Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 12.3.19
- CTRL+SHIFT+I - Show HTML code in Chrome browser
- JavaScript-
- Document – calls to the entire doument
- Document.getElementById(‘elementID’)
- httpbin.org
- soup.select == document.querySelectorAll
- HW take Google_search.py and make it work for he first three pages
- _________________________________________________________________________
- Filtering Google search by site:website.co.il for sensitive
- Dir-buster to take a list of urls (dictionary in a txt file) with multithreading and
- python3 -i python.file ---- running python in interactive mode
- ______________________________________________________________________________
- vim -O file1 file2 Opens two files switching between them with CTRL+w+arrow
- Replace in vim:
- :%s (search) / <pattern for replace>/ <replace pattern> /g (global)
- vim basic navigation:
- w b to move back and forth in vim, f / Shift+f is to go until the next keyboard character
- q is for recording - doing an action and repeating with a shortcut
- When using python to scrape google, the server will send the data back in an older format- We need to change the http headers to something more up to date
- _______________________________________________________________________________
- white box- full transparency
- gray box- some information is divulged
- black box- no information is divulged
- Reconnaissance- active (any direct access to servers) and passive
- ____________________________________
- Social engineering: Email, phone/sms-> referred to the domain-> worker
- Creating a table to list workers' details with their name, title, email, phone, social
- IntelTechniques- Tools- Classic Version- Facebook- <facebook profile> - Find Facebook ID-
- copy the image address of the individual and search on google for additional affiliations
- Google Dorking: filter with site:<site> and title:"<keyword>" inurl:"<keyword>" filetype:<>
- - (is not)
- for subdomains >>>> site:intel.com -site:www.intel.com
- ghdb- google hacking data base for google search sytanxes
- <site.com/robots.txt> shows a list of directories that are not indexed for google
- accessing webpages through googles cache to go undeteted and to recover removed data
- waybackmachine to see past snapshots of websites
- email-checker to see if email exists (some servers dont allow email verification)
- characterizing our system- enter company name and domain:
- go to linkedin > if there is only one company continue- if not let the user choose which one
- parse list of employees and save (to file/list or ram) names and titles
- additional function to google and collects first five pages of site:site intext:"@domain" and find emails with regex
- we now have a sample list of emails - create a pattern to determine how the emails are written and distribute them accordingly to the employee table
- postgresql - resource to create the table for assignment
- bonus- also in facebook
- _____________________________________________________________________________
- foca- eleven paths -
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement