SlideShare a Scribd company logo
1 of 21
ASHISH
RANJAN
B.Sc. IT 5TH
SEM.
Presentation By
Google Hacking
 Gather information from search engines
is an important step ,because they are
really easy way of getting to know the
target , and the target has no idea of
what you are doing.
 Google search engine is not only clean
and simple , but it is also and extremely
powerful tool to search information on
the web.
 Google`s web crawling robot , Googlebot ,
finds links on the web and retrives web
pages from those links and hands them off
to the google indexing server , where
they are saved to be searched by users.
Working of Google …
 Googlebot , a web crawler that finds
and fetches web pages.
 The indexer that sorts every word on
every pages and stores the resulting
index of words in a huge database.
 The query processor , which
compares your search query to the
index and recommends the
documents that it considers most
relevant.
Google`s Advanced Search
Operator
inurl:
If you include
inurl:in query ,
google will
restrict the
result to
documents
containing that
word in the url
.
 site:
 If you include
site:
 In your query ,
google will
restrict your
search results
to the site or
domain you
specify
 intitle:
 The query
intitle: restricts
to the result to
the documents
containing term
in the title.
file type:
If you include filetype: suffix in your query , google will restrict the result
to the pages whose names end in suffix.
Steganography
Hiding Data Behind Image
 Open notepad ……write your message …..
hey boys we are going to mass bunk
today
- Save @ desktop as
1. secret.txt
2. hacker.jpg
- Copy /b text.jpg+hacker.jpg final.jpg .
Tools for stegnography
 ImageHide
 Stegno
 Quick Stegno
 StegHide
 SilentHide
 JPHide
 HiderMan
Websites hacking
Username – Ashish’ or ‘login’ =
login’
password - Ashish’ or ‘login’ =
login’
Web server
 It General user data.
 A web server is a computer which contains
web pages and other content s of website
which can be viewed by ANY USER on
internet.
 Examples – Apache and IIS.
Database Server
 It contains user specefic records.
SQL injection
Search from server where
username=Ashish’or ‘login’=‘login
and password=Ashish’or
‘login’=‘login

More Related Content

What's hot

Amrapali builders -- google cheatsheet.pdf
Amrapali builders -- google cheatsheet.pdfAmrapali builders -- google cheatsheet.pdf
Amrapali builders -- google cheatsheet.pdf
amrapalibuildersreviews
 
Google tricks
Google tricksGoogle tricks
Google tricks
Ram Patil
 

What's hot (18)

Google search techniques
Google search techniquesGoogle search techniques
Google search techniques
 
Week 9 10 ppt-google_search
Week 9 10 ppt-google_searchWeek 9 10 ppt-google_search
Week 9 10 ppt-google_search
 
Surfing the internet
Surfing the internetSurfing the internet
Surfing the internet
 
Demystifying google hacks
Demystifying google hacksDemystifying google hacks
Demystifying google hacks
 
Google
GoogleGoogle
Google
 
Amrapali builders -- google cheatsheet.pdf
Amrapali builders -- google cheatsheet.pdfAmrapali builders -- google cheatsheet.pdf
Amrapali builders -- google cheatsheet.pdf
 
Securing and Personalizing Commerce Using Identity Data Mining
Securing and Personalizing Commerce Using Identity Data MiningSecuring and Personalizing Commerce Using Identity Data Mining
Securing and Personalizing Commerce Using Identity Data Mining
 
Effective Googling
Effective GooglingEffective Googling
Effective Googling
 
How Google Search Algorithm Works ??
How Google Search Algorithm Works ??How Google Search Algorithm Works ??
How Google Search Algorithm Works ??
 
Creating Operational Redundancy for Effective Web Data Mining
Creating Operational Redundancy for Effective Web Data MiningCreating Operational Redundancy for Effective Web Data Mining
Creating Operational Redundancy for Effective Web Data Mining
 
Google Search Presentation
Google Search PresentationGoogle Search Presentation
Google Search Presentation
 
Fe Colleges Conference
Fe Colleges ConferenceFe Colleges Conference
Fe Colleges Conference
 
Search engines
Search enginesSearch engines
Search engines
 
How to google
How to googleHow to google
How to google
 
Google tricks
Google tricksGoogle tricks
Google tricks
 
Search Engine
Search EngineSearch Engine
Search Engine
 
FII News
FII NewsFII News
FII News
 
Search Engine
Search EngineSearch Engine
Search Engine
 

Viewers also liked (6)

Afceh 2.0 Final
Afceh 2.0 FinalAfceh 2.0 Final
Afceh 2.0 Final
 
Google hacking 2015
Google hacking 2015Google hacking 2015
Google hacking 2015
 
Google Hacking Basics
Google Hacking BasicsGoogle Hacking Basics
Google Hacking Basics
 
