NCyTE Center
Home MenuGoogle Hacking
This interactive lesson explains how insecure website configurations may expose personal, private and other sensitive information to indexing by Google and other search engines. Attackers may use Google hacking (also called "Google dorking") techniques to identify vulnerabilities to exploit. Penetration testers run Google hacking queries against organization websites to find exposed information that should be protected and hidden from search engines. A self-assessment is provided at the end of the lesson.
This interactive lesson was made possible by funding from National Science Foundation Grant # DUE 1601612 at Brookdale Community College in Lincroft, New Jersey – PI Mike Qaissaunee, with contributions from Dr. John Sands & Susan Sands of Moraine Valley Community College and Jaime Mahoney of Bunker Hill Community College.