Вы находитесь на странице: 1из 7

How to use Google for Hacking

Submitted by Srikanth on Tuesday, 29 December 200957 Comments

Google serves almost 80 percent of all


search queries on the Internet, proving itself as the most popular search engine. However
Google makes it possible to reach not only the publicly available information resources,
but also gives access to some of the most confidential information that should never have
been revealed. In this post I will show how to use Google for exploiting security
vulnerabilities within websites. The following are some of the hacks that can be
accomplished using Google.

1. Hacking Security Cameras

There exists many security cameras used for monitoring places like parking lots, college
campus, road traffic etc. which can be hacked using Google so that you can view the
images captured by those cameras in real time. All you have to do is use the following
search query in Google. Type in Google search box exactly as follows and hit enter

inurl:”viewerframe?mode=motion”

Click on any of the search results (Top 5 recommended) and you will gain access to the
live camera which has full controls. You will see something as follows
As you can see in the above screenshot, you now have access to the Live cameras which
work in real-time. You can also move the cameras in all the four directions, perform
actions such as zoom in and zoom out. This camera has really a less refresh rate. But
there are other search queries through which you can gain access to other cameras which
have faster refresh rates. So to access them just use the following search query.

intitle:”Live View / – AXIS”

Click on any of the search results to access a different set of live cameras. Thus you have
hacked Security Cameras using Google.

2. Hacking Personal and Confidential Documents

Using Google it is possible to gain access to an email repository containing CV of


hundreds of people which were created when applying for their jobs. The documents
containing their Address, Phone, DOB, Education, Work experience etc. can be found
just in seconds.

intitle:”curriculum vitae” “phone * * *” “address *” “e-mail”

You can gain access to a list of .xls (excel documents) which contain contact details
including email addresses of large group of people. To do so type the following search
query and hit enter.

filetype:xls inurl:”email.xls”

Also it’s possible to gain access to documents potentially containing information on bank
accounts, financial summaries and credit card numbers using the following search query

intitle:index.of finances.xls

3. Hacking Google to gain access to Free Stuffs

Ever wondered how to hack Google for free music or ebooks. Well here is a way to do
that. To download free music just enter the following query on google search box and hit
enter.

“?intitle:index.of?mp3 eminem“

Now you’ll gain access to the whole index of eminem album where in you can download
the songs of your choice. Instead of eminem you can subtitute the name of your favorite
album. To search for the ebooks all you have to do is replace “eminem” with your
favorite book name. Also replace “mp3″ with “pdf” or “zip” or “rar”.

I hope you enjoy this post. Pass your comments. Cheers!

Windows IP Utilities
Submitted by Srikanth on Friday, 15 August 200813 Comments
The following are the IP utilities available in Windows that help in finding out the
information about IP Hosts and domains. These are the basic IP Hacking Commands
that everyone must know!

Please note that the the term Host used in this article can also be assumed as a Website
for simple understanding purpose.

1. PING

PING is a simple application (command) used to determine whether a host is online and
available. PING command sends one or more ICMP Echo messages to a specified host
requesting a reply. The receiver (Target Host) responds to this ICMP Echo message and
returns it back to the sender. This confirms that the Host is online and available.
Otherwise the host is said to be unavailable.

Syntax:
C:\>ping gohacking.com

2. TELNET

Telnet command is used to connect to a desired host on a specified port number. For
example

Syntax:
C:\>telnet yahoo.com 25
C:\>telnet yahoo.com

NOTE: The default port number is 23. When the port number is not specified the default
number is assumed.

Telnet Hacking is explained in detail in the following post.


How To Send Fake Email

3. NSLOOKUP
Many times we think about finding out the IP address of a given site. Say for example
google.com, yahoo.com, microsoft.com etc. But how to do this? For this there are some
websites that can be used to find out the IP address of a given site. But in Windows we
have an inbuilt tool to do this job for us. It is nslookup. Yes this tool can be used for
resolving a given domain name into it’s IP address (determine the IP of a given site
name). Not only this it can also be used for reverse IP lookup. That is if the IP address is
given it determines the corresponding domain name for that IP address.

Syntax:
C:\>nslookup google.com

4. NETSTAT

The netstat command can be used to display the current TCP/IP network connections.
For example the following netstat command displays all connections and their
corresponding listening port numbers.

Eg: C:\>netstat -a

This command can be used to determine the IP address/Host names of all the applications
connected to your computer. If a hacker is connected to your system even the hacker’s IP
is displayed. So the netstat command can be used to get an idea of all the active
connections to a given system.

Netbios Hacking
Submitted by Srikanth on Friday, 14 December 200763 Comments

THIS NETBIOS HACKING GUIDE WILL TELL YOU ABOUT HACKING


REMOTE COMPUTER AND GAINING ACCESS TO IT’S HARD-DISK OR
PRINTER. NETBIOS HACK IS THE EASIEST WAY TO BREAK INTO A REMOTE
COMPUTER.
STEP-BY-STEP NETBIOS HACKING PROCEDURE

1.Open command prompt

2. In the command prompt use the “net view” command


( OR YOU CAN ALSO USE “NB Scanner” OPTION IN “IP TOOLS” SOFTWARE BY
ENTERING RANGE OF IP ADDRESSS. BY THIS METHOD YOU CAN SCAN
NUMBER OF COMPUTERS AT A TIME).

Example: C:\>net view \\219.64.55.112

The above is an example for operation using command prompt. “net view” is one of
the netbios command to view the shared resources of the remote computer. Here
“219.64.55.112″ is an IP address of remote computer that is to be hacked through
Netbios. You have to substitute a vlaid IP address in it’s place. If succeeded a list of
HARD-DISK DRIVES & PRINTERS are shown. If not an error message is displayed. So
repeat the procedure 2 with a different IP address.

3. After succeeding, use the “net use” command in the command prompt. The “net use” is
another netbios command which makes it possible to hack remote drives or printers.

Example-1:
C:\>net use D: \\219.64.55.112\F
Example-2:
C:\>net use G: \\219.64.55.112\SharedDocs
Example-3:
C:\>net use I: \\219.64.55.112\Myprint

NOTE: In Examples 1,2 & 3, D:,G: & I: are the Network Drive Names that are to be
created on your computer to access remote computer’s hard-disk.
NOTE: GIVE DRIVE NAMES THAT ARE NOT USED BY ANY OTHER
DRIVES INCLUDING HARD-DISK DRIVES, FLOPPY DRIVES AND ROM-
DRIVES ON YOUR COMPUTER. THAT IS, IF YOU HAVE C: & D: AS HARD
DIRVES, A: AS FLOPPY DIVE AND E: AS CD-DRIVE, GIVE F: AS YOUR
SHARED DRIVE IN THE COMMAND PROMPT

F:,”SharedDocs” are the names of remote computer’s hard-disk’s drives that you want to
hack. “Myprint” is the name of remote computer’s printer. These are displayed after
giving “net use” command. “219.64.55.112″ is the IP address of remote computer that
you want to hack.

4. After succeeding your computer will give a message that “The command completed
successfully“. Once you get the above message you are only one step away from hacking
the computer.
Now open “My Computer” you will see a new “Hard-Disk drive”(Shared) with the
specified name. You can open it and access remote computer’s Hard-Drive. You can
copy files, music, folders etc. from victim’s hard-drive. You can delete/modify data on
victim’s hard-drive only if WRITE-ACCESS is enabled on victim’s system. You can
access files/folders quickly through “Command Prompt”.

NOTE: If Remote Computer’s Firewall Is Enabled Your Computer Will Not


Succeed In Gaining Access To Remote Computer Through Netbios. That is Netbios
Hacking Is Not Possible In This Situation.(An Error Message Is Displayed). So
Repeat The Procedure 2,3 With Different IP Address.

HAPPY NETBOS HACKING!!

Вам также может понравиться