Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Google hacking

From Wikipedia, the free encyclopedia
Hacker technique
Not to be confused withGoogle Hacks.
icon
This articlemay incorporate text from alarge language model. It may includehallucinated information,copyright violations, claims notverified in cited sources,original research, orfictitious references. Any such material should beremoved, and content with anunencyclopedic tone should be rewritten.(October 2025) (Learn how and when to remove this message)

Google hacking, also namedGoogle dorking,[1][2] is a hacker technique that uses Google Search and otherGoogle applications to find security holes in theconfiguration and computer code thatwebsites are using.

Basics

[edit]

Google hacking involves using operators in the Googlesearch engine to locate specific sections of text on websites that are evidence of vulnerabilities, for example specific versions of vulnerableWeb applications. A search query withintitle:admbook intitle:Fversion filetype:php would locate PHP web pages with the strings "admbook" and "Fversion" in their titles, indicating that the PHP based guestbook Admbook is used, an application with a knowncode injection vulnerability. It is normal fordefault installations of applications to include their running version in every page they serve, for example, "Powered by XOOPS 2.2.3 Final", which can be used to search for websites running vulnerable versions.

Devices connected to the Internet can be found. A search string such asinurl:"Mode=" will find public web cameras.

History

[edit]

The concept of "Google hacking" dates back to August 2002, when Chris Sullo included the "nikto_google.plugin" in the 1.20 release of theNikto vulnerability scanner.[3] In December 2002 Johnny Long began to collect Google search queries that uncoveredvulnerable systems and/orsensitive information disclosures – labeling them googleDorks.[4]

The list of Google Dorks grew into a large dictionary of queries, which were eventually organized into the original Google Hacking Database (GHDB) in 2004.[5][6]

Concepts explored in Google hacking have been extended to othersearch engines, such asBing[7] andShodan.[8] Automated attack tools[9] use custom search dictionaries to findvulnerable systems andsensitive information disclosures in public systems that have been indexed by search engines.[10] 

Protection

[edit]

Robots.txt is a well known file forsearch engine optimization and protection against Google dorking. It involves the use of robots.txt to disallow everything or specific endpoints (hackers can still search robots.txt for endpoints) which prevents Google bots from crawling sensitive endpoints such as admin panels.

References

[edit]
  1. ^"Term Of The Day: Google Dorking - Business Insider".Business Insider.Archived from the original on June 19, 2020. RetrievedJanuary 17, 2016.
  2. ^Google dork queryArchived January 16, 2020, at theWayback Machine, techtarget.com
  3. ^"nikto-versions/nikto-1.20.tar.bz2 at master · sullo/nikto-versions".GitHub.Archived from the original on August 30, 2023. RetrievedAugust 30, 2023.
  4. ^"googleDorks created by Johnny Long". Johnny Long. Archived fromthe original on December 8, 2002. RetrievedDecember 8, 2002.
  5. ^"Google Hacking Database (GHDB) in 2004". Johnny Long. Archived fromthe original on July 7, 2007. RetrievedOctober 5, 2004.
  6. ^Google Hacking for Penetration Testers, Volume 1. Johnny Long. 2005.ISBN 1931836361.
  7. ^"Bing Hacking Database (BHDB) v2". Bishop Fox. July 15, 2013.Archived from the original on June 8, 2019. RetrievedAugust 27, 2014.
  8. ^"Shodan Hacking Database (SHDB) - Part of SearchDiggity tool suite". Bishop Fox.Archived from the original on June 8, 2019. RetrievedJune 21, 2013.
  9. ^"SearchDiggity - Search Engine Attack Tool Suite". Bishop Fox. July 15, 2013.Archived from the original on June 8, 2019. RetrievedAugust 27, 2014.
  10. ^"Google Hacking History". Bishop Fox. July 15, 2013. Archived fromthe original on June 3, 2019. RetrievedAugust 27, 2014.

External links

[edit]
a subsidiary ofAlphabet
Company
Divisions
Subsidiaries
Active
Defunct
Programs
Events
Infrastructure
People
Current
Former
Criticism
General
Incidents
Other
Software
A–C
D–N
O–Z
Operating systems
Machine learning models
Neural networks
Computer programs
Formats and codecs
Programming languages
Search algorithms
Domain names
Typefaces
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
Y
Hardware
Pixel
Smartphones
Smartwatches
Tablets
Laptops
Other
Nexus
Smartphones
Tablets
Other
Other
Advertising
Antitrust
Intellectual
property
Privacy
Other
Related
Concepts
Products
Android
Street View coverage
YouTube
Other
Documentaries
Books
Popular culture
Other
Retrieved from "https://en.wikipedia.org/w/index.php?title=Google_hacking&oldid=1323449948"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp