{"id":37,"date":"2010-06-24T16:49:44","date_gmt":"2010-06-24T08:49:44","guid":{"rendered":"http:\/\/blog.esafeinfo.com\/?p=37"},"modified":"2010-06-24T17:58:59","modified_gmt":"2010-06-24T09:58:59","slug":"a-bing-dork","status":"publish","type":"post","link":"https:\/\/blog.esafeinfo.com\/?p=37","title":{"rendered":"A Bing Dork!"},"content":{"rendered":"<p><a href=\"http:\/\/www.googlebig.com\/list_of_query_and_dork_of_google\/\">Google dorks<\/a> has been around for awhile. It is a list of search phrases that can be used in Google to pull out some information from vulnerable web pages and unsecured networks, the information that should definitely not be publicly available on the internet.<br \/>\nThis week Sean Arries mentioned a Bing dork in his talk at the EC-Council. I never knew that Bing has an\u00a0interesting\u00a0operator. It can help you to find the different domains, which are hosted on a given IP. First, get the IP address of a domain, e.g. by using Ping command then copy the IP address into Bing and precede it with \u201cip:\u201d. The search result will show you the other domains that hosted on the same server. From a Hacker&#8217;s Point of View,\u00a0these domains may have some common weaknesses and\u00a0vulnerabilities to exploit.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Google dorks has been around for awhile. It is a list of search phrases that can be used in Google to pull out some information from vulnerable web pages and unsecured networks, the information that should definitely not be publicly available on the internet. This week Sean Arries mentioned a Bing dork in his talk [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-37","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/blog.esafeinfo.com\/index.php?rest_route=\/wp\/v2\/posts\/37","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.esafeinfo.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.esafeinfo.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.esafeinfo.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.esafeinfo.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=37"}],"version-history":[{"count":5,"href":"https:\/\/blog.esafeinfo.com\/index.php?rest_route=\/wp\/v2\/posts\/37\/revisions"}],"predecessor-version":[{"id":42,"href":"https:\/\/blog.esafeinfo.com\/index.php?rest_route=\/wp\/v2\/posts\/37\/revisions\/42"}],"wp:attachment":[{"href":"https:\/\/blog.esafeinfo.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=37"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.esafeinfo.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=37"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.esafeinfo.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=37"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}