Author: April Hall Copywriter Turn on the news, and you'll soon learn that the American economy is struggling mightily. Home values are plummeting, unemployment is skyrocketing, energy prices are through...
There is more to Google than you know. Some people just search while others may find ways to compromise your central processing unit (CPU) or a server. Google is a very powerful tool to hackers that are trying to track down exploits or vulnerabilities in systems. Here is what a hacker might do to compromise your system.
To use these methods you will need to go to Google and type in the commands after the —> into their search bar….
Remote Desktop Connection —> “VNC Desktop” inurl:5800
Compromise Unix User and Passwords —> filetype:pwd service
To Find Sensitive Information such as passwords and financial stuff
—> filetype:bak inurl:”htaccess | passwd | shadow | htusers”
Database Hacking —> filetype:properties inurl:db intext:password
IIS Hacking —> intitle:”Welcome to IIS 4.0″
Edu Hacking —> “not for distribution” confidential site:edu
Hackers use all of these techniques above to compromise a system. After they compromise it, they will use it to hop around and hack other computers; at least that would be the way a smart hacker would go so he would not be found. This is one of many attacks that internet hackers may use.