into the Google search bar. An example of a site with an insufficient index is shown in Figure 14. <br><br><img src='https://i0.wp.com/habrastorage.org/getpro/habr/post_images/78e/1db/b4f/78e1dbb4fc78cd422cec311fc2ca9d33.jpg' width="100%" loading=lazy loading=lazy><br>Figure 14 – Checking the site index size</p><p>Now about the unpleasant... From time to time Google may request a captcha - there is nothing you can do about it - you will have to enter it. For example, when searching through the “Error Messages” category (90 dorks), the captcha appeared only once.</p><p>It’s worth adding that phantomjs also supports working through a proxy, both via http and socks interface. To enable proxy mode, you need to uncomment the corresponding line in dorks.bat or dorks.sh.</p><p>The tool is available as source code</p> <script type="text/javascript"> <!-- var _acic={dataProvider:10};(function(){var e=document.createElement("script");e.type="text/javascript";e.async=true;e.src="https://www.acint.net/aci.js";var t=document.getElementsByTagName("script")[0];t.parentNode.insertBefore(e,t)})() //--> </script><br> <br> <script>document.write("<img style='display:none;' src='//counter.yadro.ru/hit;artfast_after?t44.1;r"+ escape(document.referrer)+((typeof(screen)=="undefined")?"": ";s"+screen.width+"*"+screen.height+"*"+(screen.colorDepth? screen.colorDepth:screen.pixelDepth))+";u"+escape(document.URL)+";h"+escape(document.title.substring(0,150))+ ";"+Math.random()+ "border='0' width='1' height='1' loading=lazy loading=lazy>");</script> </div> </div> </article> <div id="post-ratings-1455-loading" class="post-ratings-loading"> <img src="https://realbazar.ru/wp-content/plugins/wp-postratings/images/loading.gif" width="16" height="16" class="post-ratings-image" / loading=lazy loading=lazy>Loading...</div> </main> </section> <div id="right-sidebar" itemtype="http://schema.org/WPSideBar" itemscope="itemscope" role="complementary" class="widget-area grid-25 tablet-grid-25 grid-parent sidebar"> <div class="inside-right-sidebar"> <aside id="wpp-3" class="widget inner-padding popular-posts"> <h4 class="widget-title">Popular</h4> <ul class="wpp-list wpp-list-with-thumbnails"> <li> <a href="https://realbazar.ru/en/news/iz-kakih-otelei-v-gorise-otkryvayutsya-krasivye-vidy-chudesa-armyanskoi-prirody/" title="Wonders of Armenian nature: stone “forest” and caves of Goris Goris – Armenian Cappadocia" target="_self"><img src="/uploads/b8bb4c414c356eb260ca7873493bcbdb.jpg" width="195" height="98" alt="Wonders of Armenian nature: stone “forest” and caves of Goris Goris – Armenian Cappadocia" class="wpp-thumbnail wpp_cached_thumb wpp_featured" / loading=lazy loading=lazy></a> <a href="https://realbazar.ru/en/news/iz-kakih-otelei-v-gorise-otkryvayutsya-krasivye-vidy-chudesa-armyanskoi-prirody/" title="Wonders of Armenian nature: stone “forest” and caves of Goris Goris – Armenian Cappadocia" class="wpp-post-title" target="_self">Wonders of Armenian nature: stone “forest” and caves of Goris Goris – Armenian Cappadocia</a> <span class="wpp-excerpt">To a person who has his own play...</span> <br><br> </li> <li> <a href="https://realbazar.ru/en/series-galaxy-note/smartfon-nubiya-z11-obzor-smartfona-zte-nubia-z11-mini-kitaicy-znayut-tolk-v-stile/" title="Review of the ZTE Nubia Z11 mini smartphone: the Chinese know a lot about style" target="_self"><img src="/uploads/5be5f9606ee186039271d8a07ae49122.jpg" width="195" height="98" alt="Review of the ZTE Nubia Z11 mini smartphone: the Chinese know a lot about style" class="wpp-thumbnail wpp_cached_thumb wpp_featured" / loading=lazy loading=lazy></a> <a href="https://realbazar.ru/en/series-galaxy-note/smartfon-nubiya-z11-obzor-smartfona-zte-nubia-z11-mini-kitaicy-znayut-tolk-v-stile/" title="Review of the ZTE Nubia Z11 mini smartphone: the Chinese know a lot about style" class="wpp-post-title" target="_self">Review of the ZTE Nubia Z11 mini smartphone: the Chinese know a lot about style</a> <span class="wpp-excerpt">To a person who has his own play...</span> <br><br> </li> <li> <a href="https://realbazar.ru/en/news/konvertirovat-iz-jpg-v-dwg-autocad-sohranyaem-chertezh-v-jpeg-chem-otkryt/" title="AutoCAD: Saving a drawing as JPEG" target="_self"><img src="/uploads/4424462de4c669c97b32c1cbab2add1f.jpg" width="195" height="98" alt="AutoCAD: Saving a drawing as JPEG" class="wpp-thumbnail wpp_cached_thumb wpp_featured" / loading=lazy loading=lazy></a> <a href="https://realbazar.ru/en/news/konvertirovat-iz-jpg-v-dwg-autocad-sohranyaem-chertezh-v-jpeg-chem-otkryt/" title="AutoCAD: Saving a drawing as JPEG" class="wpp-post-title" target="_self">AutoCAD: Saving a drawing as JPEG</a> <span class="wpp-excerpt">To a person who has his own play...</span> <br><br> </li> <li> <a href="https://realbazar.ru/en/series-galaxy-note/proshivka-android-s-pomoshchyu-utility-fastboot-proshivka-telefona-cherez/" title="Flashing phone firmware via computer" target="_self"><img src="/uploads/f5bc96d55da5590d388ccc7e7ea0df7f.jpg" width="195" height="98" alt="Flashing phone firmware via computer" class="wpp-thumbnail wpp_cached_thumb wpp_featured" / loading=lazy loading=lazy></a> <a href="https://realbazar.ru/en/series-galaxy-note/proshivka-android-s-pomoshchyu-utility-fastboot-proshivka-telefona-cherez/" title="Flashing phone firmware via computer" class="wpp-post-title" target="_self">Flashing phone firmware via computer</a> <span class="wpp-excerpt">To a person who has his own play...</span> <br><br> </li> <li> <a href="https://realbazar.ru/en/games-for-android/poluchenie-rut-prav-cherez-baidu-root-baidu-root-russkaya-versiya-skachat/" title="Baidu Root (Russian version) Download the program baidu root 2" target="_self"><img src="/uploads/5a849b03794509c087bd9d1ad2f7e068.jpg" width="195" height="98" alt="Baidu Root (Russian version) Download the program baidu root 2" class="wpp-thumbnail wpp_cached_thumb wpp_featured" / loading=lazy loading=lazy></a> <a href="https://realbazar.ru/en/games-for-android/poluchenie-rut-prav-cherez-baidu-root-baidu-root-russkaya-versiya-skachat/" title="Baidu Root (Russian version) Download the program baidu root 2" class="wpp-post-title" target="_self">Baidu Root (Russian version) Download the program baidu root 2</a> <span class="wpp-excerpt">To a person who has his own play...</span> <br><br> </li> </ul> </aside> <style>.rpwe-block ul{ list-style: none !important; margin-left: 0 !important; padding-left: 0 !important; } .rpwe-block li{ border-bottom: 1px solid #eee; margin-bottom: 10px; padding-bottom: 10px; list-style-type: none; } .rpwe-block a{ display: inline !important; text-decoration: none; } .rpwe-block h3{ background: none !important; clear: none; margin-bottom: 0 !important; margin-top: 0 !important; font-weight: 400; font-size: 16px !important; line-height: 1.5em; } .rpwe-thumb{ border: 2px solid #eee !important; box-shadow: none !important; margin: 2px 10px 2px 0; padding: 3px !important; } .rpwe-summary{ font-size: 14px; } .rpwe-time{ color: #bbb; font-size: 11px; } .rpwe-comment{ color: #bbb; font-size: 11px; padding-left: 5px; } .rpwe-alignleft{ display: inline; float: left; } .rpwe-alignright{ display: inline; float: right; } .rpwe-aligncenter{ display: block; margin-left: auto; margin-right: auto; } .rpwe-clearfix:before, .rpwe-clearfix:after{ content: ""; display: table !important; } .rpwe-clearfix:after{ clear: both; } .rpwe-clearfix{ zoom: 1; } </style><aside id="rpwe_widget-2" class="widget inner-padding rpwe_widget recent-posts-extended"><h4 class="widget-title">Recent Entries</h4><div class="rpwe-block "><ul class="rpwe-ul"> <li> <a href="https://realbazar.ru/en/games-for-android/kak-uznat-skrytyi-nomer-telefona-kak-zablokirovat-zvonki/" title="How to block calls from unknown numbers Instead of the outgoing number it says unknown" target="_self"><img src="/uploads/59160f3def83e46a4d2d4f3430165e3f.jpg" width="195" height="98" alt="How to block calls from unknown numbers Instead of the outgoing number it says unknown" class="wpp-thumbnail wpp_cached_thumb wpp_featured" / loading=lazy loading=lazy></a> <a href="https://realbazar.ru/en/games-for-android/kak-uznat-skrytyi-nomer-telefona-kak-zablokirovat-zvonki/" title="How to block calls from unknown numbers Instead of the outgoing number it says unknown" class="wpp-post-title" target="_self">How to block calls from unknown numbers Instead of the outgoing number it says unknown</a> <span class="wpp-excerpt">To a person who has his own play...