1 00:00:00,650 --> 00:00:05,780 ‫While the search engines are the most typical examples of crawlers and they let us run queries on the 2 00:00:05,780 --> 00:00:11,420 ‫websites, search engines are very useful to collect information about the target in depth. 3 00:00:12,640 --> 00:00:17,920 ‫Using search engines, you can find enormous pieces of useful information about the target company, 4 00:00:18,460 --> 00:00:24,760 ‫names of the employees, accessible services of the systems, files or folders which contain sensitive 5 00:00:24,760 --> 00:00:26,490 ‫data login pages. 6 00:00:26,830 --> 00:00:33,520 ‫Beyond the known weaknesses, these leave traces on the website on headers, titles, you URLs. 7 00:00:33,940 --> 00:00:37,390 ‫You can easily find these traces using search engines. 8 00:00:39,070 --> 00:00:45,220 ‫Google Hacking also named Google Dorking as a computer hacking technique that uses Google Search and 9 00:00:45,220 --> 00:00:51,040 ‫other Google applications to find security holes in the configuration and computer code that websites 10 00:00:51,040 --> 00:00:51,520 ‫use. 11 00:00:51,970 --> 00:00:57,310 ‫Google hacking involves using advanced operators in the Google search engine to locate specific strings 12 00:00:57,310 --> 00:00:58,840 ‫of text within search results. 13 00:00:59,260 --> 00:01:04,510 ‫Some of the more popular examples are finding specific versions of vulnerable web applications. 14 00:01:05,080 --> 00:01:09,250 ‫Some of the advanced operators of Google's search engines are shown in the slide. 15 00:01:09,760 --> 00:01:16,540 ‫You can see the details of advanced search in Google at Google.com Slash Advanced Underscores Search. 16 00:01:18,070 --> 00:01:24,730 ‫You can find a lot of specific queries on exploit dashti bbc.com slash Google Hyphen Docs. 17 00:01:25,790 --> 00:01:32,390 ‫Using these queries, you can discover Web application vulnerabilities, files containing username and 18 00:01:32,390 --> 00:01:40,040 ‫or passwords, sensitive folders, web services, error messages that disclose sensitive information, 19 00:01:40,490 --> 00:01:42,140 ‫log or backup files. 20 00:01:42,560 --> 00:01:48,380 ‫Devices such as printers or CCTV cameras that are accessible over the net and more. 21 00:01:50,630 --> 00:01:56,600 ‫For example, you can find a username and password list from front page service by writing the keyword 22 00:01:56,600 --> 00:01:58,940 ‫shown on the slide in the Google search field. 23 00:02:00,650 --> 00:02:06,470 ‫Here, there are a few examples to show how we can use Google Advanced Search to find valuable information. 24 00:02:07,070 --> 00:02:15,890 ‫For example, if we do a search with the words in you, Earl Colon, SEO Dot UK and in URL Colon Admin, 25 00:02:16,250 --> 00:02:23,570 ‫we can find administrative panels of the websites which have code at UK Super Domain, originally created 26 00:02:23,570 --> 00:02:26,030 ‫by Johnny Long of Hackers for charity. 27 00:02:26,360 --> 00:02:33,380 ‫The Google hacking database FDB is an authoritative source for querying the ever widening reach of the 28 00:02:33,380 --> 00:02:34,490 ‫Google search engine. 29 00:02:35,030 --> 00:02:42,560 ‫In the FDB, you'll find search terms for files containing usernames, vulnerable servers and even files 30 00:02:42,560 --> 00:02:44,060 ‫containing passwords. 31 00:02:44,690 --> 00:02:50,360 ‫When the Google hacking database was integrated in the exploit database of offensive security, the 32 00:02:50,360 --> 00:02:56,480 ‫various Google Docs contained in the thousands of exploit entries were entered into the fdb. 33 00:02:57,080 --> 00:03:03,380 ‫The direct mapping allows penetration testers to more rapidly determine if a particular web application 34 00:03:03,590 --> 00:03:05,690 ‫has a publicly available exploit.