Send Exploit Links Using Google’s URL

Now redirecting any website using Google’s URL become easy, new exploit of Google let you redirect to your desired web address.

Google’s redirect exploit is very popular in the world of hacking. We can generate link that seems like simple Google link but when user click on it, he will be redirected to our desired web page which may contain spam and other exploits.

You can simply create your own redirect exploit without using any tool or any programming language.

Today we are going to learn how we can create this exploit using a simple method,

Step 1: Go to Google.com

Step 2: Now in Search box, type: sitein:your website link
        Example: sitein:ehacking.net

Step 3:        You will get search results; right click on search result topic with your website link.

Step 4:         Now, Copy Link Location.

Step 5:         Now paste that link, that link will work to redirect anyone to your website.

That link will redirect you to your webpage. You can use this trick to redirect someone to your created spam or exploit or malicious webpage.

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...