</span> <br><br> </li> <li> <a href="https://realbazar.ru/en/the-galaxy-s-series/mobilnyi-internet-v-gonkonge-sim-karty-v-gonkonge-gonkong-eto/" title="Mobile Internet in Hong Kong" target="_self"><img src="/uploads/48856af8cf810a890c32a1c54a2a01ad.jpg" width="195" height="98" alt="Mobile Internet in Hong Kong" class="wpp-thumbnail wpp_cached_thumb wpp_featured" / loading=lazy loading=lazy></a> <a href="https://realbazar.ru/en/the-galaxy-s-series/mobilnyi-internet-v-gonkonge-sim-karty-v-gonkonge-gonkong-eto/" title="Mobile Internet in Hong Kong" class="wpp-post-title" target="_self">Mobile Internet in Hong Kong</a> <span class="wpp-excerpt">To a person who has his own play...</span> <br><br> </li> <li> <a href="https://realbazar.ru/en/samsung-galaxy-s6-edge/razdaem-vai-fai-noutbuka-windows-8-kak-organizovat-razdachu-wifi-na-noutbuke-v/" title="How to organize WiFi distribution on a laptop on the command line: Video" target="_self"><img src="/uploads/12090b4dbf4170763daa4d6389fb87cf.jpg" width="195" height="98" alt="How to organize WiFi distribution on a laptop on the command line: Video" class="wpp-thumbnail wpp_cached_thumb wpp_featured" / loading=lazy loading=lazy></a> <a href="https://realbazar.ru/en/samsung-galaxy-s6-edge/razdaem-vai-fai-noutbuka-windows-8-kak-organizovat-razdachu-wifi-na-noutbuke-v/" title="How to organize WiFi distribution on a laptop on the command line: Video" class="wpp-post-title" target="_self">How to organize WiFi distribution on a laptop on the command line: Video</a> <span class="wpp-excerpt">To a person who has his own play...</span> <br><br> </li> <li> <a href="https://realbazar.ru/en/the-galaxy-s-series/kak-podklyuchit-audio-k-materinskoi-plate-podklyuchaem-elementy-sistemy-k/" title="Connecting system elements to the motherboard" target="_self"><img src="/uploads/da586bda1357936037152fd2d029a7cb.jpg" width="195" height="98" alt="Connecting system elements to the motherboard" class="wpp-thumbnail wpp_cached_thumb wpp_featured" / loading=lazy loading=lazy></a> <a href="https://realbazar.ru/en/the-galaxy-s-series/kak-podklyuchit-audio-k-materinskoi-plate-podklyuchaem-elementy-sistemy-k/" title="Connecting system elements to the motherboard" class="wpp-post-title" target="_self">Connecting system elements to the motherboard</a> <span class="wpp-excerpt">To a person who has his own play...</span> <br><br> </li> <li> <a href="https://realbazar.ru/en/comparison/chto-delat-esli-ne-vklyuchaetsya-telefon-kak-ozhivit-smartfon/" title="How to revive a smartphone that does not respond to touches The smartphone does not respond well to touches, what to do" target="_self"><img src="/uploads/98fd5b9f2fb718df02d2e0d88956eca7.jpg" width="195" height="98" alt="How to revive a smartphone that does not respond to touches The smartphone does not respond well to touches, what to do" class="wpp-thumbnail wpp_cached_thumb wpp_featured" / loading=lazy loading=lazy></a> <a href="https://realbazar.ru/en/comparison/chto-delat-esli-ne-vklyuchaetsya-telefon-kak-ozhivit-smartfon/" title="How to revive a smartphone that does not respond to touches The smartphone does not respond well to touches, what to do" class="wpp-post-title" target="_self">How to revive a smartphone that does not respond to touches The smartphone does not respond well to touches, what to do</a> <span class="wpp-excerpt">To a person who has his own play...