SlideShare ist ein Scribd-Unternehmen logo
1 von 32
Downloaden Sie, um offline zu lesen
Google Hacking - The Basics

Maniac
Hacking - The Basics

• What exactly is Google Hacking?


  • Google Hacking involves using the Google search engine to identify
    vulnerabilities in websites.
Hacking - The Basics

• Ok, so you use Google to find all of this stuff, but how do you?


   • Google supports a multitude of operators and modifiers that add a ton of
     power to google searching.
Hacking - The Basics

• Mmmmmm....operators and modifiers! I want them!
Hacking - The Basics

• cache:


  • Syntax: cache:URL [highlight]


  • The cache operator will search through google’s cache and return the
    results based on those documents. You can alternatively tell cache to
    highlight a word or phrase by adding it after the operator and URL.
Hacking - The Basics

• link:


   • Syntax: link:URL


   • Sites that have a hyperlink to the URL specified will be returned in the
     search results.
Hacking - The Basics

• related:


   • Syntax: related:URL


   • The related operator will return results that are “similar” to the page that was
     specified.
Hacking - The Basics

• info:


   • Syntax: info:URL


   • This tag will give you the information that Google has on the given URL.
Hacking - The Basics

• site:


   • Syntax: site:Domain


   • This modifier will restrict results to those sites within the domain given.
Hacking - The Basics

• allintitle:


   • Syntax: allintitle: oper1 [oper2] [oper3] [etc..]


   • Google will restrict the results to those that have all of the words entered
     after the modifier within the title. NOTE: This modifier does not play well
     with others.
Hacking - The Basics

• intitle:


   • Syntax: intitle:operator


   • Google will return only results that match the word or phrase entered after
     the modifier within the title of the page.
Hacking - The Basics

• allinurl:


   • Syntax: allinurl: oper1 [oper2] [oper3] [etc...]


   • This modifier is similar to allintitle: in that it will use the rest of the query and
     look for all the words or phrases in the URL that was specified. NOTE: Also
     like allintitle:, this modifier doesn’t play well with others.
Hacking - The Basics

• inurl:


   • Syntax: inurl:operator


   • Here is the single operator version of allinurl:. Will return anything that has
     the operator in the URL.
Hacking - The Basics

• allintext:


   • Syntax: allintext: oper1 [oper2] [oper3] [etc...]


   • Just like not using any operators....
Hacking - The Basics

• intext:


   • Syntax: intext:operator


   • Ok, ok, I’ll let you guess on this one.
Hacking - The Basics

• Are you done yet? That seemed like a lot, and what the hell was with all the
  apple stuff?


   • Almost there. Now its time to start mixing and matching these modifiers
     and operators.


      • The four most commonly used will be intitle:, intext:, inurl:, and filetype:


      • Also note, you can use OR and + and - signs.
Hacking - The Basics

• mixing in intext:, inurl:, and intitle: and looking for default drupal sites that
  haven’t been configured yet.


• -inurl:drupal.org intext:"Welcome to your new Drupal-powered website."
  intitle:drupal
Hacking - The Basics

• "display printer status" intitle:"Home"
Hacking - The Basics

• Whoa! a Xerox printer!
Hacking - The Basics

 • "#mysql dump" filetype:sql 21232f297a57a5a743894a0e4a801fc3




21232f297a57a5a743894a0e4a801fc3 is the MD5sum for
admin
Hacking - The Basics

   • "Certificate Practice Statement" inurl:(PDF | DOC)




CAs are the formal requests that are made to get a Digital Certificate.
Hacking - The Basics

• "Network Vulnerability Assessment Report"
Hacking - The Basics

• "Thank you for your order" +receipt filetype:pdf
Hacking - The Basics

• "robots.txt" + "Disallow:" filetype:txt
Hacking - The Basics

• "phpMyAdmin" "running on" inurl:"main.php"
Hacking - The Basics

• "phone * * *" "address *" "e-mail" intitle:"curriculum vitae"
Hacking - The Basics

• "social security number" "phone * * *“ "address *" "e-mail *" intitle:"curriculum
  vitae" filetype:pdf site:.edu
Hacking - The Basics

• ext:vmx vmx
Hacking - The Basics

• filetype:QBW qbw
Hacking - The Basics

• filetype:xls inurl:"email.xls"
Hacking - The Basics

• intitle:"Index of" finances.xls
Hacking - The Basics

• WOW! That was a lot of good finds! Where can I find more info on
  googlehacking?


