Web Hacker's Toolbox - Tools Used by Successful Hackers - Google Hacking: Finding Sensitive Data in URLs

Web Hacker's Toolbox - Tools Used by Successful Hackers - Google Hacking: Finding Sensitive Data in URLs

Assessment

Interactive Video

Information Technology (IT), Architecture

University

Hard

Created by

Quizizz Content

FREE Resource

The video tutorial demonstrates how to use Google hacking to find sensitive data, such as API keys, in URLs. It explains the process of constructing a Google search query to locate these keys and shows a practical example of finding an API key indexed by Google. The tutorial highlights the potential risks of exposed API keys, including unauthorized access to sensitive information like emails and password hashes. It concludes with a brief mention of using tools like Hashcat for password cracking and introduces the next topic on finding insecure webpages.

Read more

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of sensitive data is specifically mentioned as being found in URLs through Google hacking?

Credit card numbers

API keys

Usernames

Social Security numbers

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which logical operator is used in the Google search query to find API keys?

OR

XOR

NOT

AND

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the common names of API keys that the search query looks for in URLs?

Token, Secret, Password

API, Key, API Key

User, Pass, Auth

Access, Code, Identifier

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of information can be accessed using the API key found through Google hacking?

Medical records

Social media profiles

Emails and password hashes

Bank account details

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which tool is recommended for cracking password hashes obtained through Google hacking?

Hashcat

Aircrack-ng

Cain and Abel

John the Ripper