
Google Search Dork: inurl:elmah.axd intext:"Powered by ELMAH" inurl:detail
# Google Dork: inurl:elmah.axd intext:"Powered by ELMAH" -inurl:detail # Date: 13.08.2018 # Exploit Author: NSIDE Attack Logic GmbH # Vendor Homepage: https://elmah.github.io/ #Description: This dorks can be used to identify public ELMAH (Error Logging Modules and Handlers) instances that provide sensitive Information, from the application path to the session token of an authenticated user.
inurl:elmah.axd intext:"Powered by ELMAH" inurl:detail Google Dork Source : inurl:elmah.axd intext:"Powered by ELMAH" inurl:detail