• http://johnny.ihackstuff.com

Weitere ähnliche Inhalte

Was ist angesagt?

WordPress Security - WordCamp NYC 2009
WordPress Security - WordCamp NYC 2009WordPress Security - WordCamp NYC 2009
WordPress Security - WordCamp NYC 2009Brad Williams
 
Lockdown WordPress
Lockdown WordPressLockdown WordPress
Lockdown WordPressDre Armeda
 
Introduction to WordPress Security
Introduction to WordPress SecurityIntroduction to WordPress Security
Introduction to WordPress SecurityShawn Hooper
 
WordCamp Mid-Atlantic WordPress Security
WordCamp Mid-Atlantic WordPress SecurityWordCamp Mid-Atlantic WordPress Security
WordCamp Mid-Atlantic WordPress SecurityBrad Williams
 
WordPress Security Presentation
WordPress Security PresentationWordPress Security Presentation
WordPress Security PresentationAndrew Paton
 
Advanced Thesis Techniques and Tricks
Advanced Thesis Techniques and TricksAdvanced Thesis Techniques and Tricks
Advanced Thesis Techniques and TricksBrad Williams
 
Now That's What I Call WordPress Security 2010
Now That's What I Call WordPress Security 2010Now That's What I Call WordPress Security 2010
Now That's What I Call WordPress Security 2010Brad Williams
 
WordPress Security WordCamp OC 2013
WordPress Security WordCamp OC 2013WordPress Security WordCamp OC 2013
WordPress Security WordCamp OC 2013Brad Williams
 
Higher Order WordPress Security
Higher Order WordPress SecurityHigher Order WordPress Security
Higher Order WordPress SecurityDougal Campbell
 
WordPress Security Best Practices 2019 Update
WordPress Security Best Practices 2019 UpdateWordPress Security Best Practices 2019 Update
WordPress Security Best Practices 2019 UpdateZero Point Development
 
Top Ten WordPress Security Tips for 2012
Top Ten WordPress Security Tips for 2012Top Ten WordPress Security Tips for 2012
Top Ten WordPress Security Tips for 2012Brad Williams
 
AmazonS3 & Rails
AmazonS3 & RailsAmazonS3 & Rails
AmazonS3 & Rails_martinS_
 
Word camp pune 2013 security
Word camp pune 2013   securityWord camp pune 2013   security
Word camp pune 2013 securityGaurav Singh
 
Building Secure WordPress Sites
Building Secure WordPress Sites Building Secure WordPress Sites
Building Secure WordPress Sites Catch Themes
 
Simple Tips to Secure your WordPress
Simple Tips to Secure your WordPressSimple Tips to Secure your WordPress
Simple Tips to Secure your WordPressFiroz Sabaliya
 
Securing Your WordPress Website - WordCamp GC 2011
Securing Your WordPress Website - WordCamp GC 2011Securing Your WordPress Website - WordCamp GC 2011
Securing Your WordPress Website - WordCamp GC 2011Vlad Lasky
 
WordPress Security - WordCamp Boston 2010
WordPress Security - WordCamp Boston 2010WordPress Security - WordCamp Boston 2010
WordPress Security - WordCamp Boston 2010Brad Williams
 
Wordpress Security Tips
Wordpress Security TipsWordpress Security Tips
Wordpress Security TipsLalit Nama
 

Was ist angesagt? (20)

WordPress Security - WordCamp NYC 2009
WordPress Security - WordCamp NYC 2009WordPress Security - WordCamp NYC 2009
WordPress Security - WordCamp NYC 2009
 
Lockdown WordPress
Lockdown WordPressLockdown WordPress
Lockdown WordPress
 
Introduction to WordPress Security
Introduction to WordPress SecurityIntroduction to WordPress Security
Introduction to WordPress Security
 
WordCamp Mid-Atlantic WordPress Security
WordCamp Mid-Atlantic WordPress SecurityWordCamp Mid-Atlantic WordPress Security
WordCamp Mid-Atlantic WordPress Security
 
WordPress Security Presentation
WordPress Security PresentationWordPress Security Presentation
WordPress Security Presentation
 
Advanced Thesis Techniques and Tricks
Advanced Thesis Techniques and TricksAdvanced Thesis Techniques and Tricks
Advanced Thesis Techniques and Tricks
 
Now That's What I Call WordPress Security 2010
Now That's What I Call WordPress Security 2010Now That's What I Call WordPress Security 2010
Now That's What I Call WordPress Security 2010
 
WordPress Security WordCamp OC 2013
WordPress Security WordCamp OC 2013WordPress Security WordCamp OC 2013
WordPress Security WordCamp OC 2013
 
Secure All The Things!
Secure All The Things!Secure All The Things!
Secure All The Things!
 
Higher Order WordPress Security
Higher Order WordPress SecurityHigher Order WordPress Security
Higher Order WordPress Security
 
WordPress Security Best Practices 2019 Update
WordPress Security Best Practices 2019 UpdateWordPress Security Best Practices 2019 Update
WordPress Security Best Practices 2019 Update
 
Website security
Website securityWebsite security
Website security
 
Top Ten WordPress Security Tips for 2012
Top Ten WordPress Security Tips for 2012Top Ten WordPress Security Tips for 2012
Top Ten WordPress Security Tips for 2012
 
AmazonS3 & Rails
AmazonS3 & RailsAmazonS3 & Rails
AmazonS3 & Rails
 
Word camp pune 2013 security
Word camp pune 2013   securityWord camp pune 2013   security
Word camp pune 2013 security
 
Building Secure WordPress Sites
Building Secure WordPress Sites Building Secure WordPress Sites
Building Secure WordPress Sites
 
Simple Tips to Secure your WordPress
Simple Tips to Secure your WordPressSimple Tips to Secure your WordPress
Simple Tips to Secure your WordPress
 
Securing Your WordPress Website - WordCamp GC 2011
Securing Your WordPress Website - WordCamp GC 2011Securing Your WordPress Website - WordCamp GC 2011
Securing Your WordPress Website - WordCamp GC 2011
 
WordPress Security - WordCamp Boston 2010
WordPress Security - WordCamp Boston 2010WordPress Security - WordCamp Boston 2010
WordPress Security - WordCamp Boston 2010
 
Wordpress Security Tips
Wordpress Security TipsWordpress Security Tips
Wordpress Security Tips
 

Ähnlich wie Google Hacking Basic

Kiran karnad rtc2014 ghdb-final
Kiran karnad rtc2014 ghdb-finalKiran karnad rtc2014 ghdb-final
Kiran karnad rtc2014 ghdb-finalRomania Testing
 
Google and Beyond: Advanced Search Engine Hacking
Google and Beyond: Advanced Search Engine HackingGoogle and Beyond: Advanced Search Engine Hacking
Google and Beyond: Advanced Search Engine Hackingamirrullohacmad
 
HTML5 History & Features
HTML5 History & FeaturesHTML5 History & Features
HTML5 History & FeaturesDave Ross
 
Introduction to html 5
Introduction to html 5Introduction to html 5
Introduction to html 5Nir Elbaz
 
Lessons learned while building Omroep.nl
Lessons learned while building Omroep.nlLessons learned while building Omroep.nl
Lessons learned while building Omroep.nlbartzon
 
Lessons learned while building Omroep.nl
Lessons learned while building Omroep.nlLessons learned while building Omroep.nl
Lessons learned while building Omroep.nltieleman
 
Scraping Scripting Hacking
Scraping Scripting HackingScraping Scripting Hacking
Scraping Scripting HackingMike Ellis
 
FarisAloulSlides.ppt
FarisAloulSlides.pptFarisAloulSlides.ppt
FarisAloulSlides.pptaashnareddy1
 
Silicon Valley Code Camp 2016 - MongoDB in production
Silicon Valley Code Camp 2016 - MongoDB in productionSilicon Valley Code Camp 2016 - MongoDB in production
Silicon Valley Code Camp 2016 - MongoDB in productionDaniel Coupal
 
Introduction to cypress in Angular (Chinese)
Introduction to cypress in Angular (Chinese)Introduction to cypress in Angular (Chinese)
Introduction to cypress in Angular (Chinese)Hong Tat Yew
 
Webapp security testing
Webapp security testingWebapp security testing
Webapp security testingTomas Doran
 
Webapp security testing
Webapp security testingWebapp security testing
Webapp security testingTomas Doran
 

Ähnlich wie Google Hacking Basic (20)

Google Hacking Basics
Google Hacking BasicsGoogle Hacking Basics
Google Hacking Basics
 
