Wednesday 4 July 2018

Google Hacking and Scanning


Introduction of google:-

                        Google is started in 1998 by two intelligent student who left Stanford, Google is the worlds most popular web search engine that has been ranked at the number 1 position for all time.

 How Google is work? :-

                        Google is the most powerful search engine, which work on a special algorithms to generate a result. While google sharer facts  about algorithm , the specify the company secrets. Google is a web based search engine that helps a person to find information and site on based on keyword.

Google as proxy and using cache:-

                       
                        Google store a full content of web page which is known as cache. Google take a snapshot a web page it examine and store that.
            Disable Indexing:-
                        Add the following line in your .htaccess file.
                        Option indexes
Make sure you hit the ENTER key or return key if your using Mac after entering the options-indexes words so that the file ends with a blank line.

Test your site :-
            When ever you modify .htaccess file, you should always check that website working after uploading it. The .htaccess controls everything the server does with your site. A slight error can render your enter website unusable.
Some Tools:-
Ø  Wikto
Ø  Google hacks
Some google dorke strig:-
                                   
 inurl:item_id=
inurl:review.php?id=
inurl:hosting_info.php?id=
inurl:newsid=
inurl:iniziativa.php?in=
inurl:gallery.php?id=
inurl:trainers.php?id=
inurl:curriculum.php?id=
inurl:rub.php?idr=
inurl:news-full.php?id=
inurl:labels.php?id=
inurl:view_faq.php?id=
inurl:news_display.php?getid=
inurl:story.php?id=
inurl:artikelinfo.php?id=
inurl:index2.php?option=
inurl:look.php?ID=
inurl:detail.php?ID=
inurl:readnews.php?id=
inurl:newsone.php?id=
inurl:index.php?=
inurl:top10.php?cat=
inurl:aboutbook.php?id=
inurl:profile_view.php?id=
inurl:newsone.php?id=
inurl:material.php?id=
inurl:category.php?id=
inurl:event.php?id=
inurl:opinions.php?id=
inurl:publications.php?id=
inurl:product-item.php?id=
inurl:announce.php?id=
inurl:fellows.php?id=
inurl:sql.php?id=
inurl:rub.php?idr=
inurl:downloads_info.php?id=
inurl:index.php?catid=
inurl:galeri_info.php?l=
inurl:prod_info.php?id=
inurl:news.php?catid=
inurl:tekst.php?idt=
inurl:shop.php?do=part&id=
inurl:index.php?id=
inurl:newscat.php?id=
inurl:productinfo.php?id=


Scanning:-

            To scan is to essentially activity on a network, which may include monitoring data flow as and network device. Scanning may be used to check the security and the performance of ay network.

Types of scanning:-

Ø  SYN or stealth is also known as a half-open scan it doesn’t complete the TCP three way handshake.
Ø  FIN scans send a packet with the FIN, URG, and PSH flags set.
Ø  IDLE scans use a spoofed IP address to send a packet to target. Depending on the response, the port can be determined to be open or closed.

Difference between Port And Network Scanning:-

Ø  Port Scanning:- A port scanning is an application designed to probe a server for open ports while network scanning only searches for active hosts on a network.  Detecting open ports and services running on the target.
Ø  Network Scanning:- The objective of scanning is to find a network and machine. IP address operating system details, Topology details, trusted routers information etc.

Tools for scanning a network:-       

Ø  T1Shopper.com                                                       
Ø  Yougetsignal
Ø  Advance port scanner2.4
Ø  Whatsup port scanner
Ø  Netscanner
Ø  Mi-Tec Network scanner
Ø  Nesses
Ø  Nmap
Ø  Nikto web scanner
Ø  Angry IP scanner
Ø  Ncat
Ø  Ndiff
Ø  Nping
Ø  Pros
Ø  OpenVAS
Ø  Core Impackt pro
Ø  Advance IP Scanner











No comments:

Post a Comment

WEP INSECURITIES

  WEP I NSECURITIES Two researchers from the University of California at Berkeley and one from Zero Knowledge Systems Inc. published a repor...