Google Dorking is a term that refers to the practice of applying advanced search techniques and specialized search engine parameters to discover confidential information from companies and individuals that wouldn't typically show up during a normal web search.
Hackers can use Google Dorking tactics to reveal information that companies and individuals likely intended not to be discoverable through a Web search. This information can include account usernames and passwords, customer and partner lists and details, sensitive and private documents, account details, website vulnerabilities for potential cyber attacks and more.
Hackers also have an array of freely available online tools they can use to run automated scans that execute multiple Google Dorking queries, enabling them to more efficiently conduct their dorking efforts.
Feds Warn Businesses About Google Dorking
In July 2014 the U.S. Feds issued a warning to companies in the United States to increase vigilance for Google Dorking activity by hackers, or "malicious cyber actors" as the bulletin refers to them.
The bulletin also recommended utilizing sites and tools like the Google Hacking Database, the Google Diggity Project and Google Webmaster Tools to help identify and prevent the potential for Google Dorking attacks.
Stay up to date on the latest developments in Internet terminology with a free weekly newsletter from Webopedia. Join to subscribe now.
List of free online Java courses for students and IT professionals looking to enhance their skills . Read More »SEO Dictionary
From keyword analysis to backlinks and Google search engine algorithm updates, our search engine optimization glossary lists 85 SEO terms you need... Read More »Slideshow: History of Microsoft Operating Systems
Microsoft Windows is a family of operating systems for personal computers. In this article we look at the history of Microsoft operating... Read More »
Java is a high-level programming language. This guide describes the basics of Java, providing an overview of syntax, variables, data types and... Read More »Java Basics, Part 2
This second Study Guide describes the basics of Java, providing an overview of operators, modifiers and control Structures. Read More »The 7 Layers of the OSI Model
The Open System Interconnection (OSI) model defines a networking framework to implement protocols in seven layers. Use this handy guide to compare... Read More »