SlideShare a Scribd company logo
Google Hacks
             How to Search Efficiently.




8th Aug 09                         http://www.mumbaiitpro.org/
Google Hacks:

   What is Google Hacks ?
   Basic Operators
   Advanced Operators
   Directory Listing
   Interesting Searches
   Tool
   Anonymous Googling
   Protecting Yourself From Google
What is Google Hacks ?:

Google hacks is all about tricks for making best use of search
  & making Google to perform searches that you cannot
         perform using the regular Google search.
Basics: http://www.searchengineshowdown.com/ features/Google/
Including & Excluding Terms: Plus(+) and Minus(-) signs.
Eg: Russian Revolution
  : Meat Free Recipes
  : Russian Revolution –Industrial
   : King –Akbar




Phrase Search: “ “ (Between The Codes).
Eg: "Russian Revolution“
  : “US Constitution“
  : “Meat Free" Recipes
Basics:
And & OR: &/|.
Eg: Holiday OR Vacation
  : Akbar AND King is same as Akbar King
  : Akbar OR King



Not Case Sensitive.
Eg: Shabbir is same as ShAbBiR



Synonyms (~).
Eg: ~Boat
   This will get boat, marine, sailboat, Etc (Similar Meanings)
Basics:

Currency Converter.
Eg: 1 us dollars in Mexican peso


Measurement Conversion.
Eg: Cup in liters
Boolean Searching: Using Brackets & Operators.
http://www.searchengineshowdown.googleboolean.html

Eg: “Meat Free" Recipes Chinese OR Indian
   : (Roman OR Greek) AND Mythology
   : ((Roman OR Greek) AND Mythology) AND Dictionary

Eg : 2+((2*2)/2) OR 2+2*2/2 (Calculator)
Advanced Operators:

Operator:Search_Term
There's no space between the operator, the colon, and the search term.


Movie:<Movie Name>
Eg: Movie:Ghajni


Define:Word
Eg: Define:Cryptography

Weather:City, State
Eg: Weather:Mumbai, Maharashtra
Advanced Operators:
Link:<URL> (Popularity) (Link has limit) (Cannot Combine with Other Operator)
Eg: Link:www.microsoft.com


Numrange:<Number Range>
Eg: Numrange:100000-20000


Inurl:<URL>
Eg:
Advanced Operators:

Related:<URL> (Results Related To The URL Entered)
Eg: Related:www.faa.gov


Filetype:<File Extension> (Supports 12 File Formats)
Eg: Filetype:pdf form 1040


Cache:<URL>
Eg: Cache:www.cisco.com
Advanced Operators:
Site:<Website OR Domain Name>
Eg: Site:www.microsoft.com
   : Site:microsoft.com -site:www.microsoft.com (32 Query Limit)

Intext:<Text>
Eg: Intext: ”Shabbir Ahmed”

Intitle:< >
Eg:Intitle:Culminis

author:<name/email address>
Eg:author:shabz
Directory Listing:

Eg:
   intitle:index.of server.at
   intitle:index.of server.at site:microsoft.com
   intitle:index.of “parent directory”
   intitle:index.of name size
Interesting Searches:
Eg:
   filetype:bak
  intitle:index.of .etc
  intitle:”index.of “ config.php
  allinurl:auth_user_file.txt
  allinurl: admin mdb
  allinurl:service.pwd
  intitle:”Index of” passwords modified
  intitle:”VNC Viewer for Java“
Interesting Searches:
Eg:
   filetype:pst
  filetype:xls username password email
  filetype:eml + intext:”subject” + intext:”from”
  filetype:reg reg + intext:”internet account manager”
  inurl:8080 –intext:8080
  “Access is denied for user” “using password”
   intitle:”Error Occurred”
  filetype:inc intext:mysql_connect
Interesting Searches:
Eg:
   index.of.DCIM (digital Camera Image)
  inurl:”level/15/exec/-/show” (Open Cisco Devices)
  intitle:”Active Webcam page”
This table is taken from the book “Google Hacking for Penetration Testers”
Tool - Google Hacks:




 DOWNLOAD
 http://googlehacks.googlecode.com/files/GoogleHacksSetup1.6.exe
Anonymous Googling:
Cached
-Original
-Cached Text Only (&strip=1)


Google As a Proxy
-Translator
What Is “I Am Feeling Lucky” ?????
Protecting Yourself From Google:
Remove Your Site From Google’s Index
-http://www.google.com/remove.html

Robots.txt
-http://www.robotstxt.org
Thank You


            Shabbir Ahmed
            CCIE, MCT, CEH, CCSA.

More Related Content

What's hot

Google Cheat Sheet
Google Cheat SheetGoogle Cheat Sheet
Google Cheat Sheetguest47b8f5d
 
Search engines coh m
Search engines coh mSearch engines coh m
Search engines coh mcpcmattc
 
Lesson 3
Lesson 3Lesson 3
Lesson 3
Juvywen
 
Optimizing Your Web Site for Discovery: A Workshop
Optimizing Your Web Site for Discovery: A WorkshopOptimizing Your Web Site for Discovery: A Workshop
Optimizing Your Web Site for Discovery: A Workshop
OReillyTOC
 
06. ElasticSearch : Mapping and Analysis
06. ElasticSearch : Mapping and Analysis06. ElasticSearch : Mapping and Analysis
06. ElasticSearch : Mapping and Analysis
OpenThink Labs
 
01 ElasticSearch : Getting Started
01 ElasticSearch : Getting Started01 ElasticSearch : Getting Started
01 ElasticSearch : Getting Started
OpenThink Labs
 
How to google
How to googleHow to google
How to google
mahajanmanu
 
Effective search on_google
Effective search on_googleEffective search on_google
Effective search on_google
Nipu Singh
 
Day1 search-1
Day1 search-1Day1 search-1
Day1 search-1jmurali
 
CITEC #CON2-Dirty Attack with Google Hacking
CITEC #CON2-Dirty Attack with Google HackingCITEC #CON2-Dirty Attack with Google Hacking
CITEC #CON2-Dirty Attack with Google HackingPrathan Phongthiproek
 
03. ElasticSearch : Data In, Data Out
03. ElasticSearch : Data In, Data Out03. ElasticSearch : Data In, Data Out
03. ElasticSearch : Data In, Data Out
OpenThink Labs
 
Pbcore workshop slides
Pbcore workshop slidesPbcore workshop slides
Pbcore workshop slides
pbcore
 
Mpl brownbag sept2011
Mpl brownbag sept2011Mpl brownbag sept2011
Mpl brownbag sept2011
Jason Coleman
 
Lfnsheffield
LfnsheffieldLfnsheffield
Lfnsheffield
tomroper
 
The Many Faces of Google
The Many Faces of GoogleThe Many Faces of Google
The Many Faces of GoogleJoel May
 
Google tricks
Google tricksGoogle tricks
Google tricksRam Patil
 
Amrapali builders -- google cheatsheet.pdf
Amrapali builders -- google cheatsheet.pdfAmrapali builders -- google cheatsheet.pdf
Amrapali builders -- google cheatsheet.pdf
amrapalibuildersreviews
 
Boolean Searching
Boolean SearchingBoolean Searching
Boolean Searchinghisled
 
Search Engine
Search EngineSearch Engine
Search Engine
ADARSHMISHRA126
 

What's hot (20)

Google Cheat Sheet
Google Cheat SheetGoogle Cheat Sheet
Google Cheat Sheet
 
Search engines coh m
Search engines coh mSearch engines coh m
Search engines coh m
 
Lesson 3
Lesson 3Lesson 3
Lesson 3
 
Optimizing Your Web Site for Discovery: A Workshop
Optimizing Your Web Site for Discovery: A WorkshopOptimizing Your Web Site for Discovery: A Workshop
Optimizing Your Web Site for Discovery: A Workshop
 
06. ElasticSearch : Mapping and Analysis
06. ElasticSearch : Mapping and Analysis06. ElasticSearch : Mapping and Analysis
06. ElasticSearch : Mapping and Analysis
 
01 ElasticSearch : Getting Started
01 ElasticSearch : Getting Started01 ElasticSearch : Getting Started
01 ElasticSearch : Getting Started
 
Online Search Techniques-Boolean Searching
Online Search Techniques-Boolean SearchingOnline Search Techniques-Boolean Searching
Online Search Techniques-Boolean Searching
 
How to google
How to googleHow to google
How to google
 
Effective search on_google
Effective search on_googleEffective search on_google
Effective search on_google
 
Day1 search-1
Day1 search-1Day1 search-1
Day1 search-1
 
CITEC #CON2-Dirty Attack with Google Hacking
CITEC #CON2-Dirty Attack with Google HackingCITEC #CON2-Dirty Attack with Google Hacking
CITEC #CON2-Dirty Attack with Google Hacking
 
03. ElasticSearch : Data In, Data Out
03. ElasticSearch : Data In, Data Out03. ElasticSearch : Data In, Data Out
03. ElasticSearch : Data In, Data Out
 
Pbcore workshop slides
Pbcore workshop slidesPbcore workshop slides
Pbcore workshop slides
 
Mpl brownbag sept2011
Mpl brownbag sept2011Mpl brownbag sept2011
Mpl brownbag sept2011
 
Lfnsheffield
LfnsheffieldLfnsheffield
Lfnsheffield
 
The Many Faces of Google
The Many Faces of GoogleThe Many Faces of Google
The Many Faces of Google
 
Google tricks
Google tricksGoogle tricks
Google tricks
 
Amrapali builders -- google cheatsheet.pdf
Amrapali builders -- google cheatsheet.pdfAmrapali builders -- google cheatsheet.pdf
Amrapali builders -- google cheatsheet.pdf
 
Boolean Searching
Boolean SearchingBoolean Searching
Boolean Searching
 
Search Engine
Search EngineSearch Engine
Search Engine
 

Viewers also liked

A fresh new look into Information Gathering - OWASP Spain
A fresh new look into Information Gathering - OWASP SpainA fresh new look into Information Gathering - OWASP Spain
A fresh new look into Information Gathering - OWASP Spain
Christian Martorella
 
Composición básica de dorks
Composición básica de dorksComposición básica de dorks
Composición básica de dorks
Tensor
 
Hacking con buscadores
Hacking con buscadoresHacking con buscadores
Hacking con buscadores
Tensor
 
Google hacking
Google hackingGoogle hacking
Google hacking
Hacking Bolivia
 
Google hacks
Google hacksGoogle hacks
Google hacks
Caroline Roche
 
Google Hacking - Explorando falhas de dispotivos
Google Hacking - Explorando falhas de dispotivosGoogle Hacking - Explorando falhas de dispotivos
Google Hacking - Explorando falhas de dispotivos
C H
 
Conceitos e Leis sobre Cibercrimes - Lei Carolina Dieckmann 12.737/12
Conceitos e Leis sobre Cibercrimes - Lei Carolina Dieckmann 12.737/12 Conceitos e Leis sobre Cibercrimes - Lei Carolina Dieckmann 12.737/12
Conceitos e Leis sobre Cibercrimes - Lei Carolina Dieckmann 12.737/12
C H
 
Google hacking 2015
Google hacking 2015Google hacking 2015
Google hacking 2015
gopartheredbuff
 
Information gathering
Information gatheringInformation gathering
Information gathering
Maulik Kotak
 
Gathering information presentation.
Gathering information presentation.Gathering information presentation.
Gathering information presentation.danielle93
 
Google Dorks and SQL Injection
Google Dorks and SQL InjectionGoogle Dorks and SQL Injection
Google Dorks and SQL Injection
Mudassir Hassan Khan
 
Técnicas de Invasão - INFOESTE 2015
Técnicas de Invasão - INFOESTE 2015Técnicas de Invasão - INFOESTE 2015
Técnicas de Invasão - INFOESTE 2015
C H
 

Viewers also liked (13)

A fresh new look into Information Gathering - OWASP Spain
A fresh new look into Information Gathering - OWASP SpainA fresh new look into Information Gathering - OWASP Spain
A fresh new look into Information Gathering - OWASP Spain
 
Composición básica de dorks
Composición básica de dorksComposición básica de dorks
Composición básica de dorks
 
Hacking con buscadores
Hacking con buscadoresHacking con buscadores
Hacking con buscadores
 
Google hacking
Google hackingGoogle hacking
Google hacking
 
Google hacks
Google hacksGoogle hacks
Google hacks
 
Google Hacking - Explorando falhas de dispotivos
Google Hacking - Explorando falhas de dispotivosGoogle Hacking - Explorando falhas de dispotivos
Google Hacking - Explorando falhas de dispotivos
 
Conceitos e Leis sobre Cibercrimes - Lei Carolina Dieckmann 12.737/12
Conceitos e Leis sobre Cibercrimes - Lei Carolina Dieckmann 12.737/12 Conceitos e Leis sobre Cibercrimes - Lei Carolina Dieckmann 12.737/12
Conceitos e Leis sobre Cibercrimes - Lei Carolina Dieckmann 12.737/12
 
Google hacking 2015
Google hacking 2015Google hacking 2015
Google hacking 2015
 
Information gathering
Information gatheringInformation gathering
Information gathering
 
Gathering information presentation.
Gathering information presentation.Gathering information presentation.
Gathering information presentation.
 
Google Dorks and SQL Injection
Google Dorks and SQL InjectionGoogle Dorks and SQL Injection
Google Dorks and SQL Injection
 
Técnicas de Invasão - INFOESTE 2015
Técnicas de Invasão - INFOESTE 2015Técnicas de Invasão - INFOESTE 2015
Técnicas de Invasão - INFOESTE 2015
 
Slider Share
Slider  ShareSlider  Share
Slider Share
 

Similar to Google Hack

3 Google Operators
3 Google Operators3 Google Operators
3 Google Operatorsaptwano
 
Google Searchology
Google SearchologyGoogle Searchology
Google Searchology
Maheshkumar Darji
 
Google search - Tips and Tricks
Google search - Tips and TricksGoogle search - Tips and Tricks
Google search - Tips and Tricks
Naji El Kotob
 
Introduction to Google API - Focusky
Introduction to Google API - FocuskyIntroduction to Google API - Focusky
Introduction to Google API - Focusky
Focusky Presentation
 
Google guide - Make searching even easier
Google guide - Make searching even easierGoogle guide - Make searching even easier
Google guide - Make searching even easier
Kuyseng Chhoeun
 
Plv Hal History Day
Plv Hal History DayPlv Hal History Day
Plv Hal History Day
ESU_THREE
 
Demystifying google hacks
Demystifying google hacksDemystifying google hacks
Demystifying google hacks
darwinah retno
 
Kibana: Real-World Examples
Kibana: Real-World ExamplesKibana: Real-World Examples
Kibana: Real-World Examples
Salvatore Cordiano
 
Grails Introduction - IJTC 2007
Grails Introduction - IJTC 2007Grails Introduction - IJTC 2007
Grails Introduction - IJTC 2007
Guillaume Laforge
 
SearchLove Boston 2017 | Dom Woodman | How to Get Insight From Your Logs
SearchLove Boston 2017 | Dom Woodman | How to Get Insight From Your LogsSearchLove Boston 2017 | Dom Woodman | How to Get Insight From Your Logs
SearchLove Boston 2017 | Dom Woodman | How to Get Insight From Your Logs
Distilled
 
Google search
Google searchGoogle search
Google search
Nelly1985
 
Boolean operators
Boolean operatorsBoolean operators
Boolean operators
Dean Da Costa
 
(Re-) Discovering Lost Web Pages
(Re-) Discovering Lost Web Pages(Re-) Discovering Lost Web Pages
(Re-) Discovering Lost Web Pages
Michael Nelson
 
A Guide to Log Analysis with Big Query
A Guide to Log Analysis with Big QueryA Guide to Log Analysis with Big Query
A Guide to Log Analysis with Big Query
Dominic Woodman
 
