{"id":6226,"date":"2013-09-10T08:13:35","date_gmt":"2013-09-10T12:13:35","guid":{"rendered":"http:\/\/thundercloud.net\/infoave\/new\/?p=6226"},"modified":"2013-09-10T08:13:35","modified_gmt":"2013-09-10T12:13:35","slug":"google-hacking-a-how-to-from-the-friendly-folks-at-the-nsa","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/google-hacking-a-how-to-from-the-friendly-folks-at-the-nsa\/","title":{"rendered":"Google Hacking: A How-to from the friendly folks at the NSA"},"content":{"rendered":"<header role=\"banner\">\n<h3>How to search like a spy: Google&#8217;s secret hacks revealed<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-6227 alignleft\" alt=\"google-hacking\" src=\"http:\/\/thundercloud.net\/infoave\/new\/wp-content\/uploads\/2013\/09\/google-hacking.jpg\" width=\"317\" height=\"191\" srcset=\"https:\/\/www.thundercloud.net\/infoave\/new\/wp-content\/uploads\/2013\/09\/google-hacking.jpg 660w, https:\/\/www.thundercloud.net\/infoave\/new\/wp-content\/uploads\/2013\/09\/google-hacking-300x180.jpg 300w\" sizes=\"(max-width: 317px) 100vw, 317px\" \/><\/p>\n<\/header>\n<section role=\"main\">\n<div>\n<div>\n<div id=\"nfBodyText\">\n<p>The National Security Agency just declassified a hefty 643-page research manual called\u00a0<em>Untangling the Web: A Guide to Internet Research<\/em>\u00a0(<a href=\"http:\/\/www.nsa.gov\/public_info\/_files\/Untangling_the_Web.pdf\" target=\"_blank\">PDF<\/a>) that, at least at first, doesn&#8217;t appear all that interesting. That is, except for one section on page 73: &#8220;Google Hacking.&#8221;<\/p>\n<p>&#8220;Say you&#8217;re a cyberspy for the NSA and you want sensitive inside information on companies in South Africa,&#8221;\u00a0<a href=\"http:\/\/www.wired.com\/threatlevel\/2013\/05\/nsa-manual-on-hacking-internet\/\" target=\"_blank\">explains Kim\u00a0<\/a><a href=\"http:\/\/www.wired.com\/threatlevel\/2013\/05\/nsa-manual-on-hacking-internet\/\" target=\"_blank\">Zetter<\/a><a href=\"http:\/\/www.wired.com\/threatlevel\/2013\/05\/nsa-manual-on-hacking-internet\/\" target=\"_blank\">\u00a0at\u00a0<em>Wired<\/em><\/a>. &#8220;What do you do?&#8221;<\/p>\n<p>Well, you could type the following advanced search into Google \u2014 &#8220;filetype:xls site:za confidential&#8221; \u2014 to uncover a trove of seemingly private spreadsheets. How about an Excel file containing Russian passwords? Try: &#8220;filetype:xls site:ru login.&#8221;<\/p>\n<p>These are just two examples of the numerous private files that are inadvertently uploaded to the Internet, and can be accessed if you know the right Google search terms.<\/p>\n<p>Here are a few more:<\/p>\n<p><img decoding=\"async\" alt=\"\" src=\"http:\/\/media.theweek.com\/img\/generic\/google-stuff\" \/><\/p>\n<p>Pretty neat, huh? Declassified information being what it is, though, some of the search tips can appear a little dated.<\/p>\n<p>And even if keyboard espionage isn&#8217;t really your thing, the document contains a number of practical tips anyone can use to become a better Googler:<\/p>\n<p>* Adding a tilde (~) immediately before a term will search for its synonyms. For example: &#8220;Scary ~animals&#8221; will also search for &#8220;scary creatures,&#8221; etc.<\/p>\n<p>* Repeating a word will help you find more relevant hits. For example a search for &#8220;java coffee coffee coffee&#8221; will cut down on the results about the programming language.<\/p>\n<p>* You can use Google wildcard (*) to replace a term in a query if you don&#8217;t know exactly what you&#8217;re searching for. For example: &#8220;Sacramento is the * of California.&#8221;<\/p>\n<p>Take a look if you&#8217;re interested\u00a0<a href=\"http:\/\/www.nsa.gov\/public_info\/_files\/Untangling_the_Web.pdf\" target=\"_blank\">over here<\/a>. (Via\u00a0<em><a href=\"http:\/\/www.wired.com\/threatlevel\/2013\/05\/nsa-manual-on-hacking-internet\/\" target=\"_blank\">Wired<\/a><\/em>)<\/p>\n<p>This article orginally appeared in May 2013 on &#8220;The Week&#8221; &#8211; <span style=\"text-decoration: underline;\"><a href=\"http:\/\/theweek.com\/article\/index\/243984\/how-to-search-like-a-spy-googles-secret-hacks-revealed#\" target=\"_blank\">you can read the original article here<\/a>.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>How to search like a spy: Google&#8217;s secret hacks revealed The National Security Agency just declassified a hefty 643-page research manual called\u00a0Untangling the Web: A Guide to Internet Research\u00a0(PDF) that, at least at first, doesn&#8217;t appear all that interesting. That is, except for one section on page 73: &#8220;Google Hacking.&#8221; &#8220;Say you&#8217;re a cyberspy for the NSA and\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/google-hacking-a-how-to-from-the-friendly-folks-at-the-nsa\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1462,1,1656],"tags":[],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/6226"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=6226"}],"version-history":[{"count":1,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/6226\/revisions"}],"predecessor-version":[{"id":6228,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/6226\/revisions\/6228"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=6226"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=6226"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=6226"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}