Manage Learn to apply best practices and optimize your operations.

Step-by-step guide: Google hacking to test your security

Make sure your Web site is not vulnerable to Google hacking. Let contributor and Microsoft MVP Brien Posey guide you through a Google hack of your Web site.

In a past article, I discussed the anatomy of a Google hack. In case you aren't familiar with the term Google hack,...

it refers to using the Google search engine in an effort to pull sensitive information, such as credit card numbers, out of a poorly constructed Web application. In response to feedback from my original Google hack article, I wanted to take the opportunity to show you some ways of Google hacking your own Website to see what exactly is being exposed to the outside world.

Google hacking to test your security

 Home: Introduction
 Step 1: Identify what could be Google hacked
 Step 2: Understand your Web applications
 Step 3: Queries to Google hack your site -- Simple stuff
 Step 4: More complicated Google queries
 Step 5: Harden your Web site against Google hacks

More information from

  • Learning Center: Google hack Windows servers
  • Tip: Google your Windows security vulnerabilities

    Brien M. Posey, MCSE, is a Microsoft Most Valuable Professional for his work with Windows 2000 Server and IIS. He has served as CIO for a nationwide chain of hospitals and was once in charge of IT security for Fort Knox. As a freelance technical writer, he has written for Microsoft, TechTarget, CNET, ZDNet, MSD2D, Relevant Technologies and other technology companies. You can visit his personal Web site at
    Copyright 2005 TechTarget

    Dig Deeper on Windows legacy operating systems