Kali Linux on USB Stick has over 600 preinstalled penetration-testing programs. It includes Armitage (a graphical cyber attack management tool). Nmap (a port scanner), Wireshark (a packet analyzer) & John the Ripper password cracker. Aircrack-ng (a software suite for penetration-testing wireless LANs). Burp suite and OWASP ZAP web application security scanners. Kali Linux can run natively when installed on a computer’s hard disk. It can be booted from a live CD or live USB. It can run within a virtual machine. It is a supported platform of the Metasploit Project‘s Metasploit Framework. It is a tool for developing and executing security exploits.”
According to the Google Hacking DataBase (GHDB) (http://www.exploit-db.com/google-dorks/), Google could be used to get the following info :
Footholds : Examples of queries that can help a hacker gain a foothold into a web server
Files containing usernames : Files containing usernames
Sensitive Directories : Google's collection of web sites sharing sensitive directories. The files contained in here will vary from sensitive to uber-secret!
Web Server Detection These links demonstrate Google's awesome ability to profile web servers.
Vulnerable Files: HUNDREDS of vulnerable files that Google can find on websites...
Vulnerable Servers: These searches reveal servers with specific vulnerabilities. These are found in a different way than the searches found in the "Vulnerable Files" section.
Error Messages: Really retarded error messages that say WAY too much!
Files containing juicy info: No usernames or passwords, but interesting stuff none the less.
Files containing passwords: PASSWORDS, for the LOVE OF GOD!!! Google found PASSWORDS!
Sensitive Online Shopping Info : Examples of queries that can reveal online shopping info like customer data, suppliers, orders, credit card numbers, credit card info, etc
Network or vulnerability data: These pages contain such things as firewall logs, honeypot logs, network information, IDS logs... all sorts of fun stuff!
Pages containing login portals: These are login pages for various services. Consider them the front door of a website's more sensitive functions.
Various Online Devices: This category contains things like printers, video cameras, and all sorts of cool things found on the web with Google.
Advisories and Vulnerabilities: These searches locate vulnerable servers. These searches are often generated from various security advisory posts, and in many cases is product or version-specific.
We will have a look at few of them now. However, at the end of the day, the usage of Google in hacking depends solely on the user’s creativity of using the search operators and queries.