Google dorks: Use cases and adoption study (2024)

Related Papers

Mider, D., Garlicki, J., & Mincewicz, W. (2019). The Internet Data Collection with the Google Hacking Tool–White, Grey or Black Open-Source Intelligence?. Przegląd Bezpieczeństwa Wewnętrznego, 11(20)

The Internet Data Collection with the Google Hacking Tool - White, Grey or Black Open-Source Intelligence

2019 •

Elwira Pluszcz, Wojciech Mincewicz

Google search engine is as much common (and having almost no alternative), as it is unknown at the same time. Its potentials in the so-called sensitive data collection regarding individuals and institutions are underestimated. the well-constructed query, submitted to the Google, makes it possible to find deleted and archival sites, restore the structure of a webpage or the structure of an intranet, access server configuration parameters, obtain information secured intentionally from unauthorized access (paywall, passwords), obtain user names and passwords, their identification numbers (for example the numbers of payment cards, IDs, etc.) and access device configuration parameters (servers, web cameras, routers and others), to take control of them. such

View PDF

IEEE Computer

Search engines as a security threat

2001 •

Benjamín Ramos

View PDF

THE PANOPTIC GAZE OF WEB SEARCH ENGINES: GOOGLE AS AN INFRASTRUCTURE OF DATAVEILLANCE

2006 •

Michael Zimmer

Introduction In January 2006 it was revealed that the US Justice Department asked a federal judge to compel the web search engine Google to turn over records on millions of its users' search queries as part of the government's effort to uphold an online p*rnography law {Mintz, 2006,# 39586; Hafner and Richtel, 2006,# 35058}. Google resisted, but Amierca Online, Microsoft and Yahoo! complied with similar government subpoenas of their search records {Hafner and Richtel, 2006,# 35058}.

View PDF

Who Needs a Botnet if you Have Google?

Renier van Heerden, Ivan Burke

View PDF

Google Hacking As A General Education Tool

James McGuffee

In order to give students hand-on experiences with Internet and World Wide Web security issues, this paper advocates using Google hacking search exercises in a non-majors computer science general education course.

View PDF

Google: An emerging global actor in the Internet world

Harun Yahya Articles

The diversity of information that Google provides is also a subject of criticism. The Internet is an environment with no quality control; anyone can gather whatever batch of information they wish and present it to the whole world It employs over 70,000 people around the world. It owns five of the top 10 most downloaded mobile applications in the United States. Having being traded at $85 in its initial public offering, the company’s shares rose up to $600. The company with the highest mobile and digital ad revenue. In 2017, its revenue in the mobile market is expected to reach some $50 billion.

View PDF

An effective attack method based on information exposed by search engines

Antonios Gouglidis

Web 2.0 consists one of the most emergent technologies of the World Wide Web. This type of technologies can be made available to consumers through a series of web services. Nevertheless, as a relative new approach, it is prone to various security issues. One of these is the potential to use web services provided by search engines such as Google’s and Microsoft’s Bing, in order to identify and attack vulnerable systems. In this paper, we describe a 3-step methodology that can be fully automated in order to deploy massive attacks against vulnerable systems. The methodology described takes advantage of the Google Hacking technique and extends it with two more steps that of information manipulation and the deployment of an exploit. An implementation of a python script demonstrates the applicability and the efficiency of the proposed attack. A real-world example, taking advantage of the JBoss JMX Management Console faulty configuration, indicates the extension of the problem. We anticipate this initiative to help in the identification of similar attack methods and the development of newly and more effective countermeasures against this type of attack methods.

View PDF

Google Bombs, Warblogs, and Hacktivism

Barney Warf

Used by roughly one-quarter of the planet's population, the internet has become an increasingly important arena of social and political debate worldwide. In addition to its innumerable commercial and personal applications, cyberspace is also a contested arena in which political discourses ranging from extremely reactionary to the emancipatory jockey with one another for audiences and attention.

View PDF

The measurement of user behaviour using free non- Google tools. [0078]

Melius Weideman, Alexander Schnelle

The research as described in this document was done by the first author as noted below. He was a student at the Munich University of Applied Sciences (MUAS) in 2014-the topic was given as a student project. It has not been peer reviewed, but has been edited for basic grammar and accuracy. References have been standardized as far as possible according to the Harvard system. Consider this document as a working paper, to be used for basic referencing but not as seminal source for research work. It could be useful for research in the fields of Website Visibility, Information Retrieval

View PDF

The Internet and the Google Age: Introduction

Jonathan D James

A look at the Internet from an historical and communication perspective-- its significance, and an overview of the most searched topics indicating both prospects and perils of the Internet.

View PDF
Google dorks: Use cases and adoption study (2024)
Top Articles
Latest Posts
Article information

Author: Amb. Frankie Simonis

Last Updated:

Views: 6177

Rating: 4.6 / 5 (76 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Amb. Frankie Simonis

Birthday: 1998-02-19

Address: 64841 Delmar Isle, North Wiley, OR 74073

Phone: +17844167847676

Job: Forward IT Agent

Hobby: LARPing, Kitesurfing, Sewing, Digital arts, Sand art, Gardening, Dance

Introduction: My name is Amb. Frankie Simonis, I am a hilarious, enchanting, energetic, cooperative, innocent, cute, joyous person who loves writing and wants to share my knowledge and understanding with you.