How do attackers use Google to hack?

Ask the Expert

How do attackers use Google to hack?

How do attackers currently use Google to hack and what are the best ways to stay off Google hackers' radar?

Continue Reading This Article

Enjoy this article as well as all of our content, including E-Guides, news, tips and more.
  • By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

  • Safe Harbor

Google hacking is a term used to describe detecting vulnerabilities in websites by entering search strings using Internet search engines.

You can stay off Google's radar by not linking to your secure website, and running the website over non-standard port numbers. If it is important to be indexed by Google, restrict the Google search to public areas by using robots.txt, a text file that tells search engine crawlers which pages you would like them to not visit, and ensure the Web server is fully patched and pen tested to ensure no vulnerabilities exist even if indexed by Google.

This was first published in May 2009

 

COMMENTS powered by Disqus  //  Commenting policy