Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,035,472 papers from all fields of science
Search
Sign In
Create Free Account
Google hacking
Known as:
Google Hack
, Google dorking
, GoogleDorks
Google hacking, also named Google dorking, is a computer hacking technique that uses Google Search and other Google applications to find security…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
8 relations
Data breach
HealthCare.gov
Microsoft FrontPage
PHP
Expand
Broader (1)
Google Search
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Penetration Testing Basics
R. Messier
Apress
2016
Corpus ID: 45774925
2016
2016
A Study on Security Diagnosis Using Automated Google Hacking Tools-Focusing on the US Government Website
M. Bae
,
Hankyu Lim
,
Dae-Jea Cho
2016
Corpus ID: 59151033
Because various software use internet to transmit data in recent internet environment, there is always a possibility of malicious…
Expand
2013
2013
Google hacking as a general education tool
James W. McGuffee
,
N. Hanebutte
2013
Corpus ID: 59658368
In order to give students hand-on experiences with Internet and World Wide Web security issues, this paper advocates using Google…
Expand
2013
2013
Ethical Hacking in Linux Environment
Aniruddha P. Tekade
,
P. Gurjar
,
P. Ingle
,
Dr. B. B. Meshram
2013
Corpus ID: 3817736
“Ethical Hacking” which attempts to pro-actively increase security protection by identifying and patching known security…
Expand
2012
2012
Google Reveals Cryptographic Secrets
E. I. Tatli
2012
Corpus ID: 14599598
Google hacking is a term to describe the search queries that find out security and privacy flaws. Finding vulnerable servers and…
Expand
2008
2008
Evaluation of Google hacking
Justin Billig
,
Yuri Danilchenko
,
Charles E. Frank
Annual Conference on Information Security…
2008
Corpus ID: 21392669
Google Hacking uses the Google search engine to locate sensitive information or to find vulnerabilities that may be exploited…
Expand
2008
2008
Document Grinding and Database Digging
J. Long
2008
Corpus ID: 63130988
2007
2007
The Impact of Google Hacking on Identity and Application Fraud
A. Abdelhalim
,
I. Traoré
IEEE Pacific Rim Conference on Communications…
2007
Corpus ID: 16301478
In the last several years, identity theft has been on the rise. The Internet represents an appealing place for fraudsters to…
Expand
2007
2007
Privacy in Danger: Let's Google Your Privacy
E. I. Tatli
FIDIS
2007
Corpus ID: 1132266
Protection of personal data is a requirement from both ethical and legal perspectives. In the Internet, search engines facilitate…
Expand
2007
2007
Research on Google Hacking Technology and the Defense on it
N. Wei
2007
Corpus ID: 63135844
On the basis of the analysis on Google searching syntax,this paper explains the Google hacking attack technology which are widely…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE