This article is collected online. If you have any vulnerabilities or problems, please kindly advise !!!!!!!
Google hacking is actually not a new thing. At that time, google hacking didn't pay much attention to this technology and thought that webshell or something didn't have much practical use. google hacking is actually not
So simple...
Simple implementation of google hacking
Some google syntaxes can be used to provide us with more information (and, of course, to those who are used to attack more people they want .), the following describes some common syntaxes.
Intext:
This means that a character in the body of a webpage is used as a search condition. For example, if you enter intext in google, the system will return all webpages whose body contains "".
. Allintext: The usage is similar to that of intext.
Intitle:
Similar to the intext above, search for any characters in the webpage title that we are looking for. For example, search: intitle: Security Angel. The system will return all web pages whose titles contain "security Angel".
Page. Similarly, allintitle: is similar to intitle.
Cache:
Search for the cache of some content in google, and sometimes you may find some good stuff.
Define:
Search for the definition of a word. Search: define: hacker. The definition of hacker is returned.
Filetype:
I would like to emphasize on this, whether it is a network-based attack or what we will talk about later
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.