Question: Google dorking, or using advanced Google search techniques to find sensitive information, has been likened to online dumpster diving. Use the Internet to research Google
Google dorking, or using advanced Google search techniques to find sensitive information, has been likened to “online dumpster diving.” Use the Internet to research Google dorking. First, use the Internet to determine how the following advanced Google search engine operators are used: allintext, allintitle, allinurl, cache, file type, in anchor, in test, in title, link, site, +, |, and *. Then, use at least five of the operators to create potential Google dorking searches. Finally, try out your searches to see if they are effective. How easy is it for a threat actor to use Google dorking? How can users and organizations combat this? List your Google dorking searches, the results, and the defenses that should be used against it. Write a one-page paper on your activity.
Step by Step Solution
3.39 Rating (155 Votes )
There are 3 Steps involved in it
Answer Google Dorking Google Dorking or using advanced Google search techniques to find sensitive in... View full answer
Get step-by-step solutions from verified subject matter experts
