Secrets of Researching on PublicWWW
- 5 hours on-demand video
- 1 downloadable resource
- Full lifetime access
- Access on mobile and TV
- Certificate of Completion
Get your team access to 4,000+ top Udemy courses anytime, anywhere.Try Udemy for Business
- Internet Research
- Source Code Search Engine Research Techniques
- Topical understanding of Internet technologies
- Topical understanding of Internet research
Using PublicWWW effectively means understanding a bit about source and a lot about how to find the data you are interested in it. Whether you want to employ the search engine as a part of a marketing strategy to find new leads, as a threat researcher to track down phishing or malicious activity; or, just to research the technologies that bind website together, if you don't know HOW to do it, you will waste a ton of time re-blazing trails and going down rabbit holes.
This course take away that issue by showing you how to use PublicWWW and its tools as well as how to do so efficiently. Learn to grab the right tool in PublicWWW's toolbox to meet your needs and find that data that is eluding you. In this course, expect to:
Find websites that will be the new leads you need for your sales funnel
Segment and organize prospects and competitors
Curate lists of technologies that are the cornerstone of successful (or not) websites
Perform market research and analysis
Research within the tech industry
For the more Threat Intelligence minded, this course has:
Techniques and examples on how to find and detect phishing sites
Find vulnerable Internet technologies an the websites that use them
Find malicious scripts, malware, or criminal infrastructure
Set your expectations to learn everything about PublicWWW -- what's on the surface and a little of what's behind the scenes. To make the snippets of code it provides come alive, you will learn how to craft regular expressions to craft a view that only contains what you want -- or the sky, if you desire. Additionally, not only is PublicWWW covered, but so too is a list of enriching and assisting tools that help you clarify, build on, or remove false positives from the information you glean.
Its a packed course. If you look in source code or perform risk or threat research, this is one tool and course you should not miss.
- Beginner to advanced researchers
- Threat Intelligence
This lecture introduces PublicWWW. Student learn about the source code search engine, the course and why its important to know the information it contains.
This course contains a dense amount of information. Its packed into the short and sometimes long lectures. Very little time is wasted on extemporizing or clicking through powerpoint. In fact, you can count the amount of lectures with slides pretty much on one hand. The course focuses on key content and examples. Not everyone is queued up to learn that amount of information as at once. The lecture educates the student on:
Key ways to absorb the information.
Strategies to learn the info and what and where to practice
Thoughts on how to incorporate PublicWWW in their work.
PublicWWW is a fine tool and while it covers a broad expanse of source code, it doesn't cover everything. The lecture educates students on what searches are appropriate to use on PublicWWW, what limitations might be out there to keep in mind, and generally the use and understanding of the results you will receive from the search engine.
Rome wasn't built in a day and neither was PublicWWW. While its interface is built for efficiency and is lean, an amazing amount of capability is hidden there. The lecture shows students around -- where to find the hidden nooks and crannies as well as things that are out in the open -- but not immediately obvious.
A gentle introduction to PublicWWW that explores and discusses the core pieces of the source code search engine. Students learn the right areas to enter to search effectively and when a different area or approach is more appropriate to the research of interest.
This lecture provides a gentle introduction to students about regular expressions (regex) and how its employed on PublicWWW. Students walk away with enough information to know whether it is something they can or will use and how to find out more information if they are interested.
Snipexp is the function employed on PublicWWW to parse the snippets of information is provides of source code. Students learn to employ this function and some basics on how to use regular expressions with it to enrich, streamline and remove information they do not want to see in the snippets.
Understanding "how" to search is as critical as known the "what" to search. This lecture introduces and explores techniques on searching and how to formulate a successful search approach. Students learn to:
Get organized on what is needed to make the search effective.
Get to the point. Finding and keeping the endgame in mind is critical. Rabbit holes lead to unknown places that sink your time. Don't fall into them and keep on task.
Strategies to know when "enough" is reached. No search is perfect, just like no results will ever be comprehensive enough. The key is finding the balance to know when you have garnered enough to act.
Students are given a brief introduction into Regular expressions, shortened to Regex. This orientation helps the student understand the topics to follow and time and resources to organize to tackle the topics.
Discussion and examples on how to use PublicWWW to return the source code and code snippets desired. Students will take this information and learn how to craft ordered searches to find the websites and source code of interest, as well as format and present the information in the snippets for a cleaner use. Includes:
Discussion and examples on how to employ the case of characters and other standard characters in regex on PublicWWW. Students will be able to craft regexes that can match a variety of situations involving characters. Includes:
Character classes 
Ranges of characters
negated character classes
Discussion and examples on how to employ capture groups and back references to them in regex on PublicWWW. Student gains knowledge and practice with the following concepts:
Scaffolding techniques, or the data around the data you are targeting.
Strategies to streamline and capture target data only versus swathes of collection
Discussion and examples on how to employ look around (ahead and behind) tactics with regex on PublicWWW. Students learn to use discover data while employing anchoring strategies in front of and behind a keyword.
Negative lookahead helps students find matches where something is not followed by something else.
Positive lookahead is the same except matches where a follows b.
Look behind logic performs the same steps but backwards in the code to check for the presence or lack thereof of a string.
Discussion and examples on how to employ PublicWWW and other tools to find phishing sites. This topic uses techniques from nearly every lecture covered to find phishing sites. It shows you how to:
Use PublicWWW as a starting point or as an enrichment source to find phishing.
Triangulate phishing sites by employing other resources to zero in on accurate phishing locations.
Discussion and examples of finding vulnerable versions of website software. While the lecture focuses on content management systems (CMS), the techniques provided work universally across any target technology.
Determine vulnerabilities exist by exploring in appropriate data shares of such information.
Matching key elements of vulnerabilities or their exploits to use in PublicWWW to find possible targets.
Discussion and examples of how to use the IP operator to pivot around single or net ranges of IPs. While dismissively seeming straightforward to use, the lecture provides insights not otherwise apparent to this powerful function of PublicWWW. Students will learn to:
Determine the breadth of activity on an IP address of net range of IP addresses.
Understand elements of ownership and sub-leasing from identified IP addresses and ranges.
Determine website presence on IPs and IP net ranges and pivot and explore on these sites to find other linked ones.