Secrets of Researching on PublicWWW
5.0 (2 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
12 students enrolled

Secrets of Researching on PublicWWW

How to find the data hidden in source code that you want on PublicWWW.
5.0 (2 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
12 students enrolled
Created by Monty St John
Last updated 10/2019
English [Auto]
Current price: $139.99 Original price: $199.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 5 hours on-demand video
  • 1 downloadable resource
  • Full lifetime access
  • Access on mobile and TV
  • Assignments
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • PublicWWW
  • Internet Research
  • Source Code Search Engine Research Techniques
  • Topical understanding of Internet technologies
  • Topical understanding of Internet research

Using PublicWWW effectively means understanding a bit about source and a lot about how to find the data you are interested in it.  Whether you want to employ the search engine as a part of a marketing strategy to find new leads, as a threat researcher to track down phishing or malicious activity; or, just to research the technologies that bind website together, if you don't know HOW to do it, you will waste a ton of time re-blazing trails and going down rabbit holes.

This course take away that issue by showing you how to use PublicWWW and its tools as well as how to do so efficiently.  Learn to grab the right tool in PublicWWW's toolbox to meet your needs and find that data that is eluding you.  In this course, expect to:

  • Find websites that will be the new leads you need for your sales funnel

  • Segment and organize prospects and competitors

  • Curate lists of technologies that are the cornerstone of successful (or not) websites

  • Perform market research and analysis

  • Research within the tech industry

For the more Threat Intelligence minded, this course has:

  • Techniques and examples on how to find and detect phishing sites

  • Find vulnerable Internet technologies an the websites that use them

  • Find malicious scripts, malware, or criminal infrastructure

Set your expectations to learn everything about PublicWWW -- what's on the surface and a little of what's behind the scenes.  To make the snippets of code it provides come alive, you will learn how to craft regular expressions to craft a view that only contains what you want -- or the sky, if you desire.  Additionally, not only is PublicWWW covered, but so too is a list of enriching and assisting tools that help you clarify, build on, or remove false positives from the information you glean.

Its a packed course.  If you look in source code or perform risk or threat research, this is one tool and course you should not miss.

Who this course is for:
  • Beginner to advanced researchers
  • Threat Intelligence
Course content
Expand all 22 lectures 04:55:18
+ Introduction
2 lectures 07:27

This lecture introduces PublicWWW.  Student learn about the source code search engine, the course and why its important to know the information it contains.

Preview 03:00

This course contains a dense amount of information.  Its packed into the short and sometimes long lectures.  Very little time is wasted on extemporizing or clicking through powerpoint.  In fact, you can count the amount of lectures with slides pretty much on one hand.  The course focuses on key content and examples.  Not everyone is queued up to learn that amount of information as at once.  The lecture educates the student on:

  • Key ways to absorb the information.

  • Strategies to learn the info and what and where to practice

  • Thoughts on how to incorporate PublicWWW in their work.

Preview 04:27
+ Getting Started
3 lectures 05:28

Sometimes its not clear on why or what a source code search engine does.  This lecture aims to clear up any lack of understanding and show you clear ways that illustrate how PublicWW can enrich or become the search you need to find data hidden in source code.

Why Use PublicWWW

PublicWWW is a fine tool and while it covers a broad expanse of source code, it doesn't cover everything.  The lecture educates students on what searches are appropriate to use on PublicWWW, what limitations might be out there to keep in mind, and generally the use and understanding of the results you will receive from the search engine.

Limitations and Understanding

Rome wasn't built in a day and neither was PublicWWW.  While its interface is built for efficiency and is lean, an amazing amount of capability is hidden there.  The lecture shows students around -- where to find the hidden nooks and crannies as well as things that are out in the open -- but not immediately obvious.

Preview 01:54
+ Searching in PublicWWW
6 lectures 01:18:57

A gentle introduction to PublicWWW that explores and discusses the core pieces of the source code search engine.  Students learn the right areas to enter to search effectively and when a different area or approach is more appropriate to the research of interest.

Preview 14:01
PublicWWW provides a number of useful examples to get the most out of their source code search engine. These help to craft your understanding of how the search engine works.
Front Page Examples
1 question

Discussion and examples on the query language employed on PublicWWW.  Students will leave this lecture armed with all the essential tools and a lot of tips on how to employ and use the query language built into PublicWW to search source code.

Query Syntax

This lecture provides a gentle introduction to students about regular expressions (regex) and how its employed on PublicWWW.  Students walk away with enough information to know whether it is something they can or will use and how to find out more information if they are interested.

Regex Introduction

Snipexp is the function employed on PublicWWW to parse the snippets of information is provides of source code.  Students learn to employ this function and some basics on how to use regular expressions with it to enrich, streamline and remove information they do not want to see in the snippets.

Regex and Snipexp Walkthrough

Discussion and examples of what to do when things go wrong.  Its certain they will and to keep frustration from ruining and otherwise excellent research day, students are taught a variety of approaches to handling common and a few uncommon issues that arise on PublicWWW.


Understanding "how" to search is as critical as known the "what" to search.  This lecture introduces and explores techniques on searching and how to formulate a successful search approach.  Students learn to:

  • Get organized on what is needed to make the search effective.

  • Get to the point.  Finding and keeping the endgame in mind is critical.  Rabbit holes lead to unknown places that sink your time.  Don't fall into them and keep on task.

  • Strategies to know when "enough" is reached.  No search is perfect, just like no results will ever be comprehensive enough.  The key is finding the balance to know when you have garnered enough to act.

Logic Behind Searching
+ Regex Detailed
6 lectures 01:05:38

Students are given a brief introduction into Regular expressions, shortened to Regex.  This orientation helps the student understand the topics to follow and time and resources to organize to tackle the topics.

Preview 01:29

Discussion and examples on how to use PublicWWW to return the source code and code snippets desired.  Students will take this information and learn how to craft ordered searches to find the websites and source code of interest, as well as format and present the information in the snippets for a cleaner use.  Includes:

  • Search strategies

  • Search order

  • Snipexp function

  • Formatting tips

Returning Results

Discussion and examples on how to employ the case of characters and other standard characters in regex on PublicWWW.  Students will be able to craft regexes that can match a variety of situations involving characters.  Includes:

  • Character classes []

  • Literal characters

  • Ranges of characters

  • negated character classes

  • Character shorthand

Case of Characters
Given a search phrase and keywords, write a regex for the snipexp tool to return the proper results.
Crafting Regex Activity
1 question

Discussion and examples on how to employ special characters in regex on PublicWWW.  This lecture covers the following important special characters:

  • Hexadecimal escapes

  • Character escapes and shorthand

  • Octal escapes

  • Special and reserved characters

Special Characters

Discussion and examples on how to employ capture groups and back references to them in regex on PublicWWW.  Student gains knowledge and practice with the following concepts:

  • Scaffolding techniques, or the data around the data you are targeting.

  • Strategies to streamline and capture target data only versus swathes of collection

Capture Groups and Back References

Discussion and examples on how to employ look around (ahead and behind) tactics with regex on PublicWWW.  Students learn to use discover data while employing anchoring strategies in front of and behind a keyword.

  • Negative lookahead helps students find matches where something is not followed by something else.

  • Positive lookahead is the same except matches where a follows b.

  • Look behind logic performs the same steps but backwards in the code to check for the presence or lack thereof of a string.

Look Ahead and Look Behind
+ Search Topics
5 lectures 02:08:52

Discussion and examples on how to employ PublicWWW and other tools to find phishing sites.  This topic uses techniques from nearly every lecture covered to find phishing sites.  It shows you how to:

  • Use PublicWWW as a starting point or as an enrichment source to find phishing.

  • Triangulate phishing sites by employing other resources to zero in on accurate phishing locations.


Discussion and examples of analyzing relationships between sites.  While covered broadly on PublicWWW's website and examples, it shows a few more ways to discover links between websites, especially more subtle and less obvious connections.

Analyzing Relationships in Code

Discussion and examples of finding vulnerable versions of website software.  While the lecture focuses on content management systems (CMS), the techniques provided work universally across any target technology.

  • Determine vulnerabilities exist by exploring in appropriate data shares of such information.

  • Matching key elements of vulnerabilities or their exploits to use in PublicWWW to find possible targets.

Finding Vulnerable Versions

Discussion and examples of how to use the IP operator to pivot around single or net ranges of IPs.  While dismissively seeming straightforward to use, the lecture provides insights not otherwise apparent to this powerful function of PublicWWW.  Students will learn to:

  • Determine the breadth of activity on an IP address of net range of IP addresses.

  • Understand elements of ownership and sub-leasing from identified IP addresses and ranges.

  • Determine website presence on IPs and IP net ranges and pivot and explore on these sites to find other linked ones.

Preview 17:11

PublicWWW is not the only source code search engine on the Internet.  This lecture introduces two other easy to use source code search engines and discusses how they differ and are alike, as well as techniques to employ them all together.

Using Multiple Source Code Search Engines