SlideShare una empresa de Scribd logo
1 de 32
Descargar para leer sin conexión
Google Hacking - The Basics

Maniac
Hacking - The Basics

• What exactly is Google Hacking?


  • Google Hacking involves using the Google search engine to identify
    vulnerabilities in websites.
Hacking - The Basics

• Ok, so you use Google to find all of this stuff, but how do you?


   • Google supports a multitude of operators and modifiers that add a ton of
     power to google searching.
Hacking - The Basics

• Mmmmmm....operators and modifiers! I want them!
Hacking - The Basics

• cache:


  • Syntax: cache:URL [highlight]


  • The cache operator will search through google’s cache and return the
    results based on those documents. You can alternatively tell cache to
    highlight a word or phrase by adding it after the operator and URL.
Hacking - The Basics

• link:


   • Syntax: link:URL


   • Sites that have a hyperlink to the URL specified will be returned in the
     search results.
Hacking - The Basics

• related:


   • Syntax: related:URL


   • The related operator will return results that are “similar” to the page that was
     specified.
Hacking - The Basics

• info:


   • Syntax: info:URL


   • This tag will give you the information that Google has on the given URL.
Hacking - The Basics

• site:


   • Syntax: site:Domain


   • This modifier will restrict results to those sites within the domain given.
Hacking - The Basics

• allintitle:


   • Syntax: allintitle: oper1 [oper2] [oper3] [etc..]


   • Google will restrict the results to those that have all of the words entered
     after the modifier within the title. NOTE: This modifier does not play well
     with others.
Hacking - The Basics

• intitle:


   • Syntax: intitle:operator


   • Google will return only results that match the word or phrase entered after
     the modifier within the title of the page.
Hacking - The Basics

• allinurl:


   • Syntax: allinurl: oper1 [oper2] [oper3] [etc...]


   • This modifier is similar to allintitle: in that it will use the rest of the query and
     look for all the words or phrases in the URL that was specified. NOTE: Also
     like allintitle:, this modifier doesn’t play well with others.
Hacking - The Basics

• inurl:


   • Syntax: inurl:operator


   • Here is the single operator version of allinurl:. Will return anything that has
     the operator in the URL.
Hacking - The Basics

• allintext:


   • Syntax: allintext: oper1 [oper2] [oper3] [etc...]


   • Just like not using any operators....
Hacking - The Basics

• intext:


   • Syntax: intext:operator


   • Ok, ok, I’ll let you guess on this one.
Hacking - The Basics

• Are you done yet? That seemed like a lot, and what the hell was with all the
  apple stuff?


   • Almost there. Now its time to start mixing and matching these modifiers
     and operators.


      • The four most commonly used will be intitle:, intext:, inurl:, and filetype:


      • Also note, you can use OR and + and - signs.
Hacking - The Basics

• mixing in intext:, inurl:, and intitle: and looking for default drupal sites that
  haven’t been configured yet.


• -inurl:drupal.org intext:"Welcome to your new Drupal-powered website."
  intitle:drupal
Hacking - The Basics

• "display printer status" intitle:"Home"
Hacking - The Basics

• Whoa! a Xerox printer!
Hacking - The Basics

 • "#mysql dump" filetype:sql 21232f297a57a5a743894a0e4a801fc3




21232f297a57a5a743894a0e4a801fc3 is the MD5sum for
admin
Hacking - The Basics

   • "Certificate Practice Statement" inurl:(PDF | DOC)




CAs are the formal requests that are made to get a Digital Certificate.
Hacking - The Basics

• "Network Vulnerability Assessment Report"
Hacking - The Basics

• "Thank you for your order" +receipt filetype:pdf
Hacking - The Basics

• "robots.txt" + "Disallow:" filetype:txt
Hacking - The Basics

• "phpMyAdmin" "running on" inurl:"main.php"
Hacking - The Basics

• "phone * * *" "address *" "e-mail" intitle:"curriculum vitae"
Hacking - The Basics

• "social security number" "phone * * *“ "address *" "e-mail *" intitle:"curriculum
  vitae" filetype:pdf site:.edu
Hacking - The Basics

• ext:vmx vmx
Hacking - The Basics

• filetype:QBW qbw
Hacking - The Basics

• filetype:xls inurl:"email.xls"
Hacking - The Basics

• intitle:"Index of" finances.xls
Hacking - The Basics

• WOW! That was a lot of good finds! Where can I find more info on
  googlehacking?


