Blogger Widgets

About Ash Hacker

My photo
I am a social-techno-learner which believes in its own efficiency first and then implements with the suggestions of my strong and enthusiastic Team which helps me takes everything into its perfection level.

Thursday 22 December 2011

Best search engine(Google operators)

Google is best search engine in the world. Actually people think that Google's popularity is because of its simple and fast searching interface but friends, its more popular because it has rich operators and query support that will make your searching experience even better. Most of us doesn't know which operators are supported by Google and if they know some of them, they doesn't know how actually these operators work and enrich our searching practice. Today, i will tell you How we can search on Google like elite hackers or simply say computer experts do. But for this its necessary that you should know and understand all the Google operators properly. So lets learn how we can enrich our searching experience in Google.




Google operators:
Google operators are classified into two basic categories:
1. Basic Google Operators like and, or, not etc.
2. Advanced google operators like inurl, intitle etc.
I am also including bonus search queries that are extremely useful for hackers.


Basic Google Operators:-
1) And (+) :- This operator is used to include multiple terms in a query which is to be searched in google.
example:- if we type "hacker+yahoo+science" in google search box and click search, it will reveal the results something which are related to all the three words simultaneously i.e. hacker, yahoo and science.


2 ) OR (|) :- The OR operator, represented by symbol( | ) or simply the word OR in uppercase letters, instructs google to locate either one term or another term in a query.


3) NOT :- It is opposite of AND operator, a NOT operator excludes a word from search.
example:- If we want to search websites containing the terms google and hacking but not security then we enter the query like "google+hacking" NOT "security".


 
Advanced Operators:-
1) Intitle :- This operator searches within the title tags.
Description:- intitle:hacking returns all pages that have the string "hacking" in their title.
intitle:"index of" returns all pages that have string "index of" in their title.
Similar operator:- "allintitle".

2) Inurl :- Returns all matches, where url of the pages contains given word.
Description:- inurl:admin returns all matches, where url of searched pages must contains the word "admin".
Companion operator:- "allinurl".

3) Site :- This operator narrows search to specific website. 
Description : It will search results only from given domain. Can be used to carry out information gathering on specific domain.
example:- site:www.microsoft.com will find results only from the domain www.microsoft.com

4) Link :- This operator allows you to search for pages that links to given website.
example:- link:www.microsoft.com
Here, each of the searched result contains asp links to www.microsoft.com

5) Info :- This operator shows summary information for a site and provides links to other google searches that might pertain to that site.
example:- info:www.yahoo.com

6) Define :- This operator shows definition for any term.
example:- define:security
It gives various definitions for the word "security" in different manner from all over the world.

7) Filetype :- This operator allows us to search specific files on the internet. The supported file types can be pdf, xls, ppt, doc, txt, asp, swf, rtf, etc..
example:- If you want to search for all text documents presented on domain www.microsoft.com then we enter the query something like following.
"inurl:www.microsoft.com filetype:txt"


Other popular search terms only for Hackers:

1. For searching active webcams online:
In Google Search Box type :-
"Active Webcam Page" inurl:8080
Description- Active WebCam is a shareware program for capturing and sharing the video streams from a lot of video devices. Known bugs: directory traversal and cross site scripting.

2. For accessing the deleted messages on forums:
In Google Search Box type:- 
"delete entries" inurl:admin/delete.asp
Description- AspJar contains a flaw that may allow a malicious user to delete arbitrary messages. The issue is triggered when the authentication method is bypassed and /admin/delete.asp is accessed directly. It is possible that the flaw may allow a malicious user to delete messages resulting in a loss of integrity.

3. For searching personal information of person:
In Google Search box type :- 
"phone * * *" "address *" "e-mail" intitle:"curriculum vitae"
Description- This search gives hundreds of existing curriculum vitae with names and address. An attacker could steal identity if there is an SSN in the document.

4.For searching secret financial spread sheets:
In Google Search box type :- 
intitle:"index of" finance.xls
Description- Secret financial spreadsheets 'finance.xls' or 'finances.xls' of companies may revealed by this query.

5. In Google Search box :- 
intitle:"index.of" robots.txt
Description- The robots.txt file contains "rules" about where web spiders are allowed (and NOT allowed) to look in a website's directory structure. Without over-complicating things, this means that the robots.txt file gives a mini-roadmap of what's somewhat public and what's considered more private on a web site. Have a look at the robots.txt file itself, it contains interesting stuff. However, don't forget to check out the other files in these directories since they are usually at the top directory level of the web server!

6. For locating admin directories of websites:
In Google Search box type :- 
intitle:index.of.admin
Description- Locate "admin" directories that are accessible from directory listings.

7. For searching proxies online:
In Google Search box type :- 
inurl:"nph-proxy.cgi" "start browsing"
Description- Returns lots of proxy servers that protects your identity online.

Note: This is not originally written by me. Thanks to Unknown and Google Search Guide.

