Characterizing Google Hacking: A First Large-Scale Quantitative Study

@inproceedings{Zhang2014CharacterizingGH,
  title={Characterizing Google Hacking: A First Large-Scale Quantitative Study},
  author={J. Zhang and Jayant Notani and G. Gu},
  booktitle={SecureComm},
  year={2014}
}
Google Hacking continues to be abused by attackers to find vulnerable websites on current Internet. Through searching specific terms of vulnerabilities in search engines, attackers can easily and automatically find a lot of vulnerable websites in a large scale. However, less work has been done to study the characteristics of vulnerabilities targeted by Google Hacking (e.g., what kind of vulnerabilities are typically targeted by Google Hacking? What kind of vulnerabilities usually have a large… Expand
9 Citations
DorkPot : A Honeypot-based Analysis of Google Dorks
  • 1
  • PDF
Contactless Vulnerability Analysis using Google and Shodan
  • 7
  • PDF
Vulnerability Analysis Using Google and Shodan
  • 6
Google Dorks: Analysis, Creation, and New Defenses
  • 8
  • PDF
Attacks landscape in the dark side of the web
  • 12
  • Highly Influenced
  • PDF
How to Learn Klingon without a Dictionary: Detection and Measurement of Black Keywords Used by the Underground Economy
  • 20
  • PDF
Erschließung, Optimierung und Bewertung von Verwundbarkeitsanalysen mittels öffentlich zugänglicher Suchmaschinen
  • Highly Influenced
  • PDF

References

SHOWING 1-10 OF 31 REFERENCES
Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing
  • 76
  • PDF
Heat-seeking honeypots: design and experience
  • 41
  • PDF
PoisonAmplifier: A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks
  • 16
  • PDF
deSEO: Combating Search-Result Poisoning
  • 80
  • PDF
Intention and Origination: An Inside Look at Large-Scale Bot Queries
  • 17
  • PDF
EvilSeed: A Guided Approach to Finding Malicious Web Pages
  • 156
  • PDF
Searching the Searchers with SearchAudit
  • 26
  • PDF
Large-scale vulnerability analysis
  • 171
  • PDF
Quo Vadis? A Study of the Evolution of Input Validation Vulnerabilities in Web Applications
  • 48
  • PDF
Large-Scale , Automatic XSS Detection using Google Dorks
  • 7
  • PDF
...
1
2
3
4
...