• http://johnny.ihackstuff.com

Más contenido relacionado

La actualidad más candente

Contributing to Impala
Contributing to ImpalaContributing to Impala
Contributing to ImpalaCloudera, Inc.
 
Dangerous Google searching for secrets
Dangerous Google searching for secretsDangerous Google searching for secrets
Dangerous Google searching for secretsPim Piepers
 
IVS CTO Night And Day 2018 Winter - AWS Startup Tech Office Hours
IVS CTO Night And Day 2018 Winter - AWS Startup Tech Office HoursIVS CTO Night And Day 2018 Winter - AWS Startup Tech Office Hours
IVS CTO Night And Day 2018 Winter - AWS Startup Tech Office HoursAmazon Web Services Japan
 
Free The Enterprise With Ruby & Master Your Own Domain
Free The Enterprise With Ruby & Master Your Own DomainFree The Enterprise With Ruby & Master Your Own Domain
Free The Enterprise With Ruby & Master Your Own DomainKen Collins
 
Combining Django REST framework & Elasticsearch
Combining Django REST framework & ElasticsearchCombining Django REST framework & Elasticsearch
Combining Django REST framework & ElasticsearchYaroslav Muravskyi
 
Swaggered web apis in Clojure
Swaggered web apis in ClojureSwaggered web apis in Clojure
Swaggered web apis in ClojureMetosin Oy
 
Server Logs: After Excel Fails
Server Logs: After Excel FailsServer Logs: After Excel Fails
Server Logs: After Excel FailsOliver Mason
 
A Survey of Elasticsearch Usage
A Survey of Elasticsearch UsageA Survey of Elasticsearch Usage
A Survey of Elasticsearch UsageGreg Brown
 
RxJS - The Basics & The Future
RxJS - The Basics & The FutureRxJS - The Basics & The Future
RxJS - The Basics & The FutureTracy Lee
 
Djangocon 2014 angular + django
Djangocon 2014 angular + djangoDjangocon 2014 angular + django
Djangocon 2014 angular + djangoNina Zakharenko
 
Functions.php - It's Not Just For Developers
Functions.php - It's Not Just For DevelopersFunctions.php - It's Not Just For Developers
Functions.php - It's Not Just For DevelopersEric Mann
 
ClojuTRE2015: Kekkonen - making your Clojure web APIs more awesome
ClojuTRE2015: Kekkonen - making your Clojure web APIs more awesomeClojuTRE2015: Kekkonen - making your Clojure web APIs more awesome
ClojuTRE2015: Kekkonen - making your Clojure web APIs more awesomeMetosin Oy
 
Building a mini-theme with WordPress REST API
Building a mini-theme with WordPress REST APIBuilding a mini-theme with WordPress REST API
Building a mini-theme with WordPress REST APIAnthony Montalbano
 
Love / Hate Puppet (Puppet Gotchas)
Love / Hate Puppet (Puppet Gotchas)Love / Hate Puppet (Puppet Gotchas)
Love / Hate Puppet (Puppet Gotchas)Puppet
 

La actualidad más candente (20)

Web Operations101
Web Operations101Web Operations101
Web Operations101
 
Contributing to Impala
Contributing to ImpalaContributing to Impala
Contributing to Impala
 
Dangerous Google searching for secrets
Dangerous Google searching for secretsDangerous Google searching for secrets
Dangerous Google searching for secrets
 
Rust, Redis, and Protobuf - Oh My!
Rust, Redis, and Protobuf - Oh My!Rust, Redis, and Protobuf - Oh My!
Rust, Redis, and Protobuf - Oh My!
 
IVS CTO Night And Day 2018 Winter - AWS Startup Tech Office Hours
IVS CTO Night And Day 2018 Winter - AWS Startup Tech Office HoursIVS CTO Night And Day 2018 Winter - AWS Startup Tech Office Hours
IVS CTO Night And Day 2018 Winter - AWS Startup Tech Office Hours
 
Free The Enterprise With Ruby & Master Your Own Domain
Free The Enterprise With Ruby & Master Your Own DomainFree The Enterprise With Ruby & Master Your Own Domain
Free The Enterprise With Ruby & Master Your Own Domain
 
Google Hacking Basics
Google Hacking BasicsGoogle Hacking Basics
Google Hacking Basics
 
Combining Django REST framework & Elasticsearch
Combining Django REST framework & ElasticsearchCombining Django REST framework & Elasticsearch
Combining Django REST framework & Elasticsearch
 
Swaggered web apis in Clojure
Swaggered web apis in ClojureSwaggered web apis in Clojure
Swaggered web apis in Clojure
 
Plone api
Plone apiPlone api
Plone api
 
Google Ajax APIs
Google Ajax APIsGoogle Ajax APIs
Google Ajax APIs
 
Server Logs: After Excel Fails
Server Logs: After Excel FailsServer Logs: After Excel Fails
Server Logs: After Excel Fails
 
Cain & Obenland — Episode 4
Cain & Obenland — Episode 4Cain & Obenland — Episode 4
Cain & Obenland — Episode 4
 
A Survey of Elasticsearch Usage
A Survey of Elasticsearch UsageA Survey of Elasticsearch Usage
A Survey of Elasticsearch Usage
 
RxJS - The Basics & The Future
RxJS - The Basics & The FutureRxJS - The Basics & The Future
RxJS - The Basics & The Future
 
Djangocon 2014 angular + django
Djangocon 2014 angular + djangoDjangocon 2014 angular + django
Djangocon 2014 angular + django
 
Functions.php - It's Not Just For Developers
Functions.php - It's Not Just For DevelopersFunctions.php - It's Not Just For Developers
Functions.php - It's Not Just For Developers
 
ClojuTRE2015: Kekkonen - making your Clojure web APIs more awesome
ClojuTRE2015: Kekkonen - making your Clojure web APIs more awesomeClojuTRE2015: Kekkonen - making your Clojure web APIs more awesome
ClojuTRE2015: Kekkonen - making your Clojure web APIs more awesome
 
Building a mini-theme with WordPress REST API
Building a mini-theme with WordPress REST APIBuilding a mini-theme with WordPress REST API
Building a mini-theme with WordPress REST API
 
Love / Hate Puppet (Puppet Gotchas)
Love / Hate Puppet (Puppet Gotchas)Love / Hate Puppet (Puppet Gotchas)
Love / Hate Puppet (Puppet Gotchas)
 

Similar a ki

Kiran karnad rtc2014 ghdb-final
Kiran karnad rtc2014 ghdb-finalKiran karnad rtc2014 ghdb-final
Kiran karnad rtc2014 ghdb-finalRomania Testing
 
HTML5 History & Features
HTML5 History & FeaturesHTML5 History & Features
HTML5 History & FeaturesDave Ross
 
Introduction to html 5
Introduction to html 5Introduction to html 5
Introduction to html 5Nir Elbaz
 
Lessons learned while building Omroep.nl
Lessons learned while building Omroep.nlLessons learned while building Omroep.nl
Lessons learned while building Omroep.nlbartzon
 
Lessons learned while building Omroep.nl
Lessons learned while building Omroep.nlLessons learned while building Omroep.nl
Lessons learned while building Omroep.nltieleman
 
Scraping Scripting Hacking
Scraping Scripting HackingScraping Scripting Hacking
Scraping Scripting HackingMike Ellis
 
