As the number of websites and amount of information has increased, modern lives rely more on search engines to scoop up relevant piece of information out of Information Sea. In response to rapidly growing amount of information on the web space, major search engine companies such as Google, Yahoo, and MSN crawl web servers and index crawled information more frequently and thoroughly on the global level. Furthermore, to stay on top of the competitive search engine market, they diligently improve search algorithm and endeavor to provide Internet users with easy-to-use search interface. Due to this diligent and competing effort of search engine companies, Internet users can freely access billions of pages of information regardless of time and space constraints with a simple typing and clicking. Google Hacking uses the Google search engine to locate sensitive information or to find vulnerabilities that may be exploited. This paper evaluates how much effort it takes to get Google Hacking to work and how serious the threat of Google Hacking is. The paper discusses the implementation and impact of Google hacking in Internet security.