SlideShare a Scribd company logo
ASHISH
RANJAN
B.Sc. IT 5TH
SEM.
Presentation By
Google Hacking
 Gather information from search engines
is an important step ,because they are
really easy way of getting to know the
target , and the target has no idea of
what you are doing.
 Google search engine is not only clean
and simple , but it is also and extremely
powerful tool to search information on
the web.
 Google`s web crawling robot , Googlebot ,
finds links on the web and retrives web
pages from those links and hands them off
to the google indexing server , where
they are saved to be searched by users.
Working of Google …
 Googlebot , a web crawler that finds
and fetches web pages.
 The indexer that sorts every word on
every pages and stores the resulting
index of words in a huge database.
 The query processor , which
compares your search query to the
index and recommends the
documents that it considers most
relevant.
Google`s Advanced Search
Operator
inurl:
If you include
inurl:in query ,
google will
restrict the
result to
documents
containing that
word in the url
.
 site:
 If you include
site:
 In your query ,
google will
restrict your
search results
to the site or
domain you
specify
 intitle:
 The query
intitle: restricts
to the result to
the documents
containing term
in the title.
file type:
If you include filetype: suffix in your query , google will restrict the result
to the pages whose names end in suffix.
Steganography
Hiding Data Behind Image
 Open notepad ……write your message …..
hey boys we are going to mass bunk
today
- Save @ desktop as
1. secret.txt
2. hacker.jpg
- Copy /b text.jpg+hacker.jpg final.jpg .
Tools for stegnography
 ImageHide
 Stegno
 Quick Stegno
 StegHide
 SilentHide
 JPHide
 HiderMan
Websites hacking
Username – Ashish’ or ‘login’ =
login’
password - Ashish’ or ‘login’ =
login’
Hacking
Web server
 It General user data.
 A web server is a computer which contains
web pages and other content s of website
which can be viewed by ANY USER on
internet.
 Examples – Apache and IIS.
Database Server
 It contains user specefic records.
Hacking
Hacking
Hacking
Hacking
Hacking
Hacking
Hacking
SQL injection
Search from server where
username=Ashish’or ‘login’=‘login
and password=Ashish’or
‘login’=‘login

More Related Content

PPTX
Introduction to google hacking database
PPT
3 google hacking
PPT
Google as a Hacking Tool
PDF
Google Hack
PPTX
Google Dorks
PPTX
Google search architecture services in Hyderabad
PPTX
How google search engine work
PPTX
Week 9 10 ppt-how_searchworks
Introduction to google hacking database
3 google hacking
Google as a Hacking Tool
Google Hack
Google Dorks
Google search architecture services in Hyderabad
How google search engine work
Week 9 10 ppt-how_searchworks

What's hot (18)

PPTX
Google search techniques
PPTX
Week 9 10 ppt-google_search
PPTX
Surfing the internet
DOC
Demystifying google hacks
PPT
Google
PDF
Amrapali builders -- google cheatsheet.pdf
PPTX
Securing and Personalizing Commerce Using Identity Data Mining
DOCX
Effective Googling
PPTX
How Google Search Algorithm Works ??
PPTX
Creating Operational Redundancy for Effective Web Data Mining
PPS
Google Search Presentation
PPT
Fe Colleges Conference
PPTX
Search engines
PPTX
How to google
PPTX
Google tricks
PDF
Search Engine
DOC
FII News
PPTX
Search Engine
Google search techniques
Week 9 10 ppt-google_search
Surfing the internet
Demystifying google hacks
Google
Amrapali builders -- google cheatsheet.pdf
Securing and Personalizing Commerce Using Identity Data Mining
Effective Googling
How Google Search Algorithm Works ??
Creating Operational Redundancy for Effective Web Data Mining
Google Search Presentation
Fe Colleges Conference
Search engines
How to google
Google tricks
Search Engine
FII News
Search Engine

Viewers also liked (6)

PDF
Afceh 2.0 Final
PPT
Google hacking 2015
PDF
Google Hacking Basics
PDF
CITEC #CON2-Dirty Attack with Google Hacking
PPTX
Hacking ppt
PDF
Ethical hacking & Information Security
Afceh 2.0 Final
Google hacking 2015
Google Hacking Basics
CITEC #CON2-Dirty Attack with Google Hacking
Hacking ppt
Ethical hacking & Information Security

