background preloader

Dorks & hacks Big list

Dorks & hacks Big list

Google hacking master list This master list of Google Hacking command sets has show up on a forum in Russia, as well as on Scribd. While we often forget about Google hacking, and rarely use it against our own sites, a list like this is going to keep the kids happy as they merrily pound their way through Google to your systems. This makes the data much more accessible than at Johnny I hack stuff. There are some drawbacks in how Johnny I hack stuff works, you have to do a lot of clicking to get to the right hacks. Check it out, here is a copy of the master list in case you do not want to go to a hacker forum in Russia, or do not want to sign up for a scribd account (the only way to download it or cut and paste the document in Scribd is to make an account). Code: admin account info" filetype:log ! nurl:/admin/login.asp inurl:/cgi-bin/sqwebmail?

GHH - The "Google Hack" Honeypot How to use Google for Hacking. Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites. The following are some of the hacks that can be accomplished using Google. 1. There exists many security cameras used for monitoring places like parking lots, college campus, road traffic etc. which can be hacked using Google so that you can view the images captured by those cameras in real time. inurl:”viewerframe? Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls. you now have access to the Live cameras which work in real-time. intitle:”Live View / – AXIS” 2. filetype:xls inurl:”email.xls” 3. “? 4.

How To Search On Google Like Elite Hackers | Ethical Hacking Tutorials Google is best search engine in the world. Actually people think that Google's popularity is because of its simple and fast searching interface but friends, its more popular because it has rich operators and query support that will make your searching experience even better. Most of us doesn't know which operators are supported by Google and if they know some of them, they doesn't know how actually these operators work and enrich our searching practice. Today, i will tell you How we can search on Google like elite hackers or simply say computer experts do. Google operators: Google operators are classified into two basic categories:1. Basic Google Operators:- Advanced Operators:- 1) Intitle :- This operator searches within the title tags. Description:- intitle:hacking returns all pages that have the string "hacking" in their title. intitle:"index of" returns all pages that have string "index of" in their title. Similar operator:- "allintitle". Companion operator:- "allinurl". 1. 2. 3. 5. 6. 7.

How to Crack a Wi-Fi Network. | Arrow Webzine 1.Back Track Today we’re going to run down, step-by-step, how to crack a Wi-Fi network with WEP security turned on. Dozens of tutorials on how to crack WEP are already all over the internet using this method. Seriously—Google it. Unless you’re a computer security and networking ninja, chances are you don’t have all the tools on hand to get this job done. * A compatible wireless adapter—This is the biggest requirement. * A BackTrack 3 Live CD. * A nearby WEP-enabled Wi-Fi network. * Patience with the command line. To crack WEP, you’ll need to launch Konsole, BackTrack’s built-in command line. First run the following to get a list of your network interfaces: The only one I’ve got there is labeled ra0. Now, run the following four commands. {*style:<i>airmon-ng stop (interface) ifconfig (interface) down macchanger –mac 00:11:22:33:44:55 (interface) airmon-ng start (interface) </i>*} Now it’s time to pick your network. To see a list of wireless networks around you. You’re almost there. </b>*} 3.

Hacking Google – Or how to make a decent search | Hosting Blog It is funny that 95% of the people who use Google actually do not know how to use Google. You will say “Just type and press enter, what is there to know?” and you will be as wrong as possible. Google is a very sophisticated search engine and can give you information you never expected to get out of a search engine. Ready? Basic Codes: You probably know these… Use quotation marks ” “ to search for an exact phrase eg. General Tips: Used on a daily basis… site:www.awardspace.com This code will return pages that reside on this domain only. Going Advanced: Let’s get serious… · filetype: This gives you the ability to search for specific file types. Awesome, no? Oh and just by the way AwardSpace offers you Domain Privacy Protection service which means that if you buy a domain from us and add DPP to your cart your information will not be in the public whois registrars and phone: command will not work on you. Thanks for reading. Related posts:

