Welcome to Hackers Protocol Official Website

Showing posts with label Google Hacking. Show all posts
Showing posts with label Google Hacking. Show all posts

Friday, August 5, 2011

Advanced Password Hacking Using Google

Google is your Best Friend when it comes to Hacking. The Search Engine Giant has crawled loads of data which was intended to be protected by webmasters, but is being exploited and mined by smart users using Google Dorks. Today I will be Discussing some Practical Dorks which will help you Gain Passwords, Databases and Vulnerable Directories. The Basic Methodology remains the same, query Google using Specialized Dorks with precise parameters and you are good to go.
I assume you have basic Working Knowledge of  Google Dorks.

Lets start, shall we ?

Tuesday, August 2, 2011

Google Hacking


Google Hacking Doesn't mean to Hack Google. Google Hacking term used when a Hacker tries to Find Vulnerable Targets or Sensitive Data by using the Google Search Engine. In Google Hacking Hackers use Search Engine Commands to Locate Sensitive Data and Vulnerable Devices on the Internet. Google supports a multitude of operators and modifiers that add a ton of power to Google Searching.
Although Google Hacking Techniques are against Google Terms of Service and Google Blocks well-known Google Hacking Queries, nothing can stop Hackers from Crawling Websites and Launching Google Queries.
I am going to Explain Some Operators used in Google Hacking.

Find Vulnerable Websites Using Google for SQL Injection


Use any of these Search Query in Google to Find the Website Vulnerable to SQL Injection. Try to Check Vulnerability and get its Detail by many SQL Injection Tricks.

inurl:index.php?id=
inurl:buy.php?category=
inurl:article.php?ID=
inurl:games.php?id=
inurl:newsDetail.php?id=
inurl:gallery.php?id=
Related Posts Plugin for WordPress, Blogger...
free web site traffic and promotion