Text formatting errors and how to fix them. Fixing author, entry-title and updated errors Finding an exact phrase using double quotes

How the errors appeared

It’s strange, the site is only two weeks old and already has its first errors. Where? I thought. Today I go to Google tools, select structured data, then hentry (markup: microformats) and see as many as 19 errors!

Don't be alarmed if you have 300 or 500 of them, or maybe even more - it turned out that solving the problem associated with structured data is not so difficult.

How to fix author, entry-title and updated structured data errors

— copy the files in which we will make changes to the computer (in this case, most likely side in: single.php, search.php, index.php, archive.php). That's how it was for me;

— make another copy of these files (we will change them and upload them through Filezilla after making the changes).

In order for you not to get confused, I will divide my post into conditional parts, in each of which I will tell you how to get rid of three problems at once. Begin?

Error and solution to the entry-title problem. No article title information available.

Now I just started to understand that I needed to learn English better. Everything here is actually banal. The error is corrected by adding the phrase entry-title.

This is done as follows: we look in the file or files being edited (in all four I had a construction that is responsible for displaying header information) for part of the code:or similar to it (not by the question marks, but by the phrase php the_title).

Attention, your code may be different, but there is a high probability that it is similar or very similar. Once found, we need to add entry-title. Actually, how it was and became visible to me in the picture:

Don’t be alarmed if the entry-title needs to be written in a slightly distant place from, although this honestly confused me (I was afraid it wouldn’t work out), but the random method) helped. It will be easier later.

Attention, do not forget to do this in all the files that I wrote about above.

Solution to the problem updated - there is no information about the publication date of the article.

Here we will need to add class=”updated” to part of the code php the_time or php the_date (depending on who) and enclose the construction in a tag . For those who don’t know, look at the picture:

Get rid of the author structured data problem. Error - the author is missing :)

Of course, it would be wrong not to take care of the author, since everything has already been done. If you were attentive, you could already cope without me and find part of the php the_author code to do everything as in the picture:

By the way, I was pleased that you can immediately check whether the problem has been resolved. I won’t type in unnecessary characters, I just recommend looking at the pictures.

In the world of Naruto, two years flew by unnoticed. Former newcomers joined the ranks of experienced shinobi at the rank of chunin and jonin. The main characters did not sit still - each became a student of one of the legendary Sannin - the three great ninjas of Konoha. The guy in orange continued his training with the wise but eccentric Jiraiya, gradually ascending to a new level of combat skill. Sakura became the assistant and confidant of the healer Tsunade, the new leader of the Leaf Village. Well, Sasuke, whose pride led to his expulsion from Konoha, entered into a temporary alliance with the sinister Orochimaru, and each believes that they are only using the other for the time being.

The brief respite ended, and events once again rushed with hurricane speed. In Konoha, the seeds of old strife sown by the first Hokage are sprouting again. The mysterious Akatsuki leader has set in motion a plan for world domination. There is turmoil in the Sand Village and neighboring countries, old secrets are resurfacing everywhere, and it is clear that bills will have to be paid someday. The long-awaited continuation of the manga has breathed new life into the series and new hope into the hearts of countless fans!

© Hollow, World Art

  • (52182)

    Swordsman Tatsumi, a simple boy from the countryside, goes to the Capital to earn money for his starving village.
    And when he gets there, he soon learns that the great and beautiful Capital is just an appearance. The city is mired in corruption, cruelty and lawlessness that comes from the Prime Minister, who rules the country from behind the scenes.
    But as everyone knows, “Alone in the field is no warrior,” and nothing can be done about it, especially when your enemy is the head of state, or rather the one who hides behind him.
    Will Tatsumi find like-minded people and be able to change something? Watch and find out for yourself.

  • (52116)

    Fairy Tail is a Guild of Hired Wizards, famous throughout the world for its crazy antics. The young sorceress Lucy was sure that, having become one of its members, she had found herself in the most wonderful Guild in the world... until she met her comrades - the explosive fire-breathing and sweeping away everything in his path Natsu, the flying talking cat Happy, the exhibitionist Gray , the boring berserker Elsa, the glamorous and loving Loki... Together they will have to defeat many enemies and experience many unforgettable adventures!

  • (46768)

    18-year-old Sora and 11-year-old Shiro are half-brother and sister, complete recluses and gambling addicts. When two loneliness met, the indestructible union “Empty Space” was born, terrifying all Eastern gamers. Although in public the boys are shaken and distorted in ways that are not childish, on the Internet little Shiro is a genius of logic, and Sora is a monster of psychology who cannot be fooled. Alas, worthy opponents soon ran out, which is why Shiro was so happy about the chess game, where the master’s handwriting was visible from the first moves. Having won to the limit of their strength, the heroes received an interesting offer - to move to another world, where their talents will be understood and appreciated!

    Why not? In our world, nothing holds Sora and Shiro, and the cheerful world of Disboard is ruled by the Ten Commandments, the essence of which boils down to one thing: no violence and cruelty, all disagreements are resolved in fair play. There are 16 races living in the game world, of which the human race is considered the weakest and most untalented. But the miracle guys are already here, in their hands is the crown of Elquia - the only country of people, and we believe that the successes of Sora and Shiro will not be limited to this. The Earth's envoys just need to unite all the races of Disbord - and then they will be able to challenge the god Tet - by the way, an old friend of theirs. But if you think about it, is it worth doing?

    © Hollow, World Art

  • (46470)

    Fairy Tail is a Guild of Hired Wizards, famous throughout the world for its crazy antics. The young sorceress Lucy was sure that, having become one of its members, she had found herself in the most wonderful Guild in the world... until she met her comrades - the explosive fire-breathing and sweeping away everything in his path Natsu, the flying talking cat Happy, the exhibitionist Gray , the boring berserker Elsa, the glamorous and loving Loki... Together they will have to defeat many enemies and experience many unforgettable adventures!

  • (62978)

    University student Kaneki Ken ends up in a hospital as a result of an accident, where he is mistakenly transplanted with the organs of one of the ghouls - monsters that feed on human flesh. Now he himself becomes one of them, and for people he turns into an outcast subject to destruction. But can he become one of the other ghouls? Or is there no more room for him in the world now? This anime will tell about the fate of Kaneki and the impact he will have on the future of Tokyo, where there is a continuous war between two species.

  • (35433)

    The continent that lies in the center of the Ignola ocean is the large central one and four more - Southern, Northern, Eastern and Western, and the gods themselves look after it, and it is called Ente Isla.
    And there is a name that plunges anyone on Ente Isla into Horror - the Lord of Darkness Mao.
    He is the master of the other world where all the dark creatures live.
    He is the embodiment of fear and horror.
    The Lord of Darkness Mao declared war on the human race and sowed death and destruction throughout the continent of Ente Isla.
    The Lord of Darkness was served by 4 powerful generals.
    Adramelech, Lucifer, Alciel and Malacoda.
    The four Demon Generals led the attack on the 4 parts of the continent. However, a hero appeared and spoke out against the army of the underworld. The hero and his comrades defeated the troops of the Lord of Darkness in the west, then Adramelech in the north and Malacoda in the south. The hero led the united army of the human race and launched an attack on the central continent where the castle of the Lord of Darkness stood...

  • (33814)

    Yato is a wandering Japanese god in the form of a thin, blue-eyed youth in a tracksuit. In Shintoism, the power of a deity is determined by the number of believers, but our hero has no temple, no priests, all donations fit into a sake bottle. The guy in the neckerchief works as a handyman, painting advertisements on the walls, but things are going very badly. Even the tongue-in-cheek Mayu, who worked as a shinki—Yato’s Sacred Weapon—for many years, left her master. And without weapons, the younger god is no stronger than an ordinary mortal magician; he has to (what a shame!) hide from evil spirits. And who needs such a celestial being anyway?

    One day, a pretty high school girl, Hiyori Iki, threw herself under a truck to save some guy in black. It ended badly - the girl did not die, but gained the ability to “leave” her body and walk on the “other side.” Having met Yato there and recognizing the culprit of her troubles, Hiyori convinced the homeless god to heal her, for he himself admitted that no one can live long between worlds. But, having gotten to know each other better, Iki realized that the current Yato did not have enough strength to solve her problem. Well, you need to take matters into your own hands and personally guide the tramp on the right path: first, find a weapon for the unlucky one, then help him earn money, and then, you see, what happens. It’s not for nothing that they say: what a woman wants, God wants!

    © Hollow, World Art

  • (33785)

    There are many dormitories at Suimei University Arts High School, and there is also the Sakura Apartment House. While hostels have strict rules, everything is possible at Sakura, which is why its local nickname is “madhouse.” Since in art genius and madness are always somewhere nearby, the inhabitants of the “cherry orchard” are talented and interesting guys who are too far out of the “swamp”. Take, for example, the noisy Misaki, who sells her own anime to major studios, her friend and playboy screenwriter Jin, or the reclusive programmer Ryunosuke, who communicates with the world only via the Internet and telephone. Compared to them, the main character Sorata Kanda is a simpleton who ended up in a “psychiatric hospital” just for... loving cats!

    Therefore, Chihiro-sensei, the head of the dormitory, instructed Sorata, as the only sane guest, to meet her cousin Mashiro, who was transferring to their school from distant Britain. The fragile blonde seemed like a real bright angel to Kanda. True, at a party with new neighbors, the guest behaved stiffly and said little, but the newly minted admirer attributed everything to understandable stress and fatigue from the road. Only real stress awaited Sorata in the morning when he went to wake up Mashiro. The hero realized with horror that his new friend, a great artist, was absolutely out of this world, that is, she was not even able to dress herself! And the insidious Chihiro is right there - from now on, Kanda will forever look after her sister, because the guy has already practiced on cats!

    © Hollow, World Art

  • (34036)

    In the 21st century, the world community finally managed to systematize the art of magic and raise it to a new level. Those who are able to use magic after completing the ninth grade in Japan are now welcome in magic schools - but only if applicants pass the exam. The quota for admission to the First School (Hachioji, Tokyo) is 200 students, the best hundred are enrolled in the first department, the rest are in the reserve, in the second, and teachers are assigned only to the first hundred, “Flowers”. The rest, the “Weeds,” learn on their own. At the same time, there is always an atmosphere of discrimination in the school, because even the forms of both departments are different.
    Shiba Tatsuya and Miyuki were born 11 months apart, making them the same year in school. Upon entering the First School, his sister finds himself among the Flowers, and his brother among the Weeds: despite his excellent theoretical knowledge, the practical part is not easy for him.
    In general, we are waiting for the study of a mediocre brother and an exemplary sister, as well as their new friends - Chiba Erika, Saijo Leonhart (or just Leo) and Shibata Mizuki - at the school of magic, quantum physics, the Tournament of Nine Schools and much more...

    © Sa4ko aka Kiyoso

  • (30034)

    The "Seven Deadly Sins", once great warriors revered by the British. But one day, they are accused of trying to overthrow the monarchs and killing a warrior from the Holy Knights. Subsequently, the Holy Knights stage a coup d'état and seize power into their own hands. And the “Seven Deadly Sins”, now outcasts, scattered throughout the kingdom, in all directions. Princess Elizabeth was able to escape from the castle. She decides to go in search of Meliodas, the leader of the Seven Sins. Now all seven must unite again to prove their innocence and avenge their expulsion.

  • (28781)

    2021 An unknown virus "Gastrea" came to earth and destroyed almost all of humanity in a matter of days. But this is not just a virus like some kind of Ebola or Plague. He doesn't kill a person. Gastrea is an intelligent infection that rearranges DNA, turning the host into a terrible monster.
    The war began and eventually 10 years passed. People have found a way to isolate themselves from the infection. The only thing that Gastrea cannot tolerate is a special metal - Varanium. It was from this that people built huge monoliths and surrounded Tokyo with them. It seemed that now the few survivors could live behind the monoliths in peace, but alas, the threat has not gone away. Gastrea is still waiting for the right moment to infiltrate Tokyo and destroy the few remnants of humanity. There is no hope. The extermination of people is only a matter of time. But the terrible virus also had another effect. There are those who are already born with this virus in their blood. These children, the "Cursed Children" (Exclusively girls) have superhuman strength and regeneration. In their bodies, the spread of the virus is many times slower than in the body of an ordinary person. Only they can resist the creatures of “Gastrea” and humanity has nothing more to count on. Will our heroes be able to save the remaining living people and find a cure for the terrifying virus? Watch and find out for yourself.

  • (27841)

    The story in Steins,Gate takes place a year after the events of Chaos,Head.
    The game's intense story takes place partly in the realistically recreated Akahibara district, a famous otaku shopping destination in Tokyo. The plot is as follows: a group of friends installs a device in Akihibara to send text messages to the past. A mysterious organization called SERN is interested in the experiments of the game's heroes, which is also engaged in its own research in the field of time travel. And now friends have to make enormous efforts to avoid being captured by SERN.

    © Hollow, World Art


    Added Episode 23β, which serves as an alternate ending and lead-up to the sequel in SG0.
  • (27143)

    Thirty thousand players from Japan and many more from around the world suddenly found themselves locked in the massively multiplayer online role-playing game Legend of the Ancients. On the one hand, gamers were physically transported to a new world; the illusion of reality turned out to be almost flawless. On the other hand, the “victims” retained their previous avatars and acquired skills, user interface and leveling system, and death in the game only led to resurrection in the cathedral of the nearest large city. Realizing that there was no great goal, and no one named the price for exit, the players began to flock together - some to live and rule by the law of the jungle, others - to resist lawlessness.

    Shiroe and Naotsugu, in the world a student and a clerk, in the game - a cunning magician and a powerful warrior, have known each other for a long time from the legendary “Mad Tea Party” guild. Alas, those days are gone forever, but in the new reality you can meet old acquaintances and just good guys with whom you will not be bored. And most importantly, an indigenous population has appeared in the world of Legends, who consider the aliens to be great and immortal heroes. Involuntarily, you want to become a kind of knight of the Round Table, beating dragons and saving girls. Well, there are plenty of girls around, monsters and robbers too, and for relaxation there are cities like hospitable Akiba. The main thing is that you shouldn’t die in the game, it’s much more correct to live like a human being!

    © Hollow, World Art

  • (27238)

    In the world of Hunter x Hunter, there is a class of people called Hunters who, using psychic powers and trained in all manner of fighting, explore the wild corners of a mostly civilized world. The main character, a young man named Gon (Gun), is the son of the great Hunter himself. His father mysteriously disappeared many years ago, and now, having grown up, Gon (Gong) decides to follow in his footsteps. Along the way he finds several companions: Leorio, an ambitious medical doctor whose goal is to get rich. Kurapika is the only survivor of his clan, whose goal is revenge. Killua is the heir to a family of assassins whose goal is training. Together they achieve their goal and become Hunters, but this is only the first step on their long journey... And ahead is the story of Killua and his family, the story of Kurapika’s revenge and, of course, training, new tasks and adventures! The series stopped with Kurapika's revenge... What awaits us next after all these years?

  • (28057)

    The ghoul race has existed since time immemorial. Its representatives are not at all against people, they even love them - mainly in their raw form. Lovers of human flesh are outwardly indistinguishable from us, strong, fast and tenacious - but there are few of them, so ghouls have developed strict rules for hunting and camouflage, and violators are punished themselves or quietly handed over to fighters against evil spirits. In the age of science, people know about ghouls, but as they say, they are used to it. The authorities do not consider cannibals a threat; moreover, they view them as an ideal basis for creating super-soldiers. Experiments have been going on for a long time...

    The main character Ken Kaneki faces a painful search for a new path, because he realized that people and ghouls are similar: it’s just that some literally eat each other, others figuratively. The truth of life is cruel, it cannot be changed, and the one who does not turn away is strong. And then somehow!

  • (26754)

    The action takes place in an alternate reality where the existence of demons has long been recognized; There is even an island in the Pacific Ocean - “Itogamijima”, where demons are full citizens and have equal rights with people. However, there are also human magicians who hunt them, in particular, vampires. An ordinary Japanese schoolboy named Akatsuki Kojou for some unknown reason turned into a “purebred vampire”, the fourth in number. He begins to be followed by a young girl, Himeraki Yukina, or "blade shaman", who is supposed to monitor Akatsuki and kill him if he gets out of control.

