Using Google to Gather Information



A hacker may also do a Google search or a Yahoo! People search to locate information about employees or the organization itself.
The Google search engine can be used in creative ways to perform information gathering. The use of the Google search engine to retrieve information has been termed Google hacking. Go to http://groups.google.com to search the Google newsgroups. The following commands can be used to have the Google search engine gather target information:
  • site Searches a specific website or domain. Supply the website you want to search after the colon.]
  • filetype Searches only within the text of a particular type of file. Supply the file type you want to search after the colon. Don't include a period before the file extension.
  • link Searches within hyperlinks for a search term and identifies linked pages.
  • cache Identifies the version of a web page. Supply the URL of the site after the colon.
  • intitle Searches for a term within the title of a document.
  • inurl Searches only within the URL (web address) of a document. The search term must follow the colon.
For example, a hacker could use the following command to locate certain types of vulnerable web applications:
INURL:["parameter="] with FILETYPE:[ext] and INURL:[scriptname]
Or a hacker could use the search string intitle:"BorderManager information alert" to look for Novell BorderManager proxy/firewall servers.
Note 
For more syntax on performing Google searches, visit www.google.com/help/refinesearch.html.
Blogs, newsgroups, and press releases are also good places to find information about the company or employees. Corporate job postings can provide information as to the type of servers or infrastructure devices a company may be using on its network.
Other information obtained may include identification of the Internet technologies being used, the operating system and hardware being used, active IP addresses, email addresses and phone numbers, and corporate policies and procedures.
Note 
Generally, a hacker spends 90 percent of the time profiling and gathering information on a target and 10 percent of the time launching the attack.

6 comments:

  1. Google is very important search engine and also it is very famous.
    Thank you,
    Equity Tips

    ReplyDelete
  2. Hello Everyone !

    USA SSN Leads/Fullz available, along with Driving License/ID Number with good connectivity.

    All SSN's are Tested & Verified.

    **DETAILS IN LEADS/FULLZ**

    ->FULL NAME
    ->SSN
    ->DATE OF BIRTH
    ->DRIVING LICENSE NUMBER
    ->ADDRESS WITH ZIP
    ->PHONE NUMBER, EMAIL
    ->EMPLOYEE DETAILS

    *Price for SSN lead $2
    *You can ask for sample before any deal
    *If you buy in bulk, will give you discount
    *Sampling is just for serious buyers

    ->Hope for the long term business
    ->You can buy for your specific states too

    **Contact 24/7**

    Whatsapp > +923172721122

    Email > leads.sellers1212@gmail.com

    Telegram > @leadsupplier

    ICQ > 752822040

    ReplyDelete

Popular Posts