Skip to content
Home » Searching » Page 2

Searching

Web Search Related Information, How-To’s, Tips, Tools, and Guides

REPLACE SAFARI / CHROME BROWSERS ON IPAD / IPHONE

This is the continuation of a series of articles, that help you divorce your life from BIG TECH. With the recent events in American Politics, the need for these guides has become apparent. I hope this guide assists in your journey to protect yourself.

If you are an iPhone / iPad user, you rely heavily on either Safari, or Chrome for your daily browsing. This guide will show you how to replace it with DuckDuckGo, and below the reasons will become apparent as to why.

On your iPad
Open the App Store
Click Search
Type in DuckDuckGo Privacy Browser
Click GET
Enter your Apple Password
The Application will now install

Once it has installed
Open the DuckDuckGo Privacy Browser
The welcome screen will appear, and it will explain the application to you.
Make sure you select Set as Default Browser
When selecting that, your Settings will open up
You will need to scroll down to DuckDuckGo and open the settings
Change Default Browser App from Safari, to DuckDuckGo
Once Done, you can Click DuckDuckGo at the top left corner of the screen to return to the app setup
Here you can now continue following the guide, which walks you through the user experience features
Key features to note are:
Your Searches ARE Anonymous
Your History is not stored after you close the app
The Fire Symbol will let you burn your browser data immediately
If Tracking cookies try to follow you, you will see the notification
Do not use google.com, as DuckDuckGo cannot stop it from tracking you, if you search from that site
You can search using the address bar instead

Enjoy safe browsing!

Google Dorks

Search Handlers for Precise Results

Use one or a combination of these dorks when searching google, to narrow your results, and find precise information

cache: Search the cached version of any website (ex cache:tacticalware.com)

allintext: Search text across all web pages (ex. allintext:google dorks)

intitle: Search for words in a page title (intitle:google dorks) Google will be searched as part of the title, and dorks has to be in the page somewhere

allintitle: Search page titles across all web pages (ex. allintitle:”Google Dorks”

inurl: Search for a single word in a URL (ex. inurl:dork)

allinurl: Search for a specific string contained in a URL (ex. allinurl:wp-admin)

filetype: Search for a specific file extension (ex. filetype:bak)

inanchor: Search text contained in a link (ex inanchor:”shodan dorks”)

intext: Search the text contained in a web page, across the internet (ex

intext:“how-to dork”)

link: List all pages with a certain link contained within (ex. link:tacticalware.com)

site: Shows a list of all indexed pages for a certain domain (ex. site:tacticalware.com)

Asterisk Wildcard – This will show you everything that could be, in the search results. Comes before, during, or after the search phrase (ex. intext:tactical*)

| – This will show all sites that contain a single word contained within a search, or a combination of words in the string (ex. google | dorks) will have results for google, for dorks, and for google dorks

link: List all pages with a certain link contained within (ex. link:tacticalware.com)
site: Shows a list of all indexed pages for a certain domain (ex. site:tacticalware.com)

“” – Insert a value between the quotes and this will show exact string results (ex. “Google Dorking”) will show all results with that exact text in that exact order


“+” – Used to find pages that use the the following words in the pages, in any order (ex. tacticalware + mining)


“–” – The minus sign will exclude results (ex. tacticalware – mining) will show results without information about mining


Data Leakage From Your Home/Mining Network

How to Scan and Identify Issues at the Perimeter of your Network

A question that has been asked multiple times is how do I know what my risk is at the border of my network….Miners and Wallet holders are concerned due to the increased risk of compromised wallets, and compromised mining rigs. So to answer this I will send you to a few quick places to do a spot check on your exposure.

  1. Find out your external IP by visiting
  2. Sign up for an account at Shodan.io
  3. Place your External IP in the search box on Shodan.io and see the results of your network. If there are known CVEs (vulnerabilities) on the open ports of your network, it will be displayed here. You MUST fix the issues identified by the CVEs
  4. Run a scan from outside of your network. Meaning, go visit your cousin, or some family member. Hop onto their network, and run the following nmap scan against your network. This scan is a lot more detailed, and will be a longer, slower process. But the resulting open ports and banners will give you more places to look in your quest to secure your network. Replace the xxx.xxx.xxx.xxx with your External IP. nmap -sV –script=banner xxx.xxx.xxx.xxx

There you have it. Some quick tools to see what the perimeter of your network looks like. Remember to follow up on every open port, banner, and CVE…lock your system down now before it is compromised.

ZMap and ZGrab Installation

Installing the packages on a Ubuntu 18.04 system

In the coming weeks I will be writing more about how to check the perimeter of your network, understand what data is leaking out from it, and how to safeguard your network, and especially your wallet from bad actors. These tools are the beginning, I will wrap it altogether piece by piece.

Log into your Ubuntu rig

Install zmap and zgrab

sudo bash

apt install zmap

apt install golang-go

go get github.com/zmap/zgrab

cd /home/USERNAME/go/src/github.com/zmap/zgrab

go build

Test it by running the following from a remote system, against your network

zmap -p 30303 (Your Public IP Here) –output-fields=* –output-file=results.csv | zgrab –port 30303 -banners –output-file=banners.json

Shodan.IO At A Glance

Some Helpful Search Handlers Listed Below

Within the search box on shodan.io, you can mix and match combinations of each of the following below to gather together results:

To Search by Country
country:US

To Search by Vulnerability using the CVE from HERE
vuln:CVE-2018-5281

These are self explainatory
city:”New York”
port:21,1098,389
category:malware
net:190.30.40.0/24 – ip address or range
org:”Verizon Wireless” – organization
after:”25/12/2018″ – results after a certain date
before:”25/12/2010 “– results before a certain date
os: – operating system
isp: – ISP managing their Net Block
postal: – postal code
product: – name of software or product
version: – version of software
uptime: – how long a host has been up

To Exclude Certain Results add a “-” sign
-city:”New York”



Google Search Operators

Quick Reference

cache:site.com
allintext:
intext:
inposttitle:
allintitle:
intitle:
allinurl:
inurl:
allinanchor:
inanchor:
filetype:
related:
info:
daterange:
link:
around()
“search exact string”
-word
+word
word or word
word | word
“word * word” – acts as a wildcard rock * roll
word #..# – to display number ranges
word $ – searches prices
word in word – converts (10ft in cm)