Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
science projects buddy
Active In SP

Posts: 278
Joined: Dec 2010
15-12-2010, 08:40 AM

Speaking of search engines Google is undoubtedly the leader with 80% share in search market. Google is world’s most popular and powerful search engine which has the ability to accept pre-defined commands as inputs and produce unbelievable results. As a result of this, Google search engine is being made use of by hackers, crackers, and script kiddies to gather secret and confidential information. These information may not appear in the common search but can be gathered by using the advanced search queries.
A little advanced knowledge on the Google Search parameters, operators and constructs is enough to perform searches and pinpoint the information on the web. posting XSS exploit scripts, damaging databases, misusing bandwidth etc are the common exploits that can be launched with the information that is gathered in this way.

Some of the common attacks include:
-Finding the web server:
many webmasters and administrators just leave their default configuration of their webserver after installation. If the attacker finds the web server version , he can intrude using the default configuration.
Example Google Query:

"Microsoft-IIS/6.0 Server at" intitle:index.of

-web statistics pages:
This queries can bring out common default configurations.
Example Google Query:

"Generated by phpSystem"

intitle:"Sysinfo * " intext:"Generated by Sysinfo *"

-HTTP error pages and messages :
They sometimes provide critical system information.
-Storing FTP passwords in FTP clients:
The .ini files can be crawled and the passwords can be stolen.

-email and contact harvesting:
Simple queries containing the keywords: "name" "email" "phonenumber" etc can bring out a lot of information for spammers

get the report here:

.pdf   Demystifying Google Hacks.pdf (Size: 74.76 KB / Downloads: 145)

also see:
Use Search at wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  ethical hacking research paper pdf jaseelati 0 239 31-01-2015, 01:48 PM
Last Post: jaseelati
  google glass seminar report pdf jaseelati 0 344 21-01-2015, 01:41 PM
Last Post: jaseelati
  ethical hacking advantages and disadvantages pdf jaseelati 0 281 17-01-2015, 03:50 PM
Last Post: jaseelati
  google glass ieee paper pdf jaseelati 0 423 01-01-2015, 04:25 PM
Last Post: jaseelati
  ethical hacking full report computer science technology 41 48,471 19-03-2014, 12:55 AM
Last Post: MichaelKa
  GOOgle Architecture ppt study tips 0 410 30-07-2013, 02:48 PM
Last Post: study tips
  An Intermediate Google SketchUp Tutorial - Part 3 study tips 0 352 18-06-2013, 11:38 AM
Last Post: study tips
  Hacking Full Report lucky.prathibha 9 7,778 31-05-2013, 09:22 AM
Last Post: Guest
  Introduction To Hacking and Computer Tricks project girl 0 438 25-01-2013, 03:52 PM
Last Post: project girl
  Hacking Report project girl 0 371 18-01-2013, 04:13 PM
Last Post: project girl