SlideShare une entreprise Scribd logo
1  sur  32
Télécharger pour lire hors ligne
Google Hacking - The Basics

Maniac
Hacking - The Basics

• What exactly is Google Hacking?


  • Google Hacking involves using the Google search engine to identify
    vulnerabilities in websites.
Hacking - The Basics

• Ok, so you use Google to find all of this stuff, but how do you?


   • Google supports a multitude of operators and modifiers that add a ton of
     power to google searching.
Hacking - The Basics

• Mmmmmm....operators and modifiers! I want them!
Hacking - The Basics

• cache:


  • Syntax: cache:URL [highlight]


  • The cache operator will search through google’s cache and return the
    results based on those documents. You can alternatively tell cache to
    highlight a word or phrase by adding it after the operator and URL.
Hacking - The Basics

• link:


   • Syntax: link:URL


   • Sites that have a hyperlink to the URL specified will be returned in the
     search results.
Hacking - The Basics

• related:


   • Syntax: related:URL


   • The related operator will return results that are “similar” to the page that was
     specified.
Hacking - The Basics

• info:


   • Syntax: info:URL


   • This tag will give you the information that Google has on the given URL.
Hacking - The Basics

• site:


   • Syntax: site:Domain


   • This modifier will restrict results to those sites within the domain given.
Hacking - The Basics

• allintitle:


   • Syntax: allintitle: oper1 [oper2] [oper3] [etc..]


   • Google will restrict the results to those that have all of the words entered
     after the modifier within the title. NOTE: This modifier does not play well
     with others.
Hacking - The Basics

• intitle:


   • Syntax: intitle:operator


   • Google will return only results that match the word or phrase entered after
     the modifier within the title of the page.
Hacking - The Basics

• allinurl:


   • Syntax: allinurl: oper1 [oper2] [oper3] [etc...]


   • This modifier is similar to allintitle: in that it will use the rest of the query and
     look for all the words or phrases in the URL that was specified. NOTE: Also
     like allintitle:, this modifier doesn’t play well with others.
Hacking - The Basics

• inurl:


   • Syntax: inurl:operator


   • Here is the single operator version of allinurl:. Will return anything that has
     the operator in the URL.
Hacking - The Basics

• allintext:


   • Syntax: allintext: oper1 [oper2] [oper3] [etc...]


   • Just like not using any operators....
Hacking - The Basics

• intext:


   • Syntax: intext:operator


   • Ok, ok, I’ll let you guess on this one.
Hacking - The Basics

• Are you done yet? That seemed like a lot, and what the hell was with all the
  apple stuff?


   • Almost there. Now its time to start mixing and matching these modifiers
     and operators.


      • The four most commonly used will be intitle:, intext:, inurl:, and filetype:


      • Also note, you can use OR and + and - signs.
Hacking - The Basics

• mixing in intext:, inurl:, and intitle: and looking for default drupal sites that
  haven’t been configured yet.


• -inurl:drupal.org intext:"Welcome to your new Drupal-powered website."
  intitle:drupal
Hacking - The Basics

• "display printer status" intitle:"Home"
Hacking - The Basics

• Whoa! a Xerox printer!
Hacking - The Basics

 • "#mysql dump" filetype:sql 21232f297a57a5a743894a0e4a801fc3




21232f297a57a5a743894a0e4a801fc3 is the MD5sum for
admin
Hacking - The Basics

   • "Certificate Practice Statement" inurl:(PDF | DOC)




CAs are the formal requests that are made to get a Digital Certificate.
Hacking - The Basics

• "Network Vulnerability Assessment Report"
Hacking - The Basics

• "Thank you for your order" +receipt filetype:pdf
Hacking - The Basics

• "robots.txt" + "Disallow:" filetype:txt
Hacking - The Basics

• "phpMyAdmin" "running on" inurl:"main.php"
Hacking - The Basics

• "phone * * *" "address *" "e-mail" intitle:"curriculum vitae"
Hacking - The Basics

• "social security number" "phone * * *“ "address *" "e-mail *" intitle:"curriculum
  vitae" filetype:pdf site:.edu
Hacking - The Basics

• ext:vmx vmx
Hacking - The Basics

• filetype:QBW qbw
Hacking - The Basics

• filetype:xls inurl:"email.xls"
Hacking - The Basics

• intitle:"Index of" finances.xls
Hacking - The Basics

• WOW! That was a lot of good finds! Where can I find more info on
  googlehacking?


