Tips and tricks on using google to search effectively and getting the expected results is google hacking. Also, hackers use google hacking skills to find private information that present in the web. Like live web camera, web application vulnerabilities, software version and many more.
2. When we searching in google,
We are not actually searching the web
Searching google’s index of the web
Indexing is done in google with a software
program called “Spiders”.
Spider collects every links in a particular
webpage and the webpages where the links
lead to and it goes on and on…
3. Once after spidering, there created a big
chunk of data which is the index.
Once the search term is entered, google
checks in the index for several criteria and
shows the results.
How many times the search keywords used.
Whether it is present in title and the url.
Does the page have synonyms and good PR.
4. GH is not about hacking Google itself.
Google, a powerful searching engine as we all
know.
GH is all about tips and tricks to get more out
of a google search.
GH is used to search and locate security
vulnerabilities on poorly constructed web
application on the internet.
5. GH is used by hackers to pull sensitive
information like credit card information.
GH helps us to highly customize the search
results.
7. “ ” double quotes : Exact phrases
- Minus : Excludes the keyword or value
+ Add : Includes the keyword or value
. Dot : Single character wildcard
.. Num range : Creates a number range b/w 2
* Asterisk : Place holder to any unknown term
~ Tilde : Synonyms of the keyword
..and more available.
8. Define – shows the definition of the word
Related – Shows related websites
Similar – Shows similar websites
Cache – Shows the cache of a webpage
Info – Shows the information about a web
address
Filetype – Finds specific format in the web
Inurl – Searches the keyword in the url
Intitle – searches the keyword in the title
…
9. Site: searches in the particular website
..and more
The best use of advanced operators are
utilized when multiple operators are
combined in a search.
Ex: female designer intitle:"resume"
filetype:pdf
21. The robots.txt file contains "rules" about where
web spiders are allowed (and NOT allowed) to
look in a website's directory structure. Without
over-complicating things, this means that the
robots.txt file gives a miniroadmap of what's
somewhat public and what's considered more
private on a web site. Have a look at the
robots.txt file itself, it contains interesting
stuff.However, don't forget to check out the other
files in these directories since they are usually at
the top directory level of the web server!
22. ◦ The idea behind a Google Hack Honeypot is that it
places an invisible link onto your Web site. Just like
the case with a poorly constructed application,
visitors to your site will never see this link, but
Google will. However, instead of providing access to
backend data, the link directs would-be hackers to
a PHP script that logs their activity. Your site's real
backend is never exposed through this link.
◦ http://ghh.sourceforge.net/index.php