[ORDER SOLUTION] Google Hacking
HACKING WITH GOOGLEGoogle hacking, also known as google docking, is an information gathering technique used by leveraging the advanced Google search techniques. If used efficiently, it can be used to identify security vulnerabilities in web applications, gather information for arbitrary or individual targets, discover error messages disclosing sensitive information, discover files containing credentials and other sensitive data.This can be achieved by using advanced search operators as a part of the search query and hence, refining the query to get the desired results. For example:syntax ? operator:search-termsite:Wikipedia.com intitle:”learning”The above query will search for site i.e., domain name, to be wikipedia.com and learning as a part of its title. The result will look something like this:Why should we know about Google Hacking?When an attacker knows the sort of vulnerability, he wants to exploit but has no specific target, he employs a scanner. A scanner is a program that automates the process of examining a massive quantity of systems for a security flaw. Some of the most popular scanners are NMAP and NESSUS.Today there are scanners that automatically query IP addresses to see what proxy for exploits. A proxy is an intermediary system that an attacker can use to disguise his or her identity. For example, if you were to gain remote access to Bill Gates computer and cause it to run attacks on treasury.gov, it would appear to the Feds that Bill Gates was hacking them. His computer would we acting as a proxy. Google can be used in a similar way. The search engine has already gathered this information and will give it freely without alerting the vulnerable site.As part of this assessment, you are required to explore how can we use advanced google searching techniques to identify the vulnerabilities in web applications, gather information for individual target, discover error messages using sensitive information, discover files containing sensitive information and other sensitive data. Also, do some research on how as an organization, we can protect ourselves against google hacking.Some of the links which can be useful to complete this assessment are given below:1.Google Search Help2. Google Hacking for penetration testing3. Google Hacking DatabaseWrite a report 12-15 pages (excluding title page and references) on google hacking. How hackers can use google to gather the information and find out the vulnerabilities which they can exploit to compromise the servers. Also, discuss the countermeasures which can be used to minimize google hacking. The report should address range of topicsrelevant to google hacking with working examples. Support each working example with a screenshot. Topics can be: Advance Search Operators Searching for email addresse Network Mapping and Port Scanning Site Crawling Database Digging (SQL Passwords, SQL Dumps and SQL Injection Hints) Webserver Login Portals Security Cameras, Active Webcams and Routers with default passwords Usernames, passwords and other secret dataThe report should contain the following sections:1. Title Page2. Table of contents3. Introduction: Briefly highlighting the purpose, scope, and content of the report.4. Main Body of the report: introduce several Google hacking topics with examples and screenshots.5. Conclusion: covering lessons learned.6. ReferencesSubmission Guidelines Please note the assignment will be checked for plagiarism, therefore please use appropriate referencing and rephrasing. This is an individual Assessment. The suggested size for the font is 12 for the text and 14 for the headings. Use line spacing of 1.5. Submit the Assignment on blackboard in word/pdf format. Please Include the title page.