• http://johnny.ihackstuff.com

Contenu connexe

Tendances

WordPress Security - WordCamp NYC 2009
WordPress Security - WordCamp NYC 2009WordPress Security - WordCamp NYC 2009
WordPress Security - WordCamp NYC 2009Brad Williams
 
Lockdown WordPress
Lockdown WordPressLockdown WordPress
Lockdown WordPressDre Armeda
 
Introduction to WordPress Security
Introduction to WordPress SecurityIntroduction to WordPress Security
Introduction to WordPress SecurityShawn Hooper
 
WordCamp Mid-Atlantic WordPress Security
WordCamp Mid-Atlantic WordPress SecurityWordCamp Mid-Atlantic WordPress Security
WordCamp Mid-Atlantic WordPress SecurityBrad Williams
 
WordPress Security Presentation
WordPress Security PresentationWordPress Security Presentation
WordPress Security PresentationAndrew Paton
 
Advanced Thesis Techniques and Tricks
Advanced Thesis Techniques and TricksAdvanced Thesis Techniques and Tricks
Advanced Thesis Techniques and TricksBrad Williams
 
Now That's What I Call WordPress Security 2010
Now That's What I Call WordPress Security 2010Now That's What I Call WordPress Security 2010
Now That's What I Call WordPress Security 2010Brad Williams
 
WordPress Security WordCamp OC 2013
WordPress Security WordCamp OC 2013WordPress Security WordCamp OC 2013
WordPress Security WordCamp OC 2013Brad Williams
 
Higher Order WordPress Security
Higher Order WordPress SecurityHigher Order WordPress Security
Higher Order WordPress SecurityDougal Campbell
 
WordPress Security Best Practices 2019 Update
WordPress Security Best Practices 2019 UpdateWordPress Security Best Practices 2019 Update
WordPress Security Best Practices 2019 UpdateZero Point Development
 
Top Ten WordPress Security Tips for 2012
Top Ten WordPress Security Tips for 2012Top Ten WordPress Security Tips for 2012
Top Ten WordPress Security Tips for 2012Brad Williams
 
AmazonS3 & Rails
AmazonS3 & RailsAmazonS3 & Rails
AmazonS3 & Rails_martinS_
 
Word camp pune 2013 security
Word camp pune 2013   securityWord camp pune 2013   security
Word camp pune 2013 securityGaurav Singh
 
Building Secure WordPress Sites
Building Secure WordPress Sites Building Secure WordPress Sites
Building Secure WordPress Sites Catch Themes
 
Simple Tips to Secure your WordPress
Simple Tips to Secure your WordPressSimple Tips to Secure your WordPress
Simple Tips to Secure your WordPressFiroz Sabaliya
 
Securing Your WordPress Website - WordCamp GC 2011
Securing Your WordPress Website - WordCamp GC 2011Securing Your WordPress Website - WordCamp GC 2011
Securing Your WordPress Website - WordCamp GC 2011Vlad Lasky
 
WordPress Security - WordCamp Boston 2010
WordPress Security - WordCamp Boston 2010WordPress Security - WordCamp Boston 2010
WordPress Security - WordCamp Boston 2010Brad Williams
 
Wordpress Security Tips
Wordpress Security TipsWordpress Security Tips
Wordpress Security TipsLalit Nama
 

Tendances (20)

WordPress Security - WordCamp NYC 2009
WordPress Security - WordCamp NYC 2009WordPress Security - WordCamp NYC 2009
WordPress Security - WordCamp NYC 2009
 
Lockdown WordPress
Lockdown WordPressLockdown WordPress
Lockdown WordPress
 
Introduction to WordPress Security
Introduction to WordPress SecurityIntroduction to WordPress Security
Introduction to WordPress Security
 
WordCamp Mid-Atlantic WordPress Security
WordCamp Mid-Atlantic WordPress SecurityWordCamp Mid-Atlantic WordPress Security
WordCamp Mid-Atlantic WordPress Security
 
WordPress Security Presentation
WordPress Security PresentationWordPress Security Presentation
WordPress Security Presentation
 
Advanced Thesis Techniques and Tricks
Advanced Thesis Techniques and TricksAdvanced Thesis Techniques and Tricks
Advanced Thesis Techniques and Tricks
 
Now That's What I Call WordPress Security 2010
Now That's What I Call WordPress Security 2010Now That's What I Call WordPress Security 2010
Now That's What I Call WordPress Security 2010
 
WordPress Security WordCamp OC 2013
WordPress Security WordCamp OC 2013WordPress Security WordCamp OC 2013
WordPress Security WordCamp OC 2013
 
Secure All The Things!
Secure All The Things!Secure All The Things!
Secure All The Things!
 
Higher Order WordPress Security
Higher Order WordPress SecurityHigher Order WordPress Security
Higher Order WordPress Security
 
WordPress Security Best Practices 2019 Update
WordPress Security Best Practices 2019 UpdateWordPress Security Best Practices 2019 Update
WordPress Security Best Practices 2019 Update
 
Website security
Website securityWebsite security
Website security
 
Top Ten WordPress Security Tips for 2012
Top Ten WordPress Security Tips for 2012Top Ten WordPress Security Tips for 2012
Top Ten WordPress Security Tips for 2012
 
AmazonS3 & Rails
AmazonS3 & RailsAmazonS3 & Rails
AmazonS3 & Rails
 
Word camp pune 2013 security
Word camp pune 2013   securityWord camp pune 2013   security
Word camp pune 2013 security
 
Building Secure WordPress Sites
Building Secure WordPress Sites Building Secure WordPress Sites
Building Secure WordPress Sites
 
Simple Tips to Secure your WordPress
Simple Tips to Secure your WordPressSimple Tips to Secure your WordPress
Simple Tips to Secure your WordPress
 
Securing Your WordPress Website - WordCamp GC 2011
Securing Your WordPress Website - WordCamp GC 2011Securing Your WordPress Website - WordCamp GC 2011
Securing Your WordPress Website - WordCamp GC 2011
 
WordPress Security - WordCamp Boston 2010
WordPress Security - WordCamp Boston 2010WordPress Security - WordCamp Boston 2010
WordPress Security - WordCamp Boston 2010
 
Wordpress Security Tips
Wordpress Security TipsWordpress Security Tips
Wordpress Security Tips
 

Similaire à Google Hacking Basic

Kiran karnad rtc2014 ghdb-final
Kiran karnad rtc2014 ghdb-finalKiran karnad rtc2014 ghdb-final
Kiran karnad rtc2014 ghdb-finalRomania Testing
 
HTML5 History & Features
HTML5 History & FeaturesHTML5 History & Features
HTML5 History & FeaturesDave Ross
 
Introduction to html 5
Introduction to html 5Introduction to html 5
Introduction to html 5Nir Elbaz
 
Lessons learned while building Omroep.nl
Lessons learned while building Omroep.nlLessons learned while building Omroep.nl
Lessons learned while building Omroep.nlbartzon
 
Lessons learned while building Omroep.nl
Lessons learned while building Omroep.nlLessons learned while building Omroep.nl
Lessons learned while building Omroep.nltieleman
 
Scraping Scripting Hacking
Scraping Scripting HackingScraping Scripting Hacking
Scraping Scripting HackingMike Ellis
 
FarisAloulSlides.ppt
FarisAloulSlides.pptFarisAloulSlides.ppt
FarisAloulSlides.pptaashnareddy1
 
Silicon Valley Code Camp 2016 - MongoDB in production
Silicon Valley Code Camp 2016 - MongoDB in productionSilicon Valley Code Camp 2016 - MongoDB in production
Silicon Valley Code Camp 2016 - MongoDB in productionDaniel Coupal
 
Introduction to cypress in Angular (Chinese)
Introduction to cypress in Angular (Chinese)Introduction to cypress in Angular (Chinese)
Introduction to cypress in Angular (Chinese)Hong Tat Yew
 
Webapp security testing
Webapp security testingWebapp security testing
Webapp security testingTomas Doran
 
Webapp security testing
Webapp security testingWebapp security testing
Webapp security testingTomas Doran
 

Similaire à Google Hacking Basic (20)

Google Hacking Basics
Google Hacking BasicsGoogle Hacking Basics
Google Hacking Basics
 
Kiran karnad rtc2014 ghdb-final
Kiran karnad rtc2014 ghdb-finalKiran karnad rtc2014 ghdb-final
Kiran karnad rtc2014 ghdb-final
 
