1 00:00:00,480 --> 00:00:06,120 In the previous video, we have talked about Sudan, which is also called as hackers search engine, 2 00:00:06,510 --> 00:00:11,890 because it gives you a list of potentially vulnerable devices right now. 3 00:00:11,910 --> 00:00:14,730 In this video, we will talk about Google hacking. 4 00:00:15,420 --> 00:00:26,280 No, I'm not going to hack into Google, OK, but we will get the exact result which we want from Google. 5 00:00:27,060 --> 00:00:28,980 OK, let's see an example. 6 00:00:29,340 --> 00:00:34,170 If I play Game of Thrones season one. 7 00:00:35,530 --> 00:00:45,000 OK, now this way you will not able to download the Season one episode straight or you have to pay for 8 00:00:45,000 --> 00:00:45,260 it. 9 00:00:46,350 --> 00:00:49,110 But what if I add. 10 00:00:51,510 --> 00:00:54,720 Index of now see the difference. 11 00:00:55,380 --> 00:00:56,550 Open the first link. 12 00:01:01,330 --> 00:01:02,050 Let it open. 13 00:01:06,590 --> 00:01:14,990 See, simply click on the episode, which you want to download, and the downloading will start like 14 00:01:14,990 --> 00:01:15,260 this. 15 00:01:15,800 --> 00:01:16,190 OK. 16 00:01:22,080 --> 00:01:22,450 Right. 17 00:01:23,670 --> 00:01:24,840 I hope you understand. 18 00:01:27,890 --> 00:01:28,340 Now. 19 00:01:32,530 --> 00:01:34,300 Let's go to Google dot com 20 00:01:36,940 --> 00:01:48,730 and search for Google hacking database, open the first link that is exploited hyphen DBE. 21 00:01:53,920 --> 00:01:58,090 And here you can see the list of available 22 00:02:00,580 --> 00:02:02,120 vulnerabilities, right? 23 00:02:03,580 --> 00:02:10,780 For example, let us search for a webcam, OK, and open this link. 24 00:02:16,300 --> 00:02:26,660 OK, now one person has found this vulnerability and reported it to the company, but still to verify. 25 00:02:26,700 --> 00:02:28,300 Click on this available link. 26 00:02:29,380 --> 00:02:33,700 OK, now open anyone link. 27 00:02:39,090 --> 00:02:43,270 And this way, you have access to some cameras. 28 00:02:43,600 --> 00:02:43,970 OK, 29 00:02:46,890 --> 00:02:48,160 OK, there is no camera. 30 00:02:48,360 --> 00:02:49,650 Let's open the second link. 31 00:02:57,810 --> 00:03:04,620 So, yes, see, here is a list of all available cameras, given that it is public or private. 32 00:03:05,730 --> 00:03:08,880 Now let's open the second link. 33 00:03:14,600 --> 00:03:15,260 Click here. 34 00:03:17,630 --> 00:03:19,060 OK, open the first one. 35 00:03:24,230 --> 00:03:29,720 Yes, and now you are watching a live camera, see? 36 00:03:33,590 --> 00:03:40,660 OK, you can change it from here as well, Goldwasser's to. 37 00:03:46,360 --> 00:03:49,390 It's taking time because it's a LifeGem. 38 00:03:53,710 --> 00:04:01,810 Now, there are some more things you can do on this website, for example, search for Xen. 39 00:04:04,180 --> 00:04:07,980 OK, no mention reports of. 40 00:04:18,740 --> 00:04:26,570 Excel is not working, so I don't believe, OK, now we have some results, so let's open this one. 41 00:04:28,190 --> 00:04:28,510 Right. 42 00:04:35,070 --> 00:04:44,850 Good Lord, it says Drive Google dot com review indexed movie, that means it contains a link for movies 43 00:04:45,300 --> 00:04:46,870 containing in Google Drive. 44 00:04:47,300 --> 00:04:47,760 OK. 45 00:04:51,700 --> 00:04:55,480 It's not opening, I don't know why that's open once again. 46 00:05:03,150 --> 00:05:04,960 So here we have a link. 47 00:05:04,980 --> 00:05:05,790 Let's open it. 48 00:05:10,210 --> 00:05:18,520 So, yes, you will get an access to different kind of movies directly available, either to watch online 49 00:05:18,520 --> 00:05:19,750 or for download. 50 00:05:20,300 --> 00:05:23,590 OK, so let's open this one. 51 00:05:28,020 --> 00:05:33,870 See, OK, so this way we can hack Google, right? 52 00:05:34,140 --> 00:05:39,670 Actually, we are not hacking, we are getting the exact result that we want from Google, right. 53 00:05:39,840 --> 00:05:41,550 So let's see some more examples. 54 00:05:41,550 --> 00:05:50,750 Like if I type in you all and I mentioned logging dot BHP. 55 00:05:52,500 --> 00:05:57,470 So we are getting directly direct access to the login page. 56 00:05:57,720 --> 00:05:58,110 Right. 57 00:05:58,630 --> 00:06:01,880 See, all the others are mentioning logging, but BHP will not be. 58 00:06:01,920 --> 00:06:04,640 It will not be right now. 59 00:06:04,650 --> 00:06:05,970 Let's see one more example. 60 00:06:07,020 --> 00:06:12,030 Let's say site Callon EU for Europe. 61 00:06:14,740 --> 00:06:21,710 OK, so we are getting results only for EU websites, see, right. 62 00:06:22,210 --> 00:06:26,180 So this way we can filter the search results of Google. 63 00:06:27,200 --> 00:06:38,350 Now, if you want anything, OK, anything, just type index off and then let's say I want. 64 00:06:40,810 --> 00:06:43,390 Books on ethical hacking, so. 65 00:06:45,630 --> 00:06:49,350 Article hacking BATF. 66 00:06:49,860 --> 00:06:58,160 OK, see, now you have access to some of the beliefs of ethical hacking from different websites. 67 00:06:59,700 --> 00:07:03,500 OK, there are lots of websites. 68 00:07:04,490 --> 00:07:10,200 OK, simply click the one which you want to download and the downloading will start. 69 00:07:10,830 --> 00:07:11,140 Right. 70 00:07:11,490 --> 00:07:19,410 So this way you can filter out the search results from Google and get exactly what you want from Google.