Google Hacking
Locate security vulnerabilities on the
internet using search engines, such as Google can called as Google hacking. We
can identify Google Hacking as a passive information gathering techniques.
Generally, there are two types of vulnerabilities we can found on the web:
Software vulnerabilities and misconfigurations.
For the example, imagine we need to gather
information about hotels in United State. Most of the people that didn’t aware
of Google Footprint Techniques do it like following,