Question

Google dorking, or using advanced Google search techniques to find sensitive information, has been likened to...

Google dorking, or using advanced Google search techniques to find sensitive information, has been likened to “online dumpster diving.” Use the Internet to research Google dorking. First, use the Internet to determine how the following advanced Google search engine operators are used: allintext, allintitle, allinurl, cache, filetype, inanchor, intest, intitle, link, site, +, |, and *. Then, use at least five of the operators to create potential Google dorking searches. Finally, try out your searches to see if they are effective. How easy is it for a threat actor to use Google dorking? How can users and organizations combat this? List your Google dorking searches, the results, and the defenses that should be used against it. Write a one-page paper on your activity.

screenshot of type findings. show screenshot of the 5 operators for the Dorking search, is it effective? and answer the rest.

0 0
Add a comment Improve this question Transcribed image text
Answer #1
  • allintext: Only those results are shown that that contain all the terms specified in the query inside the text of the page. For example, allintext: Marilyn Monroe Affair will return only those pages in which all the words “Marilyn”, “Monroe”, and “Affair” appear in the text of the page. This gives more precise results.
  • allintitle: Only those results are shown that that contain all the terms specified in the query inside the title of the page. For example, allintitle: Marilyn Monroe Affair will return only those pages in which all the words “Marilyn”, “Monroe”, and “Affair” appear in the title of the page. This also gives precise results.
  • allinurl: Only those results are shown that that contain all the terms specified in the query inside the url of the page. For example, allinurl: Marilyn Monroe Affair will return only those pages in which all the words “Marilyn”, “Monroe”, and “Affair” appear in the url of the page. This also gives precise results.
  • cache: This will display Google’s cached version of a web page, and not its current version. For example, cache: https://www.womansday.com/relationships/a60346/true-story-marilyn-monroe-john-f-kennedy-affair/ will show the cached version first.
  • filetype: It will give results of pages whose names end in the specified filetype. For example, Marilyn Monroe Affair filetype:pdf will return only pdf files.
  • inanchor: It will give results containing the query terms in the anchor text (or links) to the page. For example, Marilyn Monroe inanchor:Affair  will return pages with "Affair" in the text on links to the pages that themselves itself contains Marilyn Monroe

  • intext: It returns pages containing the query terms in their text. For example, Marilyn Monroe intext:Affair  will return pages with "Affair" in the text. This applies only to single words while allintext can apply to more than one words. It is advisable to use allintext instead for a better search result using more terms.

  • intitle: It returns pages containing the query terms in their titles. For example, Marilyn Monroe intitle:Affair  will return pages with "Affair" in their title. This applies only to single words while allintitle can apply to more than one words. It is advisable to use allintitle instead for a better search result using more terms.

  • link: It shows pages that contain that URL. For example, link:www.marilynmonroeaffair.com will return pages containing this link.

  • site: This restricts the google search just to the specifies site or domain. For example, Date site:www.marilynmonroeaffair.com will show Date related information from www.marilynmonroeaffair.com. The screenshot below does not show any results since there is no website as www.marilynmonroeaffair.com.
  • + operator: It is used for exact match. It is similar to " " (double quotes). For example, Marilyn Monroe +Affair will give only those results that contain the word "Affair".

  • | operator: It is used as OR, i.e. it searched for any number of the specified terms. For example: Marilyn|Monroe|Affair will return pages containing information related to all of the three terms.

  • * operator: It is used as a blank or a proxy or a placeholder to represent one or more words. For example, “Marilyn * Affair“ will result in pages containing any phrase that starts with “Marilyn” followed by one or more words, and ends in “Affair.” The resulting phrase can be Marilyn Monroe Affair, Marilyn Monroe had an affair, Marilyn Monroe and Kennedy probably had an Affair, etc etc.

  • Harmful consequences of Google Dorking:

    • Hackers can get access to private data. For example, allintext:username filetype:log will result in usernames in all log files. Even cache command can divulge private information.

    • Commands like filetype:xls inurl:"email.xls" can give hackers sensitive information.

    • It can be used to get access to live cameras. An easy search such as intitle:"webcam" can give hackers access to video chats.

    • index of searches lets one peep into other's personal files.

  • Easy steps to avoid an attack from Google forking:

    • ​​​​​​​Captcha challenges can stop automated dorking.

    • Using IP-based protection can limit dorking to a certain extent.

    • Encrypting files will help to avoid misuse of information

    • Regularly run efficient vulnerability tests
Add a comment
Know the answer?
Add Answer to:
Google dorking, or using advanced Google search techniques to find sensitive information, has been likened to...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Please read the following article: Your Google Searches Could Help the FDA Find Drug Side Effects...

    Please read the following article: Your Google Searches Could Help the FDA Find Drug Side Effects The Food and Drug Administration is talking to Google about how the search engine could help the agency identify previously unknown side effects of medications. Agency officials held a conference call on June 9 with a senior Google researcher who co-wrote a 2013 paper about using search query data to identify adverse drug reactions, according to a record of the meeting posted to the...

  • Read the case study "Google, Apple, and Facebook Struggle for Your Internet Experience" on page 255....

    Read the case study "Google, Apple, and Facebook Struggle for Your Internet Experience" on page 255. Then discuss the advantages and disadvantages for each company. BUSINESS PROBLEM-SOLVING CASE Google, Apple, and Facebook Battle for Your Internet Experience Apple has a legacy of innovation on its side. In Three Internet titans Google, Apple, and 2011, it unveiled the potentially market disrupting Facebook are in an epic struggle to dominate your Siri (Speech Interpretation and Recognition Internet experience, and caught in the...

  • We conducted a comprehensive literature search on drones in conservation up to October 2nd 2018, in...

    We conducted a comprehensive literature search on drones in conservation up to October 2nd 2018, in line with related studies [10,11,35]. All searches were done by the same person in English, mainly using Google Scholar. This was further complemented through reference harvesting, citation tracking, abstracts in conference programs, and author search, using Research Gate and Mendeley (see PRISMA Flowchart in Supplementary Figure S1 Checklist and list of studies reviewed in Table S1). We then removed duplicate and unrelated results. Finally,...

  • The world’s 3 billion-plus smartphones emit the kind of data that health authorities covet during outbreaks....

    The world’s 3 billion-plus smartphones emit the kind of data that health authorities covet during outbreaks. They show where individuals are, where they’ve been and who they might have talked to or even touched — potentially offering maps to find infected people and clues to stopping new ones. But gaining access to this data, even amid a global pandemic, is made complex by the legal and ethical issues surrounding government access to information that can reveal intimate details about citizens’...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • Read this article. Then write a 250 word response on two of the programs you like...

    Read this article. Then write a 250 word response on two of the programs you like the most. Open source business intelligence software 1. BIRT BIRT is an open source BI program that CloudTweaks says is often viewed as the industry standard. BIRT boasts “over 12 million downloads and over 2.5 million developers across 157 countries.” Its users include heavyweights such as Cisco, S1, and IBM (which is also a BIRT sponsor). They also have maturity going for them, as...

  • Please use own words. Thank you. CASE QUESTIONS AND DISCUSSION > Analyze and discuss the questions...

    Please use own words. Thank you. CASE QUESTIONS AND DISCUSSION > Analyze and discuss the questions listed below in specific detail. A minimum of 4 pages is required; ensure that you answer all questions completely Case Questions Who are the main players (name and position)? What business (es) and industry or industries is the company in? What are the issues and problems facing the company? (Sort them by importance and urgency.) What are the characteristics of the environment in which...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT