As a registered member of SearchSoftwareQuality.com, you're entitled to a complimentary copy of Chapter 6 of Google Hacking for Penetration Testers, Vol. 2 written by Johnny Long and published by Syngress, a division of Elsevier. " Locating Exploits and Finding Targets" shows you how to find all sorts of horrifyingly common exploits like SQL injection and cross-site scripting (XSS) using Google as an application security tool. The information in this chapter is accessible to the beginner penetration tester. Screenshots and code samples are scattered throughout. Long also includes a large table of vulnerable Web application examples from the Google Hacking Database.
Google is one of the 5 most popular sites on the Internet with more than 380 million unique users per month (Nielsen/NetRatings 8/05). But, Google's search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web including: social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers, Volume 2 shows the art of torqueing Google used by security professionals and system administrators to find this sensitive information and "self-police" their own organizations.
Completely updated and revised for this all new volume! Read about all the new and amazing things that can be done with Google. Johnny reveals basic and advanced search techniques, basic and advanced hacking techniques, multi-engine attack query morphing, and zero-packet target foot printing and recon techniques. Check out Google's search-blocking tactics (and see them bypassed), and learn all about using Google to locate targets Google doesn't even know about!
>> Buy the book
Printed with permission from Syngress, a division of Elsevier. Copyright 2008. "Google Hacking for Penetration Testers, Volume 2" by Johnny Long. For more information about this book, please visit www.syngress.com..
Dig Deeper on Software Security Test Best Practices