The Google search engine found at offers many different features including language and document translation, web, image, newsgroups, catalog and news searches and more. These features offer obvious benefits to even the most uninitiated web surfer, but these same features allow for far more nefarious possibilities to the most malicious Internet users including hackers, computer criminals, identity thieves and even terrorists. | The Google Hacker s Guide ohnny@ http The Google Hacker s Guide Understanding and Defending Against the Google Hacker by Johnny Long ohnny@ http - Page 1 - The Google Hacker s Guide ohnny@ http GOOGLE SEARCH Google web Basic search GOOGLE ADVANCED About Google s URL GOOGLE HACKING Domain searches using the site Finding googleturds using the site Site mapping More about the site Finding Directory Versioning Obtaining the Web Server Software via directory via default via manuals help pages and sample Using Google to find interesting files and inurl filetype .24 combination file Using Source Code to find vulnerable Using Google as a CGI ABOUT GOOGLE AUTOMATED OTHER GOOGLE Google Google A WORD ABOUT HOW GOOGLE FINDS PAGES OPERA .35 PROTECTING YOURSELF FROM GOOGLE THANKS AND - Page 2 - The Google Hacker s Guide ohnny@ http The Google search engine found at offers many different features including language and document translation web image newsgroups catalog and news searches and more. These features offer obvious benefits to even the most uninitiated web surfer but these same features allow for far more nefarious possibilities to the most malicious Internet users including hackers computer criminals identity thieves and even terrorists. This paper outlines the more nefarious applications of the Google search engine techniques that have collectively been termed Google hacking. The intent of this paper is to educate web administrators and the security community in the .