Chapter 6 Google Hacking Showcase

A decent no-tech hacker can accumulate a library of significant data just by observing the world around him. But often that data is completely useless on its own. When it comes time to turn data into information, Hollywood tells us that the hacker will have thirty-two plasma screens (divisible by eight, naturally) in his black-walled, red-lighted room that would put NORAD’s computer center to shame. In real life, a hacker doesn’t even need his own computer to do the necessary research. If he can make it to a public library, Kinko’s or Internet cafe, he can use Google to process all that data into something useful. Other times, a hacker will just use Google to troll for targets and sensitive information.

Reprinted ...

Get No Tech Hacking now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.