SearchLove London 2016 | Dom Woodman | How to Get Insight From Your Logs
SearchLove London 2016 | Dom Woodman | How to Get Insight From Your LogsSearchLove London 2016 | Dom Woodman | How to Get Insight From Your Logs
SearchLove London 2016 | Dom Woodman | How to Get Insight From Your Logs
Distilled
 
Google Search Operators
Google Search OperatorsGoogle Search Operators
Google Search Operatorsjjs1981
 
Presentation on google
Presentation on googlePresentation on google
Presentation on googletara
 
Google cheatsheet
Google cheatsheetGoogle cheatsheet
Google cheatsheet
Alejandro Rivera Santander
 
20100614 ISWSA Keynote
20100614 ISWSA Keynote20100614 ISWSA Keynote
20100614 ISWSA Keynote
Axel Polleres
 

Similar to Google Hack (20)

3 Google Operators
3 Google Operators3 Google Operators
3 Google Operators
 
Google Searchology
Google SearchologyGoogle Searchology
Google Searchology
 
Google search - Tips and Tricks
Google search - Tips and TricksGoogle search - Tips and Tricks
Google search - Tips and Tricks
 
Introduction to Google API - Focusky
Introduction to Google API - FocuskyIntroduction to Google API - Focusky
Introduction to Google API - Focusky
 
Google
GoogleGoogle
Google
 
Google guide - Make searching even easier
Google guide - Make searching even easierGoogle guide - Make searching even easier
Google guide - Make searching even easier
 
Plv Hal History Day
Plv Hal History DayPlv Hal History Day
Plv Hal History Day
 
Demystifying google hacks
Demystifying google hacksDemystifying google hacks
Demystifying google hacks
 
Kibana: Real-World Examples
Kibana: Real-World ExamplesKibana: Real-World Examples
Kibana: Real-World Examples
 
Grails Introduction - IJTC 2007
Grails Introduction - IJTC 2007Grails Introduction - IJTC 2007
Grails Introduction - IJTC 2007
 
SearchLove Boston 2017 | Dom Woodman | How to Get Insight From Your Logs
SearchLove Boston 2017 | Dom Woodman | How to Get Insight From Your LogsSearchLove Boston 2017 | Dom Woodman | How to Get Insight From Your Logs
SearchLove Boston 2017 | Dom Woodman | How to Get Insight From Your Logs
 
Google search
Google searchGoogle search
Google search
 
Boolean operators
Boolean operatorsBoolean operators
Boolean operators
 
(Re-) Discovering Lost Web Pages
(Re-) Discovering Lost Web Pages(Re-) Discovering Lost Web Pages
(Re-) Discovering Lost Web Pages
 
A Guide to Log Analysis with Big Query
A Guide to Log Analysis with Big QueryA Guide to Log Analysis with Big Query
A Guide to Log Analysis with Big Query
 
SearchLove London 2016 | Dom Woodman | How to Get Insight From Your Logs
SearchLove London 2016 | Dom Woodman | How to Get Insight From Your LogsSearchLove London 2016 | Dom Woodman | How to Get Insight From Your Logs
SearchLove London 2016 | Dom Woodman | How to Get Insight From Your Logs
 
Google Search Operators
Google Search OperatorsGoogle Search Operators
Google Search Operators
 
Presentation on google
Presentation on googlePresentation on google
Presentation on google
 
Google cheatsheet
Google cheatsheetGoogle cheatsheet
Google cheatsheet
 
20100614 ISWSA Keynote
20100614 ISWSA Keynote20100614 ISWSA Keynote
20100614 ISWSA Keynote
 

Recently uploaded

20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 

Recently uploaded (20)

