hello everyone hope you are fine in this course you will learn how you can able to perform google dorking this course is for ethical hackers if you don't know about google dorking still you can able to watch it let me tell you this training is completely for beginners the thing is you need to watch this training in 1.5x or 1.3x due to my slang or something you might get some issues here okay sometimes i might be slow something like that so that's why just try to watch it in 1.5x or 1.3x let me tell you one of the most important thing guys this training is completely educational purpose because by using this google docs you guys can able to see a lot of vulnerable servers there we didn't exploit it simple the aim is to show you the things okay like how it's gonna work and how they affect okay hope you guys enjoy this training thank you have a nice day in this class we're gonna learn how we can able to perform google dorking what is a google darking google darking is nothing but it's a kind of advanced search okay basically we gonna perform the filtering here a simple watch what we are doing we are performing the filtering okay now let me show you the examples you will get it see if i search for tesla here i can able to see there is a website the name of www.tesla.com okay this is a domain here i can able to see the results related to tesla okay i don't want to see this all stuff simple assume that i want to only see the websites okay at that time what i'm gonna do is what is a website here website is a tesla.com okay what if i use this filter which is known as a operator okay these things are known as operators okay if i type here just use let me zoom it okay like this okay tesla and let me type here tesla.com then what will happen means it will only show you the websites see it will only show you what the websites it's not showing other results it's gonna show you only the websites related to tesla.com see here there is a tesla.com tesla.com okay each and everything related to the websites now assume that here we can able to see www.tesla.com is here i don't want to see the results which having the www okay basically www is a sub domain it comes under sub domain okay see tesla.com is a parent domain it's a main domain if anything coming in front of this tesla.com that means it's a sub domain see www.com.tesla.com is there here ww is a tesla is subdomain and here you can able to see shop it's a subdomain see there is a service it's a subdomain okay the main domain uh is a tesla.com but it's not showing the tesla.com here because uh it's using the ww there okay this is the thing but it's also comes under uh subdomain okay if i visit tesla.com let me tell you let me show you then it will automatically redirect us to www.tesla.com oh it's automatically redirecting us to what where www.tesla.com so we can able to say that this is the main domain of tesla yes still it's a sub domain still you guys can able to see ww here the main domain okay so the thing is i want to avoid this ww here simple i'm gonna use a dash here dash ww then what will happen means it won't show the results of www.tesla.com okay this is the thing which uh which it's do okay this operators do okay so it is excellent right okay let's see some more here like how to find the subdomains how to find the vulnerable servers how to find the cameras this kind of stuff okay it is a very excellent course let me tell you it's a complete hands-on practical but still it's a short okay by comparing to other trainings this course is little bit short but still you will learn a lot here okay this is how you can able to perform use the operators okay let's see some more operators learn about entitle the entitle also play very important role here first of all let me show you then i'm gonna explain about entitle see in last class we just use a site operator site colon and i just type here tesla dot com okay something like that after executing this one then i can able to see the results related to the only about the websites okay i can see only websites here okay but see i want to find a kind of logins login stuff there okay at the time i'm gonna use something like entitle here okay see in html there is a entitle is there let me show you that one as well entitle and just let me search for login is there any page having the login okay here i can able to see the login error or something like that if i use other website uh let me do one thing okay let me search for the sites okay in uk uk based site which having the uk extension you can also search like this site colon dot uk assume that if you are searching for the france or us at the time you need to type something like us or something like that okay this is a thing assume that you are searching for this thing italy or other other website at the time you need to use the extension how to find the extension of Assume that you don't know the extensions at the time. Let me show you from where you can able to find it From Wikipedia you guys can able to see it. Okay for a Year and able to see AC for United Arab you can able to see a something like that Okay So this is how you guys can able to identify the stuffs about if you are targeting any specific country Then you can also do like that.
Yeah, let me use UK and in uk insights okay in any sites in in title in title of that website is there any kind of login at that time it will show you that one uh that one okay see i got something law ac dot uk remember just focus on this one see i can able to see uk uk uk okay if i open this one here i can able to see the login page or something like that i can't able to open this one let me open another site see this are only login pages see this is a login page now how it's finding that uh about the login simple if you click on the view page source you will see the title okay you know html then you will get this all stuffs there is a head and here we'll see dev is their image let me start okay you search for title here here you guys can able to see title login simple the same operator i am using but here i am adding in there that means in title okay hope you are getting it in title is there any kind of login in this extension in in the sites okay which are uk based sites then show me i am searching like that okay simple here i can able to see all uk based sites with which having the login there in title of that website there is a login keyword okay so that's why showing this also uh showing us okay this is a thing hope you are getting okay it's not a big deal again i am saying i'm gonna teach you one easy way as well to make your own google docs okay so you no need to worry so this we can able to see all the login sites okay this is how we can able to identify assume that if i got any kind of penetration testing project or red teaming project or something like that at that time simple i target the the company website okay then i'm gonna find the login pages first then i'm gonna do uh the account if is there any kind of account takeover vulnerability is there simple i'm gonna perform the attack there okay then i can able to bypass the login page or something like that this is the thing i'm just telling you the scenario okay this is the thing so it's a very long process but just i am just giving you a hint there okay you can also find directory listing vulnerability as well by using this intitle operator how the simple thing is instead of logging login what if i add index of okay if i execute this one then see the results here here you will the directories here see this directories basically this is also a vulnerability if you find any kind of critical data here at the time it's a vulnerability assume that if you are not if you are just seeing the images or links or something like that then it's not okay sometimes people also use this for the seo purpose as well so you need to focus on this word but here i am i am finding a lot of juicy informations okay see i'm just showing you the steps okay don't exploit it or something like that i am just showing you the things for knowledge purpose or and educational purpose okay don't misuse these things and here sometimes what will happen means you will won't see that much juicy informations here okay if you still if you execute the index of at the time just use the double quote okay then it will show you the exact results what you are looking for okay now if i use this operator dot uk this extension at the time mostly i will see a excellent results if you are finding in any particular website at that time you need to play with these things okay just add the