CITEC #CON2-Dirty Attack with Google Hacking
CITEC #CON2-Dirty Attack with Google HackingCITEC #CON2-Dirty Attack with Google Hacking
CITEC #CON2-Dirty Attack with Google Hacking
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information Security
 

Similar to Hacking

SEO INTERVIEW.docx
SEO INTERVIEW.docxSEO INTERVIEW.docx
SEO INTERVIEW.docx
Jsfinserv
 
Report on search engines
Report on search enginesReport on search engines
Report on search engines
Amandeep Kaur
 
How google works and functions: A complete Approach
How google works and functions: A complete ApproachHow google works and functions: A complete Approach
How google works and functions: A complete Approach
Prakhar Gethe
 
Effective Searching by Dominik Kornas
Effective Searching by Dominik KornasEffective Searching by Dominik Kornas
Effective Searching by Dominik Kornas
AEM HUB
 

Similar to Hacking (20)

Google
GoogleGoogle
Google
 
Google ppt by amit
Google ppt by amitGoogle ppt by amit
Google ppt by amit
 
Google SEO 2013 - Hummingbird and Beyond
Google SEO 2013 - Hummingbird and BeyondGoogle SEO 2013 - Hummingbird and Beyond
Google SEO 2013 - Hummingbird and Beyond
 
Google Hacking by Ali Jahangiri
Google Hacking by Ali JahangiriGoogle Hacking by Ali Jahangiri
Google Hacking by Ali Jahangiri
 
Search engine
Search engineSearch engine
Search engine
 
Seo Manual
Seo ManualSeo Manual
Seo Manual
 
Google Advance Searching- Information System Audit & Control Report
Google Advance Searching- Information System Audit & Control ReportGoogle Advance Searching- Information System Audit & Control Report
Google Advance Searching- Information System Audit & Control Report
 
How Google Works
How Google WorksHow Google Works
How Google Works
 
How Google Search Works
How Google Search WorksHow Google Search Works
How Google Search Works
 
Google Search Engine
Google Search Engine Google Search Engine
Google Search Engine
 
SEO INTERVIEW.docx
SEO INTERVIEW.docxSEO INTERVIEW.docx
SEO INTERVIEW.docx
 
SEO Temelleri
SEO TemelleriSEO Temelleri
SEO Temelleri
 
Introduction to Search Engine Optimization
Introduction to Search Engine OptimizationIntroduction to Search Engine Optimization
Introduction to Search Engine Optimization
 
Google searching operators
Google searching operatorsGoogle searching operators
Google searching operators
 
Seo
SeoSeo
Seo
 
Report on search engines
Report on search enginesReport on search engines
Report on search engines
 
How search engine works
How search engine worksHow search engine works
How search engine works
 
How google works and functions: A complete Approach
How google works and functions: A complete ApproachHow google works and functions: A complete Approach
How google works and functions: A complete Approach
 
Google indexing
Google indexingGoogle indexing
Google indexing
 
Effective Searching by Dominik Kornas
Effective Searching by Dominik KornasEffective Searching by Dominik Kornas
Effective Searching by Dominik Kornas
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Hacking

  • 2. Google Hacking  Gather information from search engines is an important step ,because they are really easy way of getting to know the target , and the target has no idea of what you are doing.  Google search engine is not only clean and simple , but it is also and extremely powerful tool to search information on the web.  Google`s web crawling robot , Googlebot , finds links on the web and retrives web pages from those links and hands them off to the google indexing server , where they are saved to be searched by users.
  • 3. Working of Google …  Googlebot , a web crawler that finds and fetches web pages.  The indexer that sorts every word on every pages and stores the resulting index of words in a huge database.  The query processor , which compares your search query to the index and recommends the documents that it considers most relevant.
  • 4. Google`s Advanced Search Operator inurl: If you include inurl:in query , google will restrict the result to documents containing that word in the url .  site:  If you include site:  In your query , google will restrict your search results to the site or domain you specify  intitle:  The query intitle: restricts to the result to the documents containing term in the title. file type: If you include filetype: suffix in your query , google will restrict the result to the pages whose names end in suffix.
  • 6. Hiding Data Behind Image  Open notepad ……write your message ….. hey boys we are going to mass bunk today - Save @ desktop as 1. secret.txt 2. hacker.jpg - Copy /b text.jpg+hacker.jpg final.jpg .
  • 7. Tools for stegnography  ImageHide  Stegno  Quick Stegno  StegHide  SilentHide  JPHide  HiderMan
  • 9. Username – Ashish’ or ‘login’ = login’ password - Ashish’ or ‘login’ = login’
  • 10.
  • 11. Web server  It General user data.  A web server is a computer which contains web pages and other content s of website which can be viewed by ANY USER on internet.  Examples – Apache and IIS.
  • 12. Database Server  It contains user specefic records.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 21. Search from server where username=Ashish’or ‘login’=‘login and password=Ashish’or ‘login’=‘login