How are you going to use the Google Hacking Database to collect info on pc methods? On this ethical hacking tutorial, you’ll find out how we will use this useful resource to footprint.
Google Hacking Database Ethical Hacker Footprinting Using Search Commands
If you’ll take pleasure in reading and contributing to the dialogue for this submit, will you please be a part of us on the YouTube video above and depart a comment there as a result of I learn and respond to most comments on YouTube?
When you find something helpful on this video or funny, will you please depart a like as a result of you will really feel great serving to other individuals find it?
Right now we’re slowly getting into our footprinting part, which will be the final a part of the beginner part including the scanning section that we’ll do right after we cowl the footprinting.
Before we start, whereas our machine is beginning up, let us simply explain just a little bit extra what footprinting is.
To start with, there are two kinds of footprinting: one is lively and one is passive.
Now, the lively footprinting principally requires some interplay with the goal that you are making an attempt to attack whereas the passive footprinting is principally just gathering all of the publicly out there info in your target.
So, for instance, if your target has a Facebook account, a Twitter, or principally some other account or another supply of data from which you’ll be able to gather a few of the invaluable stuff you may need.
Now let’s say, for example, your target is an organization and has public info on-line that this firm makes use of Home windows XP on their machines. You possibly can already minimize out the Linux exploits and Home windows 10 or 7 exploits, and you may principally simply concentrate on writing a Windows XP exploit.
Now, we all know that no one really makes use of XP anymore as a result of it is weak and it’s principally an open box, however that was simply an instance. There are lots of public info which you’ll find.
Let’s go to a few of the practical methods with Google hacking. We’ll cover Google hacking on this tutorial, so let me simply login, “check1234.”
As quickly as my desktop boots up we’ll open Firefox and we’ll run a few of the particular instructions within the Google search bar in an effort to discover a few of the stuff we’d need.
Now, that is simply one of the instruments for footprinting that we’ll cover within the course. The opposite ones shall be Harvester, Nikto, Shodan and Whois that we’ll cover within the subsequent lectures, however for now on let’s just open our Firefox.
So simply click on your Firefox icon and principally since it can lead you to your Kali Linux web site, you need to navigate to Google. So we will add another tab and go on to google.com.
Now, let’s say that you simply need to find all the web sites that have a consumer input that would probably be weak to the SQL injection.
On the Google search bar, you simply sort here: inurl: “index.php?id=”
What it will do is it is going to discover all the websites that end within the index.php?id= after which some number.
Now, what does that mean?
Principally, if we click on any of these links like this one, we will see right here that this web site might probably be weak to the SQL injection.
We will verify that easily with the apostrophe and if we attempt to login, it says, “login failed resulting from incorrect e mail handle, flawed passphrase.”
So this website isn’t horrible, a minimum of on the first attempt, but we gained’t attempt it anymore since we shouldn’t actually do this.
I just need to show you the way to filter out all the web sites that really have a consumer enter, which might be weak to the SQL injection.
So principally anyplace the place you possibly can sort something, and then the web site web page can course of it, might be weak to the consumer input, which might be a bit of code that you’d trick the server to run for you.
However more about that within the website hacking part.
Now, that was just one of the commands.
With a view to find the instructions you may need, there’s a Google hacking database, and to seek out it you simply sort right here in Google, “Google hacking database,” and you click on the primary hyperlink.
It can lead us to an internet site with a bunch of the instructions that can be used so as to find out issues we’d want like passwords, PDF information or Excel information, or anything.
As you’ll be able to see, it says proper here it’s the “Exploit Database” web site, the “Google Hacking Database.”
These are just a bunch of the commands, which you just copy and paste into the Google search bar and it will listing you all of the information you’re looking.
I’m not actually positive what these instructions are, however it says right here if we click on on the one, it is going to lead us to the command, which is this one.
Now I can only guess what this does, however we will read it within the description.
“Dork for finding login portals for well-known firm web sites hosted on famous hosting providers similar to all of these.”
Principally, this command does that. We will attempt it out if we need to. It’s not likely that helpful for us, however why not?
You just copy the command and paste it, and we’ll see how it works.
They’re all principally account login as we will see, “account-login, my-account-login, my-account/login.”
So it filtered out all the websites with a listing which is /my-account-login.
Now, let’s see, for instance, another one.
As you’ll be able to see, these are listed with a date. The primary one was yesterday. Let’s go on this one: intitle:“index of /”ssh
Now, you possibly can learn right right here the info you discover: Net servers model, SSH version, SSH keys, SSH logins, and SSH .exe information.