double quote double quote or something like that and remove it okay let me find is there any kind of directly directory listing in tesla okay simple what i'm gonna do means instead of dot uk i'm gonna add tesla.com i won't find that one but still i am showing you the steps here is there any kind of index of okay i can able to see some kind of pdf here let me do one thing i can able to see underscore file system the kind of thing okay okay great it's not there it's not vulnerable okay now here let me remove the double quotes okay i got something here it's it's nothing okay it's not thing so this is a thing but i it's uh see the results i am seeing through the keywords this is the thing okay just let me use instead of dot uk let me use dot com here dot com let me see i can see it's only taking from the keywords i okay yes it's taking from the keywords so this is how it's gonna work okay and here uh i got the listing right and here it is now how to makes see here i can able to see index of this thing if i if i see any kind of juicy information then i'm gonna take the advantage of that one okay mostly here you will see uh the source codes okay the source code or any kind of videos or something like that mostly the gallery stuffs so this is the user use of in title right hope you guys get it there is a one excellent operator the name of address which is useful for uh osent okay now if you type here address and colon and assume that i want to know the address of tesla simple just type here tesla.com or any keyword there so here you guys can able to see there is a address right this is how it's gonna work instead of address you can also use this one as well office location okay you can also use like this mostly you will see the office locations simple add the site with site just combine the the the operators here okay that means type here tesla let me only search it like this one tesla and address so here i can able to see the steps okay the results the simple thing is you need to play again i am saying you you just need to play with it okay this class we are learning about in-text operator okay what is the in-text operator first of all let me show you practically how it's gonna uh how it's look like then i'm gonna explain you this is a very easy okay if i type here in text see in text just remember just focus on this thing a keyword here and just type the colon and i am looking for the login now it won't go with the title it will go with the page okay in page is there any kind of let me go with the fr france see here i can able to see some results in last classes we use the in title right Entitle focus on this one from the tab. Okay in the tab button Is there any kind of login then it gonna show us but in text what will happen means will go with the page Okay, go from with the page. Okay in page. Is there any kind of login then it will show us that one Okay, assume that if I go with password type something like password sorry sometimes it will throw some kind of shops here i search for password password again here page there is a login page there is a login so this is how it's showing it's not going with the title title uh when we use the title operator the title operator go with this one okay in in tab there is a tab right in tab there is a login then it will show that results to us but this in text uh operator will show you the results of the page okay this is a thing okay i got something the best password manager why it's showing this one because in page there is a in text user in the in in in this content there is a something like password so that's why it's showing the results okay so here is a thing now assume that let's target the site as in bug bounty what will happen assume that if you are targeted some site okay you want to see that site is giving the bug or not okay it's paying the amount or not at the time simple as let's take an example of tesla only okay just type here tesla.com and just type here in text such as report okay there anything impact report is there a report is there okay vehicle safety report something is there any kind of uh bug the product security tesla is committed to working with the community to verify the respond to legitimate reported product vulnerabilities that means it's accepting the uh this one there okay bug bounty a report feed or bug followed by brief comment model 3 takes a snapshot okay this is how you guys can able to look okay assume that in mostly in automation process we will target a large set of sites a by by going with the ASN at a time we will use a lot of automation tools so this is how we can able to check it okay hope you guys get it if you know bug bounty or something like that you will get it okay but still if you are not getting it then you no need to worry okay it's not a big deal now assume that in tesla let me search is there any kind of uh kind of password keyword is there or not see in tesla pages there is a keyword with the name of password right see password password password this is how it's gonna work okay hope you guys get it it's not a big deal again i'm saying just practice it you can make your own google docs as well if you have a capability of thinking then you can able to do a lot of steps here this class we're gonna learn about file type first of all let me show you what is this file type how it's gonna work the file type is nothing but if you are looking in tesla.com in this website if you are looking for pdf other time simple just type here pdf okay then here you can able to see the pdf files okay in in that website in tesla.com see the pdf see the extension here pdf assume that if you are finding for the csv file simple just type here csv you guys can able to see the file of csv see the extension there copy the url and let me show you see there is a dot csv is there so this is how it's gonna work okay the file type work i'm looking for the mp4 see here the thing is you must have the knowledge related to extensions if you don't know about the extension just try to read it on google this is a very easy things man we are looking for the xls file simple just type here xls there any kind of xls file you will see that one okay this is how you can able to find the files on any site assume that let me see the site the file of pdf in uk based sites so this is how also you guys can able to see the things see there is a uk based site and here i can able to see the pdf file assume that i want to see csv file or mp4 simple i can uh okay i can't able to see the mp4 let me type here dot mp4 still i can't able to see it but type jpeg let me see is there any kind of no there is a no jpeg let me see for xls okay i can able to see the xls files here right see here mostly uh if you do some kind of research you will see a lot of juicy informations in this files as well okay just target one specific assume that if you are looking for a specific website at that time i just showed uh told you assume that i i want to uh see for this website only for sf h a dot g uk at that time it will show the results only related to that site okay see i can able to see the files for only that website right unless and here if i type pdf let me see is there any kind of pdf file yes is there there is a pdf file in this website okay sfha see only pdf files only on that website only okay you will see a different pdf files not the same one these are the different pdf files okay so this is how you can able to see it let me see for the mp4 i think i just saw for mp4 my mp4 xls okay I got one yeah the less so this is how you can able to see it right hope you guys heard it let's learn about link operator link operator also play very important role let me show you what oh it's gonna work okay just type a link colon and just search for Tesla dot com yes you can also type the specific name as well or website i'm gonna teach you about how to find the subdomains subdomains of subdomains as well okay here i'm getting a lot of issues here there is a links you will see a different links if you use this one uh link the colon and tesla here you will see uh the links okay how many links in that uh website this is a thing okay see for the different links here you will see the tesla sso sign in is here okay and here you will see the twitter link which is related to tesla and linkedin link as well which is related to tesla this is how you can able to see it okay it is also a app store each and everything which having the links okay what kind of links you know about the links right this is the links okay this is the links the links okay So you can able to see it.
