Sei sulla pagina 1di 5

Google Dorks

------------
Google Droks are the advance way and techniques of refined searching on Google to
get the structured and accurate results as per your requierements.

Tags Use
--------
Site : This dork we use when we need all data and links of the target website.

For Example: site:lucideus.com

inurl : This dork is used when we are looking for any entity in any URL of the
website.

For Example: site:lucideus.com inurl:id=

Filetype : This dork is used when we are looking for a particular file in the
webserver.

For Example: site:lucideus.com filetype:.sql

Home Work : Make a List of 10 Dorks and take screenshots what you get. ( DO Not
Exploit )

Resources for GoogleHacks


-------------------------
1. Johny i Hack Stuff
2. Offensive Security : exploit-db.com/ghdb

inurl:ftp inurl:Seagate inurl:Backup

intext:phpMyAdmin SQL Dump filetype:sql intext:INSERT INTO `admin` (`id`, `user`,


`password`) VALUES

inurl:admin intext:username= AND email= AND password= OR pass= filetype:xls


Seeing CCTV Camera
-------------------
AXIS : CCTV Manufacturer

inurl:view/shtml

Introduction to Firewalls
--------------------------

Firewall : Its a filter or a gatekeeper which filters the content which is to be


scanned when teh data enters and goes out from the computer.
Windows Provide Inbuild firewall in all platforms of the its OS.

IDS : Intrusion Detection systems: Its a device or a application which is deployed


on a website server or a network to moniter all kind of intrusion occoured via any
attacker in the network etc.
IPS : Intrusion Protection Systems : These systems are responsible of protection
against all the intrusions casued by the network people or outside network
attacker.

Top 5 IPS and IDS systems Word List


------------------------------------

HoneyPots
---------
Honey Pots are the traps deployed by the website owners to detect and trace the
attackers who try to attack the website.

Honey Ports are of Two Types


-----------------------------
1. Production Honeypots : These are the honeypots which are deployed by the middle
level organisations , these honey pots are easy to deploy and handle as well as
operational.They are not that expensive to deploy .

2.Research Honeypots : These honeypots are used by enterprise organisations as well


as govt agenices for research and hardcore traps for the national security and
else. They are very complex in deploying as well as in handling and also cost a
huge amount as compare to production honeypots.

Web Application Firewalls


-------------------------
These are the webbased firewalls which are deployed to protect the websites from
all kind of web vulnerability attacks.

This works on Application layer of the OSI model that is why this called as Web
aPplication Firewall.

Types of Firewall
-------------------
1. Software Firewall : Application software which si installed on the server and
with having a databas of blacklist and whitelist keywords they allow or block teh
request from the user send via a URL.

PHP + MYSQL: Mod_Security ( Open Source)


Dot Net + MS SQL : Dot Defender (Paid)

2. Hardware Firewall : CYberrom , Baracuda security etc etc.

Misconfiguration of Web Application Firewalls


---------------------------------------------
1. Manual Rule Managements (Black List)
2. Time based Updation of Rules

Potrebbero piacerti anche