google hacking and personal data privacy
TRANSCRIPT
![Page 1: Google Hacking and Personal Data Privacy](https://reader030.vdocument.in/reader030/viewer/2022021023/6204f0104c89d3190e0cbdca/html5/thumbnails/1.jpg)
Google Hacking and Google Hacking and Google Hacking and Google Hacking and
Personal Data PrivacyPersonal Data PrivacyPersonal Data PrivacyPersonal Data Privacy
PH CHAN
Researcher
VX Security Research Lab
![Page 3: Google Hacking and Personal Data Privacy](https://reader030.vdocument.in/reader030/viewer/2022021023/6204f0104c89d3190e0cbdca/html5/thumbnails/3.jpg)
VXRL
• Non-profit making group
• Focus on security research and ethical hacking
• Offensive, creative and fun
![Page 4: Google Hacking and Personal Data Privacy](https://reader030.vdocument.in/reader030/viewer/2022021023/6204f0104c89d3190e0cbdca/html5/thumbnails/4.jpg)
Google makes our life easy. Just a single click
time to find any searched information.
However Google not only makes it possible to
reach the public available information, but also
threatens some of the most confidential
Information (e.g. personal privacy) that should
never be revealed.
![Page 5: Google Hacking and Personal Data Privacy](https://reader030.vdocument.in/reader030/viewer/2022021023/6204f0104c89d3190e0cbdca/html5/thumbnails/5.jpg)
Personal Privacies like name, address, phone
numbers, emails, username and password for
login sites, private directories and documents
and online devices (e.g. web cameras) without
any access control.
![Page 6: Google Hacking and Personal Data Privacy](https://reader030.vdocument.in/reader030/viewer/2022021023/6204f0104c89d3190e0cbdca/html5/thumbnails/6.jpg)
"Google Hacking” is the use of Google’s to do
naughty things. It makes use of the advanced
Google syntaxes and operators extensively.
![Page 7: Google Hacking and Personal Data Privacy](https://reader030.vdocument.in/reader030/viewer/2022021023/6204f0104c89d3190e0cbdca/html5/thumbnails/7.jpg)
How Google Works
![Page 8: Google Hacking and Personal Data Privacy](https://reader030.vdocument.in/reader030/viewer/2022021023/6204f0104c89d3190e0cbdca/html5/thumbnails/8.jpg)
How Google Works
• Googlebot
A web spider that finds and go to get web pages.
• The indexer
Stores the fetched results in a Google’s index database
in alphabetic order.
• The query processor
Compares the search query to the index and
recommends the most relevant documents.
![Page 9: Google Hacking and Personal Data Privacy](https://reader030.vdocument.in/reader030/viewer/2022021023/6204f0104c89d3190e0cbdca/html5/thumbnails/9.jpg)
The Basics
• The plus symbol (+) forces inclusion of
something common.
• The minus symbol (-) forces exclusion of a
search term.
• The pipe symbol (|) provides boolean OR
logic that locate either one term or another in
a query
• The symbol (“) uses to quote around the
search phrases
![Page 10: Google Hacking and Personal Data Privacy](https://reader030.vdocument.in/reader030/viewer/2022021023/6204f0104c89d3190e0cbdca/html5/thumbnails/10.jpg)
Advanced search operators
• [all]inurl
Searches for the certain keyword in the URL
• [all]intitle
Searches for the certain keyword in the title
• [all]intext
Searches the keywords in the body of web pages.
• Filetype / ext
Filter out the results based on the file extensions
• Site
Searches within the Domain
![Page 11: Google Hacking and Personal Data Privacy](https://reader030.vdocument.in/reader030/viewer/2022021023/6204f0104c89d3190e0cbdca/html5/thumbnails/11.jpg)
• Let’s take a look at a few of the interesting
Google search result.
Search for Name, Email Address, Phone,:
![Page 12: Google Hacking and Personal Data Privacy](https://reader030.vdocument.in/reader030/viewer/2022021023/6204f0104c89d3190e0cbdca/html5/thumbnails/12.jpg)
Search for Name, Email Address, Phone,:
![Page 13: Google Hacking and Personal Data Privacy](https://reader030.vdocument.in/reader030/viewer/2022021023/6204f0104c89d3190e0cbdca/html5/thumbnails/13.jpg)
Search for Name, Email Address, Phone,:
![Page 14: Google Hacking and Personal Data Privacy](https://reader030.vdocument.in/reader030/viewer/2022021023/6204f0104c89d3190e0cbdca/html5/thumbnails/14.jpg)
• Let’s take a look at a few of the interesting
Google search result.
