Google Hacking Database (GHDB) By Offensive Security. Home. About the Exploit Database; Exploits. Remote Exploits; Web Application Exploits; Local & Privilege Escalation Exploits; PoC & Denial of Service Exploits; Shellcode; Papers; Google Hacking Database; Submit; Search; Google Hacking Database (GHDB) Search the Google Hacking Database or browse GHDB categories. Security-Database help your corporation foresee and avoid any security risks that may impact your IT infrastructure and business applications. What is Google Hacking? Google hacking is the term used when a hacker tries to find exploitable targets and sensitive data by using search engines. The Google Hacking Database (GHDB) is a database of queries that identify sensitive data. Although Google blocks some of the better known Google hacking queries, nothing stops a hacker from crawling your site and launching the Google Hacking Database queries directly onto the crawled content. More information about Google hacking can be found on: http: //www. What a Hacker can do if your Website is Vulnerable. Information that the Google Hacking Database identifies: Advisories and server vulnerabilities. Error messages that contain too much information. Files containing passwords. Sensitive directories. Pages containing logon portals. Pages containing network or vulnerability data such as firewall logs. How to Check for Google Hacking Vulnerabilities. The easiest way to check whether your web site & applications have Google hacking vulnerabilities, is to use a Web Vulnerability Scanner. A Web Vulnerability Scanner scans your entire website and automatically checks for pages that are identified by Google hacking queries. Note: Your web vulnerability scanner must be able to launch Google hacking queries). Acunetix Web Vulnerability Scanner includes an offline copy of the Google Hacking Database (GHDB), allowing to identify pages which can be exploited using search engines. Preventing Google Hacking Attacks. Verify the all pages identified by Google hacking queries. Since these pages generally provide information which should not be found on your web site, you should generally remove such pages from your site. If these pages are required by your site, arrange the page so that it is not indexed by search engines and arrange the wording so that it is not. В easy to detect by Google hacking queries. Acunetix Web Vulnerability Scanner. Learn more about Acunetix Web Vulnerability Scanner and how the solution works to prevent Google hacking attacks. Weekly newsletter Reading our newsletter every Monday will keep you up-to-date with security news.В Download or Register for a Free Trial of Acunetix.
0 Comments
|
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
May 2016
Categories |