Dr. Erdal Ozkaya
Search
  • Home
  • About Me
  • Home
  • About Me
  • Home
  • Cybersecurity, Video Tutorials
  • Google Hacking – Highly Effective searching skills 7

Google Hacking – Highly Effective searching skills 7

Hacking Countermeasures Erdal
Erdal2021-10-02T00:49:53-04:00

Google Hacking Video

If you wonder what Google Hacking is , this is the right tutorial to learn Google Hacking and be master at Google hacking

More Video Tutorials ; Here

Watch it in You Tube : https://youtu.be/SZakW9EgZNA

The Google Hacking Database (GHDB) 

The Google Hacking Database (GHDB) is a categorized index of Internet search engine queries designed to uncover interesting, and usually sensitive, information made publicly available on the Internet. In most cases, this information was never meant to be made public but due to any number of factors this information was linked in a web document that was crawled by a search engine that subsequently followed that link and indexed the sensitive information.

The process known as “Google Hacking” was popularized in 2000 by Johnny Long, a professional hacker, who began cataloging these queries in a database known as the Google Hacking Database. His initial efforts were amplified by countless hours of community member effort, documented in the book Google Hacking For Penetration Testers and popularised by a barrage of media attention and Johnny’s talks on the subject such as this early talk recorded at DEFCON 13. Johnny coined the term “Googledork” to refer to “a foolish or inept person as revealed by Google“. This was meant to draw attention to the fact that this was not a “Google problem” but rather the result of an often unintentional misconfiguration on the part of a user or a program installed by the user. Over time, the term “dork” became shorthand for a search query that located sensitive information and “dorks” were included with may web application vulnerability releases to show examples of vulnerable web sites.

What are Google Dorks?

Google Dorks are search inquiries specially crafted by cyberpunks to get sensitive information that is not easily available to the average user. The technique of looking using these search strings is called Google Dorking, or Google Hacking.

The Google search box can act in a similar way to a command-line or an interpreter when provided with the best queries. Simply put, there are particular keywords, and drivers, that have special significance to Google.

Much more specifically, Google dorking describes the application of search strings that utilize innovative search operators to find info that is not quickly obtainable on the net. Such details could be in kind of text, pictures, classified info, e-mail addresses, passwords, and so on. Frequently, the info has been left exposed on the web mistakenly.

Google hacking was presented by cybersecurity expert Johnny Long.

In 2002, Long began collecting search questions that might locate as well as discover susceptible web servers on the internet. These inquiries can additionally locate the servers that utilized no safety and security and left sensitive information like e-mail addresses as well as bank card numbers existing unguarded on them. He later on arranged these questions as well as submitted them on a site that became the very first Google Hacking database in 2004.

Normally, when you type a search phrase right into the search bar on Google, it returns results based on all the information it can discover on that particular search phrase. These results generally cover a big ground and are unrefined, which is what makes Google such an excellent search engine to begin with.

Individuals can utilize these drivers to help them find appropriate outcomes to their search questions in a short amount of time.

On the other hand, hackers can also take advantage of these operators to obtain documents containing passwords, lists of emails, log files, and a lot more.

The following example is a google geek question that returns log data consisting of passwords with email addresses:

filetype:log intext:password intext:(@gmail.com | @yahoo.com | @hotmail.com)

By the end of this article, you will have the ability to create similar inquiries.

Commands and Operators

Operators are the foundation of Google geeks. Consequently, we will certainly address them here first prior to we can create complete dork queries.

Below is a listing of the most usual operators that you require to understand:

Alternative Keywords

If you utilize the driver OR (or |) between two keyword phrases or even more, after that the search engine result will certainly return pages which contain matches to at least among the search phrases.

Instance: google OR bing OR duckduckgo.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *


Related Posts

Inside The Dark Web Dr Ozkaya

Inside the Dark Web , my new book is just released (2019)

Inside the Dark Web Summary Inside the Dark Web provides a broad overview of emerging digital threats and computer crimes, with an emphasis... read more
OpenEDR Fundamentals

Free EDR Certification Training

Free EDR Certification Training Endpoint detection and response or EDR solution is an endpoint security solution that monitors end-user devices... read more
Phishing

How to protect yourself from phishing ? 6 Effective Tips

How to protect yourself from phishing ? A phishing attack is an attack vector that cybercriminals use it mainly for identity... read more
NIST Cybersecurity Framework

A Recipe for Cybersecurity Success

A Recipe for Cybersecurity Success The NIST Cybersecurity Framework (CSF) is a set of standards and guidelines for managing and protecting... read more
Cloud Security from the Field Erdal Ozkaya

Cloud Security from the Field Part 3 Free Video Training

Cloud Security from the Field Part 3 Azure Security Center https://youtu.be/VprrW4IVaiI   This is the 3th and last video of this course Is your... read more
Vulnerability

Monthly Vulnerability Review – April 2020

Monthly Vulnerability Review As usual it was a busy month for the Security Community.  The security researchers were finding bugs, zero... read more

Local DNS Hacking : Force your End Users to use “your site” Laugh at mates 1

Local DNS Hacking Force your End Users to use “your site” OK OK, this is not real hacking but it’s fun :) As well... read more
Cybersecurity Bootcamp Erdal Ozkaya

Intelligent security is key to fight sophisticated threats

Intelligent security is key to fight sophisticated threats By : Adelle Geronim tahawultech.com/ Intelligent security is increasingly becoming vital as GCC CISOs... read more
Introduction to Cybersecurity and Dark Web

Introduction to Cybersecurity and Dark Web (Part 2)

Introduction to Cybersecurity and Dark Web (Part 2) This is Part 2, to read part 1 : https://www.erdalozkaya.com/introduction-to-cybersecurity-and-dark-web-part-1/ Web and Its Levels The... read more
Banking Security

Australian Banking Security (We need to improve as of 2012 )

Australian Banking Security Online Security is getting every day more and more important. It’s so common these days to implement secure... read more

Categories

  • About Dr Erdal Ozkaya (298)
    • Awards (96)
    • Erdal in the news (118)
    • Feedback (90)
    • My Books (54)
    • Who is Dr Erdal Ozkaya ? (2)
  • Announcemets (302)
  • Artificial Intelligence AI (10)
  • Certification (52)
  • Cloud Computing (72)
  • Cybersecurity (322)
  • Cybersecurity Leadership (52)
  • Financial Sector (31)
  • Forensics (17)
  • Free Events (156)
  • General (133)
  • How to …? (63)
  • ISO 2700x (12)
  • News (38)
  • Reviews (77)
    • Book Reviews (33)
    • Free E-Books (13)
    • Hardware Review (9)
    • Security Review / Reports (10)
    • Software Review (8)
  • Video Tutorials (101)
  • What is new? (27)
  • Windows (30)

Recent Comments

  • Erdal on Free EDR Certification Training
  • SANDEEP SHRIVASTAV on Free EDR Certification Training
  • Alicia Harlow on Core isolation Memory Integrity not available – (Get it fixed)
  • Alicia Harlow on Core isolation Memory Integrity not available – (Get it fixed)
  • Erdal on Siber Güvenlik Saldiri ve Savunma Stratejileri – NEW B00K

Archives

Dr. Erdal Ozkaya © Copyright 2023. All Rights Reserved.