Google hacking
Johnny Long says he has never met a Google employee. And yet he is at the center of a community of security experts and search engine enthusiasts that might be developing some of the most interesting uses of Google technology today. For the past 10 years, Long has made his living as a penetration tester, a âwhite hatâ hacker who is asked to break into computer systems to test their security vulnerabilities.
His johnny.ihackstuff.com Web site is the starting point for anyone looking to turn Google into a hackerâs tool. At its heart is a repository of sneaky queries called the Google Hacking Database, which got its start nearly six years ago, when Long posted a few of what he refers to as âfunny, or interesting, or dangerous,â Google queries in the Internet.
Initially, Long, who goes by the name Johnny Hax, did not expect the idea of using Google to break into computer networks to attract any kind of serious study.
âIt was sort of a joke actually,â he says. âThe whole Google hacking thing was supposed to be tongue-in-cheek, because I knew that the real hackers would get their feathers all ruffled.â
Instead of being bent out of shape, the hackers were intrigued, and Longâs Google hacking community now boasts nearly 60,000 members.
At the recent Black Hat security conference in Las Vegas, Longâs talk on Google hacking was a standing-room-only affair, and the Google Hacking Database now stands at about 1,500 queries.
âIt evolved into this very visible thing,â says Long, a researcher with Computer Sciences Corp. and author of Google Hacking for Penetration Testers. âThe sheer weight and breadth of the stuff that we dug up just made people go, âWow.'â
Long, who talks about his Google hacks with a comicâs timing and a laid-back style, says that he has always been a hacker at heart. He claims to have legitimately broken into hundreds of computer networks in his capacity as a professional security researcher, a job he came to only after abandoning his âwear a stupid suit and climb the corporate ladder phase.â
The list of what Long and his fellow Google hackers have been able to dig up is impressive: passwords, credit card numbers and unsecured Web interfaces to things like PBXs, routers and Web sites.
Hackers also use Google for reconnaissance. One of the most basic techniques is to wait for a major security bulletin and then use Google to search for Web sites that are âpowered byâ the buggy software. Attackers can also map out computer networks using Googleâs database, making it impossible for the networksâ administrators to block the snooper.
Often, this kind of information comes in the form of apparently nonsensical information, something that Long calls âGoogle turds.â For example, because there is no such thing as a Web site with the URL ânasa,â a Google search for the query âsite:nasaâ should turn up zero results. Instead, it turns up what appears to be a list of servers, offering an insight into the structure of NASAâs internal network, he says.
But some of the most interesting hacks occur when Googleâs servers are tricked into doing work for the hackers, Long says. A recent trend has been to create Web pages with thousands of fake links that trick Google into doing hacker reconnaissance work. The technique works on Web sites that require URLs with embedded user names and passwords for access to some areas.
Continue Reading
The Side Effect of Vibe Coding Nobody Talks About
A subtle shift from AI coding: reading code faster, and why tiny diffs suddenly feel like a slowdown worth unpacking.
From WordPress to Jekyll: Rebuilding My Digital Home
Andrew Miracle chronicles migrating his site from WordPress to Jekyll, and why AI-native workflows fit a digital home...
Vibe Coding and the Death of Knowing What You're Doing
Andrew Miracle on vibe coding, the blurred line between juniors and seniors, and why nobody cares how the spaghetti w...
Johnny Long says he has never met a Google employee. And yet he is at the center of a community of security experts and search engine enthusiasts that might be developing some of the most interesting uses of Google technology today.