Dangerous_Google_-_Searching_For_Secrets

Dangerous_Google_-_Searching_For_Secrets - Dangerous Google...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Dangerous Google – Searching for Secrets Michał Piotrowski This article has been published in issue 4/2005 of the hakin9 magazine. All rights reserved. This file may be distributed for free pending no changes are made to its contents or form. hakin9 magazine, Wydawnictwo Software, ul. Lewartowskiego 6, 00-190 Warszawa, e n@hakin9.org
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
www.hakin9.org 2 hakin9 4/2005 Basics G oogle serves some 80 percent of all search queries on the Internet, mak- ing it by far the most popular search engine. Its popularity is due not only to excel- lent search effectiveness, but also extensive querying capabilities. However, we should also remember that the Internet is a highly dynamic medium, so the results presented by Google are not always up-to-date – some search results might be stale, while other relevant resources might not yet have been visited by Googlebot (the automatic script that browses and indexes Web resources for Google). Table 1 presents a summary of the most important and most useful query operators along with their descriptions, while Figure 1 shows document locations referred to by the operators when applied to Web searches. Of course, this is just a handful of examples – skil- ful Google querying can lead to much more interesting results. Hunting for Prey Google makes it possible to reach not just publicly available Internet resources, but also some that should never have been revealed. Dangerous Google – Searching for Secrets Michał Piotrowski Information which should be protected is very often publicly available, revealed by careless or ignorant users. The result is that lots of conFdential data is freely available on the Internet – just Google for it. About the Author Michał Piotrowski holds an MA in IT and has many years' experience in network and system administration. For over three years he has been a security inspector and is currently work- ing as computer network security expert at one of the largest Polish financial institutions. His free time is occupied by programming, cryp- tography and contributing to the open source community. What You Will Learn. .. how to use Google to ±nd sources of personal information and other con±dential data, how to ±nd information about vulnerable sys- tems and Web services, how to locate publicly available network de- vices using Google. What You Should Know. .. how to use a Web browser, basic rules of operation of the HTTP protocol.
Background image of page 2
www.hakin9.org 3 hakin9 4/2005 Google hacking Table 1. Google query operators Operator Description Sample query site restricts results to sites within the specifed domain site:google.com fox will fnd all sites containing the word fox , located within the *.google.com domain intitle restricts results to documents whose title contains the specifed phrase intitle:fox Fre will fnd all sites with the word fox in the title and Fre in the text allintitle restricts results to documents whose title contains all the specifed phrases allintitle:fox Fre
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 12

Dangerous_Google_-_Searching_For_Secrets - Dangerous Google...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online