Third thing about Tesla. This stuff are related to Tesla. The results will again I am saying will appear in links. In this links is there any kind of Tesla at that time you will see it. It's all about the links.
Not about the page. it's not about the title now it's all about the links okay this is the thing again i am saying because mostly students won't get it okay mostly they won't practice this is the thing just try to practice okay it is a very easy step see and it is a kind of easy as well now again i'm getting this one hope you guys get it now here i can in a crowd also there is a tesla I open this one here they are providing this much bounty for this one or Tesla okay what is the trumps here non-vehicle vulnerabilities for the in scope for the or in terms under the website testing side testing and it's running on the drupal this one is running on the drupal this is how this is comes under bug bounty okay this order out of scope like if you found the vulnerabilities in this website at the time what will happen they won't pay anything if you write the report or something mostly uh previously when i hunt for the bugs what i do means if i write the good report they pay something some money okay this is the thing you just need to negotiate with them okay like you need to talk this is the thing yes they pay but if they say out of scope they won't pay they mostly they won't pay okay this is a thing not mostly they won't pay right so this is the thing like if you found the bugs on this website shop.eu teslamotors.com they won't pay any kind of payment because this is out of scope what is of the following for uh findings are out of scope if you found web bypass then it is out of scope why I'm saying this all steps okay this is a simple Google hacking class right okay soon I'm gonna create one course as well related to bug bounty I'm gonna hunt live bugs there okay this is the thing I don't want to do it on lab or something like that first for teaching purpose we will go with the labs then we will move to a real website as well I don't know when I'm gonna create it the thing okay this is how we can able to learn about the links from now onwards we are learning pentesting point of view ok see here in title play very important role title operator is there right which we just learn in the last classes this operator play very important role during pentesting sorry pentesting ok so just let me show you one example related to apache 2 dbn default page is there right this is a this page will be just first of all let me show you you will get it just type here in title the hell man just wait I got some messages search for Apache to EBN default page you can also mostly in google docs you you need to go with case sensitive is there any you need to remember the keywords first okay see what is this apache db and test page is enough uh sorry that default page is nothing but once you install the kali linux you start the apache server there is a one default page is there okay just let me show you it will take some time good right now we are not getting this that much juicy information because the thing is here I am seeing a lot of websites such as ask ubuntu this kind of stuff at that time I just told you this is a Apache default web page a default page okay hope you guys know it mostly we delete it and we wanna import the our pages here okay so this is a thing so this is how you can able to see this default pages here okay so by using this you can able to identify it's running on the linux based machine you can do a lot of jobs if you know uh this one okay see sometimes right now i am not seeing that much websites at the time just use the double quotes okay so that's now we are only focusing on the keyword okay see now i can able to see some more sites still it's not that much good let me target according to country just type here site dot uk let me see for the uk okay now in uk in this much sites we can able to see the apache default page if you have any kind of site simple add that site and see in the title the apache 2 is there or if i go with the tesla i i know that in tesla there is a nothing like that one uh like this see i can't able to see anything on uh in tesla like that one you can is there any kind of uh website you can able to see assume that in website uh in mostly what will happen means let me explain you this thing mostly people what they do means they host in their own machine they create one server okay and they're gonna host a website that server they won't purchase it from third party or something like that from godaddy or something like that simple they create their own server there and they host a website at that time mostly in that cases we will see this kind of vulnerabilities okay this is the thing let's go with fr see in fr we can able to see this much pages if i open this one if i open this then every website have that page side web okay it's having the maintenance same here as well you see here this is ftp basically okay so basically now i got even the page is not showing still i can able to get that okay this is a linux based server let me open i can able to see something here no problem okay so this is how you can able to identify it okay now let's see for other stuffs as well now let's find the nijix default page as well how to find the nijix default page simple just type here in title title here just add what is a nijix default page here simple it will say that welcome to nijix and shebang type here welcome to nijix right and it will say the shebang as well at last so here can't say that i can't see that much stuffs right keep getting welcome to nijix let me use double quote is there any kind of website which having this thing i can't see that much here let me search with site Or Okay or something like that Okay, now I can able to see the stuffs. Yeah, Andrew brothers these guys, right Welcome to the web server and able to see the stuffs This is a default page Here there is express Mills dot com dot co dot UK is here again. I am saying welcome to knee-jinks the thing is why we are trying to find this thing is here what will happen means if you see this kind of default page that means just remember one thing the the developer or the the guy who just developed the site okay who designed the stuff something like that okay if it is developed in the full stack any anything okay he just forget it to remove this thing okay something like that he just removed the forget it to remove the uh default page here okay at that time just think that how many vulnerabilities you guys can able to find here that this guy just for just assume like that okay i'm not talking about the site these sites okay i'm talking about the point of view what i'm trying to say here means this guy just forget it to remove the the default page at the time maybe there is a lot of chances that you can able to find the vulnerability okay and also you can able to identify that if you see this kind of the page mostly see assume that sometimes you can't able to find the vulnerabilities as well but you can able to identify that this is running in the nijx server ok you need to target the nijx space exploits there ok this is the thing it's all about the way of thinking ok you need to think a lot here pentesting and red teaming you need to think ok see i got one another one here also i can able to see the default page nijix page see this is the thing see it's it is in sub domain okay walk dot something like that what if i visit to real subdom real domain here which is this one bango.ac.uk if i see the same nijix then yeah i am not seeing any kind of nijix or something like that okay maybe If I find if I focus on this side, maybe it might be vulnerable.
I am not saying that it is a vulnerable, but if I focus or if I do the pen testing on it, maybe I found. maybe i find some kind of vulnerabilities okay this is a thing i can i can able to find okay this is a thing how to find exposed git repositories this is also one of the excellent class first of all let me show you how it's look like simple just type here in title yeah in title and simple just type here index of if you remember when we just use this one to identify the directory listing we use this keyword right yes now just close with the single double code this index of right view space and just use the inurl operator here okay what is a inurl here let me show you that one as well once we get the results you will get it and colon and just type dot git okay basically what is this you know we are seeing the exposed git repositories here okay which are exposed now if i open this one here you guys can able to see the git repositories see this is a basically git repositories now uh if you want to see on con f is their config file if you want to see it then you can also see this one it's all the config files this is also comes under directory listing only okay it's a very excellent one these are the real websites okay these are not the lab or something like that see pakistan i triple is there there is a config ms there is a lot here you will see a lot of juicy information if i click on this one config dot here you will see the css path image path and script path okay and there is a page title here you will see a lot of hidden directories as well there any kind of hidden directories you guys can able to see that one right here you will see mostly the files only pages or something like that okay this is how you can able to expose it to git or something like that see here maybe i just covered about in url right the in url is nothing but it will search in url okay in url the last class we learn about the link link also kind of same but in url is nothing but it will see in the url link is lit by comparing to url link is little bit big okay this is a thing right so here it will see in the url this is there is a lot of difference are there in link and url remember this thing in link you will see a lot of thing like this this is a link okay this much big right this is a URL which is kind of you can also say it is a kind of small as well and mostly it's focus on the domain right let's find open IIS server okay to find open IIS server what you need to do means let me go with different approach here I have one site okay this site i want to check is it open ias server is there or not okay this is the site which is www.buckresearch.com and here i want to check just type here in title just go with the double code just search for welcome this is the in title of the server okay in title you will see this message welcome to IIS server IIS not server it's a welcome IIS and close with the double quote search for it see here I got the results if I open this one see i can able to see the server there microsoft windows 20 4.0 option pack is a welcome here i can able to see the same thing 0 this is how you can able to see it okay you can target the specific site as well the thing I want to show If I if you want to go with the country wise simple the same thing.uk I got Tube a SCE dot UK is there here I can okay you can also go with the country wise i just covered in the last classes okay just focus on it okay if you can't able to see in uh context just change the country that's it also just try to change the message as well just remove the double quotes from here okay just play with it how we can able to find jenkins dashboard simple use the same here you want to find in specific site simple just paste the site there and in title just paste this key dashboard jenkins simple just execute it here you guys can able to see the dashboard okay the hudson.openmicroscopy.org is there here i got another link is anvil.softing-support.ac.uk open this one here you guys can able to see this is the dashboard okay right there is a lot related to Jenkins pen testing as well right what that one here you guys can able to see okay just try to don't explore it I am just showing you the shops so this is the thing this is how you guys can able to find the Jenkins dashboard you want to change the country you can also change the country yes sorry fr france here also in france I can see helps a server return phone not phone not phone problem this one now i can able to see now because it's running see the title is dashboard jenkins which i search for see hope you guys can able to clearly see now okay in title the keyword which i search for which is in here in title this is the thing what i am trying to say in title okay so this is the thing man hope you guys get it here you guys can able to see raspberry pi publish what is this site let me see that maybe it's a project hosting site and of shops because we're gonna learn how we can able to find open RDP servers simple just type here the site the same thing and in title you need to use Q this keyword is double just start with double code and use remote desktop yeah do space and just search for just type in url colon and rd web and close with double quote just type enter here let me search it in uk based sites now here i can able to start the pdfs okay sorry i think i just hit the wrong door and double rd web double click here as well so here i can able to see some results this mix omu dot nl basically rdp server the loading right it's asking for the username and the password so i click on if i type username and the password then i can able to log in in that server okay let me go with the country wise as well if you want to go with the specific site i just told you you just need to type the site name there okay now if you got the uh mostly people when they perform the pen test in real world they get the ip address okay assume that the ip is running in public the ip is exposed in public this one in public internet at that time simple you can paste the ip address as well it's not a big deal okay simple let me type something like dot uk only because in uk you can able to find a lot of stuff vulnerable things here i got one as desktop uh on site isc dot ac dot uk mostly what will happen means the attackers perform the brute force attack on it which we covered in red team in training how to perform the brute force attack on rdp as well like here you can able to see this thing as well login there is a lot if you do the research you will see a lot of things but the main target is why we are learning this one we got any project related to pentesting at the time we will find the services by using this method as well by using google docs it's not like just perform the cyber attack or something like that okay the simple thing is we need to how to identify the stuff so that's that's what i am covering here okay and how we can find telnet servers find telnet server simple thing is the same this one only the operator which is in title welcome to here we gonna close with double quotes and let's use another operator which is in text okay here we are using in text simple i just covered why we use the in text as well just use here just type telnet if you want to find any other service then you can also use it see telnet is a one of the kind of vulnerable thing because uh assume that in your target network okay or in the target ip if you found the telnet uh service is running there at that time you can able to perform manage so here it is welcome to telnet uh here i i won't see that much right so let me add the country here see how these things will useful let me show you right now it gonna expose the default credentials as well so instead of uh here i can able to see there is a i got some results but i got the results of uh the in text okay welcome to linux zoo if i open this one then here you guys can able to see there is status testing is there and there is a login page and here you guys can able to see the username and the password okay it's a default username and the password right i don't want to execute it now here i can able to see some different panel which telnet comes under this one here text see you can also do the same process to identify this thing snmp how to do that one simple instead of telnet just add snmp let's see is there any kind of snmp serves I got something so we got some kind of stuffs here okay so this is how you can able to use a google docs So in the next classes we will see some more related to VNC and how you can able to find the open network printers as well. this all stuffs right hope you guys enjoy this process thank you have a nice now let's learn how we can able to identify open uh open ftp servers just use this one in title let me remove this one and here let me use index of forward slash ftp here it will show you the results of ftp services okay so here i can able to see the results of uh just see forward dot edu i open this one here you can able to see that data okay pre-built each and everything you know about FTP right FTP is a nothing but file transfer protocol in penetration testing training also we just saw a lot of stuffs here if you watch our courses in this channel only we just perform the pen testing on FTP as well FTP why we perform the pentesting the simple thing is there you will see the data in the private data or something like that see there is a win there is a lot a spyware blaster setup some kind of chefs see you know which University is it it's a Harvard University not they do and here you can also see the G you know me dot JP is there Salil up dot org is there if you want to target uh related to country at the time also you guys can able to see it there is a nasa dot uh is there okay basically these are not that much this information okay you can't able to hack it but the thing is you will see the juicy informations here okay this is the thing to analyze the data or something like that you will see some juicy information basically this is a nasa.gov okay you guys get it california institute of technology you will see a lot of stuffs i don't want to expose there are a lot of things are there okay now the thing is how you can able to see this one as well uh the open use this dark here is in url printer forward slash main dot html we use this one here you guys can able to see the printers basically this are the printers okay working right now simple you can also go with the ip address simple just type the site there and you can able to see the ip it's having the domain but in the domain it's running the printer as well like they are using the dns there so this is how you can able to identify the printers from now onwards we gonna go with google hacking database if you want to we are looking for camera simple you guys can search for camera here and here you guys can able to see it okay the docs for the camera see in title IP camera login is there if I copy let me search for this one and also there is a web client is there let me search for this one as well see for webcamera.html I can able to see some IP addresses here let me search through site as well site.uk let me see the results only for the uk maybe i can't able to see it because it's using the ip address this is a thing here okay and here there is a camera status let me go with this one okay here there is a camera status now what if i do something like this okay instead of control let me remove this one and here i can able to see like this the results has been changed now let me do one thing let me search for something like a url see i'm just playing with it okay in url let me search for password dot txt can i see some results here it's taking some time instead of that let's use some other docs not from google hack okay from google hacking let me see is there any more okay no problem so let me do one thing let me use this one something like uh let me search for the uh there is a you know about fastcom sorry for a fastcam was cam is also one camera if you want to search for this one this camera at a time simple use like this okay in title the camera name the company name that that camera name okay which is in our case fastcam always remember F is capital here so you need to search like that one only okay or you can also use another another operator such as uh relay uh this one related if you use that one then also it will show you that uh related to that one okay the the that first come first cam sorry here close with double code close with double code and here let me type in text see this is not available in google hacking this is a thing just close with double good here i'm looking for poscam cameras same if you are looking for phanasonic simple go with it here I got something well I am getting the okay here I got some other stuffs as well Sony camera is here so simple just try to do the research you will see a good dorks okay well me medic mail server user login there is a lot of Google Docs use it simple I didn't find anything related to first come right if i go with let's go from here only there is i cloud photos is here there is a camera life index.php let me search for this one okay i can able to see something here i want to open it right so this is how you can able to see the cameras now there is another one how to find the unsecured cameras here maybe here they just added the wait let me if there is a dark here then it is good i'm gonna show you from here only there is okay there is no okay just execute this one if you want to find unsecured cameras just type here in title colon start with double quote and type here webcam i'm looking for xp file close with double quote okay and just search here in url view the port port is 8080 here okay is there anything yes here it is basically these are the unsecured cameras here you can able to see it if you want to see with the country wise simple just type here the country dot uk something like that extension and here you guys can able to see the results only related to those country yes i think we'll see no you won't see related to those country because it's using the ip here this is the thing if it is using any kind of domain or something at the time you can able to see this is the thing hope you guys get it right thank you have a nice this class we're gonna learn how we can able to search for routers simple just type here router here you guys can able to see there is a routers which is a sofia and d-link is there let me copy this one let me search for it lets see the results ok i cant able to find anything related to this one ok lets use another router here its asus ok now i can able to see some results related to asus right sign in as you see here I want to target a specific country simple site dot UK simple it will show the results related to UK or if you are targeting any kind of website simple you need to type the IP or that that one okay which is the domain sorry the domain right so simple you guys can able to see that one there is another one which is mysql router is there let me search for this one so i am getting some kind of issues here during this capture after the browser i think so here the thing is you will see a lot of results related to the the router there is a d-link wipe router is also is here simple you can go with it and also there is a router with the there is no password set to this router let me search for it how it's working again I am saying see it's going with the in URL right and there is a AP router new generation is there there is a lot man you need to modify it this is a thing just assume that if something is not working just remove it see here they just removed dash demo from there asking for the captcha just wait so here it is let me copy going in i click on the search sorry for that is there any other thing is there for netgear okay there is a netgear let me see for the netgear search okay now i can able to see some stuff here there is ip ip open this one then you will see just the results the page or something like that no problem so this is the thing how you can able to find docs related to netgear or if you are finding for the d-link you can able to okay this class we will learn how we can able to create our own google docs assume that from watching last classes till you have kind of confusion related to google docs now by watching this video you will get each and everything okay you will create your you gonna create your own google docs you will use pre generated google docs as well to find any vulnerable server or something like that now there is a website which is this one one of the excellent website darksearch.com here it is right let me zoom it so this is the website here first of all we will focus on the pre-build then we gonna go with uh builder there is also tips we will see this all steps in next class let's go with pre-built and i'm gonna show you how it's gonna work okay see if you are looking for the vulnerable servers at that time here we have the google docs for it okay if you click here then it will generate the vulnerable servers assume that if you are looking for the Apache here is a search bar okay simple search for Apache is there anything related to Apache okay recapture or not in vulnerable servers let's go with a network or vulnerability data for Apache see here we got the apache related to apache right so no problem here we are getting kind of two related to captcha just ignore it now this is how it's gonna work right there is a error message is there adversary and adversaries and vulnerabilities if you click on this one then what will happen you're gonna load those now it's looking good right Now here you will see those darks which are useful for what for vulnerabilities. Okay, if you are looking for a plugin vulnerability in WordPress, simple here we got the plugin. Okay, related to ultimate member.
