
Google Search Dork: site:*.example.com inurl:(elmah.axd | errorlog.axd) ext:axd
# Google Dork: *site: .example.com inurl:(elmah.axd | errorlog.axd) ext:axd # Category: Files Containing Juicy Info # Date: 03-11-2021 # Description: This dork can be used to identify public elmah instances which provides access to information about requests and responses, Session cookies, Session state, Query string and post variables, Physical path of the requested file of the application. # Author: Girish
site:*.example.com inurl:(elmah.axd | errorlog.axd) ext:axd Google Dork Source : site:*.example.com inurl:(elmah.axd | errorlog.axd) ext:axd