Google Hacking

Share & Bookmark, Press Enter to show all options, press Tab go to next option
Print

This interactive lesson explains how insecure website configurations may expose personal, private and other sensitive information to indexing by Google and other search engines. Attackers may use Google hacking (also called "Google dorking") techniques to identify vulnerabilities to exploit. Penetration testers run Google hacking queries against organization websites to find exposed information that should be protected and hidden from search engines. A self-assessment is provided at the end of the lesson.


National Science Foundation LogoThis interactive lesson was made possible by funding from National Science Foundation Grant # DUE 1601612 at Brookdale Community College in Lincroft, New Jersey – PI Mike Qaissaunee, with contributions from Dr. John Sands & Susan Sands of Moraine Valley Community College and Jaime Mahoney of Bunker Hill Community College.

All Interactive Lessons