20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 

Google Hack

  • 1. Google Hacks How to Search Efficiently. 8th Aug 09 http://www.mumbaiitpro.org/
  • 2. Google Hacks:  What is Google Hacks ?  Basic Operators  Advanced Operators  Directory Listing  Interesting Searches  Tool  Anonymous Googling  Protecting Yourself From Google
  • 3. What is Google Hacks ?: Google hacks is all about tricks for making best use of search & making Google to perform searches that you cannot perform using the regular Google search.
  • 4. Basics: http://www.searchengineshowdown.com/ features/Google/ Including & Excluding Terms: Plus(+) and Minus(-) signs. Eg: Russian Revolution : Meat Free Recipes : Russian Revolution –Industrial : King –Akbar Phrase Search: “ “ (Between The Codes). Eg: "Russian Revolution“ : “US Constitution“ : “Meat Free" Recipes
  • 5. Basics: And & OR: &/|. Eg: Holiday OR Vacation : Akbar AND King is same as Akbar King : Akbar OR King Not Case Sensitive. Eg: Shabbir is same as ShAbBiR Synonyms (~). Eg: ~Boat This will get boat, marine, sailboat, Etc (Similar Meanings)
  • 6. Basics: Currency Converter. Eg: 1 us dollars in Mexican peso Measurement Conversion. Eg: Cup in liters
  • 7. Boolean Searching: Using Brackets & Operators. http://www.searchengineshowdown.googleboolean.html Eg: “Meat Free" Recipes Chinese OR Indian : (Roman OR Greek) AND Mythology : ((Roman OR Greek) AND Mythology) AND Dictionary Eg : 2+((2*2)/2) OR 2+2*2/2 (Calculator)
  • 8. Advanced Operators: Operator:Search_Term There's no space between the operator, the colon, and the search term. Movie:<Movie Name> Eg: Movie:Ghajni Define:Word Eg: Define:Cryptography Weather:City, State Eg: Weather:Mumbai, Maharashtra
  • 9.
  • 10.
  • 11. Advanced Operators: Link:<URL> (Popularity) (Link has limit) (Cannot Combine with Other Operator) Eg: Link:www.microsoft.com Numrange:<Number Range> Eg: Numrange:100000-20000 Inurl:<URL> Eg:
  • 12. Advanced Operators: Related:<URL> (Results Related To The URL Entered) Eg: Related:www.faa.gov Filetype:<File Extension> (Supports 12 File Formats) Eg: Filetype:pdf form 1040 Cache:<URL> Eg: Cache:www.cisco.com
  • 13. Advanced Operators: Site:<Website OR Domain Name> Eg: Site:www.microsoft.com : Site:microsoft.com -site:www.microsoft.com (32 Query Limit) Intext:<Text> Eg: Intext: ”Shabbir Ahmed” Intitle:< > Eg:Intitle:Culminis author:<name/email address> Eg:author:shabz
  • 14. Directory Listing: Eg: intitle:index.of server.at intitle:index.of server.at site:microsoft.com intitle:index.of “parent directory” intitle:index.of name size
  • 15. Interesting Searches: Eg: filetype:bak intitle:index.of .etc intitle:”index.of “ config.php allinurl:auth_user_file.txt allinurl: admin mdb allinurl:service.pwd intitle:”Index of” passwords modified intitle:”VNC Viewer for Java“
  • 16. Interesting Searches: Eg: filetype:pst filetype:xls username password email filetype:eml + intext:”subject” + intext:”from” filetype:reg reg + intext:”internet account manager” inurl:8080 –intext:8080 “Access is denied for user” “using password” intitle:”Error Occurred” filetype:inc intext:mysql_connect
  • 17. Interesting Searches: Eg: index.of.DCIM (digital Camera Image) inurl:”level/15/exec/-/show” (Open Cisco Devices) intitle:”Active Webcam page”
  • 18. This table is taken from the book “Google Hacking for Penetration Testers”
  • 19. Tool - Google Hacks: DOWNLOAD http://googlehacks.googlecode.com/files/GoogleHacksSetup1.6.exe
  • 20. Anonymous Googling: Cached -Original -Cached Text Only (&strip=1) Google As a Proxy -Translator
  • 21. What Is “I Am Feeling Lucky” ?????
  • 22. Protecting Yourself From Google: Remove Your Site From Google’s Index -http://www.google.com/remove.html Robots.txt -http://www.robotstxt.org
  • 23. Thank You Shabbir Ahmed CCIE, MCT, CEH, CCSA.