Google as a Hacking tool

Idimi

JF-Expert Member
Mar 18, 2007
14,963
10,457
A while ago, I read and tried to implement the ideas provided in the article (the attachment in this post), I was amazed. The results were so shocking, specifically when it comes to security risks with our networks. There are numerous security loop holes that the article reveals, though some modifications have been made to remedy them by network owners, such that some of its examples are no longer available on line. I do not like to bore you with so many words, just download the damn article, read it thoroughly and get the content. Disclaimer! The attachment is not mine, it is meant for educational purposes only. Any unlawful use of its contents are at your responsibility.
 

Attachments

  • Google as a hacking tool.pdf
    227 KB · Views: 129
Back
Top Bottom