background preloader

Using Googles Full Capabilities. « XBOX, XBOX 360, PS2, PS3, PSP, & MORE! – Your source for the latest in console modding.

Using Googles Full Capabilities. « XBOX, XBOX 360, PS2, PS3, PSP, & MORE! – Your source for the latest in console modding.
Well most of you use Google to probably look up porn. Other just search stuff. And others use Google to hack. Using Google, and some finely crafted searches we can find a lot of interesting information. For Example we can find: Credit Card Numbers Passwords Software / MP3′s …… (and on and on and on) Presented below is just a sample of interesting searches that we can send to google to obtain info that some people might not want us having.. After you get a taste using some of these, try your own crafted searches to find info that you would be interested in. Try a few of these searches: intitle:”Index of” passwords modified allinurl:auth_user_file.txt “access denied for user” “using password” “A syntax error has occurred” filetype:ihtml allinurl: admin mdb “ORA-00921: unexpected end of SQL command” inurl:passlist.txt “Index of /backup” “Chatologica MetaSearch” “stack tracking:” “parent directory ” /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums put this string in google search: ?

http://www.smdepot.net/news/computer-tutorials/using-googles-full-capabilities/

How to use Google for Hacking. Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites. The following are some of the hacks that can be accomplished using Google. 10 Best Security Software Tools for Linux that you should check out. 1. John the Ripper How To Crack A Wi-Fi Network’s WPA Password With Reaver Your Wi-Fi network is your convenient wireless gateway to the internet, and since you’re not keen on sharing your connection with any old hooligan who happens to be walking past your home, you secure your network with a password, right? Knowing, as you might, how easy it is to crack a WEP password, you probably secure your network using the more bulletproof WPA security protocol. Here’s the bad news: A new, free, open-source tool called Reaver exploits a security hole in wireless routers and can crack most routers’ current passwords with relative ease. Here’s how to crack a WPA or WPA2 password, step by step, with Reaver — and how to protect your network against Reaver attacks. In the first section of this post, I’ll walk through the steps required to crack a WPA password using Reaver. After that, I’ll explain how Reaver works, and what you can do to protect your network against Reaver attacks.

.:Computer Defense:. » Security Quite a while back I had posted everywhere and contacted everyone I knew regarding a Denial of Service survey that I was conducting. It came out of the frustration of watching people and companies disregard denial of service as a valid security concern. It seemed to be an ongoing debate -- Confidentiality & Integrity vs Availability, instead of all three being treated as important. Anyways I've been under constant hounding to release some statistics from the survey, so I figured I'd do a multi-part series on Denial of Service (ok... so right now it's planned as a 2-part series). This first part is a precursor, since I had numerous people argue on whether or not DoS and DDoS were the same thing or different things and also on whether or not DoS was still valid (more on that to come). Since the survey was part of a conference talk that I wanted to do and the talk wasn't accepted, I figure it's as good a time as any to start posting.

Web World Wide » 50 Free Internet Tools for Tin-Foil Hat Wearers If your wardrobe includes a shiny tin-foil hat, then you will love these free Ma Internet tools. Whether you want to protect yourself from Internet snoopers, want to spy on those out to get you, or want to be able to track trends that you know will lead to something big, then these tools will help you get the job done. Without a Trace If you want to use the Internet without anyone knowing who you are or leave an untraceable phone number, then these tools are for you. Security Community Training For reference purposes, and whatever purposes you choose, here are the original Fate tutorials which should help you in your attempts to learn. The creators of this site or the ISP hosting this site take no responsibility for the contents of this page, everything is provided for an educational purpose only Training session 1: John the Ripper Difficulty: Extremely EasyLearn to use this tool to crack passwd files Creator: m101 Training session 2: Directory Traversal Difficulty: Extremely EasyLearn how it is possible to 'Directory Surf' Creator: m101 Training session 3: Number Systems Difficulty: Extremely EasyLearn the use of Number Systems and how to convert between them Creator: m101

How To Become A Hacker Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. A lot of hackers now consider it definitive, and I suppose that means it is. Still, I don't claim to be the exclusive authority on this topic; if you don't like what you read here, write your own.

untitled Return to View video at: Prof Simon Cox Know the Trade – Your IT Security Information Portal CISSP/CEH/CISA/Hacker and Penetration Testing Specialist Google Hacking allintitle:Brains, Corp. camera allintitle:"index of/admin" allintitle:"index of/root" allintitle:restricted filetype:doc site:gov allintitle:restricted filetype :mail allintitle:sensitive filetype:doc allinurl:/bash_history allinurl:winnt/system32/ (get cmd.exe) ext:ini eudora.ini ext:pwd inurl:(service|authors|administrators |users) "# -FrontPage-"

Here's 101 useful websites with easy to remember names Here's 101 useful websites with (mostly) easy to remember names. Most of these websites help you manage productivity or just have some fun. If you enjoyed this list be sure to check out MajorGeeks Top Freeware Picks.

Related: