<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Hacking Archives - ITBlogSec.com</title>
	<atom:link href="https://itblogsec.com/category/hacking/feed/" rel="self" type="application/rss+xml" />
	<link>https://itblogsec.com/category/hacking/</link>
	<description>IT, network, security and hacking</description>
	<lastBuildDate>Fri, 25 Jul 2025 07:38:55 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>Top Security Tips and Tricks to Protect Yourself in Today’s Digital World 2025</title>
		<link>https://itblogsec.com/top-security-tips-and-tricks-to-protect-yourself-in-todays-digital-world-2025/</link>
					<comments>https://itblogsec.com/top-security-tips-and-tricks-to-protect-yourself-in-todays-digital-world-2025/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 25 Jul 2025 07:37:50 +0000</pubDate>
				<category><![CDATA[Hacking]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Other]]></category>
		<guid isPermaLink="false">https://itblogsec.com/?p=1360</guid>

					<description><![CDATA[<p>In an era where our lives are increasingly digital, safeguarding personal information and online presence&#8230;</p>
<p>The post <a href="https://itblogsec.com/top-security-tips-and-tricks-to-protect-yourself-in-todays-digital-world-2025/">Top Security Tips and Tricks to Protect Yourself in Today’s Digital World 2025</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In an era where our lives are increasingly digital, safeguarding personal information and online presence has never been more critical. Cyber threats are evolving rapidly, and hackers are becoming more sophisticated. To stay one step ahead, you need to adopt smart security practices that shield you from potential risks. Here are some essential security tips and tricks to help you stay safe in today’s interconnected world.</p>
<h3>1. Use Strong, Unique Passwords</h3>
<p>One of the simplest yet most effective security measures is creating strong, unique passwords for each of your accounts. Avoid common passwords like “password123” or “admin,” as these are easy targets for hackers. Instead, use a combination of uppercase and lowercase letters, numbers, and special characters. Consider using a password manager to generate and store complex passwords securely. This way, you won’t have to remember them all — just one master password.</p>
<h3>2. Enable Two-Factor Authentication (2FA)</h3>
<p>Adding an extra layer of security with two-factor authentication is a game-changer. With 2FA, even if hackers get hold of your password, they’ll need a second form of verification—like a code sent to your phone or fingerprint scan—to gain access. Many popular services like Gmail, Facebook, and banking apps support 2FA, so enable it wherever possible.</p>
<h3>3. Keep Software Up to Date</h3>
<p>Software developers frequently release updates to fix security vulnerabilities. Failing to install these updates leaves your devices open to attacks. Turn on automatic updates on your operating system, browsers, and apps to ensure you’re protected against the latest threats.</p>
<h3>4. Be Wary of Phishing Attacks</h3>
<p>Phishing scams are emails or messages designed to trick you into revealing sensitive information. They often appear legitimate, mimicking trusted brands or contacts. Always scrutinize emails for signs of fraud, such as suspicious sender addresses, grammatical errors, or unusual requests. Never click on suspicious links or share personal data unless you are certain of the sender’s identity.</p>
<h3>5. Secure Your Wi-Fi Network</h3>
<p>Your home Wi-Fi network is a gateway to all your connected devices. Secure it with a strong password and WPA3 encryption. Change the default router credentials and disable remote management features. Consider setting up a separate guest network for visitors to prevent access to your main devices.</p>
<h3>6. Backup Your Data Regularly</h3>
<p>Data loss can occur due to malware attacks, hardware failure, or accidental deletion. Protect yourself by regularly backing up important files to an external drive or cloud storage service. In case of an attack, having recent backups ensures you can restore your data quickly.</p>
<h3>7. Use Antivirus and Anti-Malware Software</h3>
<p>Installing reputable antivirus and anti-malware programs adds a vital layer of defense. These tools can detect and remove malicious software before it causes harm. Keep your security software updated and run regular scans.</p>
<h3>8. Limit Personal Information Sharing</h3>
<p>Be cautious about how much personal information you share online, especially on social media. Details like your address, phone number, or travel plans can be exploited by hackers for identity theft or targeted attacks. Keep your privacy settings tight and share information only with trusted contacts.</p>
<h3>9. Be Vigilant on Public Wi-Fi</h3>
<p>Public Wi-Fi networks are convenient but often insecure. Avoid accessing sensitive accounts or conducting financial transactions on public networks. If necessary, use a Virtual Private Network (VPN) to encrypt your internet connection and protect your data from prying eyes.</p>
<h3>10. Educate Yourself and Stay Informed</h3>
<p>Cyber threats evolve constantly. Stay informed about the latest scams, security tools, and best practices. Regularly educate yourself about online safety and encourage your friends and family to do the same.</p>
<p>The post <a href="https://itblogsec.com/top-security-tips-and-tricks-to-protect-yourself-in-todays-digital-world-2025/">Top Security Tips and Tricks to Protect Yourself in Today’s Digital World 2025</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/top-security-tips-and-tricks-to-protect-yourself-in-todays-digital-world-2025/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hacking for beginners #1 &#8211; Install the Kali Linux</title>
		<link>https://itblogsec.com/hacking-for-beginners-1-install-the-kali-linux/</link>
					<comments>https://itblogsec.com/hacking-for-beginners-1-install-the-kali-linux/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 05 May 2020 08:33:06 +0000</pubDate>
				<category><![CDATA[Hacking]]></category>
		<category><![CDATA[How to]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[kali linux]]></category>
		<guid isPermaLink="false">https://itblogsec.com/?p=1240</guid>

					<description><![CDATA[<p>In this tutorial series called Hacking for beginners, we are going to teach you how to use the most powerful open-source Linux system called Kali Linux. This tutorial gives a complete understanding of Kali Linux and explains how to use it in practice for various hacker activities. We are focusing on step-by-step guidelines with the best explanation so even beginners and hacking dummies can understand  and follow it.</p>
<p>The post <a href="https://itblogsec.com/hacking-for-beginners-1-install-the-kali-linux/">Hacking for beginners #1 &#8211; Install the Kali Linux</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;">In this tutorial series called <strong>Hacking for beginners</strong>, we are going to teach you how to use the most <strong>powerful open-source Linux system</strong> called <strong><a href="https://www.kali.org" target="_blank" rel="noopener noreferrer">Kali Linux</a>. </strong>This tutorial gives a <strong>complete</strong> <strong>understanding</strong> of <strong>Kali Linux</strong> and explains how to use it <strong>in practice for various hacker activities</strong>. We are focusing on step-by-step guidelines with the best explanation so even beginners and hacking dummies can understand  and follow it. Be polite, be ethical and use it only for education purposes! <strong>Enjoy and stay tuned for the next episodes <img src="https://s.w.org/images/core/emoji/16.0.1/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /> </strong></p>
<h3 style="text-align: justify;">What you can learn </h3>
<p style="text-align: justify;">If you want to start with hacking, first you need <strong>to have some hacking tools available</strong>. The best option for that purpose is using Kali Linux what is linux distribution specially designed to be used for hacking activities. As the part of our hacking tutorials for beginners, we are starting with the <strong>#1</strong> where you can find exact steps <strong>how to install Kali linux on MacOS using Parallels Desktop or Virtual Box</strong>. Of course, you can use <strong>any virtualization platform</strong> you want, even there is ARM Kali Linux image available for <a href="https://itblogsec.com/build-own-openvpn-server-by-using-raspberry-pi-12/" target="_blank" rel="noopener noreferrer"><strong>rapsbperry PI</strong></a>, you can download it <a href="https://www.offensive-security.com/kali-linux-arm-images/" target="_blank" rel="noopener noreferrer">here</a>. </p>
<h3 style="text-align: justify;"><strong>1: Download kali linux image</strong></h3>
<p><strong>&#8211; use official webpage https://www.kali.org/downloads/</strong></p>
<p><a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-13.42.16.png"><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-1242" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-13.42.16.png" alt="" width="553" height="168" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-13.42.16.png 553w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-13.42.16-300x91.png 300w" sizes="(max-width: 553px) 100vw, 553px" /></a></p>
<p>&nbsp;</p>
<h3><strong>2: Import Kali linux image </strong></h3>
<p><strong>&#8211; here is example by using Parallels Desktop &#8211; choose Debian GNI/Linux (the same applicable for for Virtual Box)</strong></p>
<p><a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.00.46.png"><img decoding="async" class="aligncenter size-full wp-image-1248" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.00.46.png" alt="" width="865" height="578" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.00.46.png 865w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.00.46-300x200.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.00.46-768x513.png 768w" sizes="(max-width: 865px) 100vw, 865px" /></a></p>
<h3><strong>3: Choose name and location </strong></h3>
<p><a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.01.08.png"><img decoding="async" class="aligncenter size-full wp-image-1251" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.01.08.png" alt="" width="859" height="571" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.01.08.png 859w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.01.08-300x199.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.01.08-768x511.png 768w" sizes="(max-width: 859px) 100vw, 859px" /></a></p>
<h3><strong>4: Select type of installation (Graphical install)</strong></h3>
<p><a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.03.19.png"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1252" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.03.19.png" alt="" width="633" height="514" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.03.19.png 633w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.03.19-300x244.png 300w" sizes="(max-width: 633px) 100vw, 633px" /></a></p>
<p>&nbsp;</p>
<h3><strong>5: Select language for installation</strong></h3>
<p><a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.03.53.png"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1253" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.03.53.png" alt="" width="1017" height="797" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.03.53.png 1017w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.03.53-300x235.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.03.53-768x602.png 768w" sizes="(max-width: 1017px) 100vw, 1017px" /></a></p>
<h3><strong>6: Wait for installation </strong></h3>
<p><a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.04.23.png"><img loading="lazy" decoding="async" class="aligncenter wp-image-1255 size-full" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.04.23-e1588674488352.png" alt="" width="1016" height="314" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.04.23-e1588674488352.png 1016w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.04.23-e1588674488352-300x93.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.04.23-e1588674488352-768x237.png 768w" sizes="(max-width: 1016px) 100vw, 1016px" /></a></p>
<h3><strong>7: Type hostname of your Kali linux system</strong></h3>