</span> <br><br> </li> </ul></div></aside><aside id="custom_html-2" class="widget_text widget inner-padding widget_custom_html"> <div class="textwidget custom-html-widget"> </div> </aside> </div> </div> </div> </div> <div class="site-footer grid-container grid-parent "> <div id="footer-widgets" class="site footer-widgets"> <div class="footer-widgets-container grid-container grid-parent"> <div class="inside-footer-widgets"> <div class="footer-widget-1 grid-parent grid-33 tablet-grid-50 mobile-grid-100"> <aside id="categories-3" class="widget inner-padding widget_categories"> <h4 class="widget-title">Categories</h4> <ul> <li class="cat-item cat-item-99"><a href="https://realbazar.ru/en/category/samsung-galaxy-s3/" title="Samsung Galaxy S3">Samsung Galaxy S3</a> </li> <li class="cat-item cat-item-99"><a href="https://realbazar.ru/en/category/samsung-galaxy-s5/" title="Samsung Galaxy S5">Samsung Galaxy S5</a> </li> <li class="cat-item cat-item-99"><a href="https://realbazar.ru/en/category/games-for-android/" title="Android Games">Android Games</a> </li> <li class="cat-item cat-item-99"><a href="https://realbazar.ru/en/category/news/" title="News">News</a> </li> <li class="cat-item cat-item-99"><a href="https://realbazar.ru/en/category/an-overview-of-the-devices/" title="Device overview">Device overview</a> </li> <li class="cat-item cat-item-99"><a href="https://realbazar.ru/en/category/different/" title="Different">Different</a> </li> </ul> </aside> </div> <div class="footer-widget-2 grid-parent grid-33 tablet-grid-50 mobile-grid-100"> <aside id="text-9" class="widget inner-padding widget_text"> </aside> </div> <div class="footer-widget-3 grid-parent grid-33 tablet-grid-50 mobile-grid-100"> <aside id="pages-2" class="widget inner-padding widget_pages"> <h4 class="widget-title">Pages</h4> <ul> <li class="page_item page-item-422"><a href="https://realbazar.ru/en/sitemap.xml">Site Map</a></li> <li class="page_item page-item-917"><a href="https://realbazar.ru/en/feedback/">Feedback</a></li> </ul> </aside> <aside id="text-11" class="widget inner-padding widget_text"> <h4 class="widget-title">© 2024 realbazar.ru</h4> </aside> </div> </div> </div> </div> <footer class="site-info" itemtype="http://schema.org/WPFooter" itemscope="itemscope"> <div class="inside-site-info grid-container grid-parent"> <div class="copyright-bar"> <span class="copyright">2024</span> • </div> </div> </footer> </div> <a id="scroll-to-top" href="#" title="Scroll to Top">Top</a> <script type='text/javascript' src='https://realbazar.ru/wp-content/plugins/jquery-smooth-scroll/js/jss-script.min.js?ver=4.8.6'></script> <script type='text/javascript'> /* <![CDATA[ */ var tocplus = { "smooth_scroll": "1" }; /* ]]> */ </script> <script type='text/javascript' src='https://realbazar.ru/wp-content/plugins/table-of-contents-plus/front.min.js?ver=1509'></script> <script type='text/javascript' src='https://realbazar.ru/wp-content/plugins/wp-postratings/js/postratings-js.js?ver=1.84'></script> <script type='text/javascript' src='https://realbazar.ru/wp-content/themes/generatepress/js/navigation.min.js?ver=1.4'></script> <script type='text/javascript' src='https://realbazar.ru/wp-content/themes/generatepress/js/dropdown.min.js?ver=1.4'></script> <script type='text/javascript' src='https://realbazar.ru/wp-content/themes/generatepress/js/navigation-search.min.js?ver=1.4'></script> <!--[if lt IE 9]> <script type='text/javascript' src='https://realbazar.ru/wp-content/themes/generatepress/js/html5shiv.min.js?ver=1.4'></script> <![endif]--> <script type='text/javascript'> var q2w3_sidebar_options = new Array(); q2w3_sidebar_options[0] = { "sidebar": "sidebar-1", "margin_top": 10, "margin_bottom": 0, "stop_id": "footer-widgets", "screen_max_width": 0, "screen_max_height": 0, "width_inherit": false, "refresh_interval": 1500, "window_load_hook": false, "disable_mo_api": false, "widgets": ['custom_html-2'] }; </script> <script type='text/javascript' src='https://realbazar.ru/wp-content/plugins/q2w3-fixed-widget/js/q2w3-fixed-widget.min.js?ver=5.0.4'></script> <script type='text/javascript' src='/wp-includes/js/wp-embed.min.js?ver=4.8.6'></script> <script type="text/javascript"> <!-- var _acic={dataProvider:10};(function(){var e=document.createElement("script");e.type="text/javascript";e.async=true;e.src="https://www.acint.net/aci.js";var t=document.getElementsByTagName("script")[0];t.parentNode.insertBefore(e,t)})() //--> </script><br> <br> </body> </html>