Google hacking is a computer hacking technique that uses Google Search and other Google applications to find security holes in the configuration and computer code that websites use.
[edit]Basics
Google hacking involves using advanced operators in the Google search engine to locate specific strings of text within search results. Some of the more popular examples are finding specific versions of vulnerable Web applications. The following search query would locate all web pages that have that particular text contained within them. It is normal for default installations of applications to include their running version in every page they serve, e.g., "Powered by XOOPS 2.2.3 Final".
The following search query will locate all websites that have the words "admbook" and "version" in the title of the website. It also checks to ensure that the web page being accessed is a PHP file.
intitle:admbook intitle:version filetype:php
Another technique is searching for insecure coding practices in the public code indexed by Google Code Search or other source code search engines.
One can even retrieve the username and password list from Microsoft FrontPage servers by inputting the given microscript in Google search field:
"#-Frontpage-" inurl:administrators.pwd
Devices connected to the Internet can be found. A search string such as
inurl:"ViewerFrame?Mode="
will find public web cameras.
Another Useful Search is following
intitle:index.of
[1] followed by what ever u want to search. This can give list of files on the servers.For exampleintitle:index.of mp3
will give all the mp3 file available on various servers.[edit]Avanced Operators
There are many simmilar Advanced operators which can be use to exploit insecure website
Operator | Purpose | Mixes with Other Operators? | Can be used Alone? | Web | Images | Groups | News |
---|---|---|---|---|---|---|---|
intitle | Search page Title | yes | yes | yes | yes | yes | yes |
allintitle | Search page title | no | yes | yes | yes | yes | yes |
inurl | Search URL | yes | yes | yes | yes | not really | like intitle |
allinurl | Search URL | no | yes | yes | yes | yes | like intitle |
filetype | specific files | yes | no | yes | yes | no | not really |
allintext | Search text of page only | not really | yes | yes | yes | yes | yes |
site | Search specific site | yes | yes | yes | yes | no | not really |
link | Search for links to pages | no | yes | yes | no | no | not really |
inanchor | Search link anchor text | yes | yes | yes | yes | not really | yes |
numrange | Locate number | yes | yes | yes | no | no | not really |
daterange | Search in data range | yes | no | yes | not really | not really | not really |
author | Group author search | yes | yes | no | no | yes | not really |
group | Group name search | not really | yes | no | no | yes | not really |
insubject | Group subject search | yes | yes | like intitle | like intitle | yes | like intitle |
msgid | Group msgid search | no | yes | not really | not really | yes | not really |
So conglusion is google Hacks a compilation of carefully crafted Google searches that expose novel functionality from Google's search and map services. For example, you can use it to view a timeline of your search results, view a map, search for music, search for books, and perform many other specific kinds of searches. You can also use this program to use google as a proxy.
The name should not imply the way it should be used.
Hacks is meant as this definition. "A Hack is a modification of a program or device to give the user access to features otherwise were unavailable to them. " Taken from Wikipedia.
Please do not use this program for illegal uses.
If you have used this program to find a vulnerability or if your domain is being taken advantage of, we suggest you use Google Hacks Honey Pot
Disclaimer
What im hoping by releasing this program is that it will help crack down on illegal and illegally distributed copyrighted material.
0 komentar:
Posting Komentar