Long | Google Hacking for Penetration Testers | E-Book | sack.de
E-Book

E-Book, Englisch, 448 Seiten, Web PDF

Long Google Hacking for Penetration Testers


1. Auflage 2004
ISBN: 978-0-08-047805-0
Verlag: Elsevier Science & Techn.
Format: PDF
Kopierschutz: 1 - PDF Watermark

E-Book, Englisch, 448 Seiten, Web PDF

ISBN: 978-0-08-047805-0
Verlag: Elsevier Science & Techn.
Format: PDF
Kopierschutz: 1 - PDF Watermark



Google, the most popular search engine worldwide, provides web surfers with an easy-to-use guide to the Internet, with web and image searches, language translation, and a range of features that make web navigation simple enough for even the novice user. What many users don't realize is that the deceptively simple components that make Google so easy to use are the same features that generously unlock security flaws for the malicious hacker. Vulnerabilities in website security can be discovered through Google hacking, techniques applied to the search engine by computer criminals, identity thieves, and even terrorists to uncover secure information. This book beats Google hackers to the punch, equipping web administrators with penetration testing applications to ensure their site is invulnerable to a hacker's search.

Penetration Testing with Google Hacks explores the explosive growth of a technique known as Google Hacking. When the modern security landscape includes such heady topics as blind SQL injection and integer overflows, it's refreshing to see such a deceptively simple tool bent to achieve such amazing results, this is hacking in the purest sense of the word. Readers will learn how to torque Google to detect SQL injection points and login portals, execute port scans and CGI scans, fingerprint web servers, locate incredible information caches such as firewall and IDS logs, password databases, SQL dumps and much more - all without sending a single packet to the target! Borrowing the techniques pioneered by malicious Google hackers, this talk aims to show security practitioners how to properly protect clients from this often overlooked and dangerous form of information leakage.

*First book about Google targeting IT professionals and security leaks through web browsing.

*Author Johnny Long, the authority on Google hacking, will be speaking about Google Hacking at the Black
Hat 2004 Briefing. His presentation on penetrating security flaws with Google is expected to create a lot of buzz and exposure for the topic.

*Johnny Long's Web site hosts the largest repository of Google security exposures and is the most popular destination for security professionals who want to learn about the dark side of Google.

Long Google Hacking for Penetration Testers jetzt bestellen!

Autoren/Hrsg.


Weitere Infos & Material


1;Cover;1
2;Contents;14
3;Foreword;24
4;Google Searching Basics;26
5;Advanced Operators;66
6;Google Hacking Basics;112
7;Pre-Assessment;146
8;Network Mapping;176
9;Locating Exploits and Finding Targets;206
10;Ten Simple Security Searches That Work;228
11;Tracking Down Web Servers, Login Portals, and Network Hardware;246
12;Usernames, Passwords, and Secret Stuff, Oh My!;288
13;Document Grinding and Database Digging;314
14;Protecting Yourself from Google Hackers;346
15;Automating Google Searches;388
16;Professional Security Testing;442
17;An Introduction to Web Application Security;462
18;Index;510
19;Related Titles;529



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.