Author: Jeremy Brake
Directory One, Inc.
Web Development & Optimization Expert

There is more to Google than you know. Some people just search while others may find ways to compromise your central processing unit (CPU) or a server. Google is a very powerful tool to hackers that are trying to track down exploits or vulnerabilities in systems. Here is what a hacker might do to compromise your system.

To use these methods you will need to go to Google and type in the commands after the —> into their search bar….

Remote Desktop Connection —> “VNC Desktop” inurl:5800

Compromise Unix User and Passwords —> filetype:pwd service

To Find Sensitive Information such as passwords and financial stuff
—> filetype:bak inurl:”htaccess | passwd | shadow | htusers”

Database Hacking —> filetype:properties inurl:db intext:password

IIS Hacking —> intitle:”Welcome to IIS 4.0″

Edu Hacking —> “not for distribution” confidential site:edu

Hackers use all of these techniques above to compromise a system. After they compromise it, they will use it to hop around and hack other computers; at least that would be the way a smart hacker would go so he would not be found. This is one of many attacks that internet hackers may use.