Related Papers
Mider, D., Garlicki, J., & Mincewicz, W. (2019). The Internet Data Collection with the Google Hacking Tool–White, Grey or Black Open-Source Intelligence?. Przegląd Bezpieczeństwa Wewnętrznego, 11(20)
The Internet Data Collection with the Google Hacking Tool - White, Grey or Black Open-Source Intelligence
2019 •
Elwira Pluszcz, Wojciech Mincewicz
Google search engine is as much common (and having almost no alternative), as it is unknown at the same time. Its potentials in the so-called sensitive data collection regarding individuals and institutions are underestimated. the well-constructed query, submitted to the Google, makes it possible to find deleted and archival sites, restore the structure of a webpage or the structure of an intranet, access server configuration parameters, obtain information secured intentionally from unauthorized access (paywall, passwords), obtain user names and passwords, their identification numbers (for example the numbers of payment cards, IDs, etc.) and access device configuration parameters (servers, web cameras, routers and others), to take control of them. such
IEEE Computer
Search engines as a security threat
2001 •
Benjamín Ramos
THE PANOPTIC GAZE OF WEB SEARCH ENGINES: GOOGLE AS AN INFRASTRUCTURE OF DATAVEILLANCE
2006 •
Michael Zimmer
Introduction In January 2006 it was revealed that the US Justice Department asked a federal judge to compel the web search engine Google to turn over records on millions of its users' search queries as part of the government's effort to uphold an online p*rnography law {Mintz, 2006,# 39586; Hafner and Richtel, 2006,# 35058}. Google resisted, but Amierca Online, Microsoft and Yahoo! complied with similar government subpoenas of their search records {Hafner and Richtel, 2006,# 35058}.
Who Needs a Botnet if you Have Google?
Renier van Heerden, Ivan Burke
Google Hacking As A General Education Tool
James McGuffee
In order to give students hand-on experiences with Internet and World Wide Web security issues, this paper advocates using Google hacking search exercises in a non-majors computer science general education course.
Google: An emerging global actor in the Internet world
Harun Yahya Articles
The diversity of information that Google provides is also a subject of criticism. The Internet is an environment with no quality control; anyone can gather whatever batch of information they wish and present it to the whole world It employs over 70,000 people around the world. It owns five of the top 10 most downloaded mobile applications in the United States. Having being traded at $85 in its initial public offering, the company’s shares rose up to $600. The company with the highest mobile and digital ad revenue. In 2017, its revenue in the mobile market is expected to reach some $50 billion.
An effective attack method based on information exposed by search engines
Antonios Gouglidis
Web 2.0 consists one of the most emergent technologies of the World Wide Web. This type of technologies can be made available to consumers through a series of web services. Nevertheless, as a relative new approach, it is prone to various security issues. One of these is the potential to use web services provided by search engines such as Google’s and Microsoft’s Bing, in order to identify and attack vulnerable systems. In this paper, we describe a 3-step methodology that can be fully automated in order to deploy massive attacks against vulnerable systems. The methodology described takes advantage of the Google Hacking technique and extends it with two more steps that of information manipulation and the deployment of an exploit. An implementation of a python script demonstrates the applicability and the efficiency of the proposed attack. A real-world example, taking advantage of the JBoss JMX Management Console faulty configuration, indicates the extension of the problem. We anticipate this initiative to help in the identification of similar attack methods and the development of newly and more effective countermeasures against this type of attack methods.
Google Bombs, Warblogs, and Hacktivism
Barney Warf
Used by roughly one-quarter of the planet's population, the internet has become an increasingly important arena of social and political debate worldwide. In addition to its innumerable commercial and personal applications, cyberspace is also a contested arena in which political discourses ranging from extremely reactionary to the emancipatory jockey with one another for audiences and attention.
The measurement of user behaviour using free non- Google tools. [0078]
Melius Weideman, Alexander Schnelle
The research as described in this document was done by the first author as noted below. He was a student at the Munich University of Applied Sciences (MUAS) in 2014-the topic was given as a student project. It has not been peer reviewed, but has been edited for basic grammar and accuracy. References have been standardized as far as possible according to the Harvard system. Consider this document as a working paper, to be used for basic referencing but not as seminal source for research work. It could be useful for research in the fields of Website Visibility, Information Retrieval
The Internet and the Google Age: Introduction
Jonathan D James
A look at the Internet from an historical and communication perspective-- its significance, and an overview of the most searched topics indicating both prospects and perils of the Internet.