Skip to main content

Google Digging and Art Of Googling

Today I Will Explained About the Google Hacking .This is also called as the Art of Googling and Google Digging .
Google Dorks :-


1) Intitle :
2) Filetype :
3) Site :
4) Related
5) Inurl :
etc
By using the Above In the Google Search We can get the Exact results what we have searching,so this is called Google Hacking .

Intitle :-


Search for the Text In the Title of the Websites


Ex:- 
Intitle : Hacking.
Intitle : Security. 
Intitle : Technology.This Search will Give you the List of All the Websites with title Hacking and Related to Hacking .

Site :-


To Narrow the Search of the Specific Website 


Ex : Site : www.technohackzs.blogspot.com
Site : nic.in admin login
Site : nitw.ac.in
site : nitw.ac filetype : pdf


It gives you the Confidential information of a site also
Site : gov.in filetype : doc confidential 

This Search will give you the list of all the web pages from the website technohackzs.blogspot.com
you can try the any site with this .

Filetype :-


Searching the Files of Specfic type in the form of docs , pdf , ppts .
and by this search we can get the reduced results from google and exact result like  ppt and pdf 


Ex:-
filetype : ppt Hacking 
filetype : pdf Hacking
filetype : doc Intitle: "Hacking" etc

Related :-

This gives the Related search of any website .... example type 
Related : Facebook.com
all social websites like facebook appear in your browser  .
Related : Nakuri.com.
Related : Google.com

Inurl :-

Inurl : Hacking 
Inurl : adminlogin.asp
Inurl : adminlogin.jsp
Inurl : adminlogin.aspx
By this you can login as a admin with trying of Sql Injection.

Watch Live CCTV Cameras :-

Type in the Google as 

liveapplet 

inurl: view/index.shtml.

intitle:liveapplet
intitle:axis intitle:"video server"
intitle:"EvoCam" 
inurl:"webcam.html"
intitle:"Live NetSnap Cam-Server feed"
intitle:"Live View / - AXIS 206M"
intitle:"Live View / - AXIS 206W" 
intitle:"Live View / - AXIS 210" 
inurl: indexframe.shtmlaxis.
intitle:"Live View / - AXIS"
intitle:"WJ-NT104 Main Page"
intitle:snc-z20 inurl:home/
intitle:snc-cs3 inurl:home/ 
intitle:snc-rz30 inurl:home/ 
intitle:"sony network camera snc-p1"
viewnetcam.com
intitle:"Toshiba Network Camera" user login
intitle:"i-Catcher Console-Webmoniter".
For More Go to Google and Type Google Hacking and
Go to Google & GHDB.



Comments

Popular posts from this blog

Place Files Inside EXE and Execute them using Gamemaker

I am fond of creating games in Gamemaker and Mugen. However I found an interesting way to create executable files that may contain anything inside them (may be a whole cracked Program) and may act as extractors or copy protectors Tools required  GameMaker 7 or above Procedure  1) Download and Install Gamemaker and start a Game Project by going to File -> New.  2) Every game consists of a Room in which all objects shall act and interact with each other.So Create a new room by either clicking on the icon on Standard toolbar or by going to Resources Menu -> Create Room.Name it anything you want.In my case ROOM0  3)Every Game consists of Objects which are responsible for all interactions. So create a new object by either clicking on the icon on Standard toolbar or by going to Resources Menu -> Create Object.Name it anything you want.In my case VIRUS  4)Now create a new script (Press CTRL+ALT+C or Resources Menu -> Create Script),Name it SCRIPT0...

Basic Introduction To SQL Injection

SQl injection is a vulnerability that allows an attacker to influence the queries that are passed to the back-end database.It has been present since the time databases have been attached to the web applications.However, the main credit of bringing SQL injection into public notice goes to Rain Forest Puppy who in 1998 wrote an article on it and in 2000 he wrote another article describing how he hacked one of the popular website on the internet using SQL injection. Before understanding the how SQL injection attacks we need to understand the Simple Three Tier Architectureor a Four Tier Architecture.This will clear your basics and give you a rough idea of how database-driven web applications work. Three Tier Architecture In a simple three tier datbase-driven architecture the three layers that are used are:- Presentation Tier(Browsers) Logic Tier Storage Tier(Database) The three tier architecture follows a linear relationship i.e Presentation Tier connects to the Logic Tier and...

How to Hack a Twitter Account

Twitter is one of the topmost widely running social networking sites,Its alexa ranking is 14(As per now).So therefore it is largely becoming target of hackers,Many requests keep coming to me ,please tell us a way to Hack twitter accounts or How to hack twitter accounts,so therefore i today i have written a post on How to hack twitter accounts Well for this purpose i will tell you the most used method to hack twitter accounts i.e phishing How to hack twitter accounts - Phishing First of all download:   Twitter fake login page ( Latest Version ) Click Here To Download : NOTE : You will be asked to enter a password while extracting the Documents. Please Insert the password as : IHA Step 1 First extract the contents into a folder Step 2 Then edit login.php .(right click and then select edit) In that ,find (CTRL+F) ‘http://rafayhackingarticles.blogspot.com’ then change it to your destined URL but don’t forget ‘'. Now rename the script to pass....