{"guid":"import-c767cd58e7116fb747","title":"Automated Hacking via Google","subtitle":null,"slug":"113_Automated_Hacking_via_Google","link":"http://www.ccc.de/congress/2004/fahrplan/event/113.en.html","description":"A look at methods of locating vulnerable sites via google and exploiting them with no user interaction and how to prevent your code being vulnerable.\n","original_language":"eng","persons":["Daniel Bartlett"],"view_count":136,"promoted":false,"date":"2004-12-27T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:16:14.458+02:00","tags":["21c3"," Hacking"],"length":1049,"duration":1049,"thumb_url":"https://static.media.ccc.de/media/congress/2004/113 Automated Hacking via Google.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/113 Automated Hacking via Google_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-c767cd58e7116fb747-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-c767cd58e7116fb747-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/113_Automated_Hacking_via_Google","url":"https://api.media.ccc.de/public/events/import-c767cd58e7116fb747","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":3},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":4},{"event_id":815,"event_guid":"import-e3bf427a6d2ffaa0a2","weight":2},{"event_id":854,"event_guid":"import-61f9360e56315a6d0d","weight":8},{"event_id":859,"event_guid":"import-75dd511530fcb882b6","weight":4},{"event_id":863,"event_guid":"import-5a4a8c1099b9cb88ee","weight":5},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":5},{"event_id":2959,"event_guid":"83ab70a1-de38-42d3-993e-08024cac1ddg","weight":2}],"recordings":[{"size":14,"length":1049,"mime_type":"audio/mpeg","language":"eng","filename":"113 Automated Hacking via Google.mp3","state":"downloaded","folder":"audio","high_quality":true,"width":496,"height":368,"updated_at":"2014-05-10T15:26:32.922+02:00","recording_url":"https://cdn.media.ccc.de/congress/2004/audio/113 Automated Hacking via Google.mp3","url":"https://api.media.ccc.de/public/recordings/1434","event_url":"https://api.media.ccc.de/public/events/import-c767cd58e7116fb747","conference_url":"https://api.media.ccc.de/public/conferences/21c3"},{"size":14,"length":1049,"mime_type":"video/mp4","language":"eng","filename":"113 Automated Hacking via Google.mp4","state":"downloaded","folder":"video","high_quality":true,"width":496,"height":368,"updated_at":"2016-01-27T11:03:13.533+01:00","recording_url":"https://cdn.media.ccc.de/congress/2004/video/113 Automated Hacking via Google.mp4","url":"https://api.media.ccc.de/public/recordings/1433","event_url":"https://api.media.ccc.de/public/events/import-c767cd58e7116fb747","conference_url":"https://api.media.ccc.de/public/conferences/21c3"}]}