Authentic voices. Remarkable stories. AOL On Originals showcase the passions that make the world a more interesting place.
Go behind the scenes with some of the biggest digital celebrities to see what life is like when the blogging and tweeting stops.
The story of punk rock singer Laura Jane Grace of Against Me! who came out as a woman in 2012, and other members of the trans community whose experiences are woefully underrepresented and misunderstood in the media.
Documentary shorts conceived of and directed by famous actors. Jeff Garlin, Katie Holmes, Alia Shawkat, Judy Greer, and James Purefoy
Park Bench is a new kind of "talking show" straight from the mind of born and bred New Yorker and host, Steve Buscemi.
Digital influencer Justine Ezarik (iJustine) is back. After covering the world of wearable tech last season, iJustine is expanding her coverage this year by profiling the hottest tech trends across the country.
A 12 episode documentary series following 5 startup companies competing in the 2013 San Francisco TechCrunch Disrupt Startup Battlefield as they fine tune their products and eventually present in front of a panel of judges in hopes of winning $50,000 in funding.
Enter the graceful but competitive world of ballet through the eyes of executive producer, Sarah Jessica Parker. This behind-the-scenes docudrama reveals what it takes to perform on the ultimate stage, the New York City Ballet. Catch NYCB on stage at Lincoln Center.
Nicole Richie brings her unfiltered sense of humor and unique perspective to life in a new series based on her irreverent twitter feed. The show follows the outspoken celebrity as she shares her perspective on style, parenting, relationships and her journey to adulthood.
Explore what it means to be human as we rush head first into the future through the eyes, creativity, and mind of Tiffany Shlain, acclaimed filmmaker and speaker, founder of The Webby Awards, mother, constant pusher of boundaries and one of Newsweek’s “women shaping the 21st Century.”
Gwyneth Paltrow and Tracy Anderson spend time with women who've overcome hardship, injury, and setbacks to triumph in the face of adversity.
Hank Azaria’s touching, humorous, and often enlightening journey from a man who is not even sure he wants to have kids, to a father going through the joys, trials and tribulations of being a dad.
ACTING DISRUPTIVE takes viewers inside the businesses and passion projects of Hollywood’s top celebrities.
This volume covers vulnerable printers, cookies, phpadmin control panels and a neat little cell phone trick.
Tags:Google Hacks Tutorial - Part 4,Google hacking,Google Tricks,googlehacks,How to hack Google,google hacks,halla,informationleak
Grab video code:
Google Hacks Tutorial - Part 4
Hello everyone, Halla information leak here the figured I do you’ve got a solid and hook you up with another Google Hacks. I’ve been here in morning right here and what do you going to do in the Google Hacks, what are you going to do —.
Now, I’m going to do one now. All right I was looking for a little bit more on interesting stuff but I’m still to working on – the thing is it’s you got to try to buy the precuts and use the technology in order to fine the lowest or the little holes and that’s been a thing for me at least.
But anyway let’s start of, now, I also understand a lot of you people have been requiring have had problems reading what I’m doing so I’m going to try to do this as a simple as possible here. Here, is an interesting hack. This is a Control Panel for network printers. I would imagine you’re all able to read that. All right, there’s not many available but ,you can tell which one is of which and here’s Lexmark’s as you can see I’ve messed with this just a bit on — for example, these are all shared you can see up in here. Just wait for to load and it’s a Java client so you have to allow the Java to run in order to use the Control panel much like with the network cameras from my first Google Hacks.
Here it is, now, it shows the whole situation. So for example if we go to print, you can browse and print the file to them stuff like that, you can change your configurations, you can check their job history which is in nothing yet but, you get the idea. I’m not going to print anything yet because I don’t know who these people are but, if you’d like to do something like that as I could joke fooling around or you know someone who has a shared printer and you can check the IP address you can resolve it. Find who are they and what the story is, and you may want to tell them, hey listen your network is vulnerable, your print you know.
But anyway as I’ve been looking around and notice this is frame so if I just view this frame I’ve noticed that the ports are different here and it seems that port 255 is the big port that they’ve been using. So you may want to check for port 255 if you’re doing scans and stuff like that, that seems to be what is that’s Lexmark out in particular, is using. Therefore as I was researching this I also notice that if you did the same type of thing, if you want in URL port 255 and forget about the HTM pages which are the regular pages that include that in a thing. You can find all your bars here and you sure you let, wait let me do this for this for you guys.
See, you can see right here these are your situations and it gives you into your Lexmark, this are your printer. So you get the idea, kind of fun to screw around and print something on somebody else thing, I thought that was funny. Anyway another one we’re going to do it’s kind of the same thing, as I did in my first Google Hacks video which is going to FTP to find particular files.
Now you can go to and find this about everything but a lot of people have been asking you know I get all easy emails, how do you hack email, hack yahoo, hack MSN, hack this, hack that. I’m just showing you tricks people. I’m not showing, you know what I mean so anyway to answer that question, I’m going to say if you had just listen to me and have been creative, you would have been able to figure this out yourself, this right here index just like the other one or to someone to that. Cookies.txt, you want to find the guy’s cookies in order to go to obviously you don’t want recipes but you want to find cookies for example here’s one here. Cookies.txt and it’s got it’s eBay stuff and all that I just — you know that’s how you find it you going to find the guys hash, you going to crack the hash here is another one I was checking out apparently.
You got to find the hash this got to deliver this refer but still you got this PHP session you can tell what the deal is what everything are all send and it’s pretty self explanatory that is not what I’m looking for. So here’s the sessions, there’s he’s hashes, you get the idea. The password and to all hashed, yes you have to crack it Google people, Google. I’m not going to show you how to do that stuff that’s just me and an evil.
The other email that I’ve been getting a million times over is how do you hack forums or here is an address hack this for me, if you going to waste your time and I mean email asking me to hack something for you, you just made as well forget it all you’re doing is wasting about a quarter second of my time as I delete it.
This one here a lot of people want to hack phpBB forums for whatever reason. So what you have to do is you got to try to find a you could do it two different ways, you could find one at a vulnerable tool particular vulnerability that you can exploit it but a lot of people aren’t that involve or you can take your time and find somebody who’s running on Google ready and just take from there. So, I just took it a step further and found this guy here, now I’ll go real slow with it in title phpMyAdmin, now this is php in general. PhpMyAdmin if you’re familiar with it is a control panel and I’ll do it like this.
Welcome to php MyAdmin and just starts because that’s what it says on the thing and it’s running as anything as root at that address. So again we’ll look at like this entitle phpMyAdmin. Welcome to phpMyAdmin with a little things. No questions everyone’s happy and you don’t have to play this a few times go right ahead.
For example I was checking out running these local hosts, I was checking out this just check an amount. Sure and off you have full control over that phpMyAdmin control panel, very dangerous stuff, you can do a lot. What am I going to do to this person, nothing because that’s mean by I’m showing that they are vulnerable to where I can do pretty much whatever I’d like I can check all the data bases to prove that I can do everything in MySQL and then there are php administration is also all over here. Look at their logs, it gets ridiculous.
So again you get the idea, you can mess around with the different things that are going on again here’s the situation just another same type of Administration panel just too different vulnerable user. Then there’s another one I like to show you that I thought that this is pretty funny I thought. I’m sure a lot of you know it already but I’ll show you anyway.
This is quite possibly the simplest thing ever, you go to Google, Mac while hold on because people want — once you click I’ll show you hold on. Now you go to Google Maps which is Maps.Google.com and you type in find businesses. Now, I have to move this over for a little bit but I’ll show you.
We’re going to look for Mc Donald’s and a particular zip code I’m just picking around them zip code, there’s a couple of Mc Donald in that area. So let me just refresh that because it seems off been a little ugly. So find businesses, Mc Donald’s and 11779. So now here we go, here’s your Mc Donald’s restaurant in the area and it tells you all of this stuff. You notice this little thing right here. Cool. This is fun because if you have a cell phone you can really screw with people so you enter your phone number which I’m going to make really small because I really don’t need you people calling me, no offense but I don’t need you calling me. I’m going to find or everything else. I’ll do it like this it’s easier.
All right so we enter in the number phone number with the dashes just for the record and my cell phone is right here next to me so we’re going to be calling this Mc Donald and then you click connector free. Now what happens is it begins to call and now I’m going to put on speaker so everyone can here it. Connecting then it rings.
So anyway that’s a lot of fun just for the record that’s a lot of fun. Now, let’s get crazy with this because you know I’ve been having my friend’s phones call Mc Donald’s and that’s all very fun and you know well and good and it is hysterical and their phone rings and they’re like who is this and it’s Mc Donald’s or better yet when it’s having dinner with his fiancé or something I’ll have you strip clubs calling him but it seems like he’s calling them and it’s very confusing but it’s very funny. But any case this can get very dangerous because as I found out what’s also listed as a business.
Yeah that’s right what else is listed as a business, yeah that’s right which is not really very smart but again complete this video will teach people that this is stupid. Don’t call the way it house in the FBI just explaining that something’s you might not think about are available. Nobody likes their phone randomly calling the FBI. I’m pretty sure I know him it likes at least but I’m just explaining that as an example that’s just the situation as it stands you may want to make a few phone calls and tell them listen this can happen try to stop it, any case.
My latest Google hacks I hope you like it, I hope you enjoyed it, I hope you’ll stop emailing me. This is Halla from information leak, I’m, just kidding I like when you email me just don’t’ ask me to hack stuff for you please I’m not going to do it. See you at information leak people until next time, copy system.