Now you all can invite me on skype for any kind of help required as my username is krackoworld

28 April 2011

Pin It

How to Use Google as for Hacking Purposes?

Google-logo-1Now a days all you people might be aware of Google Hacking as it provides large number of services and platforms.For ex- Searching,blogger,Gmail,AdSense and many more .Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites. The following are some of the hacks that can be accomplished using Google.

1. Hacking Security Cameras

There exists many security cameras used for monitoring places like parking lots, college campus, road traffic etc. which can be hacked using Google so that you can view the images captured by those cameras in real time. All you have to do is use the following search query in Google. Type in Google search box exactly as follows and hit enter


Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls. You will see something as follows


As you can see in the above screenshot, you now have access to the Live cameras which work in real-time. You can also move the cameras in all the four directions, perform actions such as zoom in and zoom out. This camera has really a less refresh rate. But there are other search queries through which you can gain access to other cameras which have faster refresh rates. So to access them just use the following search query.

intitle:”Live View / – AXIS”

Click on any of the search results to access a different set of live cameras. Thus you have hacked Security Cameras using Google.

2. Hacking Personal and Confidential Documents

Using Google it is possible to gain access to an email repository containing CV of hundreds of people which were created when applying for their jobs. The documents containing their Address, Phone, DOB, Education, Work experience etc. can be found just in seconds.

intitle:”curriculum vitae” “phone * * *” “address *” “e-mail”

You can gain access to a list of .xls (excel documents) which contain contact details including email addresses of large group of people. To do so type the following search query and hit enter.

filetype:xls inurl:”email.xls”

Also it’s possible to gain access to documents potentially containing information on bank accounts, financial summaries and credit card numbers using the following search query

intitle:index.of finances.xls

3. Hacking Google to gain access to Free Stuffs

Ever wondered how to hack Google for free music or ebooks. Well here is a way to do that. To download free music just enter the following query on google search box and hit enter.

“?intitle:index.of?mp3 eminem“

Now you’ll gain access to the whole index of eminem album where in you can download the songs of your choice. Instead of eminem you can substitute the name of your favorite album. To search for the ebooks all you have to do is replace “eminem” with your favorite book name. Also replace “mp3″ with “pdf” or “zip” or “rar”.

I hope you like this post and please pass your comments as well.

Respected Readers :-
As a 18 years old student, running the top most blog in today's world is something quite difficult to do or handle as we bring the best things available related to ethical hacking and security tips to our readers every day. To keep us strong with this attitude, a small contribution from your side will highly be appreciated.


E njoyed this post very much – So why not you Subscribe to our regular Email Updates ! and stay connected with us forever .  

Kindly Bookmark and Share it with your friends :


  1. Gotcha.... Visited a private Photobucket album using these tricks

  2. you are superb, great info, you are more than scientist

  3. In this post I will show how to use Google for exploiting security vulnerabilities within websites. email check

  4. PayPal is an administration that enables you to pay, send cash through web. PayPal likewise guards your adapt data and furthermore secure web buys. paypal money adder apk

  5. Get sites limited using proxy servers for sites that are unblocking. I'll describe how, should you don't yet understand how a proxy server functions. Google VPN

  6. I will do niche blog comment Just in 5$ .All comment relevant with your niche and UNIQUE .This off-page seo will increase your traffic and promote your business.

  7. These articles and blogs are genuinely sufficiency for me for a day.
    Johnny Chen SEO Austin

  8. The term ethical hacker came into surface in the late 1970s when the government of United States of America hired groups of experts called 'red teams' to hack its own hardware and software system. FB hack

  9. This gives you the most ideal perceivability to a focused on group of onlookers who is searching for your item/benefit, and the promotions are likewise geospecific.

  10. This is a great post. I like this topic.This site has lots of advantage.I found many interesting things from this site. It helps me in many ways.Thanks for posting this again. logo design

  11. This is amazing post. This is very informative keep it up good work.

    Brooklyn Park Web Design

  12. Not just a place worth to visit as a result of its extraordinary scene, it's a flawless spot in the event that you are searching for a rapid internet search history delete

  13. This comment has been removed by the author.

  14. Want To Boost Your ClickBank Banner Traffic And Commissions?

    Bannerizer made it easy for you to promote ClickBank products by banners, simply go to Bannerizer, and grab the banner codes for your picked ClickBank products or use the Universal ClickBank Banner Rotator Tool to promote all of the ClickBank products.

  15. Technology in the Health-care framework alone has had long achieving impacts. bobsweep robot vacuum

  16. With the dawn of the internet came a whole new world that was exciting to everyone, when in reality it can be the single most frightening part of our everyday lives!hackear facebook sin encuesta

  17. Pulling back these procedures from the general public has turned out to be close incomprehensible in view of the aggregate reliance of the general public on technology. Bobsweep robotic vacuum review

  18. This is my first time i visit here. I found so many interesting stuff in your blog especially its discussion. From the tons of comments on your articles, I guess I am not the only one having all the enjoyment here keep up the good work Mobiledokan

  19. In this article, we talked about "warmth" and how successful it is in diminishing the working life-time of your electronics. bobsweep pethair review

  20. The Acrobat shapes wizard allows these PDF documents to be transformed into structures that can be finished utilizing PDF perusers on any PC. For a man whose penmanship abilities are nearly non-existent and whose composing aptitudes are barely better, this is a genuine help.

  21. Users of ICT can look for and discover data to help current predispositions, inaccurate suppositions or truthfully mistaken data. You can even join gatherings to facilitate your own obliviousness. Good Tips For You

  22. After endorsement, these PDF's are regularly confused with being press-prepared, however should be considered with alert.

  23. Hey what a brilliant post I have come across and believe me I have been searching out for this similar kind of post for past a week and hardly came across this. Thank you very much and will look for more postings from you. Dofollow Blog Comment

  24. It was wondering if I could use this write-up on my other website, I will link it back to your website though.Great Thanks. Dofollow Blog Comment

  25. hi was just seeing if you minded a comment. i like your website and the thme you picked is super. I will be back. Spotify premium apk offline

  26. On the off chance that I had an issue with some math issue I was taking a shot at, I could snap a photo of it and put it on the Skype screen.

  27. here are a couple of ways that your email account can be compromised or hacked into. One way is through a virus.Reset your Google password by using Strong Password Generator. If this is the case, you should still have access to your email account.

  28. ERP programming robotizes complex operational and bookkeeping forms and expedites productivity and financial reserve funds all dimensions. office activator

  29. With so many books and articles coming up to give gateway to make-money-online field and confusing reader even more on the actual way of earning money, Epictext News


Your feedback is always Precious to us.
I will try to answer all the queries as soon as possible.

karan chauhan


Recent Posts

Recent Comments

| KrackoWorld (KoW) © 2014. All Rights Reserved | Style By All Web Designing | | Contact |