In which phase of the ethical hacking process can Google hacking be employed?

Posted by: Pdfprep Category: 312-50v10 Tags: , ,

In which phase of the ethical hacking process can Google hacking be employed?

This is a technique that involves manipulating a search string with specific operators to search for vulnerabilities.

Example:

allintitle: root passwd
A . Maintaining Access
B . Gaining Access
C . Reconnaissance
D . Scanning and Enumeration

Answer: C

Leave a Reply

Your email address will not be published.