Hack With Google

Reference: Google Hacking for Penetration Testers

Google as a hacking tool is generally used by hackers to locate random vulnerable targets and then they hack it for fun etc.  There are a lot of webservers  that have old unpatched  Operating Systems running. Many websites are defaced using very simple techniques. So, it is of utmost importance for the administrators to have their servers properly patched. I am presuming that you know advanced google searching techniques. Even if you don’t know, do a google search.

Search expressions in google can yield a plethora of information. We will now see Google helping us to locate Microsoft IIS  ( Internet Information Services ) servers.                                                                                                                                                                                                              Query Google for  :

intitle:”welcome to IIS 4.0”

Dissecting the search expression :

intitle:”welcome to IIS 4.0”

intitle means that Google will search for whatever words you tell it to in the title of a website. In this case you search for                     “welcome to IIS 4.0”.

IIS Server Version                             Query

Many                                                   intitle:”welcome to” intitle:internet IIS

Unknown                                             intitle:”Under construction” “does not currently have”

IIS 4.0                                                  intitle:”welcome to IIS 4.0”

IIS 4.0                                                  allintitle:Welcome to Windows NT 4.0 Option Pack

IIS 4.0                                                  allintitle:Welcome to Internet Information Server

IIS 5.0                                                  allintitle:Welcome to Windows 2000 Internet Services

IIS 6.0                                                  allintitle:Welcome to Windows XP Server Internet Services

What  attackers do after getting this info :

After locating the web server the attackers search for working exploits for the found version of the webserver and execute the exploits.

This is no rocket engineering.

You can locate different kind of web servers, default programs, network hardware, printers etc. using Google.

Search for Open Webcams:


inurl:axis-cgi/mjpg (motion-JPEG)
intitle:”live view” intitle:axis
allintitle:”Network Camera NetworkCamera”
intitle:axis intitle:”video server”
intitle:liveapplet inurl:LvAppl
intitle:”EvoCam” inurl:”webcam.html”
intitle:”Live NetSnap Cam-Server feed”
intitle:”Live View / – AXIS”
intitle:”Live View / – AXIS 206M”
intitle:”Live View / – AXIS 206W”
intitle:”Live View / – AXIS 210″
inurl:indexFrame.shtml Axis
intitle:start inurl:cgistart
intitle:”WJ-NT104 Main Page”
intext:”MOBOTIX M1″ intext:”Open Menu”
intext:”MOBOTIX M10″ intext:”Open Menu”
intext:”MOBOTIX D10″ intext:”Open Menu”
intitle:snc-z20 inurl:home/
intitle:snc-cs3 inurl:home/
intitle:snc-rz30 inurl:home/
intitle:”sony network camera snc-p1″
intitle:”sony network camera snc-m1″
site:.viewnetcam.com -www.viewnetcam.com
intitle:”Toshiba Network Camera” user login
intitle:”netcam live image”
intitle:”i-Catcher Console – Web Monitor”

Queries that Locate password Info:

filetype:netrc password netrc file may contain cleartext passwords

intitle:”Index of” passwords modified “Password” directories


ASP-Nuke database files often contain passwords

filetype:bak inurl:”htaccess|passwd| shadow|htusers” usernames

BAK files referring to passwords

filetype:log “See `ipsec —copyright”

BARF log files reveal ipsec data


CalenderScript passwords

inurl:ccbill filetype:log

CCBill log files may contain authentication Data

inurl:cgi-bin inurl:calendar.cfg

CGI Calendar (Perl) configuration file reveals information including passwords for the program.

inurl:chap-secrets -cvs chap-secrets

file may list usernames and passwords

[WFClient] Password= filetype:ica

Citrix WinFrame-Client may contain login Information


Cleartext passwords. No decryption required!

intitle:index.of config.php

Config.php files

inurl:config.php dbuname dbpass

config.php files

inurl:server.cfg rcon password

Counter strike rcon passwords


8 thoughts on “Hack With Google

  1. Hi this is abel from east africa. I really wanna become a hacker
    but I couldn’t get enought info about it so if you can please send me email about hacking in general and specially using google.Thank you.

    1. Any software, be it a Word Processor or an OS, can have programming glitches, call it bugs or security holes and software makers cover/patch these holes by providing performance and security updates. Hackers take advantage of these holes to break into systems.

  2. You actually make it seem really easy with your presentation but I to find this matter to be actually something that I believe I’d never understand.
    It kind of feels too complex and very vast for me.
    I’m looking ahead for your next publish, I will attempt to get the grasp of it!

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s