Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 210,226,023 papers from all fields of science
Search
Sign In
Create Free Account
Google hacking
Known as:
Google Hack
, Google dorking
, GoogleDorks
Google hacking, also named Google dorking, is a computer hacking technique that uses Google Search and other Google applications to find security…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
8 relations
Data breach
HealthCare.gov
Microsoft FrontPage
PHP
Expand
Broader (1)
Google Search
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Google Dorks: Analysis, Creation, and New Defenses
Flavio Toffalini
,
M. Abbà
,
D. Carra
,
D. Balzarotti
International Conference on Detection of…
2016
Corpus ID: 26121650
With the advent of Web 2.0, many users started to maintain personal web pages to show information about themselves, their…
Expand
Highly Cited
2014
Highly Cited
2014
When Governments Hack Opponents: A Look at Actors and Technology
William R. Marczak
,
J. Scott-Railton
,
Morgan Marquis-Boire
,
V. Paxson
USENIX Security Symposium
2014
Corpus ID: 5610576
Repressive nation-states have long monitored telecommunications to keep tabs on political dissent. The Internet and online social…
Expand
2014
2014
Characterizing Google Hacking: A First Large-Scale Quantitative Study
Jialong Zhang
,
Jayant Notani
,
G. Gu
Security and Privacy in Communication Networks
2014
Corpus ID: 12598147
Google Hacking continues to be abused by attackers to find vulnerable websites on current Internet. Through searching specific…
Expand
2013
2013
Google hacking as a general education tool
James W. McGuffee
,
N. Hanebutte
2013
Corpus ID: 59658368
In order to give students hand-on experiences with Internet and World Wide Web security issues, this paper advocates using Google…
Expand
2008
2008
Evaluation of Google hacking
Justin Billig
,
Yuri Danilchenko
,
Charles E. Frank
Annual Conference on Information Security…
2008
Corpus ID: 21392669
Google Hacking uses the Google search engine to locate sensitive information or to find vulnerabilities that may be exploited…
Expand
Review
2007
Review
2007
Using google hacking to enhance defense strategies
L. Lancor
,
R. Workman
Technical Symposium on Computer Science Education
2007
Corpus ID: 23060091
This paper provides a description of how the topic of Google hacking was incorporated into a graduate course on web security…
Expand
2007
2007
Using google hacking to enhance defense strategies
LancorLisa
,
WorkmanRobert
2007
Corpus ID: 216025295
This paper provides a description of how the topic of Google hacking was incorporated into a graduate course on web security…
Expand
2007
2007
Privacy in Danger: Let's Google Your Privacy
E. I. Tatli
FIDIS
2007
Corpus ID: 1132266
Protection of personal data is a requirement from both ethical and legal perspectives. In the Internet, search engines facilitate…
Expand
2007
2007
The Impact of Google Hacking on Identity and Application Fraud
A. Abdelhalim
,
I. Traoré
IEEE Pacific Rim Conference on Communications…
2007
Corpus ID: 16301478
In the last several years, identity theft has been on the rise. The Internet represents an appealing place for fraudsters to…
Expand
Highly Cited
2006
Highly Cited
2006
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
D. Endler
,
M. Collier
2006
Corpus ID: 109112185
Sidestep VoIP Catastrophe the Foolproof Hacking Exposed Way "This book illuminates how remote users can probe, sniff, and…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE