Podcasts about Google hacking

  • 16PODCASTS
  • 18EPISODES
  • 57mAVG DURATION
  • ?INFREQUENT EPISODES
  • May 29, 2024LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about Google hacking

Latest podcast episodes about Google hacking

La Nube de BLU Radio
Google Hacking: cómo protegerse del robo de información personal

La Nube de BLU Radio

Play Episode Listen Later May 29, 2024 5:59


Emanuel Ortiz, director de la especialización en gerencia en ciberseguridad de la Universidad EAN, explicó en diálogo con La Nube de Blu Radio en qué consiste el Google hacking y cómo se puede evitar para no ser víctimas de robo de información personal.  See omnystudio.com/listener for privacy information.

Fique Seguro
Como é que hackers usam ferramentas de busca para ataques?

Fique Seguro

Play Episode Listen Later Jul 5, 2023 36:56


A vida de uma pessoa na Internet é muito facilitada graças aos buscadores como Google, Bing, DuckDuckGo e Yahoo. E acreditem em mim quando digo que este serviço evoluiu bastante. Evoluiu tanto que é um dos produtos mais lucrativos do Google e portanto, a experiência do usuário é algo que conta bastante. Mas... os hackers conseguem utilizar ferramentas boas para atividades não tão legais assim. No episódio de hoje vamos falar sobre Google Hacking ou Google Dorking que é uso da ferramenta de busca, para encontrar aplicações, dispositivos conectados à Internet e que podem ter vulnerabilidades específicas ou podem ser uma porta de entrada para o atacante. Saber disso e nos antecipar na proteção é que nos faz sermos defensores de empresas na Internet. #fabiosobiecki #blueteamacademy #segurançadainformação __________________ Siga minhas redes https://www.instagram.com/fabiosobiecki https://www.facebook.com/fabiosobieckioficial https://www.tiktok.com/@fabiosobiecki

Hacker Valley Studio
Resources That Changed How I Approach Cybersecurity

Hacker Valley Studio

Play Episode Listen Later Feb 28, 2023 29:50


In this episode of the Hacker Valley Studio podcast, Chris Cochran and Ron Eddings discuss cybersecurity resources for learning and standing out in the field. In the episode, the two discuss SANS Institute posters for pentesting, purple teaming, and incident response. The two also showcase Google Hacking resources for finding domains of interest for cybersecurity. Ron and Chris highlight how podcasts can be a great way to try out a book before buying it, as authors often share the best parts of their work when interviewed. Chris notes that the cybersecurity field is constantly evolving and that staying up-to-date is crucial. They emphasize that resources like books and podcasts can help professionals develop new skills and stay current with industry trends. Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals. ........................... Links: Join our Patreon monthly creative mastermind Connect with Ron Eddings on LinkedIn and Twitter Connect with Chris Cochran on LinkedIn and Twitter Purchase an HVS t-shirt at our shop Continue the conversation by joining our Discord Check out Hacker Valley Media and Hacker Valley Studio

cybersecurity sans institute chris cochran hvs hacker valley media hacker valley studio ron eddings google hacking
Talking With Experts Podcast
EP30 Creating Content That Ranks On Google: Hacking the Algorithm with Lorraine Ball

Talking With Experts Podcast

Play Episode Listen Later Nov 30, 2021 36:38


Lorraine Ball is a digital marketing expert who is really focused on breaking down the "mystery" of digital marketing for small business owners. She has over 40 years experience in digital marketing and has built several online and offline training programs on digital and traditional marketing. She hosts the "More Than A Few Words," podcast where she features other marketing professionals from around the globe. Top 5 Actionable Steps from Lorraine:1. Built long term relationships with repeat business in mind. Use your existing database as an asset (is valuable & sellable) 2. Love your customers, good and bad. 3. Focus on relevance, relatability and related links for Google.4. Answer the right questions in your content. 5. Model what is already working. Wherever that's your content or a specific process that works really well. Learn more about Lorraine Ballhttps://www.digitaltoolbox.clubGet more information from the podcast here.See you next week!!Chris Cownden See acast.com/privacy for privacy and opt-out information.

Radiogeek
#Radiogeek - Hoy hablamos de Google hacking - Nro 1958

Radiogeek

Play Episode Listen Later Jul 30, 2021 41:21


Los temas del día: Los usuarios de PlayStation 5 beta ahora pueden probar el almacenamiento SSD https://infosertec.com.ar/2021/07/29/los-usuarios-de-playstation-5-beta-ahora-pueden-probar-el-almacenamiento-ssd/ Samsung India está perdiendo terreno frente a marcas de teléfonos pequeñas https://infosertec.com.ar/2021/07/29/samsung-india-esta-perdiendo-terreno-frente-a-marcas-de-telefonos-pequenas/ Huawei presentó su smartphone P50 y P50 Pro https://infosertec.com.ar/2021/07/29/huawei-presento-su-smartphone-p50-y-p50-pro/ Motorola lanzó de forma mundial sus smartphones Moto Edge 20 Pro, Edge 20 y Edge 20 Lite https://infosertec.com.ar/2021/07/29/motorola-lanzo-de-forma-mundial-sus-smartphones-moto-edge-20-pro-edge-20-y-edge-20-lite/ Google hacking: averigua cuanta información sobre ti o tu empresa aparece en los resultados https://www.welivesecurity.com/la-es/2021/07/29/google-hacking-averigua-que-informacion-sobre-ti-o-empresa-aparece-resultados/? Las mejoras de Google Fit abren la plataforma para trabajar con más aplicaciones https://9to5google.com/2021/07/29/google-fit-browse/ Spotify para Android prueba un nuevo diseño para la barra de reproducción APOYANOS DESDE PAYPAL https://www.paypal.me/arielmcorg APOYANOS DESDE PATREON https://www.patreon.com/radiogeek APOYANOS DESDE CAFECITO https://cafecito.app/radiogeek Podes seguirme desde Twitter @arielmcorg (www.twitter.com/arielmcorg) También desde Instagram @arielmcorg (www.instagram.com/arielmcorg) Sumate al canal de Telegram #Radiogeekpodcast (http://telegram.me/Radiogeekpodcast)

Who Moved My Freedom Podcast
Episode 406 : NRA TV On Pause! & Google Hacking 2020 Election

Who Moved My Freedom Podcast

Play Episode Listen Later Jun 27, 2019 128:36


Hank Strange WMMF Podcast: NRA TV On Pause! & Google Hacking 2020 Election Podcast #406 Google Hacking 2020 Election & NRA TV On Pause! Hank Strange WMMF Podcast Description: SUBSCRIBE AND HIT NOTIFICATION BELL:

Security In Five Podcast
Episode 181 - Tools, Tips and Tricks - The Google Hacking Database

Security In Five Podcast

Play Episode Listen Later Feb 23, 2018 5:08


We all use of have used Google search at some point in our digital lives. I would be that most don't know how powerful it truly is. The Google Hacking Database website does two things - It teaches you about how to do deep searches and opens your eyes to how open some people's lives are by accident.. This episode goes through The Google Hacking Database. The Google Hacking Database - https://www.exploit-db.com/google-hacking-database/   Be aware, be safe. ------------------------------------ Website - https://www.binaryblogger.com Podcast Page - http://securityinfive.libsyn.com Podcast RSS - http://securityinfive.libsyn.com/rss Twitter @binaryblogger - https://www.twitter.com/binaryblogger iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2 YouTube - https://www.youtube.com/binaryblogger TuneIn Radio - Security In Five Channel Spotify - Security In Five Podcast Page Email - contactme@binaryblogger.com  

Advanced Persistent Security
Lessons in Infosec (with Tracy Z. Maleeff)

Advanced Persistent Security

Play Episode Listen Later Sep 12, 2016 51:06


Lessons in Infosec (with Tracy Z. Maleeff) Advanced Persistent Security Podcast Episode 18 Guest: Tracy Z. Maleeff September 12, 2016 If you enjoy this podcast, be sure to give us a ...

Gain Your Edge
Interview with a Hacker: Bill Gardner (Marshall University)

Gain Your Edge

Play Episode Listen Later Mar 11, 2016 43:23


Gain Your Edge is a twice-monthly podcast on all things IT. This week’s guest is a bona fide hacker. Bill Gardner is an assistant professor at Marshall University where he teaches in the Digital Forensics and Information Assurance degree program. He is an information security author and speaker. During this episode, Bill mentioned several resources and references which are presented below for your enjoyment:   Book Links “Ghost in the Wires” by Kevin Mitnick “Building an Information Security Awareness Program” by Bill Gardner and Valerie Thomas  “Google Hacking for Penetration Testers” by Bill Gardner, Johnny Long and Justin Brown   Conference Links DEF CON Black Hat   Other Site Links & References Dual Core, Nerdcore Music M.C. Frontalot PTES.org Cyber War Zone 1Password Reboot It Podcast Marshall University Information Security   Contact Our Guest Expert Follow Bill on Twitter!   More Host Skip Lineberg Subscribe via iTunes   Send your feedback, comments and questions to BusinessEdge@Frontier.com

SecurityCast
Google Hacking

SecurityCast

Play Episode Listen Later Jun 30, 2015 151:06


[SecurityCast] WebCast #20 - Google Hacking

google hacking
Paul's Security Weekly
Kurt Baumgartner, Drunken Security News - Episode 331 - May 9, 2013

Paul's Security Weekly

Play Episode Listen Later May 13, 2013 59:21


Kurt Baumgartner of Kaspersky Labs joins us to talk about Red October, a research paper that he co-authored, along with the other areas that he works on at Kaspersky. It's time for another Drunken Security News. Much of the gang was on the road this week so Patrick Laverty sat in with Paul and Engineer Steve for the show, plus Jack's epic beard called in via Skype from lovely Maryland. First, Paul admitted it was a stretch to bring this into a security context but he wanted to talk about an article that he found in The Economist (via Bruce Schneier) about one theory that if the US would simply be nicer to terrorists, release them from Guantanamo Bay, Cuba and stop hunting them down around the world, that they would in turn be nicer to us. Also, fewer would pop up around the world. The thinking is that jailing and killing them turns others into terrorists. So here's the leap. Can the same be said for black hat hackers? If law enforcement agencies stop prosecuting the hackers, will they be nicer and will there be fewer of them? I think we all came to the same conclusion. "Nah." Paul also found an Adam Shostack article about how attention to the tiniest details can be important to the largest degree. The example given was the vulnerability to the Death Star in the original Star Wars movie was so small and the chances of it being exploited were so remote that the Empire overlooked it, Grand Moff Tarkin even showing his arrogance shortly before his own demise. The same can be said for our systems. It might be a tiny hole and maybe you think that no one would look for it and even if they do, what are the chances they both find it and exploit it? In some cases, it can have quite dire consequences. The Empire overlooked a small vulnerability that they shouldn't have. Are you doing the same with your systems? Did we happen to mention that Security BSides Boston is May 18 at Microsoft NERD in Cambridge, MA and Security BSides Rhode Island is June 14th and 15th in Providence, RI. Good seats and good conference swag are still available. We all hope to see you there! The Onion's Twitter account was breached by the Syrian Electronic Army and they handled it a way that only The Onion can, making light of both themselves and the SEA. Additionally, possibly for the first time ever, The Onion published a non-parody post about exactly how the breach occurred. Additionally, the National Republican Congressional Committee (NRCC) web site got spam hacked/defaced with Viagra ads. The only thing we were wondering is, are we sure it was hacked and not just a convenient online pharmacy for their members? A new whitepaper was released from MIT talking about "Honeywords". The problem being solved here is creating a way for server admins to know sooner when a passwords file has been breached on a server. In addition to the correct password, this new system would add a bunch of fake passwords as well. When the attacker starts trying usernames and passwords, if they use one of the fake passwords, the server admin would be notified that someone is doing that and it is very likely that the passwords file has been breached. It's an interesting concept to ponder. Jack had an article from Dennis Fisher at Threatpost, asking the question about what's the point of blaming various people for cyberespionage if we don't have a plan to do something about it. The NSA also has its own 643 page document telling its members how to use Google to find things like Excel documents in Russian that contain the word "login". Wait, I feel like I've heard of this somewhere before. Oh yeah, that's right. Johnny Long was talking about Google Hacking at least as far back as 2007. It's just interesting some times to see things that the media gets wind of and without the slightest bit of checking, thinks something is "new".

Tech Forum - Fall 2011
3-5 Pulp Google Hacking; The next Generation Search Engine Hacking Arsenal - Francis Brown

Tech Forum - Fall 2011

Play Episode Listen Later Dec 20, 2011


Paul's Security Weekly
Paul's Security Weekly - Episode 150 - April 30, 2009

Paul's Security Weekly

Play Episode Listen Later May 4, 2009 149:04


The Security Weekly crew are over 9 hours into the 12 hour marathon and talking to Stephen Northcutt! We also have a great segment on Google Hacking. This is just the "show" portion of the episode, look for the other segments in the coming weeks. Sponsored by Core Security, listen for the new customer discount code at the end of the show Sponsored by Tenable Network Security, creators of Nessus and makers of the Tenable Security Center, software that extends the power of Nessus through sophisticated reporting, remediation workflow, IDS event correlation and much more. Want to register for any SANS conference? Please visit http://www.securityweekly.com/sans/ for our referral program Be sure to check out "Maltego" from Paterva, try the community edition for free! Quench your thirst for knowledge at www.syngress.com and use the discount code to save 20% of all security book titles! Don't forget to sign up for our Mailing List, Forums, and log into our IRC Channel! Full Show Notes Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian, John Strand, Mick Douglas

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference

"This presentation explores the explosive growth of a technique known as ""Google Hacking"". When the modern security landscape includes such heady topics as ""blind SQL injection"" and ""integer overflows"", it's refreshing to see such a deceptively simple tool bent to achieve such amazing results; this is hacking in the purest sense of the word. Attendees will learn how to torque Google to detect SQL injection points and login portals, execute portscans and CGI scans, fingerprint web servers, locate incredible information caches such as firewall and IDS logs, password databases, SQL dumps and much more - all without sending a single packet to the target! Borrowing the techniques pioneered by malicious ""Google hackers"", this talk aims to show security practitioners how to properly protect clients from this often overlooked and dangerous form of information leakage. The speaker, Johnny Long, maintains the Internet's most comprehensive database of Google exposures on his website. Johnny Long did not develop his skills within the hallowed halls of higher learning but rather by spending way too many late nights huddled in front of his computer, developing his anti-social tendencies. Mr Long (Johnny's professional alter-ego) has previously presented at SANS and other computer security conferences nationwide. In addition, he has presented before several government alphabet-soup entities including three starting with the letter 'A', four starting with the letter 'D', a handful starting with the letters 'F' and 'S' and two starting with the today's letter, the letter 'N'. During his career as an attack and penetration specialist, Mr Long has performed active network and physical security assessments (one in the cube is worth twenty on the net) for hundreds of government and commercial clients. Johnny Long is the Author of 'Penetration Testing with Google', available December 2004 from Syngress Publishing"

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference

"This presentation explores the explosive growth of a technique known as ""Google Hacking"". When the modern security landscape includes such heady topics as ""blind SQL injection"" and ""integer overflows"", it's refreshing to see such a deceptively simple tool bent to achieve such amazing results; this is hacking in the purest sense of the word. Attendees will learn how to torque Google to detect SQL injection points and login portals, execute portscans and CGI scans, fingerprint web servers, locate incredible information caches such as firewall and IDS logs, password databases, SQL dumps and much more - all without sending a single packet to the target! Borrowing the techniques pioneered by malicious ""Google hackers"", this talk aims to show security practitioners how to properly protect clients from this often overlooked and dangerous form of information leakage. The speaker, Johnny Long, maintains the Internet's most comprehensive database of Google exposures on his website. Johnny Long did not develop his skills within the hallowed halls of higher learning but rather by spending way too many late nights huddled in front of his computer, developing his anti-social tendencies. Mr Long (Johnny's professional alter-ego) has previously presented at SANS and other computer security conferences nationwide. In addition, he has presented before several government alphabet-soup entities including three starting with the letter 'A', four starting with the letter 'D', a handful starting with the letters 'F' and 'S' and two starting with the today's letter, the letter 'N'. During his career as an attack and penetration specialist, Mr Long has performed active network and physical security assessments (one in the cube is worth twenty on the net) for hundreds of government and commercial clients. Johnny Long is the Author of 'Penetration Testing with Google', available December 2004 from Syngress Publishing"

Black Hat Briefings, Las Vegas 2005 [Audio] Presentations from the security conference

Google Hacking returns for more guaranteed fun this year at Blackhat USA! If you haven't caught one of Johnny's Google talks, you definitely should. Come and witness all the new and amazing things that can be done with Google. All new for BH USA 2005, Johnny reveals basic and advanced search techniques, basic and advanced hacking techniques, multi-engine attack query morphing, and zero-packet target foot printing and recon techniques. Check out Google's search-blocking tactics (and see them bypassed), and learn all about using Google to locate targets Google doesn't even know about! But wait, there's more! Act now and Johnny will throw in the all new "Google Hacking Victim Showcase, 2005" loaded with tons of screenshots (and supporting queries) of some of the most unfortunate victims of this fun, addictive and deadly form of Internet nastiness. Think you're too uber to be caught in a Google talk? Fine. Prove your badness. Win the respect of the audience by crushing the live Google Hacking contest! Submit your unique winning query by the end of the talk to win free books from Syngress Publishing and other cool gear! Or don't. Just listen to your friends rave about it. Whatever. Johnny Long is a "clean-living" family guy who just so happens to like hacking stuff. Over the past two years, Johnny's most visible focus has been on this Google hacking "thing" which has served as yet another diversion to a serious (and bill-paying) job as a professional hacker and security researcher for Computer Sciences Corporation. In his spare time, Johnny enjoys making random pirate noises ("Yarrrrr!"), spending time with his wife and kids, convincing others that acting like a kid is part of his job as a parent, feigning artistic ability with programs like Bryce and Photoshop, pushing all the pretty shiny buttons on them new-fangled Mac computers, and making much-too-serious security types either look at him funny or start laughing uncontrollably. Johnny has written or contributed to several books, including "Google Hacking for Penetration Testers" from Syngress Publishing, which has secured rave reviews and has lots of pictures.

Black Hat Briefings, Las Vegas 2005 [Video] Presentations from the security conference

Google Hacking returns for more guaranteed fun this year at Blackhat USA! If you haven't caught one of Johnny's Google talks, you definitely should. Come and witness all the new and amazing things that can be done with Google. All new for BH USA 2005, Johnny reveals basic and advanced search techniques, basic and advanced hacking techniques, multi-engine attack query morphing, and zero-packet target foot printing and recon techniques. Check out Google's search-blocking tactics (and see them bypassed), and learn all about using Google to locate targets Google doesn't even know about! But wait, there's more! Act now and Johnny will throw in the all new "Google Hacking Victim Showcase, 2005" loaded with tons of screenshots (and supporting queries) of some of the most unfortunate victims of this fun, addictive and deadly form of Internet nastiness. Think you're too uber to be caught in a Google talk? Fine. Prove your badness. Win the respect of the audience by crushing the live Google Hacking contest! Submit your unique winning query by the end of the talk to win free books from Syngress Publishing and other cool gear! Or don't. Just listen to your friends rave about it. Whatever. Johnny Long is a "clean-living" family guy who just so happens to like hacking stuff. Over the past two years, Johnny's most visible focus has been on this Google hacking "thing" which has served as yet another diversion to a serious (and bill-paying) job as a professional hacker and security researcher for Computer Sciences Corporation. In his spare time, Johnny enjoys making random pirate noises ("Yarrrrr!"), spending time with his wife and kids, convincing others that acting like a kid is part of his job as a parent, feigning artistic ability with programs like Bryce and Photoshop, pushing all the pretty shiny buttons on them new-fangled Mac computers, and making much-too-serious security types either look at him funny or start laughing uncontrollably. Johnny has written or contributed to several books, including "Google Hacking for Penetration Testers" from Syngress Publishing, which has secured rave reviews and has lots of pictures.

Urban Coffee
Urban Coffee Episode 25

Urban Coffee

Play Episode Listen Later Feb 21, 2006


This week we do the email & comment thing, Dave bitches about birthday songs when you go out to eat, The longest song ever, Cheney's accident report, Adult Swim Fix, Houston police chief wants cameras everywhere, Olympic politics, Anima, Eoghan Colgan, Windows Defender Beta, Radio Shack closes stores, Google Hacking, Multi-Touch Screens, Get Human, Verizon's rebuttal to the Google Article last week, Apple's poetic justice, LED throwies, RIAA's backpedaling on iPod ripping, Apple switching to Windows, The Apple "Virus", and our newest behind the scenes vidcast.