1 00:00:00,420 --> 00:00:05,820 OK, so Southernness, you might have heard of before, is called Google Hacking, so Google has a very 2 00:00:05,820 --> 00:00:12,930 useful, hidden feature that can allow you to hack, quote unquote, just by searching something in 3 00:00:12,930 --> 00:00:13,660 the Google Box. 4 00:00:13,730 --> 00:00:15,980 There's something called the Google hacking database. 5 00:00:16,000 --> 00:00:16,980 You can just Google that. 6 00:00:17,950 --> 00:00:22,980 I believe I'm going to give you the link as well, where it's full of different commands that different 7 00:00:23,370 --> 00:00:29,070 users like all across the world update on a daily basis and allows you to just search the Internet for 8 00:00:29,070 --> 00:00:30,870 specifically what you want. 9 00:00:31,050 --> 00:00:36,840 Like, for example, you can look specifically for a PDF or a word document with passwords inside of 10 00:00:36,840 --> 00:00:38,060 it on a specific domain. 11 00:00:38,340 --> 00:00:40,830 That's how powerful Google hacking actually is. 12 00:00:41,040 --> 00:00:45,810 So what I'm going to do is I'm going to show you the Google hacking database and just give you an idea 13 00:00:45,810 --> 00:00:48,000 of, you know, how it works. 14 00:00:48,360 --> 00:00:54,210 OK, so when you're colonics, you just go to this Web site here on the dot com slash Google hacking 15 00:00:54,210 --> 00:00:54,700 database. 16 00:00:54,700 --> 00:00:59,880 So just check this out and you can see a lot of stuff that's actually been uploaded by different users. 17 00:01:00,480 --> 00:01:08,640 And there's each individual query that you would actually go and put into Google dot com and actually 18 00:01:08,640 --> 00:01:10,020 see what kind of results it gives you. 19 00:01:10,050 --> 00:01:12,020 So I would just look through these. 20 00:01:12,030 --> 00:01:17,770 You can do a quick search, like maybe you're trying to find something about passwords or you can just 21 00:01:17,770 --> 00:01:21,570 tell your password and stuff and just come up and you can see the different kinds of things that you 22 00:01:21,570 --> 00:01:21,890 could do. 23 00:01:22,040 --> 00:01:26,520 We're going to instead of going to specific ones, we're going to try a couple of basic things, like 24 00:01:26,520 --> 00:01:36,870 if we were to Google search, you know, um, let's see, like ethical hacking, for example, just 25 00:01:36,870 --> 00:01:39,450 search ethical hacking and brings everything related to it. 26 00:01:39,670 --> 00:01:46,680 So if you wanted to look ethical hacking and then like, put something in parentheses, for example, 27 00:01:46,830 --> 00:01:56,010 it's going to make sure that it's worth it to you, has to be included in the in the search things that 28 00:01:56,010 --> 00:01:56,400 come up. 29 00:01:56,550 --> 00:01:58,920 So it's going to like prioritize those things. 30 00:01:59,010 --> 00:02:06,720 If we wanted to look for maybe like a PDF file specifically, we would like, let's say, ethical hacking 31 00:02:07,920 --> 00:02:11,160 tutorial and then we'll do file type. 32 00:02:12,400 --> 00:02:19,460 And then Colin PDF, and now it's only going to bring up PDF files, as you see right here. 33 00:02:19,600 --> 00:02:24,100 So now we have a bunch of different ethical hacking tutorials, actually, and it's bring us specifically 34 00:02:24,280 --> 00:02:25,330 PDF files. 35 00:02:25,480 --> 00:02:26,020 So nice. 36 00:02:26,030 --> 00:02:28,470 I noticed that a little bit of the power behind this. 37 00:02:28,490 --> 00:02:35,930 So if you want to do, you know, look for a see you actually doing some like just browsing in Internet 38 00:02:35,930 --> 00:02:43,060 and maybe practicing just what you do in your URL and you could do ethical hacking. 39 00:02:44,680 --> 00:02:48,310 And you're going to see that this is going to be a part of the euro. 40 00:02:48,340 --> 00:02:49,940 Those words are going to be a part of it. 41 00:02:49,960 --> 00:02:54,280 See what is ethical hacking as part of this part of the actual URL to the website. 42 00:02:54,520 --> 00:02:56,170 So it's pretty powerful. 43 00:02:56,180 --> 00:03:06,100 You can look for like maybe you can say, like in text how to hack, you know, and you're going to 44 00:03:06,100 --> 00:03:09,760 see websites, you know, how to hack is going to be somewhere in the text and the website. 45 00:03:09,910 --> 00:03:14,160 So you can use this to your advantage to find different things like about a domain. 46 00:03:14,320 --> 00:03:19,090 OK, so another one we can do is maybe like, you know, in your URL, they want to look up something 47 00:03:19,090 --> 00:03:22,870 about my Web site, Anthony Temblors dot com. 48 00:03:22,870 --> 00:03:31,180 And then let's say in text we want to say something like penetration because we want our penetration 49 00:03:31,180 --> 00:03:31,740 testing. 50 00:03:32,020 --> 00:03:36,910 So now is going to look is going to make sure that Anthony Summers dot com is in the euro and is going 51 00:03:36,910 --> 00:03:41,950 to actually find things that have penetration in in the text somewhere in that page. 52 00:03:41,950 --> 00:03:44,550 So you actually pull up a blog that I wrote. 53 00:03:44,560 --> 00:03:45,550 So that's pretty neat stuff. 54 00:03:45,790 --> 00:03:50,890 So you can be very specific with the different things that you're actually searching for on the Web 55 00:03:51,370 --> 00:03:53,920 and all this kind of stuff like that from my website. 56 00:03:53,930 --> 00:03:54,940 So it's pretty powerful. 57 00:03:54,950 --> 00:04:00,190 So, OK, so I'm not going to teach you how to do malicious things per say, but what I will tell you 58 00:04:00,190 --> 00:04:06,010 to do is, you know, go to Google the Google hacking database, check it out, do some research online 59 00:04:06,010 --> 00:04:10,240 for the different syntax and different things that you can actually use Google hacking for, because 60 00:04:10,240 --> 00:04:12,400 like I said, you can find very powerful things. 61 00:04:12,410 --> 00:04:20,800 I'm not going to exactly show you, but you can do stuff like file type as a PDF or Files I, Deacy 62 00:04:20,830 --> 00:04:27,070 X and you can put in title or in your URL and actually specify what you want to find. 63 00:04:27,080 --> 00:04:28,480 So I'm an ethical hacker. 64 00:04:28,630 --> 00:04:33,700 You know, I might be looking for something that has passed or was in it honest and it's on a specific 65 00:04:33,700 --> 00:04:34,270 domain. 66 00:04:34,450 --> 00:04:36,370 So maybe you can go figure out how to do that. 67 00:04:36,490 --> 00:04:42,940 It'll improve your ethical hacking skills greatly and help you help you help companies discover, you 68 00:04:42,940 --> 00:04:47,820 know, the type of things that are out, you know, available and open to the public that they didn't 69 00:04:47,820 --> 00:04:48,790 necessarily know about.