Browse Definitions :
Definition

Google Hack Honeypot (GHH)

A Google Hack Honeypot (GHH) is a system designed to be vulnerable to sophisticated search engine queries for the purpose of attracting hackers and studying their behavior. 

GHH places an invisible link on the user’s website that can be detected through the use of advanced search operators. Google hacking (sometimes called Google dorking) is the use of advanced search operators to access hard-to-find information. Although Google hacking has many valid research purposes, it's also employed by attackers to gather information that can be used for illicit purposes, such as identity theft or corporate espionage. The reason Google hacking is effective is that neither website security nor corporate assets are adequately protected.

To an attacker, a honeypot acts like a live system, but it doesn’t actually provide access to any important data. A properly configured honeypot also doesn’t provide evidence to a hacker that his actions are being monitored. It should have user accounts, system files and ports that respond to port scans. However, instead of providing access to real backend data, the invisible link on the user website directs would-be hackers to a PHP script that logs their activity.

Administrators can use the information gathered to block access to resources, compile hacking attempt statistics or, if they chose, turn hacker information over to the authorities.

 

This was last updated in September 2014

Continue Reading About Google Hack Honeypot (GHH)

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • biometric verification

    Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing ...

  • password

    A password is a string of characters used to verify the identity of a user during the authentication process.

  • biometrics

    Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

  • virtual memory

    Virtual memory is a memory management technique where secondary memory can be used as if it were a part of the main memory.

Close