Yellowpipe - Encrypter/Decrypter, Encode / decode: Base64, ASCII, Binary, Hex, DES, MD5, SHA1, Bruteforce, ROT-13, URL encode Home > yis > tools > encrypter > Yellowpipe - Encrypter/Decrypter, Encode / decode: Base64, ASCII, Binary, Hex, DES, MD5, SHA1, Bruteforce, ROT-13, URL encode Encrypter /Decoder Encryption / Decryption tool » Online Encrypter / Decrypter tool This program let you encode/decode or encrypt/decrypt your documents in various formats such as: ASCSII, Binary, Base 64, Hex, Caesar Bruteforce, MD5, SHA-1, HTML Entities. •ASCII to Binary •Binary to ASCII •ASCII to Hex •Hex to ASCII •Binary to Hex •Hex to Binary •Backwards •Base 64 Encode •Base 64 Decode •Caesar Bruteforce •DES Crypt (one way) •HTML Entities Encode •HTML Entities Decode •l33t 5p34k 3nc0d3 •l33t 5p34k d3c0d3 •MD5 Crypt (one way) •Igpay Atinlay •Un-Pig Latin •ROT-13 •URL Encode •URL Decode •SHA-1 Check our other free webmaster tools

101 Google Tips, Tricks & Hacks Looking for the ultimate tips for Google searching? You've just found the only guide to Google you need. Let's get started: 1. The best way to begin searching harder with Google is by clicking the Advanced Search link. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23, In fact, you can combine any Boolean search operators, as long as your syntax is correct. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. Carina's Craftblog: Tutorial: crochet granny triangle So! Here we go with the granny triangle tutorial. Did you master the magic circle yet? Ready to go? If you don't fancy using the magic circle, you can make a ring by making 4 chain stitches and joining them into a ring. July 2012 - Please note: these days I do very little crochet because I'm working on an embroidery book. Por favor, respeta mis derechos de autor. Round 1 Img. 1: Ch3 in the magic circle, counts as first dc, 2dc into circle, ch2, 3dc, ch1, 3dc, ch2, 3dc, ch1, 3dc, ch2, 3dc, ch1, join into top of chain Img. 2: notice how I am holding the ring? Img. 4: See how that's all neat and tight? Round 2 Img. 7: chain 3, counts as first dc Img. 8: 2dc in the corner/ch space, ch2, then 3dc in the corner Img. 9: find the ch1 space from the last round - sometimes a bit tricky to find.. Img. 10: 3dc into the ch1 space, then repeat the following sequence twice: 3dc in corner, ch2, 3dc in corner, 3dc in ch1 space. You can of course add more rounds if you want a larger triangle! Thank you!

[Infographic] Google's 200 Ranking Factors There’s no doubt that Google’s algorithm is more complex — and volatile — than ever. The days where SEO was all about meta tags and backlinks is long gone. Google now uses at least 200 ranking factors in their algorithm, including social signals, user-interaction signals, and trust. If you’d like a bird’s eye view of these factors, then this infographic by Entrepreneur.com and Backlinko may give you some much needed perspective. The piece covers all of the known 200 ranking signals that Google uses to rank sites and pages. However, it’s important to note that many of these aren’t proven or official ranking signals. Either way, I’m sure you’ll learn something new (even if you’re an industry veteran). Having said that, enjoy this excellent infographic. Which ones will you implement into your business?

Search Google Anonymously While Logged Into Google In Firefox One of the things that keeps some users from using Google Search is the certainty that everything that is done on the site is being logged and analyzed by Google. While it is possible to overcome this, for instance by launching searches only in the browser's private browsing mode, or using search engines such as Startpage that use Google search results but do not track you, you may prefer an automated solution that just works in the background without you doing anything. You could try and use Google while you are not signed in to your Google Account, but that too means some form of tracking as there are other means besides tracking a user by account. Plus, it means that you cannot use other Google Services such as Gmail properly without signing in first again. Another option would be to use two different web browsers, one for Google searches, the other for all other activities. The new Firefox add-on Searchonymous introduces a solution that resolves this issue.

Related: