Research Article
Characterizing Google Hacking: A First Large-Scale Quantitative Study
2199 downloads
@INPROCEEDINGS{10.1007/978-3-319-23829-6_46, author={Jialong Zhang and Jayant Notani and Guofei Gu}, title={Characterizing Google Hacking: A First Large-Scale Quantitative Study}, proceedings={International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I}, proceedings_a={SECURECOMM}, year={2015}, month={11}, keywords={Vulnerability Google Hacking Google Dork}, doi={10.1007/978-3-319-23829-6_46} }
- Jialong Zhang
Jayant Notani
Guofei Gu
Year: 2015
Characterizing Google Hacking: A First Large-Scale Quantitative Study
SECURECOMM
Springer
DOI: 10.1007/978-3-319-23829-6_46
Abstract
Google Hacking continues to be abused by attackers to find vulnerable websites on current Internet. Through searching specific terms of vulnerabilities in search engines, attackers can easily and automatically find a lot of vulnerable websites in a large scale. However, less work has been done to study the characteristics of vulnerabilities targeted by Google Hacking (e.g., what kind of vulnerabilities are typically targeted by Google Hacking? What kind of vulnerabilities usually have a large victim population? What is the impact of Google Hacking and how easy to defend against Google Hacking?).
Copyright © 2014–2024 ICST