Blog Archives

How Hackers Use Google Search For Hacking


As you all know that Google indexes 80% of the internet providing you all information you require, but it also provides some confidential information, which in hands of a hacker can prove fatal.

and you can do it by just right search query.

here are some examples for you.

 

HOW HACKERS USE GOOGLE FOR HACKING SECURITY CAMERAS?

There are many security cameras used for monitoring places like parking lots, college campus, road traffic etc and which provide the information on web.

All You have to do is Type in Google search box exactly as follows and hit enter

inurl:”viewerframe?mode=motion”

Open any of the link and you will gain access to the live camera which has full controls. You are now all done. You can perform all the actions on that camera, such as: zoom in, zoom out,rotate the camera etc.

How To Gain Personal and Confidential Documents.

You can gain access to an email repository containing CV of hundreds of people which were created when applying for their jobs. The documents containing their Address, Phone, DOB, Education, Work experience etc via Google search.

Just type in

intitle:”curriculum vitae” “phone * * *” “address *” “e-mail”

if you want to get excel file, then

filetype:xls inurl:”email.xls”

and for gaining access to documents potentially containing information on bank accounts, financial summaries and credit card numbers using the following search query.

intitle:index.of finances.xls

Using Google To Get Free Stuffs

Using Google search You can get free music,ebooks and lot more free stuffs.

you just need to enter this quire.

“?intitle:index.of?mp3 Lady Gaga“

after hitting this you will get all album list of Lady Gaga, where you can download her songs by your choice.

similarly if you want to get free ebooks type :

“?intitle:index.of?pdf ebooks“

it will provide you all pdf with the name ‘ebooks’.

You can do a lot more by just entering the right keyword.

Advertisements

5 hacking Tools A Hacker Must Have


Here is the following list of some of the tools used by hackers in the hacking playground.

1) Vulnerability Scanner

Nessus :- Premier UNIX vulnerability assessment tool
Nessus is the best free network vulnerability scanner available, and the best to run on UNIX at any price. It is constantly updated, with more than 11,000 plugins for the free (but registration and EULA-acceptance required) feed. Key features include remote and local (authenticated) security checks, a client/server architecture with a GTK graphical interface, and an embedded scripting language for writing your own plugins or understanding the existing ones.

Home:- http://www.nessus.org
Latest Release:- Nessus 4
Download:- http://www.nessus.org/download/

2) Port Scanner

Nmap :-This tool developed by Fyodor is one of the best unix and windows based port scanners. This advanced port scanner has a number of useful arguments that gives user a lot of control over the process.

Home:- http://www.insecure.org
Latest Release:- Nmap 5.50
Download:- http://nmap.org/download.html

3) ETHEREAL

Ethereal :-This (also known as Wireshark) is a fantastic open source network protocol analyzer for Unix and Windows. It allows you to examine data from a live network or from a capture file on disk. You can interactively browse the capture data, delving down into just the level of packet detail you need. Ethereal has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session. It also supports hundreds of protocols and media types.

Home:- http://www.wireshark.org
Latest Release:- Wireshark 1.0.4 (Ethereal)
Download:- http://www.wireshark.org/download.html

4) PROXY

Tor :- An anonymous Internet communication system Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet. Using Tor can help you anonymize web browsing and publishing, instant messaging, irc, ssh, and other applications that use the TCP protocol. Tor also provides a platform on which software developers can build new applications with built-in anonymity, safety, and privacy features.

Website: http://tor.eff.org/ 

5) Password Cracker  

 

Cain and Abel :- The top password recovery tool for Windows. This Windows-only password recovery tool handles an enormous variety of tasks. It can recover passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIPconversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.

Home:- http://www.oxid.it
Latest Release:- cain & abel v4.9.40
Download:- http://www.oxid.it/cain.html