Did deface or took over a computer, always must not through the process that was known uptil now as looking for the weakness and the exploitation through various techniques. Without through the technique that was difficult and complicated as well as needed high knowledge, by looking for the location database went through Google also evidently could be carried out.
I will order so that Google looks for the location that had database access that had extention file .mdb and had words password or passwd with URL him. For the order OR (OR), could be used by the character "|" so as, syntax that was used was: filetype:mdb inurl:"passwd|password
By that, we could get dozens of sites that protected database him with password, but with software pembongkar like passware, database this could be opened in 1 minute
There was again the site that if being seen will take the form of the asterisk, but that only his form then. Only with eliminated inout mask password in database him, then password immediately will appear
Basically, was suggested by me should not had kept database that could be accessed directly by the public except be forced
Evidently the page this one was good also to be printed: Print This Page
9.16.2008
Google Hacking Got Password
·
Labels: Category Hacking, Google Hacking
Subscribe to:
Post Comments (Atom)
2 comments:
Thx infonya,bro. Ditunggu postingan barunya ya...Sukses buat anda,friend. :)
Free E-Book TOP DI SINI
Post a Comment