Sunday, March 5, 2017

BROWSER HACKING

BROWSER HACKING

Hacking is an age old art of getting things without paying for it, or gaining access to places you are specifically denied entry. If you ever picked-up a round metal electrical box knockout plate that resembles a coin and deposited into a public telephone coin hopper or a toy / bubble-gum machine's coin hopper with the intention of making a free phone call or getting a few bubblegum balls or a toy for free, then you're guilty of hacking. If you've ever jumped over the fence at a soccer or rugby match or sneaked-in at a music festival undetected, to avoid paying the gate fee, then you are guilty of hacking. If you ever boarded a train without buying a ticket knowing full well that the station at which you intend to disembark doesn't have any ticket collectors, then you hacked the system. 

Hacking takes various forms and is not purely associated with computers. People hack their electricity boxes, in order to pay less for electricity. People hack their DSTV decoders to gain channels they are not paying for. People hack their public telephone cards to increase the available credit so that they can make more calls than the card initially allowed. People hack the MVG Casino cards to increase  the number of tier credits on the card, then simply redeem the card and collect the cash from the casino tellers.  In a nutshell you're a thief.  However, some consider getting away with such behavior as clever or mentally superior, by  outdoing/surpass/ outshine, others at their own game.  

With the following information you can easily gain access to other peoples computer data, not intended for publicly consumption. Skillful use of a few commands, could get root access to other peoples computers, access to their passwords, credit card data and other personal information. If it's your thing, you could steal the identities of careless or ignorant computer users. However, computers that are properly configured will deny you access.

WARNING & DISCLAIMER:-

This blog installment is published purely as an educational aid; and as a tool for those who wish to broaden their computer skills. I do not in anyway encourage hacking other peoples computers. I therefore cannot and will not be held  responsible for whatever  you do with this information.  Use it at your own risk. Its main objective is to point out security flaws and software vulnerabilities, so that you can properly secure your own websites on your  computer network. 

The tool we are going to use is the Google Chrome browser, though any browser would do. However these advanced commands may not work on other browsers. With it, Google makes it possible to find sources of personal information, confidential data, and info about web services as well as system vulnerabilities. The following is a list of alphabetical web browser commands that most people are totally unaware of.

GOOGLE COMMANDS


allintext:
allintitle:
allinurl: 
cache:

daterange:
inanchor:
intext:
intitle:
info:
inurl:
link: 
numrange: 
phonebook:
related:
site:

These commands have a special syntax including some Boolean operands (AND, OR, wildcards and quoted strings) like those listed below to hone your search results. Internet search engines can be divided into two groups,  those that perform  "subject index searches" and those that do, full-text searches.  For example Yahoo! is a searchable subject index engine whereas Google is a full-text search engine that employs "spiders" to index billions of web pages which can be search by  title or content.

+   (logical AND)
-  (logical NOT)
|  (logical OR)
* (wildcard for a single word)
.  (wildcard for a single character)
" " (text delimiters)

intext: - searches only body text of webpages and explicitly ignores link text, URLs, and titles. Eg. intext:food

allintext:presents  documents containing the specified phrase in the text, but excludes the title, the link descriptions and the URL. Eg. allintext:money

allinurl:  - presents the search phrase only in the url and excludes body text and title. Eg. allinurl:peace

Caption of a root directory

This gives you an idea of how to the these search commands. So try any of the following by copying  and pasting in url bar, then search:-

phonebook:Audi Centre JHB
site:apple.com/robots.txt
info:donald trump
numrange: 115-135
microsoft cache:IIS 5
money | love
Hitler -Hess 
Index of +password.txt  
Index of /admin  
Index of /credit-card  
"Index of /root"  

inurl:server-info "Apache Server Information" 
intitle:"active webcam page"
intitle:phpMyAdmin "Welcome to phpMyAdmin"

intitle:index.of finances.xls

"three * pigs" - the asterisk will insert a missing word - (little)
"three * mice" - the asterisk will insert a missing word - (bind)
"donald * trump" the asterisk will insert a missing word - (John)

Using a combination of the above commands, gives search results you never imagined possible.  Any web server with Index browsing enabled would allow anyone to  browse the web server parent directory like a local directory and have access to all its sub directories. Be Warned that deleting or changing files on other peoples computers constitutes a felony and is punishable by law.