Kiran karnad rtc2014 ghdb-final
Kiran karnad rtc2014 ghdb-finalKiran karnad rtc2014 ghdb-final
Kiran karnad rtc2014 ghdb-final
 
Google Dorks
Google DorksGoogle Dorks
Google Dorks
 
Google and Beyond: Advanced Search Engine Hacking
Google and Beyond: Advanced Search Engine HackingGoogle and Beyond: Advanced Search Engine Hacking
Google and Beyond: Advanced Search Engine Hacking
 
Google Hacking 101
Google Hacking 101Google Hacking 101
Google Hacking 101
 
google dork.pdf
google dork.pdfgoogle dork.pdf
google dork.pdf
 
HTML5 History & Features
HTML5 History & FeaturesHTML5 History & Features
HTML5 History & Features
 
Splunk bsides
Splunk bsidesSplunk bsides
Splunk bsides
 
Introduction to html 5
Introduction to html 5Introduction to html 5
Introduction to html 5
 
Lessons learned while building Omroep.nl
Lessons learned while building Omroep.nlLessons learned while building Omroep.nl
Lessons learned while building Omroep.nl
 
Lessons learned while building Omroep.nl
Lessons learned while building Omroep.nlLessons learned while building Omroep.nl
Lessons learned while building Omroep.nl
 
3 google hacking
3 google hacking3 google hacking
3 google hacking
 
Scraping Scripting Hacking
Scraping Scripting HackingScraping Scripting Hacking
Scraping Scripting Hacking
 
FarisAloulSlides.ppt
FarisAloulSlides.pptFarisAloulSlides.ppt
FarisAloulSlides.ppt
 
SearchLab
SearchLabSearchLab
SearchLab
 
Google power search
Google power searchGoogle power search
Google power search
 
Silicon Valley Code Camp 2016 - MongoDB in production
Silicon Valley Code Camp 2016 - MongoDB in productionSilicon Valley Code Camp 2016 - MongoDB in production
Silicon Valley Code Camp 2016 - MongoDB in production
 
Introduction to cypress in Angular (Chinese)
Introduction to cypress in Angular (Chinese)Introduction to cypress in Angular (Chinese)
Introduction to cypress in Angular (Chinese)
 
Webapp security testing
Webapp security testingWebapp security testing
Webapp security testing
 
Webapp security testing
Webapp security testingWebapp security testing
Webapp security testing
 

Mehr von Ocim Nationalism

Presentation Kecakapan Antar Personal
Presentation Kecakapan Antar PersonalPresentation Kecakapan Antar Personal
Presentation Kecakapan Antar PersonalOcim Nationalism
 
Contoh Daftar Riwayat Hidup
Contoh Daftar Riwayat HidupContoh Daftar Riwayat Hidup
Contoh Daftar Riwayat HidupOcim Nationalism
 
Tutorial belajar autocad 2 dimensi dan 3 dimensi
Tutorial belajar autocad 2 dimensi dan 3 dimensiTutorial belajar autocad 2 dimensi dan 3 dimensi
Tutorial belajar autocad 2 dimensi dan 3 dimensiOcim Nationalism
 
Dasar Pemrograman PHP dan MySQL
Dasar Pemrograman PHP dan MySQLDasar Pemrograman PHP dan MySQL
Dasar Pemrograman PHP dan MySQLOcim Nationalism
 
Membangun Aplikasi Database Oracle Menggunakan Visual Basic
Membangun Aplikasi Database Oracle Menggunakan Visual BasicMembangun Aplikasi Database Oracle Menggunakan Visual Basic
Membangun Aplikasi Database Oracle Menggunakan Visual BasicOcim Nationalism
 
Tutorial mikrotik-step-by-step
Tutorial mikrotik-step-by-stepTutorial mikrotik-step-by-step
Tutorial mikrotik-step-by-stepOcim Nationalism
 
BELAJAR MEMBUAT DATABASE MICROSOFT VISUAL BASIC 6.0
BELAJAR MEMBUAT DATABASE MICROSOFT VISUAL BASIC 6.0BELAJAR MEMBUAT DATABASE MICROSOFT VISUAL BASIC 6.0
BELAJAR MEMBUAT DATABASE MICROSOFT VISUAL BASIC 6.0Ocim Nationalism
 
Dasar pemrograman visual basic
Dasar pemrograman visual basicDasar pemrograman visual basic
Dasar pemrograman visual basicOcim Nationalism
 
