Google hacking for penetration testers. Volume 2 /
A self-respecting Google hacker spends hours trolling the Internet for juicy stuff. Firing off search after search, they thrive on the thrill of finding clean, mean, streamlined queries and get a real rush from sharing those queries and trading screenshots of their findings. I know because Ive seen...
Main Author: | |
---|---|
Format: | Licensed eBooks |
Language: | English |
Published: |
Burlington, MA :
Syngress Pub.,
©2008.
|
Online Access: | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=230833 |
Table of Contents:
- Why Bother w/Google for an Assessment
- Advanced Operators
- Google Hacking Basics
- Pre-Assessment
- Mapping the Target Network
- Locating Exploits and Finding Targets
- 10 Simple searches
- Tracking Down Web Servers, Login Portals and Network Hardware
- Usernames, Passwords and Other Secret Stuff
- Document Grinding and Database Digging
- Protecting Yourself From Google Hackers
- Programming Google Searches.