Posts

Google Dorks or Google hacking

Image
  What is a Google Dork? Google dorking, also known as Google hacking, can return information that is difficult to locate through simple search queries. That description includes information that is not intended for public viewing but that has not been adequately protected.  A search parameter is a limitation applied to a search. Here are a few examples of advanced search parameters: site:  returns files located on a particular website or domain. filetype:  followed (without a space) by a file extension returns files of the specified type, such as DOC, PDF, XLS and INI. Multiple file types can be searched for simultaneously by separating extensions with “|”. inurl:  followed by a particular string returns results with that sequence of characters in the URL. intext:  followed by the searcher’s chosen word or phrase returns files with the string anywhere in the text. As a  passive attack  method, Google dorking can return usernames and passwords, email lists, sensitive documents, persona

What are the most common types of cyber attacks?

Image
๐Ÿ›‘Cyber attacks most commonly involve the following: ⭕Malware in which malicious software is used to attack information systems. Ransomware, spyware and Trojans are examples of malware. Depending on the type of malicious code, malware could be used by hackers to steal or secretly copy sensitive data, block access to files, disrupt system operations or make systems inoperable. ⭕Phishing in which hackers socially engineer email messages to entice recipients to open them. The recipients are tricked into downloading the malware contained within the email by either opening an attached file or embedded link. ⭕Man-in-the-middle or MitM, where attackers secretly insert themselves between two parties, such as individual computer users and their financial institution. Depending on the details of the actual attack, this type of attack may be more specifically classified as a man-in-the-browser attack, monster-in-the-middle attack or machine-in-the-middle attack. It is also sometimes c

What is a cyber attack?

๐Ÿ›‘ What is a cyber attack? - A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to cause damage. Cyber attacks aim to disable, disrupt, destroy or control computer systems or to alter, block, delete, manipulate or steal the data held within these systems. - A cyber attack can be launched from anywhere by any individual or group using one or more various attack strategies. - People who carry out cyber attacks are generally regarded as cybercriminals. Often referred to as bad actors, threat actors and hackers, they include individuals who act alone, drawing on their computer skills to design and execute malicious attacks.