Vulnerability Scanning of Poorly Configured Websites Using Search Engine
Vulnerability scanning in a important aspect in Information Security maintenance,the experts scan for the vulnerabilities using several tools but there are other ways to scan for v
vulnerabilities for websites using search engines such as Google,Yahoo,Bing etc.
If the user wants to search for any Information in the web,the user uses the Web Search engines to simplify the search space for the Results.This similar ideology is used by the Information security experts to scan the critical areas of the websites.
The every data the user or web administrator enter into the web ,gets scanned and crawled by the search engines instantaneously,even if the user deletes the particular details still the Search Engines save a copy of them in its Cache.
The user can view the Cache Pages from the search results,”nothing can be hidden from Google”.
The concept is used by the Information Security experts and Hacker to exploit the poorly configured website.
Every website has a admin page ,which is shown to every user or hidden, that is meant to be used only for the administrators and website editors.
These hidden pages has be found using Google Search Engines .The code using which these stuffs can be done is called Google Dorks.
The Google Dock code is just to find Pdf files and Txt files in Particular website.
Some Websites Store their password in Text file,and store within their directory.This can be checked using this Google Code.
file:txt password site:in or file:txt password site:pk
and there are lots more,Google Docking
These are important code for Information Security experts to scan for vulnerabilities and to secure their Network and Client Networks.