Google Dorking: A Deep Dive into Data Security and Exploitation

Verified

Added on  2022/11/15

|5
|311
|52
Homework Assignment
AI Summary
This assignment provides an overview of Google Dorking, a technique used to retrieve information from the internet using specific search operators. It discusses the basic concepts, including how Google Dorking works and its potential for both ethical and malicious purposes. The assignment highlights the use of various operators like allintext, allinurl, and allintitle, and their functions. It also mentions the use of tools like SQL injection and the impact of Google Dorking on data security, referencing a significant number of companies affected. The assignment concludes with a list of references used. Desklib provides this and other solved assignments for students.
Document Page
GOOGLE
DORKING
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
What is Google dorking?
Google dorking or hacking is a type of
technique where information regarding a
particular subject or company can be
retrieved from the internet with the help
of a set of advanced operators that can
search over the entire world wide web to
retrieve specific parts of information [1].
Google dorking is very easy to use and
can be used as a potential hacking tool by
anyone. Some SQL injection hacking tool
like “Havji” can be used by anyone to
easily retrieve data from websites about
other companies.
More than 35000 companies were
affected by google dorking in 2013 in the
United States of America.
Document Page
Operators in Google dorking
Examples of operators used in google dorking
[2]:
Allintext: searches for a specific text on web
pages
Allinurl: fetches exact matching URL as the
searched text
Allintitle: same as allintext but returns the title
of the web pages
+: used to concatenate or join many specific
keys to detect web pages
|: acts as a logical operator while searching
*: used to search words with anything before the
given word
Cache: used to show cached version of the
websites
Document Page
References
[1] F Toffalini, M Abbà, D Carra, and D
Balzarotti, Google dorks: Analysis,
creation, and new defenses.
In International Conference on Detection
of Intrusions and Malware, and
Vulnerability Assessment (pp. 255-275).
Springer, Cham. July 2016.
[2] M.Y Bae, H.K Lim, and D.J Cho, A
study on security diagnosis using
automated Google hacking tools-focusing
on the US government website. Journal of
Advances in Information
Technology, 7(2), pp.93-97. 2016.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]