High Impact Factor : 4.396 icon | Submit Manuscript Online icon | UGC Approved icon

Notorious ways of exploitation search engine

Author(s):

SOHESH DOSHI , CHARUSAT UNIVERSITY CHANGA; Meet Gadhiya, CHARUSAT UNIVERSITY CHANGA; SANKET SUTHAR, CHARUSAT UNIVERSITY CHANGA

Keywords:

Google Search Engine, Exploitation Search Engine

Abstract

As time goes the use of internet & technology increases and become the part of the human in routine life. All people continuously use to share their information either it's private or public via various source on the internet. This information directly and indirectly interact with Google database searching the keyword on Google search engine give precise information but in vary large scale ,but use of Google dorks help us to narrow this scale and retrieve specific result. This research paper's objective is mainly focus on how hackers use Google dorks to steal information on the database.

Other Details

Paper ID: NCACSETT4P026
Published in: Conference 10 : NCACSET 2017
Publication Date: 06/05/2017
Page(s): 112-116

Article Preview




Download Article