Google Hacking for Penetration TestersGoogle, the most popular search engine worldwide, provides web surfers with an easy-to-use guide to the Internet, with web and image searches, language translation, and a range of features that make web navigation simple enough for even the novice user. What many users don't realize is that the deceptively simple components that make Google so easy to use are the same features that generously unlock security flaws for the malicious hacker. Vulnerabilities in website security can be discovered through Google hacking, techniques applied to the search engine by computer criminals, identity thieves, and even terrorists to uncover secure information. This book beats Google hackers to the punch, equipping web administrators with penetration testing applications to ensure their site is invulnerable to a hacker's search. Penetration Testing with Google Hacks explores the explosive growth of a technique known as "Google Hacking." When the modern security landscape includes such heady topics as "blind SQL injection" and "integer overflows," it's refreshing to see such a deceptively simple tool bent to achieve such amazing results; this is hacking in the purest sense of the word. Readers will learn how to torque Google to detect SQL injection points and login portals, execute port scans and CGI scans, fingerprint web servers, locate incredible information caches such as firewall and IDS logs, password databases, SQL dumps and much more - all without sending a single packet to the target! Borrowing the techniques pioneered by malicious "Google hackers," this talk aims to show security practitioners how to properly protect clients from this often overlooked and dangerous form of information leakage.*First book about Google targeting IT professionals and security leaks through web browsing. *Author Johnny Long, the authority on Google hacking, will be speaking about "Google Hacking" at the Black Hat 2004 Briefing. His presentation on penetrating security flaws with Google is expected to create a lot of buzz and exposure for the topic. *Johnny Long's Web site hosts the largest repository of Google security exposures and is the most popular destination for security professionals who want to learn about the dark side of Google. |
Contents
| 1 | |
Advanced Operators | 41 |
Google Hacking Basics | 87 |
PreAssessment | 121 |
Network Mapping | 151 |
Locating Exploits and Finding Targets | 181 |
Ten Simple Security Searches That Work | 203 |
Tracking Down Web Servers Login Portals and Network Hardware | 221 |
Usernames Passwords and Secret Stuff Oh My | 263 |
Other editions - View all
Common terms and phrases
admin advanced operators Advanced Search allows Apache attacker automated base search browser cached chapter configuration file Continued Table crawled credentials cross-site scripting CuteNews default directory listing displayed document domain names e-mail addresses error messages example exploit file extensions filenames filetype Frequently Asked Questions GHDB Google API Google Groups Google Hacking Google Local Google query Google search Google's Gooscan hacker hits host install interface Internet Internet Information Services intext intitle intitle:index.of inurl language log files login portals look Microsoft options OSSTMM output packet parameter password phishing phpMyAdmin phrase proxy server Queries That Locate request reveal robots.txt script search engine search results search terms security testing shown in Figure simply SiteDigger socket source code specific SQL injection string target tcpdump techniques tool Underground Googling UNIX username vulnerabilities Web application Windows registry word
Popular passages
Page i - Through this site, we've been able to provide readers a real time extension to the printed book. As a registered owner of this book, you will qualify for free access to our members-only solutions@syngress.com program. Once you have registered, you will enjoy several benefits, including: • Four downloadable e-booklets on topics related to the book. Each booklet is approximately 20-30 pages in Adobe PDF format.
Page 9 - If you do not find your native language in the pulldown above, you can help Google create it through our Google in Your...
Page ix - Foster holds degrees and certifications in Business, Software Engineering, Management of Information Systems, and numerous computer-related or programming-related concentrations and has attended or conducted research at the Yale School of Business, Harvard University, Capitol College, and the University of Maryland.
Page 27 - Search with all of the words with the exact phrase with at least one of the words | without the words...


