From the course: Complete Guide to Cybersecurity: A Practical Approach

Unlock this course with a free trial

Join today to access over 24,400 courses taught by industry experts.

Introduction to Google hacking and search engine reconnaissance

Introduction to Google hacking and search engine reconnaissance

From the course: Complete Guide to Cybersecurity: A Practical Approach

Introduction to Google hacking and search engine reconnaissance

- I previously mentioned this concept of Google Hacking or the Google Hacking Database. And I want to take a moment and explain what I meant and how you can use search engines, and we're talking about Google in here, but it can be pretty much any search engine to find public information that can definitely help you then perform a specific attack or go into the Active Reconnaissance and know what targets to potentially do scanning and fuzzing and other reconnaissance, Active Reconnaissance tasks. So what you're seeing in front of your screen is this thing called the Exploit Database. And the main purpose or the original purpose of it is of course that for many people in the industry they contribute sample proof of concept code for exploiting vulnerabilities. However, if you navigate to the second section here in the navigation panel, you enter to a section called the Google Hacking Database. This is not hacking Google. These are not vulnerabilities in Google. Basically, is using…

Contents