Be the first to like this
This report shows how hackers leverage the power of search engines to conduct cyber reconnaissance. Hackers, armed with a browser and specially crafted search queries (“Dorks”), use botnets to generate more than 80,000 daily queries, identify potential attack targets, and build a picture of the resources within that server that are potentially exposed. Automating the query and result parsing enables the attacker to issue a large number of queries, examine all the returned results, and obtain a filtered list of potentially exploitable sites. As searches are conducted using botnets, and not the hacker’s IP address, the attacker’s identity remains concealed.