How To Use Google To Find Vulnerabilities In Your IT Environment
Francis Brown writes:
The vast volumes of information available on the Internet are of great value to businesses — and to hackers. For years, hackers have been using Google and other search engines to identify vulnerable systems and sensitive data on publicly exposed networks. The practice, known as Google hacking, has seen a resurgence of late, providing new challenges for IT professionals striving to protect their companies from threats growing in number and sophistication.
Google hacking — a term used for penetration testing using any search engine — surged in popularity around 2004, when computer security expert Johnny Long first released his book Google Hacking for Penetration Testers and the Google Hacking Database (GHDB). The database was designed to serve as a repository for search terms, called Google-Dorks, that exposed sensitive information, vulnerabilities, passwords, and much more.
There recently has been an upswing in Google hacking, with a few factors playing a role in the practice’s growth. For one thing, the amount of data indexed and searchable by Google and other search engines has skyrocketed in the last few years. Simply put, this has given hackers much more to work with.
It has always seemed to me that topic maps have a natural role to play in computer security, whatever your hat color.
From efficient access to exploits for particular versions of software packages to tracking weaknesses in source code.
Do you even have a complete list of all the software on premises with versions and latest patches? Not that you need a topic map for that but it could help track hacker exploits that may appear in a wide number of forums, using any number of rubrics.