As it says right here:
*”I found a variety of servers utilizing SSH 1.four. They are often five plus years previous and filled with security holes. A search in exploit database for SSH 1 turns up plus forty thousand exploits. For these, some may go.”
This might be a helpful command for us. We will copy it and see what we find with it.
We gained’t be attacking any of those since we don’t have permission, however it positive might be useful afterward.
As you’ll be able to see, we won’t mess with this proper now. What we need to do is just use these commands and we’ll cowl hacking of internet sites afterward, not on these web sites, however on the web sites that we do personal, which we’ll make in our personal virtual setting.
It’s worthwhile to use these commands solely.
You possibly can principally, if you want to search issues like PDF information, you’ll be able to sort here within the quick search “PDF,” and it’ll present you the PDF I consider.
Let’s see methods to discover a PDF file with this command here and if this might be a PDF file that would include a password.
As you possibly can see right here, all information are PDF information. Let’s see if we open one, it can ask us to save lots of these information. We don’t need to reserve it.
Principally, that is just all the PDF information out there on the Internet. Allow us to simply see the extra correct rationalization of this command.
“Passwords and knowledge on targets staff/clients additionally for spear phishing. Substitute PDF extension with another doc extension like doc, docx, txt.”
Okay, that was PDF and you need to use any of these instructions. If you want to know what it does, you simply click on the command.
This one really doesn’t have any rationalization.
Let’s simply take a look at one other one.
As you’ll be able to see, this command which is pretty large, will aid you to seek out out movies revealed in Google Drives.
There is a bunch of file extensions for movies. I’m not likely positive why PDF is there, but there’s probably a purpose for that.
So let’s say now that we don’t need a PDF file, but we would like an Excel file. We just sort Excel.
There isn’t any matching data found.
We will set here on 120 commands and there’s a .xls file, which is an Excel file and should you click there we will see what else it should find. It’s a mix of login portals and passwords, but this can be a large command. We won’t use it right now.
So, that’s all I needed to point out you.
As you possibly can see, they principally clarify for every command what it does if you click on it and see the explanation, which is principally just a number of login portals.
It might be useful when you needed to seek out a few of the weak websites to the precise assaults like we showed within the first command, or in the first string that we typed into Google, which was that index.php?id= that may lead us to all the web sites with consumer enter that could possibly be probably weak to SQL injection.
So, that’s about it for the Google hacking.
Now, if you wish to, you’ll be able to scroll down and take a look at all these other commands. It might be helpful for you, however we gained’t be doing that since there are lots of them and we’ll proceed footprinting within the next lecture.
I hope I see you there and take care.
Thanks very a lot for watching this video tutorial that I, Jerry Banfield, executive-produced, which suggests I hired the trainer to make a video for you as part of a “Grasp Ethical hacking in 2019“ course that I think about you will love and luxuriate in.
You possibly can unlock a profession in penetration testing and go from newbie to advanced in this brand-new course all with the same instructor that we now have just gone via within the video here collectively.
We have now obtained 5 sections of the course prepared for you now and we’re making new movies each single week for this course for you. I think about by the top of 2019, this course will embrace 10 to 20 hours of ethical hacking tutorials for you from the very fundamentals, which we’ve got already gotten into advanced things like constructing your personal custom hacking instruments.
This course additionally has a Discord server and a Fb group where you will get solutions to your questions from ethical hackers and fellow students. If you need to purchase the course, will you please use this link to buy it as a result of I imagine if in case you have received this far in, you will completely love the complete course?
You may also get this as a part of the “Jerry Banfield Perpetually Course Bundle,” which includes all the courses I train as the trainer, I make a brand new class each week or so, and all the programs I pay instructors to make as on this hacking course for life.
My objective in this is for it to be the perfect value you’ve gotten ever gotten in schooling on in-demand topics. I am meaning to make anyplace from fifty to a hundred new programs for you a yr indefinitely both myself and because the government producer.
Thanks very much for watching this tutorial. I think about in case you discovered it useful you’ll depart a like on the video to assist others find this info that you simply found helpful with us.
Should you love regulation enforcement, Corrections, exhibits like Cops, you may absolutely go loopy having a great time listening to my audiobook “Officer Banfield,” which describes my real-life expertise with three years in Corrections and regulation enforcement.
It’s obtainable on Audible where you possibly can take heed to it. That’s the format I like to recommend.
Nevertheless, you can too get it on Kindle or on paperback.
If you need to buy it, will you please go to https://jerrybanfield.com/books/ and grab it instantly with a hyperlink there because you’ll feel nice figuring out that helps me earn probably the most as an writer.
Edits from video transcript by Michel Gerard at www.michelgerardonline.com.