These Google dark list out website using this vulnerability, vulnerable WordPress plugin even provide path to uninstall or install PHP link. okay this one uh if you copy this one the you are the the door here and if you paste it here then what will happen you will see those sites which having this vulnerabilities okay now see we have the vulnerabilities here they're related to this one see i don't want to open it here you will see a lot of private data if i want to go with any country simple i'm gonna type site colon dot uk or something like that then i'm gonna see those sites uh the uk based sites okay now assume that if you want to remove anything from it okay from you don't want to see ww from those sites at that time simple just type here dash ww then what will happen you're gonna remove that uh thing okay which you want to which you don't want to look okay so this is how it's gonna the same thing we have okay related to flash gallery contact forms this is a pre-built darks let's say not that uh that one in google hacking mostly you will see the same dark in uh that in google hacking website as well okay which is from hopsec right uh from x in exploit db we just saw in the last class right how we can able to see the camera camera logins or something like that simple maybe they uh that website also you will see this kind of uh docs okay which we are seeing here but here we are we can able to see the category okay which is necessary for us okay see assume that why i am showing you this website means mostly people will get kind of confusion assume that if you want to find the vulnerable servers at the time here we have this one okay if i check on the vulnerable server i can able to see those uh Only related to vulnerable server the darks which are related to vulnerable servers Okay, and there is a various online devices are there if I click this one then what will happen it gonna show The devices okay in text real-time IP camera monitoring here. I can able to see the camera monitoring shops Okay, like camera login or something like that. See there is a router login Microsoft M7 M7 cam IP camera is there a copy this one then what will happen?
paste it here ok can able to see something yes see having in exploit DB also there is a same dark is available see here we didn't added the double code simple let's add the double code so here I can able to see something the not much results related to this darks if you change the name keyword or something like that maybe you will see it okay so this is how you guys can able to use this website for dark for vulnerable dogs to identify sorry vulnerable servers vulnerable files web server detection okay you can also go with sensitive online shopping info pages containing login portals if i this one is very important right you click here then you guys can able to see this are related to what login pages okay see let's read the url this google dark here the same thing we also doing right instead of edu we gonna use the uk there in our last classes we just use the uk and here in url login admin it's looking in in url okay in url it's looking for login admin the keyword then it gonna show us the results if i execute it then what will happen i can able to see the login pages which having the extension of dot edu in that domain see it's having the dot edu dot edu right this is how it's gonna work just you need to edit it that's it it's not a big deal see in url it's looking for the port see 888 copy this one then what will happen mostly i see the ports open this one see double eight double eight ports if you are looking for any specific port you can also go with it this is the thing which i am trying to say hope you guys get it how we can able to use it in the next class we gonna see about uh builder how to create your own google docs using this site this class we gonna learn how we can able to create Google Docs there is a one tab here builder if you click on builder here you will see all operators which we learn in the last classes but here you will see some more okay such as here there is a in URL and here there is a all in URL what is this it's gonna go with will show you each and every results okay all means you are specifying each and everything there related to that keyword which you are searching for the same thing for in text as well if you are looking for anything okay the specific text at that time it gonna show each and everything for you if you use all there okay just see the results and difference between that one okay it is also one excellent google doc like this keyword i am talking about all if you go down there is a data range is a number range is there if you want to locate a number you can also go with it there is a data range author if you are looking uh first through author simple if you use this one and and if you type the name of the author then it will show you see the results okay related to that author only and there is a group in subject okay msgid the group message id uh and here there is a the most and important things are this one this this one the place double quote dot what is this all stuffs use a quite around such errors example master card like we just saw it right to identify the specific result there is a single character wild card is there okay if we will see this in this one how to identify subdomains okay in that class we will see how how we can able to use this dot or something like that see there is a pipe is there pipe is nothing but it is useful for or or means nothing but all sorry or see here it is all what is this basically if i add this pipe here then what will happen but i can also add another google doc as well here okay like this one as well any any google doc if you want to search anything like again if you want to go with any kind of keyword or something like that simple if you want to type only keyword there yes such as 5577 let me see for other port simple this is how you can able to play with it okay once you will do the practice you will get it at the port simple just try to use the keyword or something like that and there is also a bolan is there any word I'm gonna explain you what is this any word what it's gonna do in practical class there is extension you don't know about extension here you guys can able to see it PDF doc PDF okay doc doc X CSV XLS XLS X PXT EPT is there doc sex each and everything is there if you want to look with it want to see go with it you can go with it okay like this is this comes under database yeah if you are looking for SQLite file okay simple you need to use this one it is a SQL there is a ID B EDB is there yes is is there which is this and odb is there ENV is there okay so here you will see each and everything assume that if you click here then it will automatically select it okay if you go with the tips tips will help you a lot right sorry rebuilt it is there is another tab no problem if i visit on blog here also you guys can able to see the articles related to it okay but still you can able to get it okay not a big deal again i'm saying it is very easy things here if you type uh you want if you are looking for something you can type here and you can send it to them okay like here like here it by using ai it gonna generate it for you okay like it will generate a google doc for you i don't know why it's not working here okay class dev the name you are a robot because i am getting a issue here related to this google docs just try it in your machine you guys can able to get it okay let me tell you one thing guys instead of using this one you can also use the chat gpt okay to execute the same thing in chat gpt chat gpt also can able to give you the google docs okay not a big deal google talking first of all you need to know the basic things which we covered in the last classes then no one need to teach you how to become a pro unit okay once you will do the practice automatically you will become a professional unit okay the thing okay the next class i'm gonna cover about subdomains how we can able to find subdomains of subdomains and subdomains of subdomains of subdomains as well okay right hope you guys enjoy this classes thank you have a nice class we gonna learn how we can able to find subdomains okay to find subdomains what you need to do means just simple use this operator which is side okay colon and I am looking for tesla.com okay here I am able to see all about Tesla but I want to find the subdomains at that time what I need to do means see here there is a operator which is star which is known as any word if i add star here just type shift 8 then there is a star and if you add here in front of star if you add dot then what will happen dot is nothing but it's a single character wild card see what is the this wild card you will get it okay just execute it okay see now you will only see the things you can only see subdomains here okay let's see what i use me let me zoom it site colon okay star and dot is for the wild card and the website okay what is this star for star is for any keyword in front of tesla is there any kind of keyword then show us this is what we are searching for okay simple i can able to see ww i just told you ww is also here this is this comes under subdomain but still tesla is using as a main domain here and