Google Hacks

From BC$ MobileTV Wiki
Jump to: navigation, search

Google Hacks are searching shortcuts, tricks and "easter egg" style secret features that only inside developers at Google are told, hackers discover, or Google intentionally releases as a feature.[1]



Web

Site


URL

SafeSearch


Files

Video

-inurl:htm -inurl:html intitle:"index of" mp4 DVD | -inurl:htm -inurl:html intitle:"index of" avi Spongebob | SNL celebrity jeopardy filetype:flv | +inurl%3Aavi|mpg|wmv DailyShow | &[4]

Audio

+inurl:mp3|wma|ogg Iron Maiden | +inurl:mp3|wma|ogg Iron Maiden site:rapidshare.com&[5]

Images

Reports

Mobile TV filetype:pdf | World Peace filetype:pdf [6]

Presentations

Mobile TV filetype:ppt [7]


Code

[8][9]

Projects

Groups

Blogs

Journals

News

Books

Online Video

Music


Movies

movie:Avatar E1A4Y1


Weather

weather:E1A4Y1


Stocks

stocks:goog


People

Identity

"Bryan+Copeland" "Bryan Copeland"


Phone Numbers

phonebook:Bryan Copeland | phonebook: (337) 456-2492 begin_of_the_skype_highlighting (337) 456-2492 end_of_the_skype_highlighting [10]

Address

John Doe New York NY


Locations

Driving Directions

Map an Area code

506


Transportation

Travel

Airport Codes

Denver International Airport code Colorado airport code

Travel Conditions

DEN airport [11]

Flight Status

AC002


Vehicle Registration

JH4NA1157MT001832


Medical

[12]


Definitions

define:Mobile TV


Commerce

Patents

patent 5122313


Products (UPC)

036000250015


FCC Equipment

fcc B4Z-34009-PIR


Companies


Business Hours

hours Goodlife Fredericton Prospect St hours



Math

1354 * 19671


Geometry

Planck's Constant Pi


Trigonometry

cos(1/5)

Calculus

Unit Conversion

451 fahrenheit in celsius


Science

Physics

mass of the sun mass of the earth mass of the sun + mass of the earth

Architecture

height of the empire state building



Google Dorking

[13] [14] [15] [16] [17]


Securing servers or sites from Google’s invasion

Below given are the security measures which system administrators and security professionals must take into account to secure critical information available online, falling into wrong hands:

  1. Install latest security patches available till date for the applications and as well as the operating system running on the servers.
  2. Don’t put critical and sensitive information on servers without any proper authentication system which can be directly accessible to anyone on internet.
  3. Disable directory browsing on the webserver. Directory browsing should be enabled for those web-folders for which you want to give access to anyone on internet.
  4. If you find any links to your restricted server or sites in Google search result then it should be removed. Visit the following link for more details[18]
  5. Disable anonymous access in the webserver through internet to restricted systems directory.
  6. Install filtering tools like URLScan for servers running IIS as webserver.

Sometimes increase in sophistication in the systems creates new problems. Google being so sophisticated can be used by any Tom, Dick & Harry on internet to dig sensitive information which is normally neither visible nor reachable to anyone. The only options left for the security professionals and systems administrators are to secure and harden their systems from such un-authorized invasion.


Tutorials


External Links


References

  1. Google Guide - shortcuts: http://www.googleguide.com/shortcuts.html
  2. Google time "slices" - calculate julian date: http://www.searchlores.org/daterange.htm&
  3. Get Better Google Search Results: http://cnettv.cnet.com/get-better-google-search-results/9742-1_53-50071755.html&
  4. Google Hacks - Google searches to increase productivity: http://video.google.com/videoplay?docid=6272710823098922710#docid=1708720893244538105&
  5. Google Hacks - Google searches to increase productivity: http://video.google.com/videoplay?docid=6272710823098922710#docid=1708720893244538105&
  6. Google Special Search Features: http://www.google.com/help/faq_filetypes.html
  7. Google Special Search Features: http://www.google.com/help/faq_filetypes.html
  8. Google Code Search Data API: http://code.google.com/apis/codesearch/index.html
  9. CodeSearch FAQ: http://www.google.com/intl/en/help/faq_codesearch.html
  10. GoogleGuide - Phonebook: http://www.googleguide.com/phonebook.html
  11. http://www.googleguide.com/travel_conditions.html
  12. Effective Google Search Guidelines For Medical Transcriptionists: http://mtherald.com/effective-google-search-guidelines-for-medical-transcriptionists/
  13. Complete Google Dorks List in 2020 For Ethical Hacking and Penetration Testing: https://gbhackers.com/latest-google-dorks-list/
  14. Google Dorks - A Beginner’s Guide: https://the-dark-web.com/google-dorks/
  15. What Is Google Dorking And How To Use It: https://www.gizmodo.com.au/2021/01/what-is-google-dorking-and-how-to-use-it/
  16. Exploring Google Hacking Techniques - Top Google Dorks: https://securitytrails.com/blog/google-hacking-techniques
  17. Google Dorking Commands 101: https://the-dark-web.com/google-dorking-commands-101/
  18. http://www.google.com/remove.html

See Also

Google