What is the Most Powerful Hacking Tool?

A free video tutorial from Tim Pierson
Cyber Security Evangelist and Cloud Technical Guru
Rating: 4.6 out of 5Instructor rating
1 course
14,407 students
Most Powerful Hacking Tool on the Internet Today

Learn more from the full course

The Complete Ethical Hacker Certification Exam Prep Course

This Course WILL provide EVERYTHING Needed to allow you to Pass your Ethical Hacking Exam v12

16:16:41 of on-demand video • Updated March 2021

Master the topics needed to pass the Certified Ethical Hacker Exam from EC-Council.
Discover the why behind security administrators’ work and secure your corporate and/or home-based network.
Build your career towards becoming a professional penetration tester.
Get paid for providing a valuable service for companies with sensitive data.
English [Auto]
Now, in this lecture demonstration, I'm going to show you a hacking tool you may be familiar with. So in other words, can I assure you the most powerful hacking tool on the Internet today? You're looking at it. So if you don't believe me, sit tight, folks, you're going to believe me. Now, Google is actually used as a basic footprinting to what's one of the reasons we're going to use it. We're going to use it primarily because we are never touching their website. Consequently, no one is ever going to call you or no one's ever going to call Google and ask if somebody's been messing with my Web site. Of course not. This is how we look for things on the Internet. But using the keywords I'm going to show you in the next couple of sections, you'll be amazed at how much data we can get. So something that would bring tools, including Google, are search engines, of course, a tool called Site Digger, who is information. I'm going to show you all of the different ways we can get this information in as Look-Up Traceroute and the ED database. Now, the thing is important is I can indeed download a number of these tools and run them from my desktop. It's not a really good idea to do that because whose IP address is going to end up in the log of their server? If you're wanting to be stealthy, you're going to want to use the online tools where they're going to have to get a court order to go to that online person who also has said that we're not even going to save any of our logs or you're going to dump them daily and try and get you can kind of see the it's not going to be very easy for them to do that rather than them just having your IP address. So you want to use as many of the online tools as possible, a little bit of a preamble for Google and query operators that most of these can be found by just doing an advance search in Google. But I'm going to show you some things that are not in here. And I think it's really going to cause you to be shaking in your boots. It contains a wealth of information. If given the proper queries, you can find a huge amount of information, advanced searches, you can query languages, the file format, domain name sites, whether it's in a Eurail where it's on the Web page, you can query the Google cache even if it's been deleted out of your website. The Google cache lives for about a year for Web pages that have links to particular Web page that are related to particular Web page, all kinds of stuff. It's really amazing when you think about it. Who even thought of this? Who came up with this particular idea? This gentleman right here is a gentleman by the name of Johnny Long, and he's the one who came up with this idea. This is me at a conference with him when we both spoke at that conference at one time. So Google could be modified in a number of different ways, we can be modified by the site, so site Colen would restricted to particular site. So if I were to look at CNN dot com, I would take site Colen CNN dot com and then whatever I wanted to look for on CNN, the only pages to be returned would be those that match the site. CNN dot com all in title would be the title of the Web site entitled Would Be the Time. It has to be in the title. All in new URL means it has to all of the key words have to be within the URL and in RL basically mean just that one keyword has to be in there. You notice we've got things like in neutral admin in your orders file type P P. All right. You can kind of see how we can make this look very, very interesting. So let's go on with our demonstration.