NEW Learn Google hacks, gather sensitive data and Phishing
- 1 hour on-demand video
- 2 articles
- Full lifetime access
- Access on mobile and TV
- Certificate of Completion
Get your team access to 4,000+ top Udemy courses anytime, anywhere.Try Udemy for Business
- Gather sensitive information using Google among other tools
- Google hacking and it's queries
- How to explore a Data Breach and gather valuable information
- Use Shodan and Binaryedge to list IOT devices
- Configure and launch a Phishing website
- Student must know how to use Google (Duh!)
- Import and run Kali Linux on VirtualBox
- Network basic knowledge
Google is a great tool that must of us use on a daily basis, however it's real power and capacities are hidden to the vast majority of us. Since it fetches data from all over the internet (or most of it) some sensitive data also stays available and can be gathered with a few custom search queries and a bit of imagination
This course will not only teach you how use most of Google's full capacities, it will also show you how to use other search engines to fetch sensitive information and validate if credentials are compromised. Besides this you will learn how to setup a phishing attack website in order to get sensitive information by cloning websites such as Google's, Facebook, LinkedIn, etc and you will also learn how to setup a local fake WiFi access point to get users credentials, among other useful information.
You will also learn best practices to secure your information, detect and avoid phishing scams in order to best secure your data.
This course is meant to be practical, no boring slideshows or lectures, we will go straight to the point and start exploring the several tools right from the first lessons.
This course is for educational purposes only, I do not take any responsibility for your actions and you are highly advised not to use this information to perform any illicit actions.
- Anyone with basic IT knowledge
- Curious, enthusiasts, hackers, beginners ...
Several web servers aren't configured correctly, folders that should be marked as private are indexed by Google and sensitive files get easily exposed, find out how easy it is.
Find IOT devices connected to the internet using powerful search engines.