<p><a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.05.17.png"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1256" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.05.17.png" alt="" width="1018" height="798" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.05.17.png 1018w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.05.17-300x235.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.05.17-768x602.png 768w" sizes="(max-width: 1018px) 100vw, 1018px" /></a></p>
<h3><strong>8: Type domain name</strong></h3>
<p><strong>&#8211; if you do not use domain, just leave it blank</strong></p>
<p><a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.05.30.png"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1257" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.05.30.png" alt="" width="1019" height="795" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.05.30.png 1019w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.05.30-300x234.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.05.30-768x599.png 768w" sizes="(max-width: 1019px) 100vw, 1019px" /></a></p>
<h3><strong>9: Set-up user and password </strong></h3>
<p><strong>&#8211; (always use strong password)</strong></p>
<h3><a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.05.51.png"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1258" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.05.51.png" alt="" width="1014" height="798" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.05.51.png 1014w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.05.51-300x236.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.05.51-768x604.png 768w" sizes="(max-width: 1014px) 100vw, 1014px" /></a> <a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.06.27.png"><img loading="lazy" decoding="async" class="aligncenter size-large wp-image-1259" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.06.27.png" alt="" width="1015" height="792" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.06.27.png 1015w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.06.27-300x234.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.06.27-768x599.png 768w" sizes="(max-width: 1015px) 100vw, 1015px" /></a> <a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.06.58.png"><img loading="lazy" decoding="async" class="aligncenter size-large wp-image-1260" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.06.58.png" alt="" width="1013" height="796" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.06.58.png 1013w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.06.58-300x236.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.06.58-768x603.png 768w" sizes="(max-width: 1013px) 100vw, 1013px" /></a><strong>10: Select your time-zone</strong> </h3>
<p><a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.07.15.png"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1261" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.07.15.png" alt="" width="1013" height="796" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.07.15.png 1013w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.07.15-300x236.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.07.15-768x603.png 768w" sizes="(max-width: 1013px) 100vw, 1013px" /></a></p>
<h3><strong>11: Partition and format your virtual disk </strong></h3>
<p><strong>&#8211; please select: Guided &#8211; use entire disk</strong></p>
<p><a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.07.57.png"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1262" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.07.57.png" alt="" width="1018" height="798" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.07.57.png 1018w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.07.57-300x235.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.07.57-768x602.png 768w" sizes="(max-width: 1018px) 100vw, 1018px" /></a> <a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.13.png"><img loading="lazy" decoding="async" class="aligncenter size-large wp-image-1263" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.13.png" alt="" width="1017" height="799" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.13.png 1017w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.13-300x236.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.13-768x603.png 768w" sizes="(max-width: 1017px) 100vw, 1017px" /></a> <a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.25.png"><img loading="lazy" decoding="async" class="aligncenter size-large wp-image-1264" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.25.png" alt="" width="1016" height="797" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.25.png 1016w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.25-300x235.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.25-768x602.png 768w" sizes="(max-width: 1016px) 100vw, 1016px" /></a> <a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.36.png"><img loading="lazy" decoding="async" class="aligncenter size-large wp-image-1265" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.36.png" alt="" width="1015" height="798" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.36.png 1015w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.36-300x236.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.36-768x604.png 768w" sizes="(max-width: 1015px) 100vw, 1015px" /></a> <a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.56.png"><img loading="lazy" decoding="async" class="aligncenter size-large wp-image-1266" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.56.png" alt="" width="1016" height="792" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.56.png 1016w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.56-300x234.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.56-768x599.png 768w" sizes="(max-width: 1016px) 100vw, 1016px" /></a></p>
<h3><strong>12: Select software you want to install </strong></h3>
<p><strong>&#8211; of course later you can install any kind of software you want</strong></p>
<p><a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.20.34.png"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1267" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.20.34.png" alt="" width="1015" height="800" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.20.34.png 1015w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.20.34-300x236.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.20.34-768x605.png 768w" sizes="(max-width: 1015px) 100vw, 1015px" /></a></p>
<h3><strong>13: Install GRUB boot loader</strong></h3>
<p><a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.45.13.png"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1268" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.45.13.png" alt="" width="1020" height="797" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.45.13.png 1020w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.45.13-300x234.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.45.13-768x600.png 768w" sizes="(max-width: 1020px) 100vw, 1020px" /></a> <a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.45.28.png"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1269" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.45.28.png" alt="" width="1019" height="793" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.45.28.png 1019w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.45.28-300x233.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.45.28-768x598.png 768w" sizes="(max-width: 1019px) 100vw, 1019px" /></a> <a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.45.42.png"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1270" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.45.42.png" alt="" width="1019" height="799" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.45.42.png 1019w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.45.42-300x235.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.45.42-768x602.png 768w" sizes="(max-width: 1019px) 100vw, 1019px" /></a><strong> </strong></p>
<h3><strong>14: Wait for installation to be finished</strong></h3>
<p><a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.47.32.png"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1271" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.47.32.png" alt="" width="1018" height="799" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.47.32.png 1018w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.47.32-300x235.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.47.32-768x603.png 768w" sizes="(max-width: 1018px) 100vw, 1018px" /></a></p>
<h3><strong>15: Congratulations! We are done.</strong></h3>
<p><strong>&#8211; Now your Kali linux system is ready to be used for your hacking practice </strong></p>
<p><a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.48.31.png"><img loading="lazy" decoding="async" class="aligncenter size-large wp-image-1272" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.48.31-1024x602.png" alt="" width="1024" height="602" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.48.31-1024x602.png 1024w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.48.31-300x176.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.48.31-768x452.png 768w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.48.31.png 1275w" sizes="(max-width: 1024px) 100vw, 1024px" /></a> <a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.49.38.png"><img loading="lazy" decoding="async" class="aligncenter size-large wp-image-1273" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.49.38-1024x603.png" alt="" width="1024" height="603" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.49.38-1024x603.png 1024w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.49.38-300x177.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.49.38-768x452.png 768w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.49.38.png 1276w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></p>
<h3>Conclusion</h3>
<p>At this point, you have the system which is ready to learn new hacking practice by yourself. In our next tutorials, we will try to bring you step-by-step guides how to learn ethical hacking practices. Stay tuned, like us on facebook and soon there will second part of <strong>Hacking for Beginners</strong> available. </p>
<p>The post <a href="https://itblogsec.com/hacking-for-beginners-1-install-the-kali-linux/">Hacking for beginners #1 &#8211; Install the Kali Linux</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/hacking-for-beginners-1-install-the-kali-linux/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How CoffeeMiner Attack Hacks Public Wi-Fi And Uses Your PC For Mining Cryptocurrency</title>
		<link>https://itblogsec.com/coffeeminer-attack-hacks-public-wi-fi-uses-pc-mining-cryptocurrency/</link>
					<comments>https://itblogsec.com/coffeeminer-attack-hacks-public-wi-fi-uses-pc-mining-cryptocurrency/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 18 Jan 2018 13:57:35 +0000</pubDate>
				<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Wi-Fi hotspot]]></category>
		<category><![CDATA[Wireless]]></category>
		<guid isPermaLink="false">http://itblogsec.com/?p=1059</guid>

					<description><![CDATA[<p>After a series of ransomware attacks capturing the headlines past year, crypto mining malware and cryptojacking attacks came into the play. Just last month, a Starbucks customer found that the infected Wi-Fi hotspot was trying to mine Monero digital coins.</p>
<p>The post <a href="https://itblogsec.com/coffeeminer-attack-hacks-public-wi-fi-uses-pc-mining-cryptocurrency/">How CoffeeMiner Attack Hacks Public Wi-Fi And Uses Your PC For Mining Cryptocurrency</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>How CoffeeMiner Attack Hacks Public Wi-Fi And Uses Your PC For Mining Cryptocurrency</h2>
<p style="text-align: justify;">After a series of ransomware attacks capturing the headlines past year, <strong>crypto mining malware and cryptojacking attacks</strong> came into the play. Just last month, a <strong>Starbucks customer found that the infected Wi-Fi hotspot</strong> was trying to <strong>mine Monero digital coins</strong>. It was a new kind of threat associated with <strong>using public hotspots</strong>, which are often labeled <strong>unsafe and users are advised to use VPN</strong> services for extra privacy.</p>
