gogogo
Syndetics cover image
Image from Syndetics

Google hacking for penetration testers / Johnny Long ; foreword by Ed Skoudis.

By: Contributor(s): Material type: TextTextPublication details: Rockland, Mass. : Syngress, c2005.Description: xxiv, 502 p. : ill. ; 24 cmISBN:
  • 1931836361
  • 9781931836364
Subject(s):
Contents:
Google searching basics -- Advanced operators -- Google hacking basics -- Pre-assessment -- Network mapping -- Locating exploits and finding targets -- Ten simple security searches that work -- Tracking down web servers, login portals, and network hardware -- Usernames, passwords, and secret stuff, oh my! -- Document grinding and database digging -- Protecting yourself from Google hackers -- Automating Google searches / James C. Foster.
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Standard Loan Thurles Library Main Collection 025.04 LON (Browse shelf(Opens below)) 1 Available R16869KRCT

Enhanced descriptions from Syndetics:

Google, the most popular search engine worldwide, provides web surfers with an easy-to-use guide to the Internet, with web and image searches, language translation, and a range of features that make web navigation simple enough for even the novice user. What many users dont realize is that the deceptively simple components that make Google so easy to use are the same features that generously unlock security flaws for the malicious hacker. Vulnerabilities in website security can be discovered through Google hacking, techniques applied to the search engine by computer criminals, identity thieves, and even terrorists to uncover secure information. This book beats Google hackers to the punch, equipping web administrators with penetration testing applications to ensure their site is invulnerable to a hackers search. Penetration Testing with Google Hacks explores the explosive growth of a technique known as Google Hacking. When the modern security landscape includes such heady topics as blind SQL injection and integer overflows, it's refreshing to see such a deceptively simple tool bent to achieve such amazing results; this is hacking in the purest sense of the word. login portals, execute port scans and CGI scans, fingerprint web servers, locate incredible information caches such as firewall and IDS logs, password databases, SQL dumps and much more - all without sending a single packet to the target Borrowing the techniques pioneered by malicious Google hackers, this talk aims to show security practitioners how to properly protect clients from this often overlooked and dangerous form of information leakage.

Includes index.

Google searching basics -- Advanced operators -- Google hacking basics -- Pre-assessment -- Network mapping -- Locating exploits and finding targets -- Ten simple security searches that work -- Tracking down web servers, login portals, and network hardware -- Usernames, passwords, and secret stuff, oh my! -- Document grinding and database digging -- Protecting yourself from Google hackers -- Automating Google searches / James C. Foster.

Table of contents provided by Syndetics

  • Why Bother w/Google for an Assessment Advanced Operators
  • Google Hacking Basics Pre-Assessment
  • Mapping the Target Network
  • Locating Exploits and Finding Targets
  • 10 Simple searches
  • Tracking Down Web Servers
  • Login Portals and Network Hardware Usernames
  • Passwords and Other Secret Stuff Document
  • Grinding and Database Digging Protecting
  • Yourself From Google Hackers Programming
  • Google Searches

Powered by Koha