Google Hacking
HACKING WITH GOOGLEGoogle hacking, also known as google dorking, is an information gathering technique used byleveraging the advanced Google search techniques. If used efficiently, it can be used to identifysecurity vulnerabilities in web applications, gather information for arbitrary or individual targets,discover error messages disclosing sensitive information, discover files containing credentials andother sensitive data.This can be achieved by using advanced search operators as a part of the search query and hence,refining the query to get the desired results. For example:syntax → operator:search-termsite:Wikipedia.com intitle:”learning”The above query will search for site i.e., domain name, to be wikipedia.com and “learning” as apart of its title. The result will look something like this:Why should we know about Google Hacking?When an attacker knows the sort of vulnerability, he wants to exploit but has no specific target, heemploys a scanner. A scanner is a program that automates the process of examining a massivequantity of systems for a security flaw. Some of the most popular scanners are NMAP anNESSUS.Today there are scanners that automatically query IP addresses to see what proxy for exploits. Aproxy is an intermediary system that an attacker can use to disguise his or her identity. Forexample, if you were to gain remote access to Bill Gates’ computer and cause it to run attacks ontreasury.gov, it would appear to the Feds that Bill Gates was hacking them. His computer wouldbe acting as a proxy. Google can be used in a similar way.The search engine has already gathered this information and will give it freely without alerting thevulnerable site.As part of this assessment, you are required to explore how can we use advanced google searchingtechniques to identify the vulnerabilities in web applications, gather information for individualtarget, discover error messages using sensitive information, discover files containing sensitiveinformation and other sensitive data. Also, do some research on how as an organization, we canprotect ourselves against google hacking.Some of the links which can be useful to complete this assessment are given below:1. Google Search Help2. Google Hacking for penetration testing3. Google Hacking DatabaseWrite a report 12-15 pages (excluding title page and references) on google hacking. How hackerscan use google to gather the information and find out the vulnerabilities which they can exploit tocompromise the servers. Also, discuss the countermeasures which can be used to minimize googlehacking. The report should address range of topics relevant to google hacking with workingexamples. Support each working example with a screenshot. Topicscan be:• Advance Search Operators• Searching for email addresses• Network Mapping and Port Scanning• Site Crawling• Database Digging (SQL Passwords, SQL Dumps and SQL Injection Hints)• Webserver Login Portals• Security Cameras, Active Webcams and Routers with default passwords• Usernames, passwords and other secret dataThe report should contain the following sections:1. Title Page2. Table of contents3. Introduction: Briefly highlighting the purpose, scope, and content of the report.4. Main Body of the report: introduce several Google hacking topics with examples andscreenshots.5. Conclusion: covering lessons learned.6. ReferencesSubmission Guidelines• Please note the assignment will be checked for plagiarism, therefore please useappropriate referencingand rephrasing.• This is an individual Assessment.• The suggested size for the font is 12 for the text and 14 for the headings. Use line spacingof 1.5.• Submit the Assignment on blackboard in word/pdf format. Please Include the title page