Google Dorks
Google DorksGoogle Dorks
Google Dorks
 
Google Hacking 101
Google Hacking 101Google Hacking 101
Google Hacking 101
 
google dork.pdf
google dork.pdfgoogle dork.pdf
google dork.pdf
 
HTML5 History & Features
HTML5 History & FeaturesHTML5 History & Features
HTML5 History & Features
 
Splunk bsides
Splunk bsidesSplunk bsides
Splunk bsides
 
Introduction to html 5
Introduction to html 5Introduction to html 5
Introduction to html 5
 
Lessons learned while building Omroep.nl
Lessons learned while building Omroep.nlLessons learned while building Omroep.nl
Lessons learned while building Omroep.nl
 
Lessons learned while building Omroep.nl
Lessons learned while building Omroep.nlLessons learned while building Omroep.nl
Lessons learned while building Omroep.nl
 
3 google hacking
3 google hacking3 google hacking
3 google hacking
 
Scraping Scripting Hacking
Scraping Scripting HackingScraping Scripting Hacking
Scraping Scripting Hacking
 
FarisAloulSlides.ppt
FarisAloulSlides.pptFarisAloulSlides.ppt
FarisAloulSlides.ppt
 
SearchLab
SearchLabSearchLab
SearchLab
 
Google power search
Google power searchGoogle power search
Google power search
 
Silicon Valley Code Camp 2016 - MongoDB in production
Silicon Valley Code Camp 2016 - MongoDB in productionSilicon Valley Code Camp 2016 - MongoDB in production
Silicon Valley Code Camp 2016 - MongoDB in production
 
Introduction to cypress in Angular (Chinese)
Introduction to cypress in Angular (Chinese)Introduction to cypress in Angular (Chinese)
Introduction to cypress in Angular (Chinese)
 
Webapp security testing
Webapp security testingWebapp security testing
Webapp security testing
 
Webapp security testing
Webapp security testingWebapp security testing
Webapp security testing
 
Have I Been Pwned and Cloudflare
Have I Been Pwned and CloudflareHave I Been Pwned and Cloudflare
Have I Been Pwned and Cloudflare
 

Plus de Ocim Nationalism

Presentation Kecakapan Antar Personal
Presentation Kecakapan Antar PersonalPresentation Kecakapan Antar Personal
Presentation Kecakapan Antar PersonalOcim Nationalism
 
Contoh Daftar Riwayat Hidup
Contoh Daftar Riwayat HidupContoh Daftar Riwayat Hidup
Contoh Daftar Riwayat HidupOcim Nationalism
 
Tutorial belajar autocad 2 dimensi dan 3 dimensi
Tutorial belajar autocad 2 dimensi dan 3 dimensiTutorial belajar autocad 2 dimensi dan 3 dimensi
Tutorial belajar autocad 2 dimensi dan 3 dimensiOcim Nationalism
 
Dasar Pemrograman PHP dan MySQL
Dasar Pemrograman PHP dan MySQLDasar Pemrograman PHP dan MySQL
Dasar Pemrograman PHP dan MySQLOcim Nationalism
 
Membangun Aplikasi Database Oracle Menggunakan Visual Basic
Membangun Aplikasi Database Oracle Menggunakan Visual BasicMembangun Aplikasi Database Oracle Menggunakan Visual Basic
Membangun Aplikasi Database Oracle Menggunakan Visual BasicOcim Nationalism
 
Tutorial mikrotik-step-by-step
Tutorial mikrotik-step-by-stepTutorial mikrotik-step-by-step
Tutorial mikrotik-step-by-stepOcim Nationalism
 
BELAJAR MEMBUAT DATABASE MICROSOFT VISUAL BASIC 6.0
BELAJAR MEMBUAT DATABASE MICROSOFT VISUAL BASIC 6.0BELAJAR MEMBUAT DATABASE MICROSOFT VISUAL BASIC 6.0
BELAJAR MEMBUAT DATABASE MICROSOFT VISUAL BASIC 6.0Ocim Nationalism
 
Dasar pemrograman visual basic
Dasar pemrograman visual basicDasar pemrograman visual basic
Dasar pemrograman visual basicOcim Nationalism
 
Tips dan trik service printer
Tips dan trik service printerTips dan trik service printer
Tips dan trik service printerOcim Nationalism
 
