Tip

Google Hacking for Penetration Testers, Volume 2: Chapter 6, Locating Exploits and Finding Targets


As a registered member of SearchSoftwareQuality.com, you're entitled to a complimentary copy of Chapter 6 of Google Hacking for Penetration Testers, Vol. 2 written by Johnny Long and published by Syngress, a division of Elsevier. "Locating Exploits and Finding Targets"

    Requires Free Membership to View

shows you how to find all sorts of horrifyingly common exploits like SQL injection and cross-site scripting (XSS) using Google as an application security tool. The information in this chapter is accessible to the beginner penetration tester. Screenshots and code samples are scattered throughout. Long also includes a large table of vulnerable Web application examples from the Google Hacking Database.



Book description:

Google is one of the 5 most popular sites on the Internet with more than 380 million unique users per month (Nielsen/NetRatings 8/05). But, Google's search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web including: social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers, Volume 2 shows the art of torqueing Google used by security professionals and system administrators to find this sensitive information and "self-police" their own organizations.

Completely updated and revised for this all new volume! Read about all the new and amazing things that can be done with Google. Johnny reveals basic and advanced search techniques, basic and advanced hacking techniques, multi-engine attack query morphing, and zero-packet target foot printing and recon techniques. Check out Google's search-blocking tactics (and see them bypassed), and learn all about using Google to locate targets Google doesn't even know about!

Features

  • Completely revised and updated second edition of the best-selling Google Hacking for Penetration Testers.
  • Written by "The Google Guy," Johnny Long, who maintains the world's largest database of Google Hacks.
  • Find your own sensitive data through Google before the bad guys do....which is just a matter of time!
  • >> Read Chapter 6: Locating Exploits and Finding Targets

    >> Buy the book




    Printed with permission from Syngress, a division of Elsevier. Copyright 2008. "Google Hacking for Penetration Testers, Volume 2" by Johnny Long. For more information about this book, please visit www.syngress.com..

    This was first published in November 2007

    There are Comments. Add yours.

     
    TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

    REGISTER or login:

    Forgot Password?
    By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
    Sort by: OldestNewest

    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to:

    Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.