Similar to Hacking (20)

PPT
Google
PPT
Google ppt by amit
PPTX
Google SEO 2013 - Hummingbird and Beyond
PDF
Google Hacking by Ali Jahangiri
PPTX
Search engine
DOC
Seo Manual
PPTX
SEO (SEARCH ENGINE OPTIMIZATION) AND DIGITAL MARKETING.pptx
DOCX
Google Advance Searching- Information System Audit & Control Report
PDF
How Google Search Works
PPT
Google Search Engine
DOCX
SEO INTERVIEW.docx
PPT
SEO Temelleri
PPTX
Introduction to Search Engine Optimization
PDF
Google searching operators
PDF
DOCX
Report on search engines
DOCX
How search engine works
PPTX
How google works and functions: A complete Approach
PPTX
Google indexing
PPTX
Effective Searching by Dominik Kornas
Google
Google ppt by amit
Google SEO 2013 - Hummingbird and Beyond
Google Hacking by Ali Jahangiri
Search engine
Seo Manual
SEO (SEARCH ENGINE OPTIMIZATION) AND DIGITAL MARKETING.pptx
Google Advance Searching- Information System Audit & Control Report
How Google Search Works
Google Search Engine
SEO INTERVIEW.docx
SEO Temelleri
Introduction to Search Engine Optimization
Google searching operators
Report on search engines
How search engine works
How google works and functions: A complete Approach
Google indexing
Effective Searching by Dominik Kornas

Recently uploaded (20)

PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Mushroom cultivation and it's methods.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Encapsulation theory and applications.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
August Patch Tuesday
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Approach and Philosophy of On baking technology
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
Digital-Transformation-Roadmap-for-Companies.pptx
Network Security Unit 5.pdf for BCA BBA.
Building Integrated photovoltaic BIPV_UPV.pdf
Mushroom cultivation and it's methods.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Encapsulation theory and applications.pdf
Unlocking AI with Model Context Protocol (MCP)
August Patch Tuesday
NewMind AI Weekly Chronicles - August'25-Week II
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Encapsulation_ Review paper, used for researhc scholars
Programs and apps: productivity, graphics, security and other tools
Advanced methodologies resolving dimensionality complications for autism neur...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Approach and Philosophy of On baking technology
MIND Revenue Release Quarter 2 2025 Press Release
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Assigned Numbers - 2025 - Bluetooth® Document

Hacking

  • 2. Google Hacking  Gather information from search engines is an important step ,because they are really easy way of getting to know the target , and the target has no idea of what you are doing.  Google search engine is not only clean and simple , but it is also and extremely powerful tool to search information on the web.  Google`s web crawling robot , Googlebot , finds links on the web and retrives web pages from those links and hands them off to the google indexing server , where they are saved to be searched by users.
  • 3. Working of Google …  Googlebot , a web crawler that finds and fetches web pages.  The indexer that sorts every word on every pages and stores the resulting index of words in a huge database.  The query processor , which compares your search query to the index and recommends the documents that it considers most relevant.
  • 4. Google`s Advanced Search Operator inurl: If you include inurl:in query , google will restrict the result to documents containing that word in the url .  site:  If you include site:  In your query , google will restrict your search results to the site or domain you specify  intitle:  The query intitle: restricts to the result to the documents containing term in the title. file type: If you include filetype: suffix in your query , google will restrict the result to the pages whose names end in suffix.
  • 6. Hiding Data Behind Image  Open notepad ……write your message ….. hey boys we are going to mass bunk today - Save @ desktop as 1. secret.txt 2. hacker.jpg - Copy /b text.jpg+hacker.jpg final.jpg .
  • 7. Tools for stegnography  ImageHide  Stegno  Quick Stegno  StegHide  SilentHide  JPHide  HiderMan
  • 9. Username – Ashish’ or ‘login’ = login’ password - Ashish’ or ‘login’ = login’
  • 11. Web server  It General user data.  A web server is a computer which contains web pages and other content s of website which can be viewed by ANY USER on internet.  Examples – Apache and IIS.
  • 12. Database Server  It contains user specefic records.
  • 21. Search from server where username=Ashish’or ‘login’=‘login and password=Ashish’or ‘login’=‘login