Web Hacker's Toolbox - Tools Used by Successful Hackers - Google Hacking: Finding Publicly Exposed Backup Files

Web Hacker's Toolbox - Tools Used by Successful Hackers - Google Hacking: Finding Publicly Exposed Backup Files

Assessment

Interactive Video

Information Technology (IT), Architecture

University

Hard

Created by

Quizizz Content

FREE Resource

The video tutorial demonstrates how to use Google Hacking to find publicly exposed backup files. It begins with constructing a search query using specific file extensions and executing it to find indexed files on a target domain. The tutorial then shows how to download and analyze a backup file, revealing sensitive information like the admin's email and password hash. Finally, it discusses using hashcat to crack the password, highlighting the potential security risks of exposed backup files.

Read more

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of using Google Hacking in the context of this tutorial?

To find publicly exposed backup files on a domain

To create new backup files

To delete old backup files

To encrypt backup files

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which file extensions are commonly used to identify backup files in Google Hacking?

.txt, .doc, .pdf

.exe, .dll, .sys

.jpg, .png, .gif

.backup, .bak, .old

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

After downloading a backup file, what format is it changed to for analysis?

JSON

SQL

CSV

XML

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What sensitive information was found in the backup file during the analysis?

Admin's email and password hash

Usernames and phone numbers

Credit card details

Server IP addresses

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which tool is recommended for cracking password hashes found in backup files?

Metasploit

Wireshark

Nmap

Hashcat