Google can be used to find some shells and password to bypass the security and do anything being an admin of that website etc.
So here are the steps and Dorks are listed below too

Go to Google.com and type these Dorks, and you will got a Lot of uploaded shells in Google serach results !!


Dorks for finding shells:



inurl:.php “cURL: ON MySQL: ON MSSQL: OFF”



“Shell” filetypehp intext:”uname -a:” “EDT 2010″



intitle:”intitle:r57shell” [ phpinfo ] [ php.ini ] [ cpu ] [ mem ] [ users ] [ tmp ] [ delete ]



inurl:”c99.php” & intext:Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout



inurl:”c100.php” & intext:Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout



intitle:”Shell” inurl:”.php” & intext:Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update




Dorks for finding Passwords:



filetype:htpasswd htpasswd

intitle:”index of” “.htpasswd” -intitle:”dist” -apache -htpasswd.c

index.of.private (algo privado)

intitle:index.of master.passwd

inurlasslist.txt (para encontrar listas de passwords)

intitle:”index of..etc” passwd

intitle:admin intitle:login

“incorrect syntax near” (sql script error)

intitle:”the page cannot be found” inetmgr (debilidad en iis4)

intitle:index.of ws_ftp.ini

“supplied arguments is not a valid postgresql result” (possible debilidad sql)

_vti_pvt password intitle:index.of (frontpage)

inurl:backup intitle:index.of inurl:admin

“index of /backup”

index.of.password

index.of.winnt



inurl:”auth_user_file.txt”

“index of /admin”

“index of /password”

“index of /mail”

“index of /” +passwd

index of /” +.htaccess

index of ftp +.mdb allinurl:/cgi-bin/ +mailto

allintitle: “index of/admin”

allintitle: “index of/root”

allintitle: sensitive filetype:doc

allintitle: restricted filetype :mail

allintitle: restricted filetype:doc site:gov

administrator.pwd.index

authors.pwd.index

service.pwd.index

filetype:config web

gobal.asax index

inurlasswd filetype:txt

inurl:admin filetypeBig Grinb

inurl:iisadmin

inurl:”auth_user_file.txt”

inurl:”wwwroot/*.”

allinurl: winnt/system32/ (get cmd.exe)

allinurl:/bash_history

intitle:”index of” .sh_history

intitle:”index of” .bash_history

intitle:”index of” passwd

intitle:”index of” people.1st

intitle:”index of” pwd.db

intitle:”index of” etc/shadow

intitle:”index of” spwd

intitle:”index of” master.passwd

intitle:”index of” htpasswd

intitle:”index of” members or accounts

intitle:”index of” user_carts or user _cart