Perawatan Personal Computer ( PC )
Perawatan Personal Computer ( PC )Perawatan Personal Computer ( PC )
Perawatan Personal Computer ( PC )Ocim Nationalism
 
Tutorial Microsoft Excel 2007
Tutorial Microsoft Excel 2007Tutorial Microsoft Excel 2007
Tutorial Microsoft Excel 2007Ocim Nationalism
 
Tutorial joomla versi 1.5.3
Tutorial joomla versi 1.5.3Tutorial joomla versi 1.5.3
Tutorial joomla versi 1.5.3Ocim Nationalism
 

Plus de Ocim Nationalism (20)

Crack Xp jadi Original
Crack Xp jadi OriginalCrack Xp jadi Original
Crack Xp jadi Original
 
Presentation Kecakapan Antar Personal
Presentation Kecakapan Antar PersonalPresentation Kecakapan Antar Personal
Presentation Kecakapan Antar Personal
 
Mobile technology
Mobile technologyMobile technology
Mobile technology
 
Contoh Daftar Riwayat Hidup
Contoh Daftar Riwayat HidupContoh Daftar Riwayat Hidup
Contoh Daftar Riwayat Hidup
 
Tutorial belajar autocad 2 dimensi dan 3 dimensi
Tutorial belajar autocad 2 dimensi dan 3 dimensiTutorial belajar autocad 2 dimensi dan 3 dimensi
Tutorial belajar autocad 2 dimensi dan 3 dimensi
 
Tutorial Autocad 2006 2D
Tutorial Autocad 2006 2DTutorial Autocad 2006 2D
Tutorial Autocad 2006 2D
 
Dasar Pemrograman PHP dan MySQL
Dasar Pemrograman PHP dan MySQLDasar Pemrograman PHP dan MySQL
Dasar Pemrograman PHP dan MySQL
 
Membangun Aplikasi Database Oracle Menggunakan Visual Basic
Membangun Aplikasi Database Oracle Menggunakan Visual BasicMembangun Aplikasi Database Oracle Menggunakan Visual Basic
Membangun Aplikasi Database Oracle Menggunakan Visual Basic
 
Tutorial mikrotik-step-by-step
Tutorial mikrotik-step-by-stepTutorial mikrotik-step-by-step
Tutorial mikrotik-step-by-step
 
Tutorial coreldraw
Tutorial coreldrawTutorial coreldraw
Tutorial coreldraw
 
BELAJAR MEMBUAT DATABASE MICROSOFT VISUAL BASIC 6.0
BELAJAR MEMBUAT DATABASE MICROSOFT VISUAL BASIC 6.0BELAJAR MEMBUAT DATABASE MICROSOFT VISUAL BASIC 6.0
BELAJAR MEMBUAT DATABASE MICROSOFT VISUAL BASIC 6.0
 
Dasar pemrograman visual basic
Dasar pemrograman visual basicDasar pemrograman visual basic
Dasar pemrograman visual basic
 
Dasar Java Mobile
Dasar Java MobileDasar Java Mobile
Dasar Java Mobile
 
Tips dan trik service printer
Tips dan trik service printerTips dan trik service printer
Tips dan trik service printer
 
Hacking Blackberry Apps
Hacking Blackberry Apps Hacking Blackberry Apps
Hacking Blackberry Apps
 
Panduan Penulisan Skirpsi
Panduan Penulisan SkirpsiPanduan Penulisan Skirpsi
Panduan Penulisan Skirpsi
 
Perawatan Personal Computer ( PC )
Perawatan Personal Computer ( PC )Perawatan Personal Computer ( PC )
Perawatan Personal Computer ( PC )
 
Tutorial Microsoft Excel 2007
Tutorial Microsoft Excel 2007Tutorial Microsoft Excel 2007
Tutorial Microsoft Excel 2007
 
Tutorial joomla versi 1.5.3
Tutorial joomla versi 1.5.3Tutorial joomla versi 1.5.3
Tutorial joomla versi 1.5.3
 
tutorial membuat website
tutorial membuat websitetutorial membuat website
tutorial membuat website
 

Dernier

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Dernier (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Google Hacking Basic

