We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
80,259 News Articles

Goolag offers Google hacking for dummies

Open-source software scans for vulnerabilities

The hacking group Cult of the Dead Cow has released a tool that should make Google hacking a little easier for novices.

Called Goolag, the open-source software lets hackers use the Google search engine to scan websites for vulnerabilities.

This is something that hackers have been doing for years, but it can be complicated - involving custom scripts and tools that sift through the mountain of data available via Google.

The Cult of the Dead Cow is best known for creating the Back Orifice software 10 years ago, which could be used to remotely control a Windows machine.

Like Back Orifice, the software could be used by both legitimate security professionals and criminals. Goolag comes with an easy-to-use graphical interface. It is based on techniques developed by Computer Sciences Corp researcher Johnny Long, a well-known computer hacker who has spent years documenting the way that Google's search engine can be used to uncover security vulnerabilities in the websites it indexes.

In a statement, The Cult of the Dead Cow said that the software is "one more tool for website owners to patch up their online properties".

"It's no big secret that the web is the platform," the statement said. "And this platform pretty much sucks from a security perspective."

There are already free web vulnerability search tools available - such as the Wikto scanning software - but the Cult of the Dead Cow's notoriety will probably help make Goolag popular, security experts said on Friday.

"I don't think it's particularly new, but maybe it makes [Google hacking] more accessible," said Robert Hansen, CEO of Sectheory.com and author of the Ha.ckers.org web security blog.

"It is interesting because it could theoretically represent a lower burden of entry for the novice Google hacker," he added.

Amichai Shulman, chief technology officer with security vendor Imperva, agreed that there are still far too many security vulnerabilities on websites. "Maybe the headlines that this release is getting will serve as a wake-up call for application owners," he said.


IDG UK Sites

5 reasons not to wait for the Apple Watch: Why you shouldn't buy the iWatch

IDG UK Sites

Why local multiplayer gaming is rapidly vanishing: we look at the demise of split-screen and LAN...

IDG UK Sites

How Emotional Debt is damaging digital design

IDG UK Sites

iPhone buying advice: Should I buy an iPhone 6, iPhone 6 Plus, iPhone 5s, or iPhone 5c, or wait for7......