How easy it is to find Private Info on Google

9 months ago 58
BOOK THIS SPACE FOR AD
ARTICLE AD

Lochana Dissanayake

Ever wondered how to uncover hidden treasures and potential security gaps on the internet? Enter Google Dorking — a straightforward technique in the world of OSINT (Open Source Intelligence) that lets you navigate the web with ease. By using a few clever search tricks, you can unveil valuable information and spot potential risks effortlessly.

Google Dorking relies on easy-to-use search operators, acting as your digital magnifying glass to zoom in on specific data across websites. Whether you’re a researcher, ethical hacker, or bug bounty hunter, this method simplifies the journey into the digital landscape.

Google Dorking is known be a widely used tool that many bug bounty hunters and OSINT investigators use to search about a specific target or to find about vulnerabilities of a system. You can find leaked CCTV camera footage to passwords to a person’s bank account by just Googling.

Let me show you a basic query that will result a leaked CCTV footage in Slovenia.

Yes, it is that easy to spy on someone using a simple Google Search. Next let’s do a more complex query to find some leaked passwords of a database.

As you can see we were able to find some login credentials of a certain administrator of a system.

This is the way that most bug bounty hunters find vulnerabilities in a systems.

If you want search about a certain person for research purposes you can also use Google Dorking for that. We will take a fictional character name “Ken Adams” and let’s find out what kind of information that we can get about this individual. And let’ see whether there’s a twitter user named Ken Adams.

This is a very basic query that you can use to search about a person. Google Dorking, in and of itself, is not illegal. It is a method of using advanced search operators to refine and narrow down search queries on Google. However, the legality of the actions taken after obtaining search results depends on how the information is used.

It becomes illegal when individuals use Google Dorking to access unauthorized or sensitive information, attempt unauthorized access to systems, or engage in any activities that violate privacy laws or terms of service of websites. Unauthorized access to computer systems, data breaches, or any malicious activities are against the law.

Therefore, it’s crucial to always conduct Google Dorking and related activities ethically and within legal boundaries. Always obtain proper authorization before conducting security testing, adhere to the terms of service of websites, and ensure compliance with applicable laws and regulations. Unauthorized access or malicious use of information obtained through Google Dorking can lead to legal consequences.

Read Entire Article