<p style="text-align: justify;">In a similar development, <strong>a security researcher named Arnau</strong> has published a <strong>proof-of-concept project</strong> that showcases how troublesome actors <strong>can exploit such public Wi-Fi networks</strong> and print free money.</p>
<p style="text-align: justify;">Named <strong>CoffeeMiner</strong>, this attack uses a<strong> script to perform autonomous MITM attack to inject some malicious JavaScript code into the HTML pages</strong>. The <strong>attack has been tested in the real-world scenario to turn smartphones and PCs into cryptomining bots</strong>.</p>
<p style="text-align: justify;">For performing <strong>MITM attack</strong>, the <strong>ARP spoofing technique is used</strong>. The researcher used <strong>dsniff library to perform the ARP spoofing attack</strong>. Using another tool named <strong>mitmproxy</strong>, the <strong>traffic</strong> going to the host <strong>is analyzed and JavaScript code is injected.</strong> To make the process cleaner, <strong>a single line of HTML code is injected; this line calls the miner.</strong></p>
<p><iframe title="coffeeMiner demo in real WiFi network" width="1170" height="658" src="https://www.youtube.com/embed/-TnzGLUD0DU?feature=oembed" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></p>
<p style="text-align: justify;">As expected, the miner being used in the concept is from <strong>CoinHive</strong>. It’s a <strong>Monero miner that uses the CPU power to calculate hashes with Cryptonight PoW hash algorithm for mining.</strong></p>
<p style="text-align: justify;">The real-world demo of the attack using Kali Linux is shown above. The researcher has shared this attack for academic purposes and to showcase how easily one cybercriminal can exploit your weak security practices.</p>
<p><span style="font-size: 10pt;"><strong>source:</strong> <a href="https://fossbytes.com" target="_blank" rel="noopener">https://fossbytes.com</a></span></p>
<p>The post <a href="https://itblogsec.com/coffeeminer-attack-hacks-public-wi-fi-uses-pc-mining-cryptocurrency/">How CoffeeMiner Attack Hacks Public Wi-Fi And Uses Your PC For Mining Cryptocurrency</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/coffeeminer-attack-hacks-public-wi-fi-uses-pc-mining-cryptocurrency/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>10 private search engines that do not track you</title>
		<link>https://itblogsec.com/10-private-search-engines-not-track/</link>
					<comments>https://itblogsec.com/10-private-search-engines-not-track/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 07 Oct 2017 19:21:10 +0000</pubDate>
				<category><![CDATA[Hacking]]></category>
		<category><![CDATA[browser]]></category>
		<category><![CDATA[privacy]]></category>
		<guid isPermaLink="false">http://itblogsec.com/?p=1000</guid>

					<description><![CDATA[<p>Private browsing using the private or incognito modes provided in your browser, does not give you the level of privacy you think it does. If you really don’t want to be tracked and also don’t want anyone tracking your searches, try these search engines.</p>
<p>The post <a href="https://itblogsec.com/10-private-search-engines-not-track/">10 private search engines that do not track you</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2 style="text-align: justify;">10 private search engines that do not track you</h2>
<p style="text-align: justify;">Private browsing using the private or incognito modes provided in your browser, does not give you the level of privacy you think it does. If you really <strong>don’t want to be tracked and also don’t want anyone tracking your searches</strong>, try these search engines.</p>
<h3 style="text-align: justify;">1.<a href="https://duckduckgo.com/" target="_blank" rel="noopener">DuckDuckGo</a></h3>
<p style="text-align: justify;">DuckDuckGo is a very secure search engine that never tracks your searches while providing you really good search experience. The main purpose of building this search engine is for people who likes to remain private while searching, and <strong>delivers instant results without tailored ads</strong> on the search pages. DuckDuckGo gets around <strong>10M+ searches</strong> a day.</p>
<h3 style="text-align: justify;">2.<a href="http://www.wolframalpha.com/" target="_blank" rel="noopener">WolframAlpha</a></h3>
<p style="text-align: justify;">This is a great computable search engine which provides<strong> very accurate answers</strong> and offers open knowledge. WolframAlpha’s main purpose is to serve knowledge and nonetheless it does not track what you search for. WolframAlpha performs dynamic calculations using built-in algorithms and delivers an expert knowledge about calculations, people, money &amp; finance, health &amp; medicines, music &amp; movies and much more.</p>
<h3 style="text-align: justify;">3.<a href="https://www.startpage.com/" target="_blank" rel="noopener">Startpage</a></h3>
<p style="text-align: justify;">Startpage is a powerful search engine which provides <strong>accurate results while protecting your searches</strong> and avoiding tracking your steps. It offers browsing through a<strong> proxy server</strong> and helps protecting you from websites that track your IP address or location. You can add Startpage to your browser, on Firefox or Chrome , and even change its color theme.</p>
<h3 style="text-align: justify;">4.<a href="https://privatelee.com/" target="_blank" rel="noopener">Privatelee</a></h3>
<p style="text-align: justify;">There is nothing much to talk about Privatelee but it <strong>enables strict filters and secure searches</strong> if you need it. Privatelee doesn’t keeps your search keywords to be used for surveillance or adds. It <strong>offers ‘<em>PowerSearch</em>‘ commands</strong> that lets you configure search source and more. It is also famous by name <strong>Qrobe.it</strong>.</p>
<h3 style="text-align: justify;">5.<a href="http://yippy.com/" target="_blank" rel="noopener">Yippy</a></h3>
<p style="text-align: justify;">Yippy allows you to <strong>manually filter the results</strong> according to categories and flag any inappropriate result. Unlike some engines, it allows <strong>searching of many types of content including images, web, news, blogs, jobs, government data, etc.</strong> Yippy lets you <strong>view cached pages</strong> (like Google) and <strong>filter</strong> results <strong>by tags like sources, clouds, websites</strong>. Yippy does not track your search queries and doesn’t show customized ads.</p>
<p><span style="font-size: 14pt; color: #ff0000;"><strong>| ALSO READ: </strong></span><a href="https://itblogsec.com/hack-windows-7810-admin-account-password-windows-magnifier/">Hack a Windows 7/8/10 admin account password with Windows magnifier</a></p>
<h3 style="text-align: justify;">6.<a href="https://hulbee.com/" target="_blank" rel="noopener">Hulbee</a></h3>
<p style="text-align: justify;">This is a private search that delivers instant searches while not tracking your location history or search. Hulbee provides <strong>very intelligent information yet never analyses or stores its visitor’s details</strong>. All your searches are encrypted for security against man in the middle attacks and data leaks. There is an <strong>option to choose a region for most relevant search results</strong> and then lets you ‘clear your activity‘ to avoid any trace of information.</p>
<h3 style="text-align: justify;">7.<a href="https://ixquick.com/">Ixquick</a></h3>
<p style="text-align: justify;">Ixquick is the main search engine <strong>from the company that runs Startpage</strong>. Unlike Startpage, <strong>Ixquick pulls results from a variety of sources</strong> instead of only Google – this can be a good or a bad thing, depending on how much you like Google’s search results. Ixquick and Startpage have essentially the same design. Ixquick <strong>includes the same privacy features Startpage does</strong>, including the Ixquick proxy links in the search results.</p>
<h3 style="text-align: justify;">8.<a href="https://search.disconnect.me/" target="_blank" rel="noopener">Disconnect Search</a></h3>
<p style="text-align: justify;">Just like Gibiru, Disconnect Search uses search assistance from major search engines like Google, Yahoo and Bing but it does not track your online activities or searches or IP address. It lets you <strong>search by location so that you get accurate and relevant search results based on the information you provided.</strong></p>
<h3 style="text-align: justify;">9.<a href="http://www.lukol.com/" target="_blank" rel="noopener">Lukol</a></h3>
<p style="text-align: justify;">Lukol uses a <strong>proxy server to give you customized search results</strong> from Google using its own enhanced custom search. It conserves your privacy by <strong>removing traceable entities</strong>. Lukol is considered as <strong>one of the best private search engines that protects from online information</strong> and keeps the spammers away from you by safeguarding you from inappropriate and misleading sites. It ensures full anonymity for your searches.</p>
<p><span style="font-size: 14pt; color: #ff0000;"><strong>| ALSO READ: </strong></span><a href="https://itblogsec.com/how-to-see-who-viewed-facebook-profile/">How to see who viewed your Facebook profile</a></p>
<h3 style="text-align: justify;">10.<a href="https://metager.de/en/" target="_blank" rel="noopener">MetaGer</a></h3>
<p style="text-align: justify;">MetaGer lets you make <strong>confidential untraceable searches that leave no footprints</strong>. It also integrates a proxy server so that <strong>you can open any link anonymously from the search result pages and yet keep your IP address hidden</strong> from the destination server. It also never tracks your keywords. This prohibits third parties or advertisers to target you for ads or any of malicious attacks. Its default language is in German.</p>
<p style="text-align: justify;"><span style="font-size: 8pt;"><strong>source:</strong> <a href="https://codingsec.net" target="_blank" rel="noopener">https://codingsec.net</a>, <a href="https://www.howtogeek.com" target="_blank" rel="noopener">https://www.howtogeek.com</a></span></p>
<p>The post <a href="https://itblogsec.com/10-private-search-engines-not-track/">10 private search engines that do not track you</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/10-private-search-engines-not-track/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hack a Windows 7/8/10 admin account password with Windows magnifier</title>
		<link>https://itblogsec.com/hack-windows-7810-admin-account-password-windows-magnifier/</link>
					<comments>https://itblogsec.com/hack-windows-7810-admin-account-password-windows-magnifier/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 21 Sep 2017 19:56:38 +0000</pubDate>
				<category><![CDATA[Hacking]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[windows]]></category>
		<guid isPermaLink="false">http://itblogsec.com/?p=976</guid>

					<description><![CDATA[<p>This exploit takes advantage of the ease of access tool on the login page by 'tricking' windows into launching a fully privileged command prompt by selecting 'make items on the screen larger - magnifier'. By using this method you can simply reset admin admin account password, just by having physical access to the computer.</p>
<p>The post <a href="https://itblogsec.com/hack-windows-7810-admin-account-password-windows-magnifier/">Hack a Windows 7/8/10 admin account password with Windows magnifier</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Hack a Windows 7/8/10 admin account password with Windows magnifier</h2>
<p style="text-align: justify;">This exploit takes advantage of the ease of access tool on the login page by &#8216;tricking&#8217; windows into launching a fully privileged command prompt by selecting &#8216;make items on the screen larger &#8211; magnifier&#8217;. By using this method you can simply reset admin account password, just by having physical access to the computer.</p>
<p style="text-align: justify;"><em><strong>Disclaimer:</strong> This is for use on a PC that you own. Breaking into someone else&#8217;s PC is considered a serious crime in most places. If you make a mistake or change something else, your Windows may become a non-boot. If so, just undo whatever you changed outside of the hack shown here, and it will back to normal. Need I say this is for Educational Purposes! You are responsible for your own thoughts and actions.</em></p>