  • (25502)

    The story tells of a young man named Saitama, who lives in a world ironically similar to ours. He is 25, bald and handsome, and, moreover, so strong that with one blow he can annihilate all dangers to humanity. He is looking for himself on the difficult path of life, simultaneously handing out slaps to monsters and villains.

  • (23225)

    Now you have to play the game. What kind of game it will be will be decided by roulette. The bet in the game will be your life. After death, people who died at the same time go to Queen Decim, where they have to play a game. But in fact, what is happening to them here is the Heavenly Judgment.

  • “Chief editor of the GetGoodRank blog, web analyst, blogger.
    Incorrectly formatted text affects the user’s desire to read and the perception of information. GetGoodRank has identified the main errors in text design on the sites it checks"

    On 3 of the 5 sites we check, we find errors in text formatting. We have repeatedly talked about the fact that poorly formatted text worsens the user experience in our blog (selection of publications at the end of the newsletter).

    We have collected the most common text formatting errors that we found during checks.

    In this issue:

    • What happens on the site page
    • Text formatting errors
    • How to fix it

    What happens on the site page

    Text is the main information tool on the site. A typical website page combines:

    • graphic elements- logo, pictures, color design of website sections (backlight or background in menu items), video materials
    • text and graphic elements- text decorated with a picture
    • clear text- this is the article itself, description, instructions

    Users' attention is distributed in the same order. First of all, we will see pictures and graphics, then text in the form of pictures, then pure text.

    Images are processed by the brain thousands of times faster than text. 90% of information and 93% of communication with the outside world occurs through visual perception.

    Text cannot compete with images. Consciousness will perceive and process the image faster. Moreover, reading is an acquired, not an innate, skill. We do not put any effort into image processing, while text processing involves a certain load on the brain.

    Incorrect formatting increases physical and cognitive load and reduces the likelihood that the text will be read. Moreover, the design of the text affects the user's trust.

    The worse the text is formatted, the higher the doubts about the competence and reliability of the company.

    Errors in text design on websites (according to GetGoodRank estimates)

    Small font

    • documents, in which they are trying to hide something (everyone remembers the fine print in contracts)
    • SEO texts, which in practice are absolutely useless for the reader



    You can check the quality of text design and get recommendations on what factors impair the perception of information on the site in

    Hacking with Google

    Alexander Antipov

    The Google search engine (www.google.com) provides many search options. All these features are an invaluable search tool for a user new to the Internet and at the same time an even more powerful weapon of invasion and destruction in the hands of people with evil intentions, including not only hackers, but also non-computer criminals and even terrorists.
    (9475 views in 1 week)


    Denis Barankov
    denisNOSPAMixi.ru

    Attention:This article is not a guide to action. This article was written for you, WEB server administrators, so that you will lose the false feeling that you are safe, and you will finally understand the insidiousness of this method of obtaining information and take up the task of protecting your site.

    Introduction

    For example, I found 1670 pages in 0.14 seconds!

    2. Let's enter another line, for example:

    inurl:"auth_user_file.txt"

    a little less, but this is already enough for free downloading and password guessing (using the same John The Ripper). Below I will give a number of more examples.

    So, you need to realize that the Google search engine has visited most of the Internet sites and cached the information contained on them. This cached information allows you to obtain information about the site and the content of the site without directly connecting to the site, only by delving into the information that is stored inside Google. Moreover, if the information on the site is no longer available, then the information in the cache may still be preserved. All you need for this method is to know some Google keywords. This technique is called Google Hacking.

    Information about Google Hacking first appeared on the Bugtruck mailing list 3 years ago. In 2001, this topic was raised by a French student. Here is a link to this letter http://www.cotse.com/mailing-lists/bugtraq/2001/Nov/0129.html. It provides the first examples of such queries:

    1) Index of /admin
    2) Index of /password
    3) Index of /mail
    4) Index of / +banques +filetype:xls (for france...)
    5) Index of / +passwd
    6) Index of / password.txt

    This topic made waves in the English-reading part of the Internet quite recently: after the article by Johnny Long, published on May 7, 2004. For a more complete study of Google Hacking, I advise you to go to this author’s website http://johnny.ihackstuff.com. In this article I just want to bring you up to date.