If you have any queries ask me in form of comments. Thanks for reading.

Tuesday 20 December 2011

Begining of Hacking must read..


[Image: 0Yi7J.png]


Index
  • Introduction
  • Pros & Cons
  • Getting started
  • Becoming a Hacker
  • What You Should Learn
  • Notes


Introduction :
Today I'm here to explain what basic hacking is and what you will need to know.
I have seen a lot of users asking "How to hack" & "Where to start in hacking", so I decided to make a post on my blog. 
If you're a good learner then you should be able to catch on quick.
I'm going to try and make this have great details attached so that everyone will understand.

Pros & Cons :
  • Pros
    • Some software companies will hire hackers to check for flaws in there programs
    • Free things
    • Learning
    • Adrenaline Rush
    • Interest
    • As a Career
  • Cons
    • Possible jail time
    • Fines
    • BlackHat Hacking is Illegal
    • Take's some time to learn

Getting Started :
First things first.
There are 3 type of hackers you can choose from.
Black Hat, Gray Hat, and White Hat.
Below I will list the definition for each of them.

Black Hat :
Black hatters, also known as crackers, are the ones who destroy private information, deface websites, and do most illegal activity.
Becoming a Black hat can be difficult if you're not willing to devote your time in learning.
Usually these people can not get a decent job because of the illegal activity.
Not of all them have bad reputation, but most of them do.
If you are caught by Law Enforcement than be expecting jail time.

Grey Hat :
Grey hatters are in between Black hat and White hat.
Most grey hat people commit pranks that they think is harmless to other users, but can be illegal also.
It's unlikely for some users to take it as a joke. Some might take it seriously if you go to far.
You can also suspect jail time if you're thinking about becoming a Grey hat.

White Hat :
White hatters basically use there knowledge to fight against malware. More than half of them are friendly & can be trusted.
I'm not saying trust anyone because there are some White hats, but it's more than unlikely for them to do harm to your computer.
White hatter can end up in a good paying job.
Such as computer programming & security consultant.
They most likely will not end up in jail if they do not do illegal activity.

Becoming a Hacker :
You must learn information about any operating system and/or programming language, this way you have some skill in the required fields.
Most people prefer Python for a coding language because you can create advanced programs.
There is no such thing as learning a "Easy language", it takes time & patients to master your goals.
You will be able to learn computer security, also known as exploits.

Learn a Programming Language :
Python is a pretty decent language to start with because it has a clean design, very organized, and easy for beginners.
It's not just a software to joke around with, it is very useful & powerful when creating an advanced project.
Java is also good but some people do not value it as a good language to start off with.

If you are well into programming then you might want to learn C.
It's the closest language related to C++ and is to the core of Unix.
It's helps a lot when creating a software but takes time debugging and is often not used because of that reason.

Perl is also good learning for practice reasons and is worth learning.
It is commonly used for web pages and system administration.
Other people use Perl to avoid programming in C.
Most computer jobs do not require C much often.

What's an Exploit :
An exploit is a piece of software and/or information that takes advantage of a bug or vulnerability in order to cause unintended behavior to occur on computer software.
This includes gaining control of a computer system or allowing privilege escalation or a denial-of-service attack.
Finding a bug can cause you to have further access into websites and software.

There are a bunch of methods on finding exploits.
The common found is a vulnerability in the creators software.
A remote exploit can work over a network and exploits the security vulnerabilities without access to the system.
A local exploit requires information before accessing the system.
It also increases the privileges of the person running the exploit past those by the system administrator.

Exploits clients also exist, usually using modified servers that send exploits when accessed with the clients application.
Exploits against applications requires some interaction with the user and is combined with a bit of social engineering.
This is part of the hackers way of gaining access into computers & websites for stealing information.

Normally a single exploit can take advantage of some software.
Often, when the exploit is released to the public, the creators will try and patch the bug.
Later they will release an update for customers to download.
This happens when the software is on the newer version.
The reason on why some black hatters don't publish their exploits is because of the patching method that is done by the creators, so they keep it to themselves or other hackers.

Earn Respect As a Hacker :
Program software & release it to the community with the source attached.
Design software that can be useful to everyone, this way users will download it & leave positive feedback.
Soon it will spread and you will start to become more known.

Test open-source software that users create.
If you can help them in any sort of way to make there software better & easy to use, I'm sure the creator will be thankful and mention you in the credits.
Try and find a program that is in the making.
Contact the creator and ask to beta-test it.
There's a good chance of you beta-testing it before it's released to the public.
You will also learn a lot this way and create good karma with others, so this way if you ever need help, they will offer you help as well.

Last but not least, give credit.
If you have had help in your current software than be sure to give credits.
Who knows, the person you're working with may give you a good ego.

Have fun!

What You Should Learn :
  • Learn advanced information about an operating system
  • Learn at least one programming language
  • Learn how exploits work
  • Do some research  

WEL-COME

You Are Welcome Heartly.......
Blogger Widgets