Google Hacking

  August 24, 2007   Category :     Computer Security Consulting   information

Author: Jeremy Brake
Directory One, Inc.
Web Development & Optimization Expert

There is more to Google than you know. Some people just search while others may find ways to compromise your central processing unit (CPU) or a server. Google is a very powerful tool to hackers that are trying to track down exploits or vulnerabilities in systems. Here is what a hacker might do to compromise your system.

To use these methods you will need to go to Google and type in the commands after the —> into their search bar….

Remote Desktop Connection —> “VNC Desktop” inurl:5800

Compromise Unix User and Passwords —> filetype:pwd service

To Find Sensitive Information such as passwords and financial stuff
—> filetype:bak inurl:”htaccess | passwd | shadow | htusers”

Database Hacking —> filetype:properties inurl:db intext:password

IIS Hacking —> intitle:”Welcome to IIS 4.0″

Edu Hacking —> “not for distribution” confidential site:edu

Hackers use all of these techniques above to compromise a system. After they compromise it, they will use it to hop around and hack other computers; at least that would be the way a smart hacker would go so he would not be found. This is one of many attacks that internet hackers may use.

About The Author

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book.

Comments are closed.