    Who can use this:
    - Journalists, spies and all those people who like to poke their nose into other people's business can use this to search for incriminating evidence.
    - Hackers looking for suitable targets for hacking.

    How Google works.

    To continue the conversation, let me remind you of some of the keywords used in Google queries.

    Search using the + sign

    Google excludes words it considers unimportant from searches. For example, question words, prepositions and articles in English: for example are, of, where. In Russian, Google seems to consider all words important. If a word is excluded from the search, Google writes about it. In order for Google to start searching for pages with these words, you need to add a + sign without a space before the word. For example:

    ace +of base

    Search using the sign –

    If Google finds a large number of pages from which it needs to exclude pages with a certain topic, then you can force Google to search only for pages that do not contain certain words. To do this, you need to indicate these words by placing a sign in front of each - without a space before the word. For example:

    fishing - vodka

    Search using ~

    You may want to search not only for the specified word, but also for its synonyms. To do this, precede the word with the ~ symbol.

    Search for an exact phrase using double quotes

    Google searches on each page for all occurrences of the words that you wrote in the query string, and it does not care about the relative position of the words, as long as all the specified words are on the page at the same time (this is the default action). To find the exact phrase, you need to put it in quotes. For example:

    "bookend"

    In order to have at least one of the specified words, you need to specify the logical operation explicitly: OR. For example:

    book safety OR protection

    In addition, you can use the * sign in the search bar to indicate any word and. to represent any character.

    Searching for words using additional operators

    There are search operators that are specified in the search string in the format:

    operator:search_term

    Spaces next to the colon are not needed. If you insert a space after the colon, you will see an error message, and before it, Google will use them as a normal search string.
    There are groups of additional search operators: languages ​​- indicate in which language you want to see the result, date - limit the results for the past three, six or 12 months, occurrences - indicate where in the document you need to search for the line: everywhere, in the title, in the URL, domains - search on the specified site or, conversely, exclude it from the search; safe search - blocks sites containing the specified type of information and removes them from the search results pages.
    However, some operators do not require an additional parameter, for example the request " cache:www.google.com" can be called as a full-fledged search string, and some keywords, on the contrary, require a search word, for example " site:www.google.com help". In light of our topic, let's look at the following operators:

    Operator

    Description

    Requires an additional parameter?

    search only on the site specified in search_term

    search only in documents with type search_term

    find pages containing search_term in the title

    find pages containing all search_term words in the title

    find pages containing the word search_term in their address

    find pages containing all search_term words in their address

    Operator site: limits the search only to the specified site, and you can specify not only the domain name, but also the IP address. For example, enter:

    Operator filetype: Limits the search to a specific file type. For example:

    As of the publication date of the article, Google can search within 13 different file formats:

    • Adobe Portable Document Format (pdf)
    • Adobe PostScript (ps)
    • Lotus 1-2-3 (wk1, wk2, wk3, wk4, wk5, wki, wks, wku)
    • Lotus WordPro (lwp)
    • MacWrite (mw)
    • Microsoft Excel (xls)
    • Microsoft PowerPoint (ppt)
    • Microsoft Word (doc)
    • Microsoft Works (wks, wps, wdb)
    • Microsoft Write (wri)
    • Rich Text Format (rtf)
    • Shockwave Flash (swf)
    • Text (ans, txt)

    Operator link: shows all pages that point to the specified page.
    It's probably always interesting to see how many places on the Internet know about you. Let's try:

    Operator cache: Shows the version of the site in Google's cache as it looked the last time Google visited that page. Let’s take any frequently changing site and look:

    Operator intitle: searches for the specified word in the page title. Operator allintitle: is an extension - it searches for all specified few words in the page title. Compare:

    intitle:flight to Mars
    intitle:flight intitle:on intitle:mars
    allintitle:flight to mars

    Operator inurl: forces Google to show all pages containing the specified string in the URL. allinurl operator: searches for all words in a URL. For example:

    allinurl:acid acid_stat_alerts.php

    This command is especially useful for those who don't have SNORT - at least they can see how it works on a real system.

    Hacking Methods Using Google

    So, we found out that using a combination of the above operators and keywords, anyone can collect the necessary information and search for vulnerabilities. These techniques are often called Google Hacking.

    Site Map

    You can use the site: operator to list all the links that Google has found on a site. Typically, pages that are dynamically created by scripts are not indexed using parameters, so some sites use ISAPI filters so that links are not in the form /article.asp?num=10&dst=5, and with slashes /article/abc/num/10/dst/5. This is done so that the site is generally indexed by search engines.

    Let's try:

    site:www.whitehouse.gov whitehouse

    Google thinks that every page on a website contains the word whitehouse. This is what we use to get all the pages.
    There is also a simplified version:

    site:whitehouse.gov

    And the best part is that the comrades from whitehouse.gov didn’t even know that we looked at the structure of their site and even looked at the cached pages that Google downloaded. This can be used to study the structure of sites and view content, remaining undetected for the time being.

    View a list of files in directories

    WEB servers can display lists of server directories instead of regular HTML pages. This is usually done to ensure that users select and download specific files. However, in many cases, administrators have no intention of showing the contents of a directory. This occurs due to incorrect server configuration or the absence of the main page in the directory. As a result, the hacker has a chance to find something interesting in the directory and use it for his own purposes. To find all such pages, it is enough to note that they all contain the words: index of. But since the words index of contain not only such pages, we need to refine the query and take into account the keywords on the page itself, so queries like:

    intitle:index.of parent directory
    intitle:index.of name size

    Since most directory listings are intentional, you may have a hard time finding misplaced listings the first time. But at least you can already use listings to determine the WEB server version, as described below.

    Obtaining the WEB server version.

    Knowing the WEB server version is always useful before launching any hacker attack. Again, thanks to Google, you can get this information without connecting to a server. If you look carefully at the directory listing, you can see that the name of the WEB server and its version are displayed there.

    Apache1.3.29 - ProXad Server at trf296.free.fr Port 80

    An experienced administrator can change this information, but, as a rule, it is true. Thus, to obtain this information it is enough to send a request:

    intitle:index.of server.at

    To get information for a specific server, we clarify the request:

    intitle:index.of server.at site:ibm.com

    Or vice versa, we are looking for servers running a specific version of the server:

    intitle:index.of Apache/2.0.40 Server at

    This technique can be used by a hacker to find a victim. If, for example, he has an exploit for a certain version of the WEB server, then he can find it and try the existing exploit.

    You can also get the server version by viewing the pages that are installed by default when installing the latest version of the WEB server. For example, to see the Apache 1.2.6 test page, just type

    intitle:Test.Page.for.Apache it.worked!

    Moreover, some operating systems immediately install and launch the WEB server during installation. However, some users are not even aware of this. Naturally, if you see that someone has not removed the default page, then it is logical to assume that the computer has not undergone any customization at all and is likely vulnerable to attack.

    Try searching for IIS 5.0 pages

    allintitle:Welcome to Windows 2000 Internet Services

    In the case of IIS, you can determine not only the server version, but also the Windows version and Service Pack.

    Another way to determine the WEB server version is to search for manuals (help pages) and examples that may be installed on the site by default. Hackers have found many ways to use these components to gain privileged access to a site. That is why you need to remove these components on the production site. Not to mention the fact that the presence of these components can be used to obtain information about the type of server and its version. For example, let's find the apache manual:

    inurl:manual apache directives modules

    Using Google as a CGI scanner.

    CGI scanner or WEB scanner is a utility for searching for vulnerable scripts and programs on the victim’s server. These utilities must know what to look for, for this they have a whole list of vulnerable files, for example:

    /cgi-bin/cgiemail/uargg.txt
    /random_banner/index.cgi
    /random_banner/index.cgi
    /cgi-bin/mailview.cgi
    /cgi-bin/maillist.cgi
    /cgi-bin/userreg.cgi

    /iissamples/ISSamples/SQLQHit.asp
    /SiteServer/admin/findvserver.asp
    /scripts/cphost.dll
    /cgi-bin/finger.cgi

    We can find each of these files using Google, additionally using the words index of or inurl with the file name in the search bar: we can find sites with vulnerable scripts, for example:

    allinurl:/random_banner/index.cgi

    Using additional knowledge, a hacker can exploit a script's vulnerability and use this vulnerability to force the script to emit any file stored on the server. For example, a password file.

