Dangerous_Google_-_Searching_For_Secrets

Dangerous_Google_-_Searching_For_Secrets - Dangerous Google...

Info icon This preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Dangerous Google – Searching for Secrets Michał Piotrowski This article has been published in issue 4/2005 of the hakin9 magazine. All rights reserved. This file may be distributed for free pending no changes are made to its contents or form. hakin9 magazine, Wydawnictwo Software, ul. Lewartowskiego 6, 00-190 Warszawa, e [email protected]
Image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
www.hakin9.org 2 hakin9 4/2005 Basics G oogle serves some 80 percent of all search queries on the Internet, mak- ing it by far the most popular search engine. Its popularity is due not only to excel- lent search effectiveness, but also extensive querying capabilities. However, we should also remember that the Internet is a highly dynamic medium, so the results presented by Google are not always up-to-date – some search results might be stale, while other relevant resources might not yet have been visited by Googlebot (the automatic script that browses and indexes Web resources for Google). Table 1 presents a summary of the most important and most useful query operators along with their descriptions, while Figure 1 shows document locations referred to by the operators when applied to Web searches. Of course, this is just a handful of examples – skil- ful Google querying can lead to much more interesting results. Hunting for Prey Google makes it possible to reach not just publicly available Internet resources, but also some that should never have been revealed. Dangerous Google – Searching for Secrets Michał Piotrowski Information which should be protected is very often publicly available, revealed by careless or ignorant users. The result is that lots of confidential data is freely available on the Internet – just Google for it. About the Author Michał Piotrowski holds an MA in IT and has many years' experience in network and system administration. For over three years he has been a security inspector and is currently work- ing as computer network security expert at one of the largest Polish financial institutions. His free time is occupied by programming, cryp- tography and contributing to the open source community. What You Will Learn... how to use Google to find sources of personal information and other confidential data, how to find information about vulnerable sys- tems and Web services, how to locate publicly available network de- vices using Google. What You Should Know... how to use a Web browser, basic rules of operation of the HTTP protocol.
Image of page 2
www.hakin9.org 3 hakin9 4/2005 Google hacking Table 1. Google query operators Operator Description Sample query site restricts results to sites within the specified domain site:google.com fox will find all sites containing the word fox , located within the *.google.com domain intitle restricts results to documents whose title contains the specified phrase intitle:fox fire will find all sites with the word fox in the title and fire in the text allintitle restricts results to documents whose title contains all the specified phrases allintitle:fox fire will find all sites with the words fox and fire
Image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern