Now, Let’s click on any link whether we get the password list.When we use this URL we can find some password and database. Configuration files should never be accessible externally.Plain Text Password Search For Configuration Files With Passwords In the below picture we login details for links we directly download the data and we can search in that file.when we use this URL we can see password list in plain text Passwords that are available in internet allintext:password filetype:log after:2018.In the above picture, we see some file containing confidential data in it.Now click on any link from that HTTP pages, Let’s see any data is available.This URL will list out only unsecured HTTP pages, In this results, we can find hundreds of HTTP pages and ready to compromise If we want to find out insecure HTTP pages, we have to modify the request above by changing “FTP” to “HTTP” intitle:”index of” inurl:http after:2018.If you click on any link in this we can download and see the content in this filesįIND UNSECURE WEBSITES WITH GOOGLE HACKING Let’s check whether we can any confidential information Now click on any link from that FTP pages, Let’s see any data is available or not.Now We use the dork to search for FTP servers available after 2018. These servers allow you to find out the files of internal use but unknowingly ended up in public access.It involves using specialized search query operation to find out the right results based on what you are looking for, By some advanced operators like (inurl, filetype, intitle) using this advanced operators we can find out some information which is openly connected to the internet it may happen in a different way like mostly The first is when the server or other service is configured incorrectly, and administrative logs are available via the Internet. In the event of a password change or failure during authorization, account leakage through these logs is possible. The second scenario is when configuration files containing the same information become available. It is assumed that these files are for internal use only, but often confidential information is available in cleartext. Both of these scenarios allow you to gain control over the entire deal if an attacker manages to find the files of this kindįIND OPEN FTP SERVERS WITH GOOGLE HACKING Google hacking is a passive information gathering or footprinting technique that is used to extract information about vulnerabilities data exposure and security misconfiguration in websites which stored on a server Google is used for everything to find out the details about any topics which we don’t know or having any type of confusion in it and now using the same search engine we can find out some sensitive information called google dorking In this smart world if we are connected to the internet we can find many types of details using a google search engine.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |