Johnny Long. Google Hacking For Penetration Testers

Тема в разделе "Литература", создана пользователем pk2002, 28 июн 2007.

Статус темы:
Модераторы: Hilo
  1. pk2002


    14 ноя 2006
    Немного старовата, но может кому-то пригодится. Обещают в июле выпустить 2-е издание


    Johnny Long, "Google Hacking For Penetration Testers"
    Syngress | ISBN: 1931836361 | Edition - 2005 | PDF | 528 pages | 9.7 MB

    Can you guard against Google Hacking? Google’s advanced search capabilities are being used on an increasing basis by some to harvest information from the Web. Sensitive documents, stolen credit card information, even servers behind corporate firewalls can be found using Google searches.

    Are you the type of person who needs to know how to torque Google to detect SQL injection points and login portals, execute port scans and CGI scans, fingerprint web servers, locate incredible information caches such as firewall and IDS logs, password databases, SQL dumps and much more – all without sending a single packet to the target! Then Google Hacking for Penetration Testers is for you. By reverse engineering the techniques of malicious "Google hackers," this book shows security practitioners how to properly protect their servers from this often overlooked and dangerous form of information leakage.

    Chapter 01 - Google Searching Basics
    Chapter 02 - Advanced Operators
    Chapter 03 - Google Hacking Basics
    Chapter 04 - Network Mapping
    Chapter 05 - Locating Exploits and Finding Targets
    Chapter 06 - Ten Simple Security Searches That Work
    Chapter 07 - Tracking Down Web Servers, Login Portals, and Network Hardware
    Chapter 08 - Usernames, Passwords, and Secret Stuff, Oh My!
    Chapter 09 - Document Grinding and Database Digging
    Chapter 10 - Protecting Yourself from Google Hackers
    Chapter 11 - Automating Google Searches
    Appendix A - Professional Security Testing
    Appendix B - An Introduction to Web Application Security
    password: ganelon
    zaqwsx_ нравится это.
Статус темы: