Google search Commands examples 5: 1) filetype: Searches for specific filetypes based on the filetype (extension)....
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Google search Commands examples 5: 1) filetype: Searches for specific filetypes based on the filetype (extension). filetype: pdf filetype:xls 2) Site: Limit your search to a single site or domain site:https://www.aramco.com cyberattack Will search for the cyberattack only in Aramco website site: .sa "vision 2030" Will search for "vision 2030" only in websites that are in Saudi Arabia 3) inurl: searches for a text inside the URL. inurl: index.php Will display all websites that have index.php inside the URL (result example: www.example.com/index.php) 4) intitle: search for text in the title of the website page Examples: All of the following search queries display publicly available information in Google: - Spammers usually search for email lists (victims) to launch their attack and one way of finding publicly available email addresses is the following search query: filetype:xls inurl: "email.xls" You can display all CV pdf files for people that work in cybersecurity using: "cybersecurity" intitle:CV filetype: pdf or "cybersecurity" intitle: resume filetype: pdf You can also search for information about yourself or your organization using these commands to find any disclosed information on the Internet. Question 1: write search queries to find the following information in Google and include screenshot for your search results (you need to use the search commands to limit your search): a. Webpages that include "cybersecurity" in Saudi Vision 2030 website (www.vision2030.gov.sa) b. job opportunities for security engineer only in Saudi Arabia (.sa) c. job opportunities for security analyst only in Saudi Arabia (.sa) d. CV (resume) files for people that have CEH certification in their CV in PDF filetype. e. CV (resume) files for people that have any GIAC certification in their CV in PDF filetype. f. powerpoint slides for "programming" course from educational websites (.edu) g. Webpages that have "login.php" in the URL. Question 2: Write search query example for each of the following search commands (include screenshots) and describe what they do (see reference #4): phonebook related link cache + (plus operator) -(minus operator) Question 3: DuckDuckGo.com is another search engine that is used by researchers on the Internet. - What is the difference between DuckDuckGo.com and Google.com Use all the search queries in Question 1 and apply them in DuckDuckGo.com Do these search queries work in DuckDuckGo.com ? Question 4: What can you do to prevent Google dorks? Question 5: "robots.txt" is a standard used by websites that could lead to a security risk. What does "robots.txt" do? And how it could lead to a security risk? Search for: "robot" filetype: txt Open any link and write your observation of what is in that file. Question 6: The information on the Internet might not disappear even if it has been deleted from websites. However, https://web.archive.org is an Internet archive for websites that allows you to view old versions of websites. Choose any website and then browse old version of that page in the https://web.archive.org. You need to include screenshots and the links for the existing website and the old versions web.archive.org. Submission: Submit a detailed report for the lab with screenshots for each command and describe what you have done in page 2 examples. Also, answer Questions 1 to 6. Google search Commands examples 5: 1) filetype: Searches for specific filetypes based on the filetype (extension). filetype: pdf filetype:xls 2) Site: Limit your search to a single site or domain site:https://www.aramco.com cyberattack Will search for the cyberattack only in Aramco website site: .sa "vision 2030" Will search for "vision 2030" only in websites that are in Saudi Arabia 3) inurl: searches for a text inside the URL. inurl: index.php Will display all websites that have index.php inside the URL (result example: www.example.com/index.php) 4) intitle: search for text in the title of the website page Examples: All of the following search queries display publicly available information in Google: - Spammers usually search for email lists (victims) to launch their attack and one way of finding publicly available email addresses is the following search query: filetype:xls inurl: "email.xls" You can display all CV pdf files for people that work in cybersecurity using: "cybersecurity" intitle:CV filetype: pdf or "cybersecurity" intitle: resume filetype: pdf You can also search for information about yourself or your organization using these commands to find any disclosed information on the Internet. Question 1: write search queries to find the following information in Google and include screenshot for your search results (you need to use the search commands to limit your search): a. Webpages that include "cybersecurity" in Saudi Vision 2030 website (www.vision2030.gov.sa) b. job opportunities for security engineer only in Saudi Arabia (.sa) c. job opportunities for security analyst only in Saudi Arabia (.sa) d. CV (resume) files for people that have CEH certification in their CV in PDF filetype. e. CV (resume) files for people that have any GIAC certification in their CV in PDF filetype. f. powerpoint slides for "programming" course from educational websites (.edu) g. Webpages that have "login.php" in the URL. Question 2: Write search query example for each of the following search commands (include screenshots) and describe what they do (see reference #4): phonebook related link cache + (plus operator) -(minus operator) Question 3: DuckDuckGo.com is another search engine that is used by researchers on the Internet. - What is the difference between DuckDuckGo.com and Google.com Use all the search queries in Question 1 and apply them in DuckDuckGo.com Do these search queries work in DuckDuckGo.com ? Question 4: What can you do to prevent Google dorks? Question 5: "robots.txt" is a standard used by websites that could lead to a security risk. What does "robots.txt" do? And how it could lead to a security risk? Search for: "robot" filetype: txt Open any link and write your observation of what is in that file. Question 6: The information on the Internet might not disappear even if it has been deleted from websites. However, https://web.archive.org is an Internet archive for websites that allows you to view old versions of websites. Choose any website and then browse old version of that page in the https://web.archive.org. You need to include screenshots and the links for the existing website and the old versions web.archive.org. Submission: Submit a detailed report for the lab with screenshots for each command and describe what you have done in page 2 examples. Also, answer Questions 1 to 6.
Expert Answer:
Answer rating: 100% (QA)
Q1 a Webpages that include cybersecurity in Saudi Vision 2030 website wwwvision2030govsa Search query sitewwwvision2030govsa cybersecurity Screenshot b Job opportunities for security engineer only in ... View the full answer
Related Book For
Income Tax Fundamentals 2013
ISBN: 9781285586618
31st Edition
Authors: Gerald E. Whittenburg, Martha Altus Buller, Steven L Gill
Posted Date:
Students also viewed these electrical engineering questions
-
On one of my first dates with my wife, we went to see the movie Space balls and paid $5 per ticket. A: Halfway through the movie, my wife said: What on earth were you thinking? This movie sucks! I...
-
One slice of cheese pizza contains 290 Cal, 15 g of protein, 9 g of fat, and 39 g of carbohydrates. One-half cup of gelatin dessert contains 70 Cal, 2 g of protein, 0 g of fat, and 17 g of...
-
One serving of Shredded Wheat supplies 160 calories, 5 g of protein, 6 g of fiber, and 1 g of fat. One serving of Crispix supplies 110 calories, 2 g of protein, .1 g of fiber, and .4 g of fat. a. Set...
-
Which one the below does not define "Work role boundaries" of a care worker limits that allow a patient and staff to connect safely in a therapeutic relationship based on patients' needs rules of...
-
This case study compares benefit/cost analysis and cost effectiveness analysis on the same information about highway lighting and its role in accident reduction. Poor highway lighting may be one...
-
Suppose that the fie measured Sample RTT values (see Section 3.5.3) are 106 ms, 120 ms, 140 ins, 90 ms, and 115 ms. Compute the EstimateedRTT after each of these Sample RTT values is obtained, using...
-
Conventional management accounting systems provide the foundation for all other accounting systems.What are the main differences and links between conventional management accounting and environmental...
-
Pike Street Taffy makes and sells taffy in a variety of flavors in a shop located in the local public market. Data for a recent week are as follows: All employees work standard shifts, no matter how...
-
16. 4 ln(x)+2ln(y) Condense a logarithmic expression completely into a logarithm with a coefficient of 1.
-
Bob Burley and his brother Buford ran the best restaurant in Dallas, Texas. Many out-of-towners would visit Dallas and go to Burleys Biscuits, Beef, and Veggies for a good wholesome meal. One thing...
-
Which one of the following is correct about Modigliani and Miller's Proposition I A. the market value of any firm is independent of its capital structure B. the market value of a firm's debt is...
-
Environmental Scanning and Strategic Factor Analysis Based on the Mini Sim case for Country Comfort Coffee, Why environmental scanning and strategic factor analysis are important for strategy...
-
Qinto Company sells two types of products: basic and deluxe. The company provides technical support for its products at a budgeted overhead cost of $239,200 per year. The company allocates technical...
-
In the context of advanced file systems, such as ZFS or Btrfs, how do mechanisms like copy-on-write, snapshots, and data deduplication contribute to data integrity and system resilience ?
-
When preparing and formatting budget schedules, how should they be ordered or prepared? Explain
-
The local ice cream shop sells single-scoop cones. The store employs a manager plus one full-time and two part-time employees, and also incurs costs for labor, rent, and insurance. Information...
-
6 The price of a bell pepper increases from $1 to $1.20. Quantity supplied for bell peppers increases from 40 to 60. Price elasticity of supply for bell peppers is (A) 2.5 (B) 1.5 (C) 2.0 (D) 0.2 (E)...
-
What are the typical record-at-a-time operations for accessing a file? Which of these depend on the current file record?
-
Sally and Charles Heck received the following dividends and interest during 2012: Assuming the Hecks file a joint tax return, complete Schedule B of Form 1040 (on page 2-33) for them for the 2012 tax...
-
The following additional information is available for the Dr. Ivan and Irene Incisor family from Chapters 1-5. Ivan's grandfather died and left a portfolio of municipal bonds. In 2012, they pay Ivan...
-
Cypress Corporation has regular taxable income of $170,000 (assume annual gross receipts are greater than $5 million) and regular tax liability of $49,550 for 2012. The corporation also has tax...
-
The presence of air in the brake system fluid causes the brake pedal to feel __________________.
-
Three main components of pst brake antiskid systems are __________________, __________________ and a __________________.
-
__________________ pressure bleeding is not an option for power brakes; the air trapped in the brake system would be forced into the main hydraulic system, which should operate without air in the...
Study smarter with the SolutionInn App