FarisAloulSlides.ppt
FarisAloulSlides.pptFarisAloulSlides.ppt
FarisAloulSlides.pptaashnareddy1
 
Silicon Valley Code Camp 2016 - MongoDB in production
Silicon Valley Code Camp 2016 - MongoDB in productionSilicon Valley Code Camp 2016 - MongoDB in production
Silicon Valley Code Camp 2016 - MongoDB in productionDaniel Coupal
 
Introduction to cypress in Angular (Chinese)
Introduction to cypress in Angular (Chinese)Introduction to cypress in Angular (Chinese)
Introduction to cypress in Angular (Chinese)Hong Tat Yew
 
Webapp security testing
Webapp security testingWebapp security testing
Webapp security testingTomas Doran
 
Webapp security testing
Webapp security testingWebapp security testing
Webapp security testingTomas Doran
 
The things we found in your website
The things we found in your websiteThe things we found in your website
The things we found in your websitehernanibf
 

Similar a ki (20)

Kiran karnad rtc2014 ghdb-final
Kiran karnad rtc2014 ghdb-finalKiran karnad rtc2014 ghdb-final
Kiran karnad rtc2014 ghdb-final
 
Google Dorks
Google DorksGoogle Dorks
Google Dorks
 
Google Hacking 101
Google Hacking 101Google Hacking 101
Google Hacking 101
 
google dork.pdf
google dork.pdfgoogle dork.pdf
google dork.pdf
 
HTML5 History & Features
HTML5 History & FeaturesHTML5 History & Features
HTML5 History & Features
 
Splunk bsides
Splunk bsidesSplunk bsides
Splunk bsides
 
Introduction to html 5
Introduction to html 5Introduction to html 5
Introduction to html 5
 
Lessons learned while building Omroep.nl
Lessons learned while building Omroep.nlLessons learned while building Omroep.nl
Lessons learned while building Omroep.nl
 
Lessons learned while building Omroep.nl
Lessons learned while building Omroep.nlLessons learned while building Omroep.nl
Lessons learned while building Omroep.nl
 
3 google hacking
3 google hacking3 google hacking
3 google hacking
 
Scraping Scripting Hacking
Scraping Scripting HackingScraping Scripting Hacking
Scraping Scripting Hacking
 
FarisAloulSlides.ppt
FarisAloulSlides.pptFarisAloulSlides.ppt
FarisAloulSlides.ppt
 
SearchLab
SearchLabSearchLab
SearchLab
 
Google power search
Google power searchGoogle power search
Google power search
 
Silicon Valley Code Camp 2016 - MongoDB in production
Silicon Valley Code Camp 2016 - MongoDB in productionSilicon Valley Code Camp 2016 - MongoDB in production
Silicon Valley Code Camp 2016 - MongoDB in production
 
Introduction to cypress in Angular (Chinese)
Introduction to cypress in Angular (Chinese)Introduction to cypress in Angular (Chinese)
Introduction to cypress in Angular (Chinese)
 
Webapp security testing
Webapp security testingWebapp security testing
Webapp security testing
 
Webapp security testing
Webapp security testingWebapp security testing
Webapp security testing
 
Have I Been Pwned and Cloudflare
Have I Been Pwned and CloudflareHave I Been Pwned and Cloudflare
Have I Been Pwned and Cloudflare
 
The things we found in your website
The things we found in your websiteThe things we found in your website
The things we found in your website
 

