The Google search engine found at www.google.com offers many different features including language and document translation, web, image, newsgroups, catalog and news searches and more. These features offer obvious benefits to even the most uninitiated web surfer, but these same features allow for far more nefarious possibilities to the most malicious Internet users including hackers, computer criminals, identity
thieves and even terrorists.
This paper outlines the more nefarious applications of the Google search engine, techniques that have collectively been termed “Google hacking.” The intent of this paper is to educate web administrators and the security community in the hopes of eventually securing this form of information leakage.
Attached Files for Direct Download
* Click on the 'file icon' or 'file name' to start downloading