    How to protect yourself from Google hacking.

    1. Do not post important data on the WEB server.

    Even if you posted the data temporarily, you may forget about it or someone will have time to find and take this data before you erase it. Don't do that. There are many other ways to transfer data that protect it from theft.

    2. Check your site.

    Use the methods described to research your site. Check your site periodically for new methods that appear on the site http://johnny.ihackstuff.com. Remember that if you want to automate your actions, you need to get special permission from Google. If you read carefully http://www.google.com/terms_of_service.html, then you will see the phrase: You may not send automated queries of any sort to Google's system without express permission in advance from Google.

    3. You may not need Google to index your site or any part of it.

    Google allows you to remove a link to your site or part of it from its database, as well as remove pages from the cache. In addition, you can prohibit the search for images on your site, prohibit short fragments of pages from being shown in search results. All possibilities for deleting a site are described on the page http://www.google.com/remove.html. To do this, you must confirm that you are really the owner of this site or insert tags into the page or

    4. Use robots.txt

    It is known that search engines look at the robots.txt file located at the root of the site and do not index those parts that are marked with the word Disallow. You can use this to prevent part of the site from being indexed. For example, to prevent the entire site from being indexed, create a robots.txt file containing two lines:

    User-agent: *
    Disallow: /

    What else happens

    So that life doesn’t seem like honey to you, I’ll say finally that there are sites that monitor those people who, using the methods outlined above, look for holes in scripts and WEB servers. An example of such a page is

    Application.

    A little sweet. Try some of the following for yourself:

    1. #mysql dump filetype:sql - search for mySQL database dumps
    2. Host Vulnerability Summary Report - will show you what vulnerabilities other people have found
    3. phpMyAdmin running on inurl:main.php - this will force control to be closed through the phpmyadmin panel
    4. not for distribution confidential
    5. Request Details Control Tree Server Variables
    6. Running in Child mode
    7. This report was generated by WebLog
    8. intitle:index.of cgiirc.config
    9. filetype:conf inurl:firewall -intitle:cvs – maybe someone needs firewall configuration files? :)
    10. intitle:index.of finances.xls – hmm....
    11. intitle:Index of dbconvert.exe chats – icq chat logs
    12.intext:Tobias Oetiker traffic analysis
    13. intitle:Usage Statistics for Generated by Webalizer
    14. intitle:statistics of advanced web statistics
    15. intitle:index.of ws_ftp.ini – ws ftp config
    16. inurl:ipsec.secrets holds shared secrets - secret key - good find
    17. inurl:main.php Welcome to phpMyAdmin
    18. inurl:server-info Apache Server Information
    19. site:edu admin grades
    20. ORA-00921: unexpected end of SQL command – getting paths
    21. intitle:index.of trillian.ini
    22. intitle:Index of pwd.db
    23.intitle:index.of people.lst
    24. intitle:index.of master.passwd
    25.inurl:passlist.txt
    26. intitle:Index of .mysql_history
    27. intitle:index of intext:globals.inc
    28. intitle:index.of administrators.pwd
    29. intitle:Index.of etc shadow
    30.intitle:index.ofsecring.pgp
    31. inurl:config.php dbuname dbpass
    32. inurl:perform filetype:ini

  • "Hacking mit Google"
  • Training center "Informzashita" http://www.itsecurity.ru - a leading specialized center in the field of information security training (License of the Moscow Committee of Education No. 015470, State accreditation No. 004251). The only authorized training center for Internet Security Systems and Clearswift in Russia and the CIS countries. Microsoft authorized training center (Security specialization). The training programs are coordinated with the State Technical Commission of Russia, the FSB (FAPSI). Certificates of training and state documents on advanced training.

    SoftKey is a unique service for buyers, developers, dealers and affiliate partners. In addition, this is one of the best online software stores in Russia, Ukraine, Kazakhstan, which offers customers a wide range of products, many payment methods, prompt (often instant) order processing, tracking the order process in the personal section, various discounts from the store and manufacturers BY.