<p><a href="https://itblogsec.com/wp-content/uploads/2017/09/windows_magnifier.jpg"><img loading="lazy" decoding="async" class="aligncenter wp-image-977 size-full" title="image-border" src="https://itblogsec.com/wp-content/uploads/2017/09/windows_magnifier.jpg" alt="" width="581" height="480" srcset="https://itblogsec.com/wp-content/uploads/2017/09/windows_magnifier.jpg 581w, https://itblogsec.com/wp-content/uploads/2017/09/windows_magnifier-300x248.jpg 300w" sizes="(max-width: 581px) 100vw, 581px" /></a></p>
<h3><span style="font-family: Bitter, Georgia, serif; font-size: 22px;">1. Launch any OS that allow full access to file system</span></h3>
<p style="text-align: justify;">Here you can use many different linux distros or even a windows disk/usb, as long as you can access the terminal/command prompt, you&#8217;re good. In this case, we are going to use Kali linux distro. Insert CD/DVD into drive and reboot the machine. Start your Live DVD. You may need to go into the BIOS screen and change the boot-up order to CD/DVD drive first, HDD second.</p>
<h3 class="step">2. Navigate to Sys32</h3>
<p style="text-align: justify;">Use the file browser in your Linux environment, navigate to <strong>%windir%/system32/</strong>. You may have to right-click and mount the Windows partition/drive first or use the <a href="http://linux.die.net/man/8/mount.ntfs-3g" target="_blank" rel="nofollow noopener">NTFS-3G command</a>.</p>
<div id="attachment_978" style="width: 761px" class="wp-caption aligncenter"><a href="https://itblogsec.com/wp-content/uploads/2017/09/kali_01.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-978" class="wp-image-978 size-full" title="image-border" src="https://itblogsec.com/wp-content/uploads/2017/09/kali_01.jpg" alt="" width="751" height="506" srcset="https://itblogsec.com/wp-content/uploads/2017/09/kali_01.jpg 751w, https://itblogsec.com/wp-content/uploads/2017/09/kali_01-300x202.jpg 300w" sizes="(max-width: 751px) 100vw, 751px" /></a><p id="caption-attachment-978" class="wp-caption-text">Article is written on a macbook with Windows dual booted, there is Windows instance named as BOOTCAMP.</p></div>
<h3 class="step">3. Rename Magnify.exe</h3>
<p style="text-align: justify;">Find and rename <strong>magnify.exe</strong> (Magnifier file) to <strong>magnify.old</strong>. </p>
<pre class="lang:default decode:true ">mv magnify.exe magnify.old</pre>
<h3><strong>4. Rename <span class="skimlinks-unlinked">cmd.exe</span></strong></h3>
<p style="text-align: justify;">Find and rename <strong><span class="skimlinks-unlinked">cmd.exe</span></strong> to <strong><span class="skimlinks-unlinked">magnify.exe</span></strong>.</p>
<pre class="lang:default decode:true ">mv cmd.exe magnify.exe</pre>
<h3><strong>5. Shut Down Linux &amp; Reboot Windows</strong></h3>
<p style="text-align: justify;">Log out and reboot, remove CD/DVD/USB, and restart into Windows.</p>
<h3><strong>6. Get CMD Prompt Modify Accounts</strong></h3>
<p style="text-align: justify;">When Windows reboots, click on the ease of access button in the bottom left corner<a href="https://itblogsec.com/wp-content/uploads/2017/09/windows_magnifier01.png"><img loading="lazy" decoding="async" class="aligncenter wp-image-986 size-full" title="border-image" src="https://itblogsec.com/wp-content/uploads/2017/09/windows_magnifier01.png" alt="" width="179" height="101" /></a></p>
<p style="text-align: justify;">Click the second selection “Make items on the screen larger (Magnifier)” and hit apply.</p>
<p><a href="https://itblogsec.com/wp-content/uploads/2017/09/windows_magnifier02.png"><img loading="lazy" decoding="async" class="aligncenter wp-image-988 size-full" title="border-image" src="https://itblogsec.com/wp-content/uploads/2017/09/windows_magnifier02.png" alt="" width="300" height="242" /></a></p>
<p style="text-align: justify;">The command prompt should now be in front of you. You now have a system level command prompt. At this point is where you can change the admin password and make any modification to the system using administrator privileges. </p>
<p style="text-align: justify;"><strong>Tip</strong>: <em>You can right-click on <span class="skimlinks-unlinked">cmd.exe</span> and click “Run as administrator” inside of Windows for escalated privileges. To edit files, it would never be allowed at basic admin level (caution). Same goes for any app in Windows right click and make the magic happen.</em></p>
<div id="attachment_990" style="width: 671px" class="wp-caption aligncenter"><a href="https://itblogsec.com/wp-content/uploads/2017/09/windows_admin_hack.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-990" class="wp-image-990 size-full" title="border-image" src="https://itblogsec.com/wp-content/uploads/2017/09/windows_admin_hack.jpg" alt="" width="661" height="461" srcset="https://itblogsec.com/wp-content/uploads/2017/09/windows_admin_hack.jpg 661w, https://itblogsec.com/wp-content/uploads/2017/09/windows_admin_hack-300x209.jpg 300w" sizes="(max-width: 661px) 100vw, 661px" /></a><p id="caption-attachment-990" class="wp-caption-text">Type net user to get a list of accounts</p></div>
<p><strong><em>Change Password: </em></strong></p>
<pre class="lang:default decode:true">net user username new_password</pre>
<p style="text-align: justify;"><em>Tip: when you do so, the password changes without prompting you again.</em></p>
<p><strong><em>Add an account: </em></strong></p>
<pre class="lang:default decode:true">net user username password /add</pre>
<p style="text-align: justify;"><em>Tip: If your username has a space, like John Doe, use quotes like “John Doe”.</em></p>
<p><strong><em>Admin that: </em></strong></p>
<pre class="lang:default decode:true ">net localgroup administrators username /add</pre>
<p><strong><em>Delete that: </em></strong></p>
<pre class="lang:default decode:true ">net user username /delete</pre>
<p><strong><em>Remote Desktop Users Group: </em></strong></p>
<pre class="lang:default decode:true">net localgroup Remote Desktop Users username /add</pre>
<p><em><strong>Net User Syntax Reference:</strong></em></p>
<pre class="lang:default decode:true">net user commands 
net user for domain</pre>
<h3><strong>7. Revert back all changes</strong></h3>
<p style="text-align: justify;">Now you should insert your Linux Live CD/DVD/USB and rename the files back to the original names.</p>
<ol>
<li style="text-align: justify;">Repeat Step 1</li>
<li style="text-align: justify;">Repeat Step 2</li>
<li style="text-align: justify;">Rename <span class="skimlinks-unlinked">magnify.exe</span> back to <span class="skimlinks-unlinked">cmd.exe</span></li>
<li style="text-align: justify;">Rename <span class="skimlinks-unlinked">magnify.old</span> back to <span class="skimlinks-unlinked">magnify.exe</span></li>
<li style="text-align: justify;">Log out, take out CD/DVD USB, reboot into Windows</li>
</ol>
<h3>Recommended resources</h3>
<p><a title="Kali Linux" href="https://www.kali.org/downloads/">Kali Linux</a><br />
 <a title="Rufus USB Creator" href="https://rufus.akeo.ie/">Create Live USB Sticks Rufus</a></p>
<h3>Conclusion</h3>
<p style="text-align: justify;">Well, that was how you hack a Windows 7/8/2008/10 administrator account password with Windows Magnifier. This also demonstrates how you could Pwn a machine if you think about it some, have hands on and they have not disabled EoA.  Hope it helps you in some way.</p>
<p><span style="font-size: 10pt;"><strong>source:</strong><a href="https://null-byte.wonderhowto.com" target="_blank" rel="noopener"> https://null-byte.wonderhowto.com</a>, <a href="https://thehacktoday.com" target="_blank" rel="noopener">https://thehacktoday.com</a></span></p>
<p>The post <a href="https://itblogsec.com/hack-windows-7810-admin-account-password-windows-magnifier/">Hack a Windows 7/8/10 admin account password with Windows magnifier</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/hack-windows-7810-admin-account-password-windows-magnifier/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Send Anonymous emails: 19 sites to keep your identity hidden</title>
		<link>https://itblogsec.com/send-anonymous-emails-19-sites-keep-identity-hidden/</link>
					<comments>https://itblogsec.com/send-anonymous-emails-19-sites-keep-identity-hidden/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 11 May 2017 08:30:13 +0000</pubDate>
				<category><![CDATA[Hacking]]></category>
		<category><![CDATA[email]]></category>
		<guid isPermaLink="false">http://itblogsec.com/?p=861</guid>

					<description><![CDATA[<p>The first question to answer here is why go for anonymous email when there are plenty of premium featured and free email services such as Gmail, Outlook and Yahoo! Mail available? Well, privacy and anonymity is a digital right — our digital right. These email services are ‘free’ because of the advertisements.</p>
<p>The post <a href="https://itblogsec.com/send-anonymous-emails-19-sites-keep-identity-hidden/">Send Anonymous emails: 19 sites to keep your identity hidden</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Send Anonymous emails: 19 sites to keep your identity hidden</h2>
<p style="text-align: justify;">The first question to answer here is why go for <strong>anonymous emails</strong> when there are plenty of premium featured and free email services such as <strong>Gmail, Outlook and Yahoo! Mail</strong> available? Well, <strong>privacy</strong> and <strong>anonymity</strong> is a<strong> digital right</strong> — our digital right. These email services are<strong> ‘free’</strong> because of the advertisements.</p>
<p style="text-align: justify;">Although deemed necessary evils, ads are mostly tailored for the visitor or service user, and to do that, <strong>service providers</strong> need your data to show you advertisements targeted to you and your user group. These are ads that you are most likely to click and/or follow.</p>
<p style="text-align: justify;">Moreover, the disclosure of the motives of secret agencies and their top-secret internet-censoring programs (such as PRISM) has raised concerns among digital privacy advocates. If you want to <strong>keep your emails away from prying eyes</strong>, this article will introduce to you the many options for <strong>sending and receiving anonymous emails</strong>.</p>
<p style="text-align: justify;">Anonymous email forms the basic foundation of <strong>anonymity over the web</strong>. Internet is no secure storage, but you have a say in who has access to your data and who doesn’t. If that is no, anonymous emails is one way to <strong>ensure your emails are not trackable online</strong>.</p>
<p style="text-align: justify;">Note: <strong>Anonymity</strong> is <strong>not possible</strong> on the web <strong>without hiding your IP address</strong>, so you must use <strong>Tor</strong>, or any other proxy or<strong> VPN service</strong> before using the services below to remain anonymous on the Internet.</p>
<p style="text-align: justify;"><span style="font-size: 12pt; color: #ff0000;"><strong>| ALSO READ:</strong></span> <a href="https://itblogsec.com/amazing-hidden-features-of-google-search-you-probably-dont-know/" target="_blank" rel="noopener noreferrer">Amazing hidden features of Google Search you probably don’t know</a></p>
<h3 style="text-align: justify;"><strong>Encrypted / Anonymous Email Service</strong></h3>
<p style="text-align: justify;">Here are some of the anonymous email services that lets you <strong>send and receive emails anonymously online</strong>. Some of them have <strong>encryption features</strong>, others are <strong>disposable or will self-destruct</strong> after a specified period of time. Here are:</p>
<p style="text-align: justify;"><a href="https://torguard.net/anonymous-email.php" target="_blank" rel="noopener noreferrer"><b>Anonymous Email – TorGuard</b></a> – This service provides you an <strong>anonymous inbox</strong> with lots of privacy and <strong>cryptographic features</strong>. You get 10MB storage, and end-to-end security using <strong>SSL encryption</strong> for connection and <strong>G/PGP encryption</strong> for securing the messages.</p>
<p style="text-align: justify;"><a href="http://tormail.org/" target="_blank" rel="noopener noreferrer"><b>Tor Mail</b></a> – Tor Mail is a <strong>Tor Hidden service</strong> that provides truly <strong>anonymous email service</strong>. It runs on the hidden service network of The Tor Project so you must use Tor to access and use it. Tor Mail is <strong>developed for super anonymity</strong>. As it’s built <strong>over the Tor network</strong>, it cannot be traced easily.</p>
<p style="text-align: justify;"><a href="https://www.guerrillamail.com/" target="_blank" rel="noopener noreferrer"><b>GuerrilaMail</b></a> – GuerrillaMail offers you a <strong>disposable</strong>, <strong>self-destructible</strong>, temporary email address to <strong>send and receive emails anonymously</strong> on the internet. <strong>Mail is deleted after an hour</strong>. You only need to choose an email address; no personal data is required.</p>
<p style="text-align: justify;"><a href="https://www.secure-email.org/index.php" target="_blank" rel="noopener noreferrer"><b>Secure Mail</b></a> – This service <strong>encrypts your mail using 4096-bit key</strong>, which makes it unreadable by anyone except you. It doesn’t ask for your personal information or IP address to sign up. They also have a<strong> zero-tolerance policy against spam</strong>.</p>
<p style="text-align: justify;"><a href="http://www.theanonymousemail.com/register/" target="_blank" rel="noopener noreferrer"><b>The Anonymous Email</b></a> – Create an account to <strong>send and receive emails</strong> by signing up <strong>with your real email</strong>. None of your other personal info is necessary.</p>
<h3><b>Send Emails Without Registration</b></h3>
<div id="aim16496617614258040148">
<div id="adsense-target">
<div dir="ltr" style="text-align: justify;">
<p style="text-align: justify;">Sometimes you just need to send emails without prior registration. In fact you <strong>don’t even need to receive any feedback</strong>. If this is you, here are 8 services that is essentially a form where you put in details of the email you want to send. Note that there is <strong>no way for the receiver to get back to you</strong>.</p>
<p style="text-align: justify;"><a href="https://anonymousemail.me/" target="_blank" rel="noopener noreferrer"><b>AnonymousEmail.me</b></a> – Here you will find only a <strong>simple form to fill in the receiver’s address</strong>, subject, the email content (you can also attach a file to the email if necessary). To get a reply, opt to provide a reply-to email address, otherwise this is <strong>a one-way ticket to sending an anonymous email</strong>.</p>
</div>
</div>
</div>
<div id="aim26496617614258040148" style="text-align: justify;">
<p style="text-align: justify;"><a href="http://www.5ymail.com/" target="_blank" rel="noopener noreferrer"><b>5ymail</b></a> – Send and receive <strong>beautifully formatted messages</strong> using its rich-text editor <strong>without revealing your true self</strong>. You will have to give up a real email to receive your email inbox credentals. There is <strong>also a paid version</strong> for more features.</p>
<p style="text-align: justify;"><a href="http://cyberatlantis.com/anonymous_email.php" target="_blank" rel="noopener noreferrer"><b>CyberAtlantis</b></a> – It offers a simple interface to provide the receiver’s email address, subject, and the message. It strips off the IP address from your mail, and thus <strong>you can’t be traced easily</strong>. It asks for <strong>none of your personal information</strong>.</p>
<p style="text-align: justify;"><a href="http://gilc.org/speech/anonymous/remailer.html" target="_blank" rel="noopener noreferrer"><b>W3 Anonymous Remailer</b></a> – Send anonymous emails to anyone. You only need to enter the receiver’s email address, subject and the message for the email.</p>
<p style="text-align: justify;"><a href="http://www.sendanonymousemail.net/" target="_blank" rel="noopener noreferrer"><b>Send Anonymous Email</b></a> – This one operates with a plain interface to enter the sender and receiver’s address, subject and message. No other details are required to send emails with this. The IP addresses are logged in.</p>
<p style="text-align: justify;"><a href="http://send-email.org/" target="_blank" rel="noopener noreferrer"><b>Send Email Message</b></a> – You only need to enter the receiver’s email address, subject, and the message. <strong>Over 100,000 anonymous emails</strong> are <strong>sent every day</strong> for free.</p>
<p style="text-align: justify;"><a href="http://anonymouse.org/anonemail.html" target="_blank" rel="noopener noreferrer"><b>AnonEmail </b></a>– You get to s<strong>end anonymous emails without revealing any information</strong> about your identity.</p>
</div>
<h3 style="text-align: justify;">Receive emails</h3>
<div style="text-align: justify;">
<p>If you just need a <strong>disposable email to confirm links</strong> and don’t want to deal with the newsletter or other deals they might send you in the future, try these 7 email services. <strong>Accounts are created automatically when a mail is received for that address</strong>.</p>
<p><a href="https://securemail.hidemyass.com/" target="_blank" rel="noopener noreferrer"><b>Anonymous Email – Hide My Ass! </b></a>– Hide My Ass! offers a free anonymous email account, which can be <strong>used to receive (but not send) emails</strong>. You can opt for new email received notifications to be sent to your real email or even set your inbox to “self-destruct” with an expiration date. </p>
<p><a href="http://mytrashmail.com/" target="_blank" rel="noopener noreferrer"><b>myTrashMail</b></a> – Get open and <strong>public email accounts created upon receiving mail or sign up for a private and password-protected one to receive mail</strong>. The accounts are temporary and will be deleted automatically after some time.</p>
<p style="text-align: justify;"><a href="http://notsharingmy.info/"><b>NotSharingMy.Info</b></a> – NotSharingMy.Info provides you with a <strong>permanent anonymous email address</strong> to receive emails without providing any traceable and identifiable information. It only requires<strong> your real email address for signing up</strong>. All emails to the anonymous email address is f<strong>orwarded to your real email address</strong>.</p>
<p><a href="http://mailnesia.com/" target="_blank" rel="noopener noreferrer"><b>Mailnesia</b></a> – Aside from inboxes generated automatically upon receipt of an email, Mailnesia even features an <strong>automatic confirmation-links click system</strong> which is useful if you make<strong> lots of sign-ups on web services</strong>.</p>
<p><a href="https://www.mailinator.com/" target="_blank" rel="noopener noreferrer"><b>Mailinator</b></a> – Here is one that lets you create email <strong>inboxes quickly and even automatically</strong>. You can only receive emails with it.</p>
<p><a href="https://discard.email/" target="_blank" rel="noopener noreferrer"><b>Spambog</b></a> – Spambog offers you a <strong>disposable (7-day purge)</strong>, <strong>temporary</strong>, <strong>anonymous</strong> email <strong>inbox</strong> on the Web. You can receive, reply and forward emails but not send an original one. An email alias can be protected with a password.</p>
<p><a href="http://tempinbox.com/" target="_blank" rel="noopener noreferrer"><b>TempInbox</b></a> – Here’s another temporary, disposable, <strong>auto-automated email inbox service</strong>. Give any email alias to anyone and check that inbox on the website for your incoming mail.</p>
<p>Do you use any other anonymous email service? Please share with us through comments.</p>
</div>
<div style="text-align: justify;"> <span style="font-size: 8pt;"><strong>source:</strong> <a href="http://www.hackingnewstutorials.com" target="_blank" rel="noopener noreferrer">http://www.hackingnewstutorials.com</a></span></div>
<div style="text-align: justify;"> </div>
<p>The post <a href="https://itblogsec.com/send-anonymous-emails-19-sites-keep-identity-hidden/">Send Anonymous emails: 19 sites to keep your identity hidden</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/send-anonymous-emails-19-sites-keep-identity-hidden/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hacker Reveals Easiest Way to Hijack Privileged Windows User Session Without Password</title>
		<link>https://itblogsec.com/hacker-reveals-easiest-way-hijack-privileged-windows-user-session-without-password/</link>
					<comments>https://itblogsec.com/hacker-reveals-easiest-way-hijack-privileged-windows-user-session-without-password/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 27 Mar 2017 19:46:21 +0000</pubDate>
				<category><![CDATA[Hacking]]></category>
		<category><![CDATA[windows]]></category>
		<guid isPermaLink="false">http://itblogsec.com/?p=788</guid>

					<description><![CDATA[<p>Alexander Korznikov, an Israeli security researcher, has recently demonstrated that a local privileged user can even hijack the session of any logged-in Windows user who has higher privileges without knowing that user's password, using built-in command line tools.</p>
<p>The post <a href="https://itblogsec.com/hacker-reveals-easiest-way-hijack-privileged-windows-user-session-without-password/">Hacker Reveals Easiest Way to Hijack Privileged Windows User Session Without Password</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Hacker Reveals Easiest Way to Hijack Privileged Windows User Session Without Password</h2>
<p style="text-align: justify;">You may be aware of the fact that a local Windows user with system rights and permissions can reset the password for other users, but did you know that <strong>a local user can also hijack other users&#8217; session</strong>, including domain admin/system user, <strong>without knowing their passwords</strong>?</p>
<p style="text-align: justify;"><strong>Alexander Korznikov</strong>, an <strong>Israeli security researcher</strong>, has recently demonstrated that a local privileged user can even hijack the session of any logged-in Windows user who has higher privileges without knowing that user&#8217;s password, using <strong>built-in command line tools</strong>.</p>
<p style="text-align: justify;">This trick works on almost <strong>all versions of Windows operating system</strong> and does not require any special privileges. Korznikov is himself unable to figure out if it is a <strong>Windows feature or a security flaw</strong>. The issue discovered by Korznikov is not entirely new, as a French security researcher, namely <strong>Benjamin Delpy</strong>, detailed a similar user session hijacking technique on his blog some six years ago.</p>
<p style="text-align: justify;">Korznikov calls the attack a <strong>&#8220;privilege escalation and session hijacking,&#8221;</strong> which could allow an attacker to hijack high-privileged users&#8217; session and gain unauthorized access to applications and other sensitive data. For successful exploitation, an attacker requires <strong>physical access</strong> to the targeted machine, but <strong>using Remote Desktop Protocol (RDP) session</strong> on a hacked machine; the attack can be performed remotely as well.</p>
<h3 style="text-align: justify;">Video Demonstrations and PoC Exploit Released!</h3>
<p><a href="https://www.youtube.com/watch?v=oPk5off3yUg&#038;feature=player_embedded">https://www.youtube.com/watch?v=oPk5off3yUg&amp;feature=player_embedded</a></p>
<p style="text-align: justify;">Korznikov has also provided a few video <strong>demonstrations of a successful session hijacking</strong> (using Task manager, service creation, as well as command line), along with Proof-of-Concept (<strong>PoC</strong>) exploit.</p>
<p style="text-align: justify;">Korznikov successfully tested the flaw on the newest <strong>Windows 10, Windows 7, Windows Server 2008 and Windows Server 2012 R2</strong>, though another researcher <a href="https://twitter.com/GossiTheDog/status/843053953537531904" target="_blank" rel="nofollow">confirmed on Twitter</a> that the flaw works on every Windows version, even if the workstation is locked.</p>
<p> While Microsoft does not deem it to be a security vulnerability and some experts argued that a <strong>Windows user with administrative permissions can do anything</strong>, Korznikov explained a simple attack scenario to explain how a malicious insider can easily misuse this flaw:</p>
<blockquote>
<p style="text-align: justify;">Some bank employee have access to the billing system and its credentials to log in. One day, he comes to work, logging into the billing system and start to work. At lunchtime, he locks his workstation and goes out for lunch. Meanwhile, the system administrator gets to can use this exploit to access employee&#8217;s workstation.</p>
