Posts tagged with: security

Introduction to “Google Hacking”

Google hacking is a hacking technique that utilizes google search and another google services to find security holes or vulnerabilities on a site’s configuration and any information on it.

Google hacking can be done by using advanced operators in the Google search bar to locate specific strings of text within search results. Simply, any advanced operators provided by google can be used to help us to find a vulnurable sites.

Here’s an explanation of google hacking from wikipedia :
“Google hacking is a computer hacking technique that uses Google Search and other Google applications to find security holes in the configuration and computer code that websites use. Continue Reading


Introduction to “Shodan”

You know search engine like Google, Yahoo or Bing right?

Shodan is like that. It is also a search engine. The difference between shodan and usual search-engine is the thing that searched. While google,yahoo or bing is good to search for websites, shodan is also a great search engine to find a specific computer (routers, servers, etc.) using various filters to put your searching into more specific.

Shodan lets you find servers or routers easily by using the search bar on its homepage. It can find what web are running what (example, web with ip 114.166.242.76 is running apache version 2.3.3)

Great search engine isn’t it? Continue Reading


“Privilege Escalation” at Glance

Before discussing more about privilege escalation, first we must know what is ‘privilege’. Privilege is the level of authority given to user on a specific system or file. Or we can say that privilege is ‘what the user are permitted to do”. For example, a general user doesn’t have the privilege to change the sytem settings on a machine while the administrator have it. Continue Reading


“Vulnerability Assessment” at Glance

Hello Guys,
Lets talk about Vulnerability Assessment.

First, we must know what is Vulnerability. (you can go to this post)
Vulnerability is a weak point/spot of a system that can be attacked/exploited by someone through a series of method and technique to take over the control over the system. There are three types of vulnerability, Hardware Software and Human/Brainware. Continue Reading


“Vulnerability” at Glance

Wikipedia :
“In computer security, a vulnerability is a weakness which allows an attacker to reduce a system’s information assurance. Vulnerability is the intersection of three elements : a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness. In this frame, vulnerability is also known as the attack surface.” Continue Reading