  • 1. Google Hacking - The Basics Maniac
  • 2. Hacking - The Basics • What exactly is Google Hacking? • Google Hacking involves using the Google search engine to identify vulnerabilities in websites.
  • 3. Hacking - The Basics • Ok, so you use Google to find all of this stuff, but how do you? • Google supports a multitude of operators and modifiers that add a ton of power to google searching.
  • 4. Hacking - The Basics • Mmmmmm....operators and modifiers! I want them!
  • 5. Hacking - The Basics • cache: • Syntax: cache:URL [highlight] • The cache operator will search through google’s cache and return the results based on those documents. You can alternatively tell cache to highlight a word or phrase by adding it after the operator and URL.
  • 6. Hacking - The Basics • link: • Syntax: link:URL • Sites that have a hyperlink to the URL specified will be returned in the search results.
  • 7. Hacking - The Basics • related: • Syntax: related:URL • The related operator will return results that are “similar” to the page that was specified.
  • 8. Hacking - The Basics • info: • Syntax: info:URL • This tag will give you the information that Google has on the given URL.
  • 9. Hacking - The Basics • site: • Syntax: site:Domain • This modifier will restrict results to those sites within the domain given.
  • 10. Hacking - The Basics • allintitle: • Syntax: allintitle: oper1 [oper2] [oper3] [etc..] • Google will restrict the results to those that have all of the words entered after the modifier within the title. NOTE: This modifier does not play well with others.
  • 11. Hacking - The Basics • intitle: • Syntax: intitle:operator • Google will return only results that match the word or phrase entered after the modifier within the title of the page.
  • 12. Hacking - The Basics • allinurl: • Syntax: allinurl: oper1 [oper2] [oper3] [etc...] • This modifier is similar to allintitle: in that it will use the rest of the query and look for all the words or phrases in the URL that was specified. NOTE: Also like allintitle:, this modifier doesn’t play well with others.
  • 13. Hacking - The Basics • inurl: • Syntax: inurl:operator • Here is the single operator version of allinurl:. Will return anything that has the operator in the URL.
  • 14. Hacking - The Basics • allintext: • Syntax: allintext: oper1 [oper2] [oper3] [etc...] • Just like not using any operators....
  • 15. Hacking - The Basics • intext: • Syntax: intext:operator • Ok, ok, I’ll let you guess on this one.
  • 16. Hacking - The Basics • Are you done yet? That seemed like a lot, and what the hell was with all the apple stuff? • Almost there. Now its time to start mixing and matching these modifiers and operators. • The four most commonly used will be intitle:, intext:, inurl:, and filetype: • Also note, you can use OR and + and - signs.
  • 17. Hacking - The Basics • mixing in intext:, inurl:, and intitle: and looking for default drupal sites that haven’t been configured yet. • -inurl:drupal.org intext:"Welcome to your new Drupal-powered website." intitle:drupal
  • 18. Hacking - The Basics • "display printer status" intitle:"Home"
  • 19. Hacking - The Basics • Whoa! a Xerox printer!
  • 20. Hacking - The Basics • "#mysql dump" filetype:sql 21232f297a57a5a743894a0e4a801fc3 21232f297a57a5a743894a0e4a801fc3 is the MD5sum for admin
  • 21. Hacking - The Basics • "Certificate Practice Statement" inurl:(PDF | DOC) CAs are the formal requests that are made to get a Digital Certificate.
  • 22. Hacking - The Basics • "Network Vulnerability Assessment Report"
  • 23. Hacking - The Basics • "Thank you for your order" +receipt filetype:pdf
  • 24. Hacking - The Basics • "robots.txt" + "Disallow:" filetype:txt
  • 25. Hacking - The Basics • "phpMyAdmin" "running on" inurl:"main.php"
  • 26. Hacking - The Basics • "phone * * *" "address *" "e-mail" intitle:"curriculum vitae"
  • 27. Hacking - The Basics • "social security number" "phone * * *“ "address *" "e-mail *" intitle:"curriculum vitae" filetype:pdf site:.edu
  • 28. Hacking - The Basics • ext:vmx vmx
  • 29. Hacking - The Basics • filetype:QBW qbw
  • 30. Hacking - The Basics • filetype:xls inurl:"email.xls"
  • 31. Hacking - The Basics • intitle:"Index of" finances.xls
  • 32. Hacking - The Basics • WOW! That was a lot of good finds! Where can I find more info on googlehacking? • http://johnny.ihackstuff.com