How can you use the Google Hacking Database to gather information on computer systems? In this ethical hacking tutorial, you will learn how we can use this resource to footprint.
Google Hacking Database Ethical Hacker Footprinting Using Search Commands
If you will enjoy reading and contributing to the discussion for this post, will you please join us on the YouTube video above and leave a comment there because I read and respond to most comments on YouTube?
If you find anything helpful in this video or funny, will you please leave a like because you will feel great helping other people find it?
Right now we are slowly entering our footprinting section, which will be the last part of the beginner section including the scanning section that we will do right after we cover the footprinting.
Before we begin, while our machine is starting up, let us just explain a little bit more what footprinting is.
First of all, there are two types of footprinting: one is active and one is passive.
Now, the active footprinting basically requires some interaction with the target that you are trying to attack while the passive footprinting is basically just gathering all the publicly available information for your target.
So, for example, if your target has a Facebook account, a Twitter, or basically any other account or any other source of information from which you can gather some of the valuable stuff you might need.
Now let's say, for example, your target is a company and has public information online that this company uses Windows XP on their machines. You can already cut out the Linux exploits and Windows 10 or 7 exploits, and you can basically just focus on writing a Windows XP exploit.
Now, we all know that nobody really uses XP anymore because it is vulnerable and it is basically an open box, but that was just an example. There are lots of public information which you can find.
Let's go to some of the practical methods with Google hacking. We will cover Google hacking in this tutorial, so let me just login, "test1234."
As soon as my desktop boots up we will open Firefox and we will run some of the specific commands in the Google search bar in order to find some of the stuff we might need.
Now, this is just one of the tools for footprinting that we will cover in the course. The other ones will be Harvester, Nikto, Shodan and Whois that we will cover in the next lectures, but for now on let's just open our Firefox.
So just click on your Firefox icon and basically since it will lead you to your Kali Linux website, you want to navigate to Google. So we can add another tab and go on to google.com.
Now, let's say that you want to find all the websites that have a user input that could possibly be vulnerable to the SQL injection.
Read more on my website at https://jerrybanfield.com/google-hacking-database/
Love,
Jerry Banfield
https://jerrybanfield.com/
https://jerrybanfield.com/blog/
https://jerrybanfield.com/books/
https://jerrybanfield.com/contact/
https://jerrybanfield.com/freecourses/
https://jerrybanfield.com/masterclass/
https://jerrybanfield.com/partners/
https://jerrybanfield.com/podcast/
https://jerrybanfield.com/resources/
https://jerrybanfield.com/steem/
https://jerrybanfield.com/twitch2019/
https://jerrybanfield.com/wirecast/
https://jerrybanfield.com/youtube/
https://jerry.tips/emaillist1017
https://jerry.tips/songsbyme
https://uthena.com
https://www.facebook.com/jbanfield
http://itunes.apple.com/podcast/id915442105
https://www.patreon.com/jerrybanfield
https://soundcloud.com/jbanfield
https://teespring.com/stores/jerrybanfield
https://www.twitch.tv/jerrybanfield/
https://twitter.com/JerryBanfield
https://www.youtube.com/jerrybanfield
I am coming on steemit after an year.
What happened to your popularity and following?
Nice sights... Looking forward to have more on how to hack an account from you... What a technological improvement