![google hacking in title index of whatsapp databases google hacking in title index of whatsapp databases](https://dnenergy.weebly.com/uploads/1/2/3/8/123865764/814386200.png)
![google hacking in title index of whatsapp databases google hacking in title index of whatsapp databases](https://image.slidesharecdn.com/introductiontogooglehackingdatabase-160423171139/95/introduction-to-google-hacking-database-9-638.jpg)
![google hacking in title index of whatsapp databases google hacking in title index of whatsapp databases](https://i-awcs.com/assets/img/articles/article_3_2.png)
I should note here that the mysql process was running as root so I figured I’d try executing \! whoami in hopes of getting root.
GOOGLE HACKING IN TITLE INDEX OF WHATSAPP DATABASES FULL
“use databasename ” allows us to access any of the 35 databases and view & modify their contents After just 7 minutes, we have full read/write access to the contents of 35(!) databases That’s a lot of open ports! By observing that the FTP (port 21) and SMB (ports 139/445) ports are open we can guess that the server is used for file hosting and for file sharing, along with it being a webserver (ports 80/443 and proxies at 8080/8081). $ nmap -top-ports 1000 -T4 -sC Nmap scan report for 445/tcp open microsoft-ds 5901/tcp open vnc-1 | vnc-info: | Protocol version: 3.8 | Security types: |_ VNC Authentication (2) 8080/tcp open http-proxy |_http-title: 400 Bad Request 8081/tcp open blackice-icecap The scan completed in about 2 minutes.
![google hacking in title index of whatsapp databases google hacking in title index of whatsapp databases](https://img.wonderhowto.com/img/original/12/84/63695740437952/0/636957404379521284.jpg)
This is an important stage, as I am inclined to ask for him to formally express that I have his permission to perform a full test on his web application and on the server hosting it. Note: Some prerequisite CS knowledge is needed to follow through the technical parts of the article.Ī friend messaged me that an XSS vulnerability was found in his website and that he wants me to take a further look. This will be a detailed story about how I hacked into a server which hosted 40 (this is an exact number) websites and my findings. Long story short, my experience was always limited to simulated environments, and since I consider myself a white-hat hacker (aka one of the good guys) I never stuck my nose into other peoples’ businesses - quite literally. Over the last year I’ve played in various wargames, capture the flag and penetration testing simulations, continuously improving my hacking skills and learning new things about ‘how to make computers deviate from their expected behavior’. Last summer I started learning about information security and hacking.