Último

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Último (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

ki

  • 1. Google Hacking - The Basics Maniac
  • 2. Hacking - The Basics • What exactly is Google Hacking? • Google Hacking involves using the Google search engine to identify vulnerabilities in websites.
  • 3. Hacking - The Basics • Ok, so you use Google to find all of this stuff, but how do you? • Google supports a multitude of operators and modifiers that add a ton of power to google searching.
  • 4. Hacking - The Basics • Mmmmmm....operators and modifiers! I want them!
  • 5. Hacking - The Basics • cache: • Syntax: cache:URL [highlight] • The cache operator will search through google’s cache and return the results based on those documents. You can alternatively tell cache to highlight a word or phrase by adding it after the operator and URL.
  • 6. Hacking - The Basics • link: • Syntax: link:URL • Sites that have a hyperlink to the URL specified will be returned in the search results.
  • 7. Hacking - The Basics • related: • Syntax: related:URL • The related operator will return results that are “similar” to the page that was specified.
  • 8. Hacking - The Basics • info: • Syntax: info:URL • This tag will give you the information that Google has on the given URL.
  • 9. Hacking - The Basics • site: • Syntax: site:Domain • This modifier will restrict results to those sites within the domain given.
  • 10. Hacking - The Basics • allintitle: • Syntax: allintitle: oper1 [oper2] [oper3] [etc..] • Google will restrict the results to those that have all of the words entered after the modifier within the title. NOTE: This modifier does not play well with others.
  • 11. Hacking - The Basics • intitle: • Syntax: intitle:operator • Google will return only results that match the word or phrase entered after the modifier within the title of the page.
  • 12. Hacking - The Basics • allinurl: • Syntax: allinurl: oper1 [oper2] [oper3] [etc...] • This modifier is similar to allintitle: in that it will use the rest of the query and look for all the words or phrases in the URL that was specified. NOTE: Also like allintitle:, this modifier doesn’t play well with others.
  • 13. Hacking - The Basics • inurl: • Syntax: inurl:operator • Here is the single operator version of allinurl:. Will return anything that has the operator in the URL.
  • 14. Hacking - The Basics • allintext: • Syntax: allintext: oper1 [oper2] [oper3] [etc...] • Just like not using any operators....
  • 15. Hacking - The Basics • intext: • Syntax: intext:operator • Ok, ok, I’ll let you guess on this one.
  • 16. Hacking - The Basics • Are you done yet? That seemed like a lot, and what the hell was with all the apple stuff? • Almost there. Now its time to start mixing and matching these modifiers and operators. • The four most commonly used will be intitle:, intext:, inurl:, and filetype: • Also note, you can use OR and + and - signs.
  • 17. Hacking - The Basics • mixing in intext:, inurl:, and intitle: and looking for default drupal sites that haven’t been configured yet. • -inurl:drupal.org intext:"Welcome to your new Drupal-powered website." intitle:drupal
  • 18. Hacking - The Basics • "display printer status" intitle:"Home"
  • 19. Hacking - The Basics • Whoa! a Xerox printer!
  • 20. Hacking - The Basics • "#mysql dump" filetype:sql 21232f297a57a5a743894a0e4a801fc3 21232f297a57a5a743894a0e4a801fc3 is the MD5sum for admin
  • 21. Hacking - The Basics • "Certificate Practice Statement" inurl:(PDF | DOC) CAs are the formal requests that are made to get a Digital Certificate.
  • 22. Hacking - The Basics • "Network Vulnerability Assessment Report"
  • 23. Hacking - The Basics • "Thank you for your order" +receipt filetype:pdf
  • 24. Hacking - The Basics • "robots.txt" + "Disallow:" filetype:txt
  • 25. Hacking - The Basics • "phpMyAdmin" "running on" inurl:"main.php"
  • 26. Hacking - The Basics • "phone * * *" "address *" "e-mail" intitle:"curriculum vitae"
  • 27. Hacking - The Basics • "social security number" "phone * * *“ "address *" "e-mail *" intitle:"curriculum vitae" filetype:pdf site:.edu
  • 28. Hacking - The Basics • ext:vmx vmx
  • 29. Hacking - The Basics • filetype:QBW qbw
  • 30. Hacking - The Basics • filetype:xls inurl:"email.xls"
  • 31. Hacking - The Basics • intitle:"Index of" finances.xls
  • 32. Hacking - The Basics • WOW! That was a lot of good finds! Where can I find more info on googlehacking? • http://johnny.ihackstuff.com