From the course: Threat Intelligence: From Analysis to Program Design by Infosec
Unlock this course with a free trial
Join today to access over 24,900 courses taught by industry experts.
Google dorks
From the course: Threat Intelligence: From Analysis to Program Design by Infosec
Google dorks
- Hello, everyone. 2 Welcome to the threat intelligence learning path, 3 which will allow you to master the concept 4 of threat intelligence from intelligence analysis 5 to building a threat intelligence program. 6 My name is Peter Vanis. 7 I am a threat intelligence manager. 8 This is course three, 9 threat intelligence analysis and tools. 10 In this slide deck, I will talk about Google dorks. 11 We will first begin with an overview 12 of what Google dorks are. 13 Then we will look at some easier examples of Google dorks. 14 Afterwards, we will talk a bit 15 about advanced Google dorking. 16 Finally, we will discuss what to Google dork for. 17 Okay, so what are Google dorks? 18 I can assure you there are no actual dorks involved. 19 The term Google dorks originates from Johnny Long, 20 a computer security expert, author, 21 and public speaker in the United States. 22 He was an early pioneer in the field of Google hacking.…