PdfPrep.com

In which phase of the ethical hacking process can Google hacking be employed?

In which phase of the ethical hacking process can Google hacking be employed?

This is a technique that involves manipulating a search string with specific operators to search for vulnerabilities.

Example:

allintitle: root passwd
A . Maintaining Access
B . Gaining Access
C . Reconnaissance
D . Scanning and Enumeration

Answer: C

Exit mobile version