inurl:elmah.axd intext:"Powered by ELMAH" -inurl:detail
# Google Dork:
inurl:elmah.axd intext:"Powered by ELMAH" -inurl:detail
# Date:
13.08.2018
# Exploit Author:
NSIDE Attack Logic GmbH
# Vendor Homepage:
https://elmah.github.io/
#Description:
This dorks can be used to identify public ELMAH (Error Logging Modules and Handlers) instances that provide sensitive Information, from the application pathto the session token of an authenticated user.