there is a shop there is a service there is a ir okay there is a ww again i don't want to see ww simple what i need to do means just type here dash www now i won't see any results related to ww okay now i got some other subdomains okay till i am seeing the the duplicate ones okay if you want to remove it you can also remove it what if i remove dot from here see the results what i will get i got something custom tesla lowkey tesla.com okay basically these are not the website the the correct domain okay basically these are this this is not even a subdomain okay this is a complete domain okay which having which uh in the in the domain they are using dash here okay this is the thing right if i add dot here then i can able to see the specific results to this one only the tesla.com now i want to find the subdomains of subdomains at that time what i need to do again i'm gonna use the same thing just add star here okay which is any any keyword then wildcard which is dot this is how it's gonna look okay if i add enter then you will see subdomains of subdomains you see there is a fleet view is there this is one subdomain okay then dot and then again we can able to see fn then dot so that's why we are using the dot here and there is a tesla.com okay i got subdomain of subdomain here the official tesla site it's asking for the login okay let's go with the facebook you will now you will get it okay or if you go with google.com we'll see a lot of subdomains of subdomains see simulator.webapps.google see console.cloud.google.com okay this is how we can able to see okay this is a subdomains of subdomains now what if i add again star dot then you will see subdomains of subdomains something like that want to learn red teaming then this training is for you in this training you will learn how you can able to perform red teaming from basic to advanced level okay this is a complete pre-recorded training okay you will get a lifetime access to the lms platform okay from where you can able to access the training okay it's a 24 by 7 support once you enroll the training whenever you stuck somewhere if you are not getting any kind of topic simple you can also contact our support team or you can directly contact me okay we can able to provide support through google mate or zoom okay and here you will get a lifetime lab access basically this is a downloadable labs okay you need to download it and you need to set up it on your vmware we want to teach you how to do that whole process you no need to worry and the language is english and the training duration is 70 plus hours right now the training duration is 70 hours after updating kind of marvel and marvel development windows windows marvel development training it will become some more then we gonna add some different trainings as well right now we decided to add purple teaming okay and web application penetration testing as well some more advanced topics we are adding in future like maybe we decided to start start from this month only okay let's see okay we gonna update it if this is for sure okay after updating the training the price will be get increased okay this is the thing here and this is a complete hands-on practical training first of all this uh we gonna teach you penetration testing like white box black box gray box pen testing like what is this this all shows then we will move to wi-fi penetration testing training for red teamers where you will learn how to perform wi-fi hacking or wi-fi pentesting using wi-fi pineapple android device and node mcu raspberry pi okay then we will move to uh red team mitre attack from here from this section you will learn about red teaming like in this section okay this is a very huge section here you will learn each and every tool uh about red teaming okay like the tools which are useful in red teaming okay we gonna learn each and everything about the tools how to use it it's all about tools okay how to use those tools and how to troubleshoot it if you get any kind of uh use in future how to solve it and everything then we will move to active directory penetration testing and add in this section you will learn how you can able to perform active directory pen testing Then we will move to penetration testing using metasploit. Here you will learn how you can able to perform penetration testing using only metasploit. We are not using any other tools here. Simple we gonna use only metasploit.
After watching this section you will become a master in metasploit. Then we will move to external and internal retina operation training. where you will learn how you can able to perform red teaming in real world okay how we can how you how you can able to approach it okay these things we're gonna learn here then we will move to this one windows marvel development for red teamers soon we're gonna update this section as well right and here these are the topics which you will learn in penetration testing these are the topics which you gonna learn in uh here in wi-fi penetration testing then this are this are the topics which you gonna learn in red team mitre attacks see here this is a definition if you don't know what is reconnaissance from here you can able to read it okay what is persistence here is a what is the definition of persistence okay privilege escalation each and everything if you want to see the topics go down here is a complete topics which you wanna learn in this training okay First of all we will start with reconnaissance if we are talking about the red team mitre attack okay these are the topics of red team mitre attack like here you will learn reconnaissance in reconnaissance you will learn about amas sniper harvester about sniper and harvester recon ng multigo nickto shodown spider okay something like that in resource development you will see how to set up a lab how you can able to generate a payload or something like that and then we will go with initial asses this sort of topics see okay in persistence you will learn this all serves by using impact how you can able to do the persistence okay how you can able to do it by using SSH each and everything but then we will learn privilege escalation defense evasion credential asses okay in credential asses we will learn like responder John the Ripper Hydra Lasagny okay in discovery this order topics which we gonna learn like how to use IAD recon kismet seatbelt is it built and bloodhood okay it is a bloodhood powers powers ploid is there see just try to read it there is a huge topics okay then we will move to active directory penetration testing for red timers in this section you will learn this topics okay like how you can able to perform active directory pentesting sort of topics which which you gonna cover but the let me tell you one thing guys before without watching this section you won't get uh idea about active directory okay everything is connected here okay if you enroll this training then you need to watch uh watch from uh from step by step okay first you need to start from pentesting Wi-Fi hacking then MITRE attack then active directory pen testing this is how you need to watch see let me tell you one thing if you are a beginner okay in red teaming you will get little bit confusion here still the thing is you need to watch the training because later after watching the training you will get each and everything okay why we are using it sometimes you will get kind of confusion why we are using this software why we are using this script here simple you need to wait okay and you need to watch the next topics at the time you will get it okay so red teaming is a kind of advanced training okay this is a thing it's not like ethical hacking so that's why we are we just design this course like in this way so again i am saying if you enroll this training then first you need to watch it okay you you can ask the doubts each and everything but the thing is it depends upon you okay how you like if you have a kind of excitement to learn these things then you can easily learn it it's not that much difficult okay like not that much difficult or not that much easy as well this is the thing now here we will move to after completing the red teaming training this active directory try uh section we will move to meta splot for red teamers so these are the topics which you're gonna learn in meta splot okay in this section exploiting mysql server exploiting elastic engineering this is the most common vulnerabilities and here there is a red team analysis training like internal and external operations like here you will learn how you can able to perform red team operation in real world like you will get a complete idea from where you need to start how to perform the pivoting in real world okay what is the approach each and everything okay then we will move to master in active directory this is the new section which we added here you will learn some more execute the attacks related to active directory okay it's a little bit huge training right here you will learn diamond uh diamond ticket attack golden ticket attacks server ticket attack okay each and everything so uh soon we gonna update the purple teaming training as well like how to detect the attacks and this one my windows marvel development this topics as well I just told you in starting of this class.
This is a complete dynamic twining. time to time we're gonna update it you will get the support these things okay we we won't leave it leave you okay like once you uh join with us then we're gonna help you okay right whenever in real world also you will get kind of issues whenever you try to perform in this attacks in real world other time you can also contact with us okay if you got any issues here during red team assessment then other time we're gonna help you there okay like we won't connect with you don't think that it is a complete uh confidential okay like let me tell you you are performing red teaming assessment on any real world organization at that time what will happen means it's a complete confidential sometimes you can't able to reveal which company you are working with okay this is the thing this is a red teaming not a hacking or pentesting this is a more than hacking and pentesting okay same hacking and pentesting but it's more you than that okay this is the thing we will help you this is uh this is our guarantee okay we're gonna give you excellent support mostly we are getting excellent reviews from our students soon we're gonna update it okay uh you will see the reviews as well if you want to see the review simple just visit our udemy channel as uh udemy uh website as well uh sorry in udemy also we just updated some courses okay just see there how the students are liking our training okay we are getting four plus stars uh on our udm simple search for white sec udm you will see it okay so this is the thing guys if you want to learn it simple what you need to do is you need to contact our support team here it's this is a complete manual process okay you need to contact our support team simple click on this whatsapp icon and contact with our support team and if you are from uh if you are international student then you can uh this is a different uh you will get a different payment get a payment gateway for you okay if you want to pay through crypto or something like that then we're gonna uh we're gonna accept that one as well okay the crypto paypal or something hope you guys enjoy this training thank you have a nice day this is our training which is advanced android hacking training for ethical hackers and also you will learn android application penetration testing and reverse engineering as well how you can able to crack the rat, how you can able to extract the source code of the rat as well. How you can able to assume that the rat is kind of premium rat, how you can able to crack that one. You will learn a lot here. So you will get a lifetime access, you will get a 24 by 7 support, you will get my private contact where you can able to call me, you can able to chat with me. something like that and the training language is in english the training duration is 50 plus hours this is the thing see right now after updating the training it might be 60 or 65 hours this is the thing see sometimes what will happen means the support team can uh they would update uh instantly on the website okay it will take some time right so it's a hands-on practical training like four hour four percent of tv and 96 percent is practical Here you will learn about banking botnets, each and everything.
Like a black hat techniques as I told you here as well. Advanced Android hacking planning black hat techniques. Okay like it's not about hacking with Metasploit.
Okay it's all it's about banking botnets. How you can able to develop your own spyware. Okay how you can able to provide the services. Okay assume that you have the clients.
Okay you are working as a cyber security consultant or you are you are working as a pentester. assume that mostly the companies want to spy on their employees okay this is also one thing okay they want to spy or something like that at that time you can also provide the services for them okay this is the thing like for monitoring or something like that here you guys can able to read each and everything and also we added the end to end to end security for android device like how you guys can able to secure your android device how you can able to analyze the payload we just covered each and everything okay and we are covering a more okay we we gonna add a lot of updates here right as i told you this is a dynamic trainings uh whenever you see our trainings assume that if you are enrolling our trainings not only android hacking or red teaming we we add a lot of trainings okay in future you will see a lot of trainings here soon we will we are launching a infrastructure pentesting training okay so it's not a kind of stop okay after we will continuously update the training okay this is the thing so there is android analyzing rats and payloads android application penetration testing we just added a lot here so just just see these are the topics which you are learning basically these are the section names okay in this section you will see more videos such as six videos five videos three videos or something like that but here simple it's just a uh section names okay and this is a coding scam page how you can able to create a complete fake page okay to steal social media or credit card information like as i told you we are learning the black hat techniques this is for ethical hackers okay so how the black hat hacker hacking works or something like that okay and here there is a section of banking botnets here you will learn the banking botnets uh how to set up it how to provide the service let me tell you continuously we will add the update the banking botnets here okay and also there is a section of provide early and monthly subscription of rats and bank botnets to your clients as i told you if you have a uh clients at the time how to provide the service for them like monthly or yearly subscriptions okay you you will learn here and there is a section of end-to-end security like which uh how to secure this thing okay android device and here you will learn analyzing the duration rats and payloads okay so here you will learn the reverse engineering and this is an android application penetration testing right so we just updated the training this is a huge okay you just need to give the time you just need to after enrolling the training uh you just need to watch two hours per day okay this is a thing see let me tell you within one hour you will learn how to hack the android this is the thing i'm guarantee okay like after enrolling the training after watching three to four sections you will learn how to hack the android it won't take that much time for you to hand hack the android but to bypass the abs to do some social engineering techniques it will take the time okay so this is a thing hope you guys enjoy this training as well okay uh let me tell you we will soon we will update the training price to three three hundred dollars to three fifty dollars because uh we're gonna update it running right so this is a thing so if you want to contact us simple just click here you can you can able to contact our support team the same process for as i told you in the red teaming you just need to submit your uh email address you first of all you need to send your uh you need to tell that from where you are okay so we will share the payment details according to that country right so hope you guys enjoy this training thank you have a nice day