Posted by: Pdfprep
Post Date: November 23, 2020
In which phase of the ethical hacking process can Google hacking be employed?
This is a technique that involves manipulating a search string with specific operators to search for vulnerabilities.
Example:
allintitle: root passwd
A . Maintaining Access
B . Gaining Access
C . Reconnaissance
D . Scanning and Enumeration
Answer: C
Leave a Reply