Web 2.0,:
![Page 15: Google Hacking and Personal Data Privacy](https://reader030.vdocument.in/reader030/viewer/2022021023/6204f0104c89d3190e0cbdca/html5/thumbnails/15.jpg)
Web 2.0,:
![Page 16: Google Hacking and Personal Data Privacy](https://reader030.vdocument.in/reader030/viewer/2022021023/6204f0104c89d3190e0cbdca/html5/thumbnails/16.jpg)
• Let’s take a look at a few of the interesting
Google search result.
Webcam,:
![Page 17: Google Hacking and Personal Data Privacy](https://reader030.vdocument.in/reader030/viewer/2022021023/6204f0104c89d3190e0cbdca/html5/thumbnails/17.jpg)
Webcam,:
![Page 18: Google Hacking and Personal Data Privacy](https://reader030.vdocument.in/reader030/viewer/2022021023/6204f0104c89d3190e0cbdca/html5/thumbnails/18.jpg)
![Page 19: Google Hacking and Personal Data Privacy](https://reader030.vdocument.in/reader030/viewer/2022021023/6204f0104c89d3190e0cbdca/html5/thumbnails/19.jpg)
![Page 20: Google Hacking and Personal Data Privacy](https://reader030.vdocument.in/reader030/viewer/2022021023/6204f0104c89d3190e0cbdca/html5/thumbnails/20.jpg)
![Page 21: Google Hacking and Personal Data Privacy](https://reader030.vdocument.in/reader030/viewer/2022021023/6204f0104c89d3190e0cbdca/html5/thumbnails/21.jpg)
![Page 22: Google Hacking and Personal Data Privacy](https://reader030.vdocument.in/reader030/viewer/2022021023/6204f0104c89d3190e0cbdca/html5/thumbnails/22.jpg)
![Page 23: Google Hacking and Personal Data Privacy](https://reader030.vdocument.in/reader030/viewer/2022021023/6204f0104c89d3190e0cbdca/html5/thumbnails/23.jpg)
![Page 24: Google Hacking and Personal Data Privacy](https://reader030.vdocument.in/reader030/viewer/2022021023/6204f0104c89d3190e0cbdca/html5/thumbnails/24.jpg)
FoxyFoxy is a Chinese P2P software.
![Page 25: Google Hacking and Personal Data Privacy](https://reader030.vdocument.in/reader030/viewer/2022021023/6204f0104c89d3190e0cbdca/html5/thumbnails/25.jpg)
Foxy
![Page 26: Google Hacking and Personal Data Privacy](https://reader030.vdocument.in/reader030/viewer/2022021023/6204f0104c89d3190e0cbdca/html5/thumbnails/26.jpg)
Foxy
![Page 27: Google Hacking and Personal Data Privacy](https://reader030.vdocument.in/reader030/viewer/2022021023/6204f0104c89d3190e0cbdca/html5/thumbnails/27.jpg)
Foxy
![Page 28: Google Hacking and Personal Data Privacy](https://reader030.vdocument.in/reader030/viewer/2022021023/6204f0104c89d3190e0cbdca/html5/thumbnails/28.jpg)
LinkedIn Account
![Page 29: Google Hacking and Personal Data Privacy](https://reader030.vdocument.in/reader030/viewer/2022021023/6204f0104c89d3190e0cbdca/html5/thumbnails/29.jpg)
Email Account
![Page 30: Google Hacking and Personal Data Privacy](https://reader030.vdocument.in/reader030/viewer/2022021023/6204f0104c89d3190e0cbdca/html5/thumbnails/30.jpg)
Email Account
![Page 31: Google Hacking and Personal Data Privacy](https://reader030.vdocument.in/reader030/viewer/2022021023/6204f0104c89d3190e0cbdca/html5/thumbnails/31.jpg)
Email Account
![Page 32: Google Hacking and Personal Data Privacy](https://reader030.vdocument.in/reader030/viewer/2022021023/6204f0104c89d3190e0cbdca/html5/thumbnails/32.jpg)
![Page 33: Google Hacking and Personal Data Privacy](https://reader030.vdocument.in/reader030/viewer/2022021023/6204f0104c89d3190e0cbdca/html5/thumbnails/33.jpg)
There are many more.
Combining the advanced operators is the key to
Google Hacking.
http://www.googleguide.com/advanced_operators
_reference.html
![Page 34: Google Hacking and Personal Data Privacy](https://reader030.vdocument.in/reader030/viewer/2022021023/6204f0104c89d3190e0cbdca/html5/thumbnails/34.jpg)
Countermeasures
• Keep sensitive data off the web!!
• http://www.google.com/remove.html
![Page 35: Google Hacking and Personal Data Privacy](https://reader030.vdocument.in/reader030/viewer/2022021023/6204f0104c89d3190e0cbdca/html5/thumbnails/35.jpg)
Thank You