9.16.2008

Google Hacking Got Password

·

Did deface or took over a computer, always must not through the process that was known uptil now as looking for the weakness and the exploitation through various techniques. Without through the technique that was difficult and complicated as well as needed high knowledge, by looking for the location database went through Google also evidently could be carried out.


I will order so that Google looks for the location that had database access that had extention file .mdb and had words password or passwd with URL him. For the order OR (OR), could be used by the character "|" so as, syntax that was used was: filetype:mdb inurl:"passwd|password

By that, we could get dozens of sites that protected database him with password, but with software pembongkar like passware, database this could be opened in 1 minute tyo

There was again the site that if being seen will take the form of the asterisk, but that only his form then. Only with eliminated inout mask password in database him, then password immediately will appear tyo

Basically, was suggested by me should not had kept database that could be accessed directly by the public except be forced tyo

Evidently the page this one was good also to be printed: Print This Page

Masukkan Email Kalian Untuk Mendapatkan Artikel-Artikel Seperti Di Atas





2 comments:

Anonymous said...
September 18, 2008 at 9:56 AM  

Thx infonya,bro. Ditunggu postingan barunya ya...Sukses buat anda,friend. :)

fansblogs said...
September 19, 2008 at 11:40 AM  

Free E-Book TOP DI SINI