Tips dan trik service printer
Tips dan trik service printerTips dan trik service printer
Tips dan trik service printerOcim Nationalism
 
Perawatan Personal Computer ( PC )
Perawatan Personal Computer ( PC )Perawatan Personal Computer ( PC )
Perawatan Personal Computer ( PC )Ocim Nationalism
 
Tutorial Microsoft Excel 2007
Tutorial Microsoft Excel 2007Tutorial Microsoft Excel 2007
Tutorial Microsoft Excel 2007Ocim Nationalism
 
Tutorial joomla versi 1.5.3
Tutorial joomla versi 1.5.3Tutorial joomla versi 1.5.3
Tutorial joomla versi 1.5.3Ocim Nationalism
 

Mehr von Ocim Nationalism (20)

Crack Xp jadi Original
Crack Xp jadi OriginalCrack Xp jadi Original
Crack Xp jadi Original
 
Presentation Kecakapan Antar Personal
Presentation Kecakapan Antar PersonalPresentation Kecakapan Antar Personal
Presentation Kecakapan Antar Personal
 
Mobile technology
Mobile technologyMobile technology
Mobile technology
 
Contoh Daftar Riwayat Hidup
Contoh Daftar Riwayat HidupContoh Daftar Riwayat Hidup
Contoh Daftar Riwayat Hidup
 
Tutorial belajar autocad 2 dimensi dan 3 dimensi
Tutorial belajar autocad 2 dimensi dan 3 dimensiTutorial belajar autocad 2 dimensi dan 3 dimensi
Tutorial belajar autocad 2 dimensi dan 3 dimensi
 
Tutorial Autocad 2006 2D
Tutorial Autocad 2006 2DTutorial Autocad 2006 2D
Tutorial Autocad 2006 2D
 
Dasar Pemrograman PHP dan MySQL
Dasar Pemrograman PHP dan MySQLDasar Pemrograman PHP dan MySQL
Dasar Pemrograman PHP dan MySQL
 
Membangun Aplikasi Database Oracle Menggunakan Visual Basic
Membangun Aplikasi Database Oracle Menggunakan Visual BasicMembangun Aplikasi Database Oracle Menggunakan Visual Basic
Membangun Aplikasi Database Oracle Menggunakan Visual Basic
 
Tutorial mikrotik-step-by-step
Tutorial mikrotik-step-by-stepTutorial mikrotik-step-by-step
Tutorial mikrotik-step-by-step
 
Tutorial coreldraw
Tutorial coreldrawTutorial coreldraw
Tutorial coreldraw
 
BELAJAR MEMBUAT DATABASE MICROSOFT VISUAL BASIC 6.0
BELAJAR MEMBUAT DATABASE MICROSOFT VISUAL BASIC 6.0BELAJAR MEMBUAT DATABASE MICROSOFT VISUAL BASIC 6.0
BELAJAR MEMBUAT DATABASE MICROSOFT VISUAL BASIC 6.0
 
Dasar pemrograman visual basic
Dasar pemrograman visual basicDasar pemrograman visual basic
Dasar pemrograman visual basic
 
Dasar Java Mobile
Dasar Java MobileDasar Java Mobile
Dasar Java Mobile
 
Tips dan trik service printer
Tips dan trik service printerTips dan trik service printer
Tips dan trik service printer
 
Hacking Blackberry Apps
Hacking Blackberry Apps Hacking Blackberry Apps
Hacking Blackberry Apps
 
Panduan Penulisan Skirpsi
Panduan Penulisan SkirpsiPanduan Penulisan Skirpsi
Panduan Penulisan Skirpsi
 
Perawatan Personal Computer ( PC )
Perawatan Personal Computer ( PC )Perawatan Personal Computer ( PC )
Perawatan Personal Computer ( PC )
 
Tutorial Microsoft Excel 2007
Tutorial Microsoft Excel 2007Tutorial Microsoft Excel 2007
Tutorial Microsoft Excel 2007
 
Tutorial joomla versi 1.5.3
Tutorial joomla versi 1.5.3Tutorial joomla versi 1.5.3
Tutorial joomla versi 1.5.3
 
tutorial membuat website
tutorial membuat websitetutorial membuat website
tutorial membuat website
 

