
Google Search Dork: "di passwd/rootpasswordcrypted password" ext:cfg
# Google Dork: "d-i passwd/root-password-crypted password" ext:cfg "d-i passwd/user-password-crypted" ext:cfg intext:"d-i network-console/password" # By using this dork, usernames and passwords in configuration files can be found. # Date: 23/03/2020 # Exploit Author: Alexandros Pappas
"di passwd/rootpasswordcrypted password" ext:cfg Google Dork Source : "di passwd/rootpasswordcrypted password" ext:cfg