Goolag 'guide' hacking through Google
An open-source tool that scans for website security errors by exploiting Google's search function has been released by the hacker group "The Cult of the Dead Cow" called Goolag.
The Cult of the Dead Cow said Goolag was created with the aim of supporting webmasters to test the basic level of security for their website and timely patch.
The interface of Goolag version 1.0.0.41.
In the underground world on the Internet, there are also a lot of free security scans (scanner) such as Wikto Scanner but the "black" reputation of the "The Cult of the Dead Cow" 10 years before its launch. Back Orifice (*) helped Goolag become more popular.
" I don't think there's anything new, but it can make it easier to retrieve hacks from Google ," said Robert Hansen, CEO of Sectheory.com and blog founder Ha.ckers.org.
Just as Robert Hansen said. Goolag is not new, but its usage has become easier than previous error scanning tools. Not only hackers, but even people who aren't knowledgeable about hacking techniques can still use it. This is a signal worth worrying about security and website development.
(*) Back Orifice: is seen as a trojan with the ability to support hackers to remotely control a computer using Windows operating system.
You should read it
- How to create security questions nobody can guess
- What you need to know about an information security analyst
- Learn about terminal security (endpoint security)
- Awareness and experience - the most important factor in every network security process
- IBM developed a new technology to patch security holes
- The basic steps in dealing with network security issues that you need to understand
- Top 5 trends in endpoint security for 2018
- 7 mistakes make Internet security at risk
May be interested
- How to Turn Off Google Chrome Updates Completelytoday's tipsmake will show you how to prevent google chrome from automatically updating on windows, mac, iphone and android platforms. note that stopping updating google chrome puts your device and other devices and systems at risk of hacking or cyberattacks.
- How to secure Facebook from hackinghow to secure facebook from hacking. facebook in recent years has made itself the largest social network on the planet with millions of accounts and users every day. but more users means more information
- Spreading hacking tools helps Windows 7 still get updates even after Microsoft has stopped supportingthis hacking tool will basically help your device pass that initial check and can receive updates just like esu customers.
- Personal data of 15 million Trello users leaked on hacking foruman unknown hacker recently publicly released more than 15 million email addresses associated with trello accounts on a hacking forum.
- Growth Hacking growth strategy - Part 2recent breakthrough growth strategy is no longer strange to technology users, especially those who are cherishing startup plans. these strategies are very diverse and applied by many large companies in the early stages of operation.
- Simple ways to protect home security cameras, avoid hackingin order to protect yourself and your family against security camera attacks, users can take the simple measures below.
- What is Domain Hijacking? How dangerous is it?the domain name is one of the most important assets in the internet.
- WikiLeaks revealed malware of CIA hacks and spies on Linux computerswikileaks has just published the vault 7 document that provides detailed information about a supposedly cia project that allows remote hacking and spying on linux-based computers.
- 5 Free Wifi Hacking Software On PC, IOS, Androidfree wifi hacking software provides wifi cracking feature for devices that want to access the internet in the simplest way without paying any fee.
- 8 best Wifi analysis and hacking softwarepentest security analysis and security evaluation is an integral part of creating any kind of secure network. to create a secure network, developers use wi-fi hacking software to test wireless networks and make modifications. this article will introduce you to the best hacking and analyzing wi-fi tools.