Google Dorking & Shodan for Ethical Hackers
This
beginner to intermediate course provides a comprehensive introduction to Google
Dorking and Shodan for ethical hacking reconnaissance. Participants will learn
to identify internet-connected devices, exposed systems, sensitive data, and
vulnerabilities using advanced search techniques. Students will gain hands-on experience using
these tools to conduct reconnaissance on IoT devices and Industrial Control Systems
(ICS), identifying potential security risks in critical infrastructure. The
course also covers defensive strategies to protect sensitive information from
hacker scans. Combining theory with hands-on practice, it equips learners with
practical cybersecurity skills.
Content
- Reconnaissance of internet-connected devices using SHODAN
- Gathering sensitive data using Google Hacking (Google Dorking)
- Defensive strategies to prevent hackers from obtaining information through scanning
Learning Outcomes
- Describe the different phases of ethical hacking and their significance in cybersecurity
- Explain the key features of Shodan, its role as a search engine for internet-connected devices, and perform passive reconnaissance using Shodan
- Execute essential Shodan CLI commands to collect information about devices, services
- Analyze misconfigured IoT devices and Industrial Control Systems (ICS) to identify potential security risks
- Demonstrate the use of Google Dorking (Google Hacking) to uncover sensitive information and assess cybersecurity risks
- Evaluate and implement defensive strategies to prevent hackers from obtaining information through scanning
Training Method
We use PowerPoint slides to teach the theoretical concepts of passive scanning while also providing hands-on experience. This combination enables students to not only understand the theory but also apply it in real-world scenarios.
Organised By
Digital Learning Hub Luxembourg
Certification
Participation OnlyPrerequisites
- Knowledge of operating systems, understanding of OSI model, and familiarity with key network protocols such as IP, TCP, UDP, and ICMP
- Familiarity with IP addresses and ports in computer networks
- Interest in analyzing network protocols in depth
Planning and location
17:30 - 20:30
17:30 - 20:30
17:30 - 20:30
ESCO Skills
ESCO Occupations
Your trainer(s) for this course
