This document outlines a presentation on finding cryptographic secrets using Google searches. It covers advanced Google search parameters and examples of hacking techniques. The presentation will discuss finding hashed passwords, secret keys, public keys, private keys, encrypted messages, and signed messages through Google searches. Automatic tools for searching are also mentioned, as well as countermeasures to prevent discovery of sensitive information.