<p style="text-align: justify;">According to the bank&#8217;s policy, administrator&#8217;s account should not have access to the billing system, but with a couple of built-in commands in windows, this system administrator will hijack employee&#8217;s desktop which he left locked. From now, a sysadmin can perform malicious actions in billing system as billing employee account.</p>
</blockquote>
<p><a href="https://www.youtube.com/watch?v=VytjV2kPwSg&#038;feature=player_embedded">https://www.youtube.com/watch?v=VytjV2kPwSg&amp;feature=player_embedded</a></p>
<p style="text-align: justify;">Well, no doubt, alternatively an attacker can also dump out system memory to retrieve users&#8217; passwords in plaintext, but this is a long and complicated process compared to <strong>just running tscon.exe</strong> with a session number <strong>without leaving any trace</strong> and using any external tool.</p>
<p> The issue has been <strong>known to Microsoft since last six years</strong>, so it&#8217;s likely the company doesn&#8217;t consider it a security flaw as it requires local admin rights on the computer, and deems this is how its <strong>operating system is supposed to behave</strong>.</p>
<p style="text-align: justify;">For more technical details, please check <a href="http://www.korznikov.com/2017/03/0-day-or-feature-privilege-escalation.html" target="_blank">Korznikov&#8217;s blog</a> directly.</p>
<p style="text-align: justify;"><span style="font-size: 8pt;"><strong>source:</strong> <a href="http://thehackernews.com" target="_blank">http://thehackernews.com</a>, <a href="http://www.korznikov.com/" target="_blank">http://www.korznikov.com/</a></span></p>
<p>The post <a href="https://itblogsec.com/hacker-reveals-easiest-way-hijack-privileged-windows-user-session-without-password/">Hacker Reveals Easiest Way to Hijack Privileged Windows User Session Without Password</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/hacker-reveals-easiest-way-hijack-privileged-windows-user-session-without-password/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Amazing hidden features of Google Search you probably don’t know</title>
		<link>https://itblogsec.com/amazing-hidden-features-of-google-search-you-probably-dont-know/</link>
					<comments>https://itblogsec.com/amazing-hidden-features-of-google-search-you-probably-dont-know/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 20 Mar 2017 16:38:45 +0000</pubDate>
				<category><![CDATA[Hacking]]></category>
		<category><![CDATA[google hacking]]></category>
		<category><![CDATA[google search]]></category>
		<guid isPermaLink="false">http://itblogsec.com/?p=739</guid>

					<description><![CDATA[<p>No one would argue the fact that Google is one of the most useful sites on the Internet. Unfortunately, most people only use about 3% of its power. Let's play with google and find out hidden features.</p>
<p>The post <a href="https://itblogsec.com/amazing-hidden-features-of-google-search-you-probably-dont-know/">Amazing hidden features of Google Search you probably don’t know</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Amazing hidden features of Google Search you probably don’t know</h2>
<p style="text-align: justify;">No one would argue the fact that Google is one <strong>of the most useful sites</strong> on the Internet. Unfortunately, most people only<strong> use about 3% of its power</strong>. Smart Google users, on the other hand, know how to turn Google into a quick calculator, translate foreign sites, create their own customized search engine, and search for movie reviews and stock quotes with special search queries. From easter eggs to handy shortcuts that give you want, you want and what you need almost instantly, Google can do it all. <strong>Google Search</strong> is becoming an i<strong>ndispensable tool to students</strong>, <strong>travelers</strong>, the curious and the bored and here the <strong>15 Amazing Hidden Features Of Google Search You Probably Didn’t Know</strong>.</p>
<p style="text-align: justify;"><strong>CHECK ALSO: </strong><a href="https://itblogsec.com/google-hacking-dorking-tutorial-1/">Google hacking (dorking) tutorial #1</a></p>
<h3 style="text-align: justify;">1) Play “Atari Breakout”(Google Images)</h3>
<p style="text-align: justify;">Breakout is an arcade game developed and published by <strong>Atari, Inc. </strong>It was conceptualized by <strong>Nolan Bushnell</strong> and <strong>Steve Bristow</strong>, influenced by the <strong>1972 Atari arcade game Pong</strong>, and built by <strong>Steve Wozniak</strong> aided by <strong>Steve Jobs</strong>. The game was ported to multiple platforms and upgraded to video games such as <strong>Super Breakout</strong>. In addition, Breakout was the basis and inspiration for certain aspects of the Apple II personal computer.</p>
<p style="text-align: justify;">In the game, a layer of <strong>bricks lines the top third of the screen</strong>. A ball travels across the screen, bouncing off the top and side walls of the screen. When a <strong>brick is hit</strong>, the ball bounces away and the brick is destroyed. The player loses a turn when the <strong>ball touches the bottom of the screen</strong>. To prevent this from happening, the player has a<strong> movable paddle to bounce the ball upward</strong>, keeping it in play.</p>
<p style="text-align: justify;">Google is commemorating the <strong>game’s 37th anniversary</strong> with a fun, little surprise today. Run a Google image search for <strong>“Atari Breakout”</strong> and instead of turning up a page of game screenshots, you’ll be treated to a <strong>playable version of game</strong>!</p>
<ol>
<li style="text-align: justify;"><em>Click to &#8220;Images&#8221; tab on Google search</em></li>
<li style="text-align: justify;"><em>Type: &#8220;Atari Breakout&#8221;</em></li>
<li style="text-align: justify;"><em>Enjoy free gaming</em></li>
</ol>
<p><a href="https://itblogsec.com/wp-content/uploads/2017/03/atari.jpg"><img loading="lazy" decoding="async" class="border-image alignnone wp-image-755 size-large" src="https://itblogsec.com/wp-content/uploads/2017/03/atari-1024x800.jpg" alt="Atari Breakout" width="1024" height="800" srcset="https://itblogsec.com/wp-content/uploads/2017/03/atari-1024x800.jpg 1024w, https://itblogsec.com/wp-content/uploads/2017/03/atari-300x234.jpg 300w, https://itblogsec.com/wp-content/uploads/2017/03/atari-768x600.jpg 768w, https://itblogsec.com/wp-content/uploads/2017/03/atari.jpg 1104w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></p>
<h3 style="text-align: justify;">2) Play “Pacman”</h3>
<p style="text-align: justify;">Pac-Man (Japanese: パックマン Hepburn: Pakkuman), stylized as <strong>PAC-MAN</strong>, is an arcade game developed by <strong>Namco</strong> and first released in <strong>Japan</strong> in May <strong>1980</strong>. It was created by Japanese video game designer <strong>Toru Iwatani</strong>. It was licensed for distribution in the <strong>United States</strong> by Midway and released in <strong>October 1980</strong>. Immensely popular from its original release to the present day, Pac-Man is considered one of the classics of the medium, and an icon of <strong>1980s</strong> <strong>popular culture</strong>.</p>
<ol>
<li style="text-align: justify;"><em>Click to &#8220;All&#8221; tab on Google search</em></li>
<li style="text-align: justify;"><em>Type: &#8220;pacman&#8221;</em></li>
<li style="text-align: justify;"><em>Enjoy free gaming</em></li>
</ol>
<p><a href="https://itblogsec.com/wp-content/uploads/2017/03/pacman.jpg"><img loading="lazy" decoding="async" class="border-image alignnone wp-image-761 size-large" src="https://itblogsec.com/wp-content/uploads/2017/03/pacman-1024x440.jpg" alt="pacman" width="1024" height="440" srcset="https://itblogsec.com/wp-content/uploads/2017/03/pacman-1024x440.jpg 1024w, https://itblogsec.com/wp-content/uploads/2017/03/pacman-300x129.jpg 300w, https://itblogsec.com/wp-content/uploads/2017/03/pacman-768x330.jpg 768w, https://itblogsec.com/wp-content/uploads/2017/03/pacman.jpg 1886w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></p>
<h3 style="text-align: justify;">3) Play “Zerg Rush”</h3>
<p style="text-align: justify;">In video games, <strong>rushing</strong> is a <strong>battle tactic similar</strong> to the <strong>blitzkrieg</strong> or the <strong>human wave attack tactics</strong> in real-world ground warfare, in which speed and surprise are used to overwhelm an enemy&#8217;s ability to wage war, usually before the enemy is able to achieve an effective buildup of sizable defensive and/or expansionist capabilities.</p>
<p style="text-align: justify;">Also known as a <strong>zerg or zerg rush</strong>, the term originated in the <strong>StarCraft</strong> strategy game to describe a strategy that was effective with the<strong> Zerg race</strong>. An <strong>Easter egg</strong> of a simulated zerg rush is activated in a browser if<strong> &#8220;zerg rush&#8221;</strong> is typed into a Google search.</p>
<p style="text-align: justify;">Enjoy playable game originally created by Google with small ‘o’ characters that destroy search results if they are not clicked with the mouse pointer.</p>
<ol>
<li style="text-align: justify;"><em>Click to &#8220;All&#8221; tab on Google search</em></li>
<li style="text-align: justify;"><em>Type: &#8220;Zerg Rush&#8221;</em></li>
<li style="text-align: justify;"><em>Enjoy free gaming</em></li>
</ol>
<p><a href="https://itblogsec.com/wp-content/uploads/2017/03/zerg_rush.jpg"><img loading="lazy" decoding="async" class="border-image alignnone wp-image-764 size-large" src="https://itblogsec.com/wp-content/uploads/2017/03/zerg_rush-1024x372.jpg" alt="Zerg Rush" width="1024" height="372" srcset="https://itblogsec.com/wp-content/uploads/2017/03/zerg_rush-1024x372.jpg 1024w, https://itblogsec.com/wp-content/uploads/2017/03/zerg_rush-300x109.jpg 300w, https://itblogsec.com/wp-content/uploads/2017/03/zerg_rush-768x279.jpg 768w, https://itblogsec.com/wp-content/uploads/2017/03/zerg_rush.jpg 1878w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></p>
<h3><strong>4) Input Handwriting for Translation</strong></h3>
<p style="text-align: justify;">Go to <strong>Google Translator</strong>, click the <strong>pencil option</strong> at the bottom left side of the text box and write the word by hand. This is helpful when translating from <strong>character-based languages</strong>.</p>
<p style="text-align: justify;"> <a href="https://itblogsec.com/wp-content/uploads/2017/03/handwrite.jpg"><img loading="lazy" decoding="async" class="border-image alignnone wp-image-769 size-large" src="https://itblogsec.com/wp-content/uploads/2017/03/handwrite-1024x564.jpg" alt="handwrite google translate" width="1024" height="564" srcset="https://itblogsec.com/wp-content/uploads/2017/03/handwrite-1024x564.jpg 1024w, https://itblogsec.com/wp-content/uploads/2017/03/handwrite-300x165.jpg 300w, https://itblogsec.com/wp-content/uploads/2017/03/handwrite-768x423.jpg 768w, https://itblogsec.com/wp-content/uploads/2017/03/handwrite.jpg 1319w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></p>
<h3 style="text-align: justify;"><strong>5) Pronouncing of Big Numbers<br />
 </strong></h3>
<p style="text-align: justify;">If you want Google Search to teach you how to pronounce big numbers, just type in the figure, then <strong>adds an equal (=)</strong> and the language you want it to be pronounced. However, this works for up <strong>to 13 digits only</strong>.</p>
<p style="text-align: justify;"><a href="https://itblogsec.com/wp-content/uploads/2017/03/pronouncing.jpg"><img loading="lazy" decoding="async" class="border-image alignnone wp-image-771 size-large" src="https://itblogsec.com/wp-content/uploads/2017/03/pronouncing-1024x371.jpg" alt="pronouncing numbers google" width="1024" height="371" srcset="https://itblogsec.com/wp-content/uploads/2017/03/pronouncing-1024x371.jpg 1024w, https://itblogsec.com/wp-content/uploads/2017/03/pronouncing-300x109.jpg 300w, https://itblogsec.com/wp-content/uploads/2017/03/pronouncing-768x278.jpg 768w, https://itblogsec.com/wp-content/uploads/2017/03/pronouncing.jpg 1600w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></p>
<h3 style="text-align: justify;"><strong>6) Use it like calculator<br />
 </strong></h3>
<p style="text-align: justify;">You can not only perform <strong>direct calculations</strong>, e.g. 5^3, 10+5, 15-8, 35*55, 100/50 in the search bar, but also can calculate the results for <strong>trigonometric functions</strong> as well.</p>
<p><a href="http://techxerl.net/wp-content/uploads/2016/01/15-Amazing-Things-You-Can-do-With-Google-Search-13.jpg"><img loading="lazy" decoding="async" class="border-image alignnone" src="http://techxerl.net/wp-content/uploads/2016/01/15-Amazing-Things-You-Can-do-With-Google-Search-13.jpg" alt="Google Search calculator" width="700" height="477" /></a></p>
<h3><strong>7) Solve Geometrical Shapes</strong></h3>
<p style="text-align: justify;">You can solve for geometrical shapes such as<strong> circle, rectangle, triangle, trapezoid, ellipse etc.</strong> With Google search. To do so type “solve” and add a shape e.g. “Solve triangle”, click the search button and it will return you with a calculator to solve that shape. Not only this but you can also choose to solve for<strong> area, perimeter, gamma, height, side (a) or side (c).</strong> Each shape carries a different calculator.</p>
<p style="text-align: justify;"><a href="http://techxerl.net/wp-content/uploads/2016/01/15-Amazing-Things-You-Can-do-With-Google-Search-9.jpg"><img loading="lazy" decoding="async" class="border-image alignnone" src="http://techxerl.net/wp-content/uploads/2016/01/15-Amazing-Things-You-Can-do-With-Google-Search-9.jpg" alt="solve triangle google search" width="671" height="660" /></a></p>
<h3><strong>8) Generate a graph<br />
 </strong></h3>
<p style="text-align: justify;">You can create a <strong>graph instantly for a mathematical function</strong>. For instance, search “graph for x^2” or “graph for tan (x)” and so on. The search results returned with the graph drawn.</p>
<p style="text-align: justify;"><a href="http://techxerl.net/wp-content/uploads/2016/01/15-Amazing-Things-You-Can-do-With-Google-Search-2.jpg"><img loading="lazy" decoding="async" class="border-image alignnone" src="http://techxerl.net/wp-content/uploads/2016/01/15-Amazing-Things-You-Can-do-With-Google-Search-2.jpg" alt="generate graph google search" width="700" height="454" /></a></p>
<h3><strong>9) Google tip calculator<br />
 </strong></h3>
<p style="text-align: justify;">You can calculate <strong>the Waiter Tip</strong> with this if you are poor with math but not with tips. Search “tip calculator”, enter your bill amount,<strong> tip %</strong> and select the number of people contributing to the bill to get how much your tip is.</p>
<p style="text-align: justify;"><a href="http://techxerl.net/wp-content/uploads/2016/01/15-Amazing-Things-You-Can-do-With-Google-Search-11.jpg"><img loading="lazy" decoding="async" class="border-image alignnone" src="http://techxerl.net/wp-content/uploads/2016/01/15-Amazing-Things-You-Can-do-With-Google-Search-11.jpg" alt="google tip calculator" width="700" height="465" /></a></p>
<h3 style="text-align: justify;">10) <strong>Currency Conversion</strong></h3>
<p style="text-align: justify;">Although currency conversions could be done via <strong><a href="https://www.google.com/finance/converter" target="_blank">Google Currency Converter</a></strong> but if you want to perform currency conversion <strong>directly from the Google search bar</strong>, then just type, the currency you want to convert from and into like this: 100 GBP to USD. The search result will return with the converted amount.</p>
<p style="text-align: justify;"><a href="http://techxerl.net/wp-content/uploads/2016/01/15-Amazing-Things-You-Can-do-With-Google-Search-1.jpg"><img loading="lazy" decoding="async" class="border-image alignnone" src="http://techxerl.net/wp-content/uploads/2016/01/15-Amazing-Things-You-Can-do-With-Google-Search-1.jpg" alt="google currency converter" width="700" height="465" /></a></p>
<h3 style="text-align: justify;"><strong>11) Conversion of Units for Different Quantities</strong></h3>
<p style="text-align: justify;">Not just currency, but you can also  convert <strong>units for different</strong>. There are 9 categories you can do conversions in: <strong>temperature, length, mass, speed, volume, area, fuel consumption, time and<span class="Apple-converted-space"> </span>digital<span class="Apple-converted-space"> </span>storage</strong>.</p>
<p style="text-align: justify;"><a href="http://techxerl.net/wp-content/uploads/2016/01/15-Amazing-Things-You-Can-do-With-Google-Search-18.jpg"><img loading="lazy" decoding="async" class="border-image alignnone" src="http://techxerl.net/wp-content/uploads/2016/01/15-Amazing-Things-You-Can-do-With-Google-Search-18.jpg" alt="Google conversion of Units" width="700" height="347" /></a></p>
<h3 style="text-align: justify;"><strong>12) Translation between Languages</strong></h3>
<p style="text-align: justify;">Just type the language you want to <strong>translate from and the language you want to translate into</strong> to turn your search bar into a temporary translator. In this example, we tried “French to English”.</p>
<p style="text-align: justify;"><a href="http://techxerl.net/wp-content/uploads/2016/01/15-Amazing-Things-You-Can-do-With-Google-Search-12.jpg"><img loading="lazy" decoding="async" class="border-image alignnone" src="http://techxerl.net/wp-content/uploads/2016/01/15-Amazing-Things-You-Can-do-With-Google-Search-12.jpg" alt="google translation between languages" width="700" height="373" /></a></p>
<h3 style="text-align: justify;"><strong>13) Google Timer</strong></h3>
<p style="text-align: justify;">Type in <strong>Google Timer</strong> and a box will pop up, allowing you to enter any amount of time, for example 45 seconds. Google Timer will <strong>start the countdown and a beeping alarm will ring</strong> once it reaches 0. Google timer can be set for full screen as well.</p>
<p style="text-align: justify;"><a href="http://techxerl.net/wp-content/uploads/2016/01/15-Amazing-Things-You-Can-do-With-Google-Search-3.jpg"><img loading="lazy" decoding="async" class="border-image alignnone" src="http://techxerl.net/wp-content/uploads/2016/01/15-Amazing-Things-You-Can-do-With-Google-Search-3.jpg" alt="google timer" width="737" height="424" /></a></p>
<h3 style="text-align: justify;"><strong>14) Sunrise and Sunset</strong></h3>
<p style="text-align: justify;">One of the amazing hidden features of Google Search is the <strong>exact times for sunrise and sunset in your city</strong>. Search sunrise or sunset in city_name  and the search result will return to the exact time.</p>
<p style="text-align: justify;"><a href="http://techxerl.net/wp-content/uploads/2016/01/v15-Amazing-Things-You-Can-do-With-Google-Search-19.jpg"><img loading="lazy" decoding="async" class="border-image alignnone" src="http://techxerl.net/wp-content/uploads/2016/01/v15-Amazing-Things-You-Can-do-With-Google-Search-19.jpg" alt="google sunrise" width="700" height="305" /></a></p>
<h3 style="text-align: justify;"><strong>15) Weather Forecast</strong></h3>
<p style="text-align: justify;">You can get the <strong>weather forecast for any city</strong> just by typing the city. Followed by “forecast.”</p>
<p style="text-align: justify;"><a href="http://techxerl.net/wp-content/uploads/2016/01/15-Amazing-Things-You-Can-do-With-Google-Search-21.jpg"><img loading="lazy" decoding="async" class="border-image alignnone" src="http://techxerl.net/wp-content/uploads/2016/01/15-Amazing-Things-You-Can-do-With-Google-Search-21.jpg" alt="google weather forecast" width="700" height="634" /></a></p>
<h3 style="text-align: justify;">Extra TIP</h3>
<p style="text-align: justify;">By opening website <strong><a href="http://elgoog.im/" target="_blank">http://elgoog.im/</a></strong> you will get a fully modified google search home page with many interesting features. Beware <strong>elgooG</strong> is not affiliated with Google, it is fully <strong>designed for fun</strong>. Among many features (some of them already mentioned above) you can find there many another amazing hidden features of Google Search:</p>
<p style="text-align: justify;">a) <a href="http://elgoog.im/underwater/" target="_blank">Underwater searching</a><br />
 b) <a href="http://elgoog.im/gravity/" target="_blank">Gravity</a><br />
 c) <a href="http://elgoog.im/terminal/" target="_blank">Terminal</a><br />
 d) <a href="http://elgoog.im/guitar/" target="_blank">Guitar </a><br />
 e) <a href="http://elgoog.im/snake/" target="_blank">Snake Game</a><br />
 f) <a href="https://bingwallpaper.com/" target="_blank">Bing Wallpaper</a><br />
 g) <a href="https://iploc.org/" target="_blank">My Location</a><br />
 h) <a href="https://gnib.org/" target="_blank">Bing Mirror</a></p>
<p style="text-align: justify;"><a href="https://itblogsec.com/wp-content/uploads/2017/03/elgoog.jpg"><img loading="lazy" decoding="async" class="border-image alignnone wp-image-779 size-large" src="https://itblogsec.com/wp-content/uploads/2017/03/elgoog-1024x287.jpg" alt="elgoog.me" width="1024" height="287" srcset="https://itblogsec.com/wp-content/uploads/2017/03/elgoog-1024x287.jpg 1024w, https://itblogsec.com/wp-content/uploads/2017/03/elgoog-300x84.jpg 300w, https://itblogsec.com/wp-content/uploads/2017/03/elgoog-768x215.jpg 768w, https://itblogsec.com/wp-content/uploads/2017/03/elgoog.jpg 1919w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></p>
<p> <span style="font-size: 8pt;"><em>source: <a href="https://en.wikipedia.org" target="_blank">https://en.wikipedia.org</a>, <a href="https://techxerl.net" target="_blank">https://techxerl.net</a></em></span></p>
<p>The post <a href="https://itblogsec.com/amazing-hidden-features-of-google-search-you-probably-dont-know/">Amazing hidden features of Google Search you probably don’t know</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/amazing-hidden-features-of-google-search-you-probably-dont-know/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Google hacking (dorking) tutorial #1</title>
		<link>https://itblogsec.com/google-hacking-dorking-tutorial-1/</link>
					<comments>https://itblogsec.com/google-hacking-dorking-tutorial-1/#comments</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 17 Mar 2017 15:00:16 +0000</pubDate>
				<category><![CDATA[Hacking]]></category>
		<category><![CDATA[google dorks]]></category>
		<category><![CDATA[google hacking]]></category>
		<category><![CDATA[hacking]]></category>
		<guid isPermaLink="false">http://itblogsec.com/?p=584</guid>

					<description><![CDATA[<p>Everybody knows how to use search engine "google".  But do you know tips, tricks and operators which can be used for google hacking? Here's a tutorial that will teach you how to use google to hack and obtain even more specific data. Enjoy!</p>
<p>The post <a href="https://itblogsec.com/google-hacking-dorking-tutorial-1/">Google hacking (dorking) tutorial #1</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Google hacking (dorking) tutorial #1</h2>
<p style="text-align: justify;">Everybody knows how to use search engine &#8220;google&#8221;.  But do you know tips, tricks and operators which can be used for google hacking? Here&#8217;s a tutorial that will teach you how to use google to hack and obtain even more specific data. Enjoy!</p>
<p style="text-align: justify;">We have decided to start a new tutorial where we are trying to collect all techniques and commands which can be used for google hacking. Google hacking, also named Google dorking, is a computer hacking technique that uses Google Search and other Google applications to find security holes in the configuration and computer code that websites use. Google hacking involves using advanced operators in the Google search engine to locate specific strings of text within search results. Some of the more popular examples are finding specific versions of vulnerable Web applications.</p>
<h3 style="text-align: justify;">History </h3>
<p style="text-align: justify;">The concept of &#8220;Google Hacking&#8221; dates back to 2002, when <strong>Johnny Long</strong> began to collect interesting Google search queries that uncovered vulnerable systems and/or sensitive information disclosures &#8211; labeling them <strong>googleDorks</strong>.</p>
<p style="text-align: justify;">The list of googleDorks grew into large dictionary of queries, which were eventually organized into the original <strong>Google Hacking Database (GHDB)</strong> in 2004. These Google hacking techniques were the focus of a book released by Johnny Long in 2005, called <strong>Google Hacking for Penetration Testers, Volume 1</strong>.</p>
<p style="text-align: justify;">Since its heyday, the concepts explored in Google Hacking have been extended to other search engines, such as <a href="http://www.bishopfox.com/resources/tools/google-hacking-diggity/attack-tools/#bing-hacking-database---bhdb-v2" target="_blank">Bing</a> and <a href="http://www.bishopfox.com/resources/tools/google-hacking-diggity/attack-tools/#shodan-hacking-database---shdb" target="_blank">Shodan</a>. Automated attack tools use custom search dictionaries to find vulnerable systems and sensitive information disclosures in public systems that have been indexed by search engines.</p>
<p style="text-align: justify;">But in 2012 Google held an open challenge for anyone to infiltrate their resisting servers. For a full visual timeline, detailing the major events and developments in <strong>Google Hacking from 2002</strong> to Present, see the <strong>Google Hacking History by Bishop Fox</strong>.</p>
<h3 style="text-align: justify;"><strong>Search operators</strong></h3>
<p>There are many operators which can be used and even combined to achieve required results, see here the list of most popular operators:</p>
<div class="pcrstb-wrap"><table class="aTable">
<tbody>
<tr>
<td><strong> Operator</strong></td>
<td><strong> Description</strong></td>
<td><strong> Examples</strong></td>
</tr>
<tr>
<td> <strong>*</strong></td>
<td>
<p><strong>Whole word wildcard</strong></p>
<ul>
<li>Searches for a missing word in a phrase search.</li>
</ul>
</td>
<td>
<p><i>&#8220;Thomas * Edison&#8221;</i></p>
<ul>
<li>Returns results:
<ul>
<li>Thomas Edison</li>
<li>Thomas A. Edison</li>
<li>Thomas Alva Edison</li>
</ul>
</li>
</ul>
<p><i>&#8220;Obama voted * on the * bill&#8221;</i></p>
</td>
</tr>
<tr>
<td><strong> <span style="color: #ff6600;">~</span></strong></td>
<td>
<p><strong>Synonyms</strong></p>
<ul>
<li>Searches for a specified keyword and words that are similar to that word.</li>
<li>Adding a plus sign before a word disables synonyms.</li>
</ul>
</td>
<td><i>~neuroscience</i></p>
<ul>
<li>Results:
<ul>
<li>neurophysiology</li>
<li>neurobiology</li>
<li>brain</li>
<li>neurology</li>
</ul>
</li>
</ul>
<p><i>&#8220;SciFinder Scholar&#8221; ~tutorial</i></p>
<ul>
<li>Possible results:
<ul>
<li>SciFinder Scholar help</li>
<li>SciFinder Scholar guide</li>
<li>SciFinder Scholar documentation</li>
</ul>
</li>
</ul>
</td>
</tr>
<tr>
<td> <strong>&#8230;</strong></td>
<td><strong>Range search</strong></p>
<ul>
<li><i>number&#8230;number</i></li>
</ul>
</td>
<td>Find laptops that cost $250 to $500.<br />
 <i>$250&#8230;$500 laptops</i></p>
<p>Find laptops with screen sizes between 14 and 17 inches.</p>
<p><i>14inch&#8230;17inch laptops</i></p>
<p>Find milestones in science that took place between 1910 and 1920.</p>
<p><i>&#8220;science milestones&#8221; 1910&#8230;1920</i></td>
</tr>
<tr>
<td><strong> allintext:</strong></td>
<td><strong>Searches for multiple words in the body of the search result.</strong></p>
<ul>
<li>Begin the query with <i>allintext:</i></li>
<li>There is no space between <i>allintext:</i> and the following word.</li>
<li>Google will restrict the results to pages that have all the query words in the body of the document.</li>
<li>Do not use a phrase search with the <i>allintext:</i> operator; use <i>intext:</i></li>
</ul>
</td>
<td>Find help for email fraud in Microsoft Outlook.<br />
 <i>allintext:microsoft help fraudulent email</i></td>
</tr>
<tr>
<td><strong> allintitle:</strong></td>
<td><strong>Searches for multiple words in the title of the search result.</strong></p>
<ul>
<li>Begin the query with <i>allintitle:</i></li>
<li>There is no space between <i>allintitle:</i> and the following word.</li>
<li>Google will restrict the results to pages that have all the query words in the title of the document.</li>
<li>Do not use a phrase search with the <i>allintitle:</i> operator; use <i>intitle:</i></li>
</ul>
</td>
<td>Find information about the Toyota auto recalls.<br />
 <i>allintitle:Toyota recall</i></td>
</tr>
<tr>
<td><strong> allinurl:</strong></td>
<td> <strong>Searches for multiple words in the url of the search result.</strong></p>
<ul>
<li>Begin the query with <i>allinurl:</i></li>
<li>There is no space between <i>allinurl:</i> and the following word.</li>
<li>Google will restrict the results to pages that have all the query words in the document url.</li>
<li>Do not use a phrase search with the <i>allinurl:</i> operator; use <i>intext:</i></li>
</ul>
</td>
<td>Find help for Microsoft Vista.<br />
 <i>allinurl:microsoft help vista</i></td>
</tr>
<tr>
<td> <strong>define:</strong></td>
<td> <strong>Searches for definitions of words from various web sources.</strong> <br />
  The operator can be used with or without the colon.</p>
<ul>
<li>Use the operator in the form <i>define:</i> and the results are restricted to a list of definitions.</li>
<li>The operator without the colon, <i>define</i>, and the results are broadened to include definitions as well as other relevant pages.</li>
<li>Use <i>define </i>if more than one word is entered in the query. The definition will be for the entire phrase as typed.</li>
</ul>
</td>
<td><i>define:combinatorics</i></p>
<p><i>define passive voice</i></p>
</td>
</tr>
<tr>
<td> <strong>filetype:</strong></td>
<td> <strong>Restrict your search to a specific file type.</strong></p>
<ul>
<li>There is no space between <i>filetype:</i> and the following word.</li>
<li>Look <a href="http://www.google.com/help/faq_filetypes.html" target="_blank">here</a> for a list of filetypes returned in a Google search.</li>
</ul>
</td>
<td>Find PDF Federal tax forms.</p>
<p><i>IRS tax forms filetype:pdf</i></p>
</td>
</tr>
<tr>
<td> <strong>intext:</strong></td>
<td>
<p><strong>Searches for a single word or phrase in the body of the search result.</strong></p>
<ul>
<li>There is no space between <i>intext:</i> and the following word.</li>
<li>Google will restrict the results to pages that have the query word or phrase in the body of the document.</li>
</ul>
</td>
<td> </p>
<p>Find help for email fraud in Microsoft Outlook.</p>
<p><i>help site:microsoft.com intext:email intext:fraudulent</i></p>
<p>Find funding opportunities provided by the Society of Neuroscience.</p>
<p><i>allintext:grants funding intext:&#8221;Society of Neuroscience&#8221;</i></p>
</td>
</tr>
<tr>
<td><strong> intitle:</strong></td>
<td>
<p><strong>Searches for a single word or phrase in the title of the search result.</strong></p>
<ul>
<li>There is no space between <i>intitle:</i> and the following word.</li>
<li>Google will restrict the results to pages that have the query word or phrase in the title of the document.</li>
</ul>
</td>
<td>
<p>Find information about the use of robots in the production of Toyota vehicles.</p>
<p><i>assembly line robots intitle:Toyota</i></p>
<p>Find information about RSS feeds provided by the MIT Libraires.</p>
<p><i>intitle:&#8221;MIT Libraries&#8221; intitle:&#8221;RSS feeds&#8221;</i></p>
</td>
</tr>
<tr>
<td><strong> inurl:</strong></td>
<td>
<p><strong>Searches for a single word or phrase in the url of the search result.</strong></p>
<ul>
<li>There is no space between <i>inurl:</i> and the following word.</li>
<li>Google will restrict the results to pages that have the query word or phrase in the url of the document.</li>
</ul>
</td>
<td>
<p>Find information about Periodic Table ipad apps from Apple.com</p>
<p><i>ipad apps intext:&#8221;periodic table&#8221; inurl:www.apple.com</i></p>
</td>
</tr>
<tr>
<td><strong> movie:</strong></td>
<td><strong>Searches for show times by location or for a specific movie.</strong></td>
<td>
<p>Find what&#8217;s playing and when in Cambridge.</p>
<p><em>movie:02139</em></p>
<p>Find reviews and showtimes for Iron Man 2 near Needham, MA.</p>
<p><em>movie:Iron Man 2 movie:02492</em></p>
</td>
</tr>
<tr>
<td><strong> phonebook:</strong></td>
<td>
<p><strong>Displays phonebook listings.</strong> <br />
 Results may vary depending on whether the search is performed in Google phonebook or Google Web.</p>
<ul>
<li><i>phonebook: </i>search for business and residential listings.</li>
<li><i>bphonebook: </i>search for business listings only.</li>
<li><i>rphonebook: </i>search for residential listings only.</li>
<li>Queries can be entered in various ways:
<ul>
<li>first name (or first initial), last name, city</li>
<li>last name, city, state</li>
<li>last name, zip code</li>
<li>phone number, including area code</li>
</ul>
</li>
<li>Searching by the first initial may result in false information. Most entries include first names spelled out. When in doubt, search by last name only.</li>
<li>Adding city and state information is optional.</li>
</ul>
</td>
<td>
<p>Find a business or residential listing in Massachusetts for Smith.</p>
<p><i>phonebook:smith ma</i></p>
<p>Find a residential listing for Tim Beaver.</p>
<p><i>rphonebook:tim beaver</i></p>
<p>Find a listing for a hardware store in Cambridge, MA.</p>
<p><i>bphonebook:hardware cambridge ma</i></p>
</td>
</tr>
<tr>
<td><strong> stocks:</strong></td>
<td>
<p><strong>Displays the current stock quote.</strong></p>
<p><em>stocks:</em>ticker symbol</p>
<ul>
<li>Search for ticker symbols <a href="http://www.nasdaq.com/asp/NasdaqSymLookup2.asp?mode=stock" target="_blank">here</a>.</li>
</ul>
</td>
<td>Find the current stock quote for Lockheed Martin.</p>
<p><em>stocks:LMT</em></p>
</td>
</tr>
</tbody>
</table></div>
<h3>
 The formula of google dorks</h3>
<p style="text-align: justify;"><strong>Dorks:</strong> They are like search criteria in which a search engine returns results related to your dork. The process can be a little time consuming, but the outcome will be worth it after learning on how to use dorks.</p>
<p>Basic Formula of dork: </p>
<pre class="lang:default decode:true">"inurl:."domain"/"dorks" "</pre>
<p>So now try to understand concept: <br />
 <strong>&#8220;inurl&#8221;</strong> = input URL<br />
 <strong>&#8220;domain&#8221;</strong> = your desired domain ex. .gov<br />
 <strong>&#8220;dorks&#8221;</strong> = your dork of your choice</p>
<h3>Real examples</h3>
<pre class="lang:default decode:true">"intitle:index.of:" mp3 jackson</pre>
<p>&#8211; download your favorite music for free</p>
<pre title="" class="">intitle:index.of +?last modified? +?parent directory? +pdf "lord of the rings" -htm -html -php -asp</pre>
<p>&#8211; download book for free</p>
<pre class="lang:default decode:true">300 -inurl:(htm|html|php|pls|txt) intitle:index.of “last modified” (mp4|wma|aac|avi)</pre>
<p>&#8211; download your favorite movie directly from the Internet or you can watch it even online (in our example movie 300)<br />
 &#8211; explanation:</p>
<p style="text-align: justify;"><strong>movie Name -inurl:(htm|html|php|pls|txt) intitle:index.of “last modified” (mp4|wma|aac|avi)<br />
 </strong>&#8211; as a result you will see a movie name there you can add any movie name for example 300, deadpool, etc.</p>
<p style="text-align: justify;"><strong>inurl(htm|html|php|pls|txt)<br />
 </strong>&#8211; this means search the movie name in the URL. Most of the times there are name of the keywords given in the link itself, and it will search all the links which are having extensions named as htm, html, php, pls, txt.</p>
<p style="text-align: justify;"><strong>intitle:index.of “last modified”<br />
 </strong>&#8211; It means that this will search for the recent date when the file was uploaded, so that you can get the HD print of the movie and you can download it in blazing fast speed.</p>
<p><strong>(mp4|wma|aac|avi)<br />
 </strong>&#8211; Your movie will be searched which is having extension of mp4, wma, aac, avi format only. </p>
<h3>Conlusion</h3>
<p style="text-align: justify;">In the second part of our tutorial, we will show you more complicated formulas, how to find vulnerable online cameras, web servers and many many another practical tips and tricks. Comment, subscribe or Like us on Facebook so you will get notification about new part of tutorial. Enjoy!</p>
<p>The post <a href="https://itblogsec.com/google-hacking-dorking-tutorial-1/">Google hacking (dorking) tutorial #1</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/google-hacking-dorking-tutorial-1/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Object Caching 0/400 objects using XCache
Page Caching using Disk: Enhanced 

Served from: itblogsec.com @ 2025-11-28 15:29:58 by W3 Total Cache
-->