Goolag 'guide' hacking through Google
An open-source tool that scans for website security errors by exploiting Google's search function has been released by the hacker group "The Cult of the Dead Cow" called Goolag.
The Cult of the Dead Cow said Goolag was created with the aim of supporting webmasters to test the basic level of security for their website and timely patch.
Goolag 'guide' hacking through Google Picture 1
The interface of Goolag version 1.0.0.41.
In the underground world on the Internet, there are also a lot of free security scans (scanner) such as Wikto Scanner but the "black" reputation of the "The Cult of the Dead Cow" 10 years before its launch. Back Orifice (*) helped Goolag become more popular.
" I don't think there's anything new, but it can make it easier to retrieve hacks from Google ," said Robert Hansen, CEO of Sectheory.com and blog founder Ha.ckers.org.
Just as Robert Hansen said. Goolag is not new, but its usage has become easier than previous error scanning tools. Not only hackers, but even people who aren't knowledgeable about hacking techniques can still use it. This is a signal worth worrying about security and website development.
(*) Back Orifice: is seen as a trojan with the ability to support hackers to remotely control a computer using Windows operating system.
You should read it
- SD-WAN security options
- Symposium on IBM Security and Security 2011
- How to create security questions nobody can guess
- What you need to know about an information security analyst
- Learn about terminal security (endpoint security)
- Awareness and experience - the most important factor in every network security process
- IBM developed a new technology to patch security holes
- The basic steps in dealing with network security issues that you need to understand
- Top 5 trends in endpoint security for 2018
- 7 mistakes make Internet security at risk
- 9 misconceptions about security and how to resolve
- Security for smartphones - how to be absolutely secure?
May be interested
Analysis of an attack (Part 3)
Hacker attacks from the network to your computer
Techniques to exploit buffer overflows: Organize memory, stack, call functions, shellcode
Techniques of exploiting buffer overflow errors - Part II
The most basic insights to becoming a Hacker - Part 2
The most basic insights to becoming a Hacker - Part 3