Kürzlich hochgeladen

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 

Kürzlich hochgeladen (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 

Google Hacking Basic

  • 1. Google Hacking - The Basics Maniac
  • 2. Hacking - The Basics • What exactly is Google Hacking? • Google Hacking involves using the Google search engine to identify vulnerabilities in websites.
  • 3. Hacking - The Basics • Ok, so you use Google to find all of this stuff, but how do you? • Google supports a multitude of operators and modifiers that add a ton of power to google searching.
  • 4. Hacking - The Basics • Mmmmmm....operators and modifiers! I want them!
  • 5. Hacking - The Basics • cache: • Syntax: cache:URL [highlight] • The cache operator will search through google’s cache and return the results based on those documents. You can alternatively tell cache to highlight a word or phrase by adding it after the operator and URL.
  • 6. Hacking - The Basics • link: • Syntax: link:URL • Sites that have a hyperlink to the URL specified will be returned in the search results.
  • 7. Hacking - The Basics • related: • Syntax: related:URL • The related operator will return results that are “similar” to the page that was specified.
  • 8. Hacking - The Basics • info: • Syntax: info:URL • This tag will give you the information that Google has on the given URL.
  • 9. Hacking - The Basics • site: • Syntax: site:Domain • This modifier will restrict results to those sites within the domain given.
  • 10. Hacking - The Basics • allintitle: • Syntax: allintitle: oper1 [oper2] [oper3] [etc..] • Google will restrict the results to those that have all of the words entered after the modifier within the title. NOTE: This modifier does not play well with others.
  • 11. Hacking - The Basics • intitle: • Syntax: intitle:operator • Google will return only results that match the word or phrase entered after the modifier within the title of the page.
  • 12. Hacking - The Basics • allinurl: • Syntax: allinurl: oper1 [oper2] [oper3] [etc...] • This modifier is similar to allintitle: in that it will use the rest of the query and look for all the words or phrases in the URL that was specified. NOTE: Also like allintitle:, this modifier doesn’t play well with others.
  • 13. Hacking - The Basics • inurl: • Syntax: inurl:operator • Here is the single operator version of allinurl:. Will return anything that has the operator in the URL.
  • 14. Hacking - The Basics • allintext: • Syntax: allintext: oper1 [oper2] [oper3] [etc...] • Just like not using any operators....
  • 15. Hacking - The Basics • intext: • Syntax: intext:operator • Ok, ok, I’ll let you guess on this one.
  • 16. Hacking - The Basics • Are you done yet? That seemed like a lot, and what the hell was with all the apple stuff? • Almost there. Now its time to start mixing and matching these modifiers and operators. • The four most commonly used will be intitle:, intext:, inurl:, and filetype: • Also note, you can use OR and + and - signs.
  • 17. Hacking - The Basics • mixing in intext:, inurl:, and intitle: and looking for default drupal sites that haven’t been configured yet. • -inurl:drupal.org intext:"Welcome to your new Drupal-powered website." intitle:drupal
  • 18. Hacking - The Basics • "display printer status" intitle:"Home"
  • 19. Hacking - The Basics • Whoa! a Xerox printer!
  • 20. Hacking - The Basics • "#mysql dump" filetype:sql 21232f297a57a5a743894a0e4a801fc3 21232f297a57a5a743894a0e4a801fc3 is the MD5sum for admin
  • 21. Hacking - The Basics • "Certificate Practice Statement" inurl:(PDF | DOC) CAs are the formal requests that are made to get a Digital Certificate.
  • 22. Hacking - The Basics • "Network Vulnerability Assessment Report"
  • 23. Hacking - The Basics • "Thank you for your order" +receipt filetype:pdf
  • 24. Hacking - The Basics • "robots.txt" + "Disallow:" filetype:txt
  • 25. Hacking - The Basics • "phpMyAdmin" "running on" inurl:"main.php"
  • 26. Hacking - The Basics • "phone * * *" "address *" "e-mail" intitle:"curriculum vitae"
  • 27. Hacking - The Basics • "social security number" "phone * * *“ "address *" "e-mail *" intitle:"curriculum vitae" filetype:pdf site:.edu
  • 28. Hacking - The Basics • ext:vmx vmx
  • 29. Hacking - The Basics • filetype:QBW qbw
  • 30. Hacking - The Basics • filetype:xls inurl:"email.xls"
  • 31. Hacking - The Basics • intitle:"Index of" finances.xls
  • 32. Hacking - The Basics • WOW! That was a lot of good finds! Where can I find more info on googlehacking? • http://johnny.ihackstuff.com