Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our User Agreement and Privacy Policy.
Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our Privacy Policy and User Agreement for details.
Published on
This video takes a closer look at how hackers automate Goggle Hacking by using botnets. Today's hackers leverage the power of Google's search engine and botnets to successfully carry out massive Web attacks. During an attack, hackers can generate more than 80,000 daily queries to probe the Web for vulnerable Web applications. If Google puts into place anti-automation measures to stop hackers from search abuse, then how do hackers succeed? By using botnets! Hackers take advantage of the dispersion of bots to give Google's search engine the impression that individuals are performing a routine search.
Login to see the comments