Google hacking for penetration testers Volume 2 Volume 2 /

This book helps people find sensitive information on the Web.Google is one of the 5 most popular sites on the internet with more than 380 million unique users per month (Nielsen/NetRatings 8/05). But, Google's search capabilities are so powerful, they sometimes discover content that no one ever...

Descripción completa

Detalles Bibliográficos
Autor principal: Long, Johnny (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Burlington, MA : Syngress Pub c2008.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627603506719
Tabla de Contenidos:
  • Front Cover; Google Hacking for Penetration Testers, Volume 2; Copyright Page; Contents; Chapter 1. Google Searching Basics; Introduction; Exploring Google's Web-based Interface; Building Google Queries; Working With Google URLs; Summary; Solutions Fast Track; Links to Sites; Frequently Asked Questions; Chapter 2. Advanced Operators; Introduction; Operator Syntax; Introducing Google's Advanced Operators; Colliding Operators and Bad Search-Fu; Summary; Solutions Fast Track; Links to Sites; Frequently Asked Questions; Chapter 3. Google Hacking Basics; Introduction; Anonymity with Caches
  • Directory ListingsGoing Out on a Limb: Traversal Techniques; Summary; Solutions Fast Track; Links to Sites; Frequently Asked Questions; Chapter 4. Document Grinding and Database Digging.; Introduction; Configuration Files; Log Files; Database Digging; Automated Grinding; Google Desktop Search; Summary; Solutions Fast Track; Links to Sites; Frequently Asked Questions; Chapter 5. Google's Part in an Information Collection Framework; Introduction; The Principles of Automating Searches; Applications of Data Mining; Collecting Search Terms; Summary; Chapter 6. Locating Exploits and Finding Targets
  • IntroductionLocating Exploit Code; Locating Exploits Via Common Code Strings; Locating Code with Google Code Search; Locating Malware and Executables; Locating Vulnerable Targets; Summary; Solutions Fast Track; Links to Sites; Frequently Asked Questions; Chapter 7. Ten Simple Security Searches That Work; Introduction; site; intitle:index, of; error | warning; login | logon; username | userid I employee.ID I ""your username is ""; password I passcode I ""your password is""; admin I administrator; -ext:html -ext:htm -ext:shtml -ext:asp -ext:php; inurl:temp I inurl:tmp | inurl:backup | inurl:bak
  • intranet | help.deskSummary; Solutions Fast Track; Frequently Asked Questions; Chapter 8. Tracking Down Web Servers, Login Portals, and Network Hardware; Introduction; Locating and Profiling Web Servers; Locating Login Portals; Targeting Web-Enabled Network Devices; Locating Various Network Reports; Locating Network Hardware; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Usernames, Passwords, and Secret Stuff, Oh My!; Introduction; Searching for Usernames; Searching for Passwords; Searching for Credit Card Numbers, Social Security Numbers, and More
  • Searching for Other Juicy InfoSummary; Solutions Fast Track; Frequently Asked Questions; Chapter 10. Hacking Google Services; AJAX Search API; Calendar; Blogger and Google's Blog Search; Signaling Alerts; Google Co-op; Google Code; Chapter 11. Google Hacking Showcase; Introduction; Geek Stuff; Cameras; Telco Gear; Power; Sensitive Info; Social Security Numbers; Beyond Google; Summary; Chapter 12. Protecting Yourself from Google Hackers; Introduction; A Good, Solid Security Policy; Web Server Safeguards; HackingYour Own Site; Getting Help from Google; Summary; Solutions Fast Track
  • Links to Sites