Google hacking for penetration testers / Johnny Long ; foreword by Ed Skoudis.

Annotation

Saved in:
Bibliographic Details
Main Author: Long, Johnny
Format: eBook
Language:English
Published: Rockland, Mass. : Syngress, ©2005.
Subjects:
Online Access:Click for online access

MARC

LEADER 00000cam a2200000 a 4500
001 ocm57308594
003 OCoLC
005 20240809213013.0
006 m o d
007 cr cnu|||unuuu
008 041221s2005 mau o 001 0 eng d
040 |a N$T  |b eng  |e pn  |c N$T  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCF  |d DKDLA  |d REDDC  |d S4S  |d NTG  |d BMU  |d CEF  |d EBLCP  |d ZCU  |d MERUC  |d CCO  |d E7B  |d OPELS  |d OKU  |d FVL  |d NLGGC  |d AU@  |d YDXCP  |d IDEBK  |d DEBSZ  |d OCLCQ  |d UMI  |d MUX  |d OCLCQ  |d COO  |d OCLCQ  |d AZK  |d COCUF  |d CNNOR  |d SUR  |d PIFBR  |d OCLCQ  |d SAV  |d OCLCQ  |d OCLCO  |d WY@  |d U3W  |d LUE  |d STF  |d BRL  |d WRM  |d D6H  |d NRAMU  |d ICG  |d INT  |d VT2  |d TOF  |d OCLCQ  |d OCLCO  |d G3B  |d TKN  |d OCLCQ  |d OCLCO  |d PUG  |d LEAUB  |d DKC  |d OCLCQ  |d M8D  |d OCLCQ  |d INARC  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL  |d SXB  |d OCLCQ 
019 |a 62792944  |a 70746517  |a 85789357  |a 122347573  |a 162598728  |a 181838823  |a 191034957  |a 475411152  |a 475723395  |a 507200730  |a 559434557  |a 646725673  |a 722324608  |a 728022500  |a 780914879  |a 823829937  |a 823899644  |a 824090912  |a 824138673  |a 856957715  |a 888766763  |a 961530387  |a 962663714  |a 1037508542 
020 |a 159749013X  |q (electronic bk.) 
020 |a 9781597490139  |q (electronic bk.) 
020 |a 1931836361 
020 |a 9781931836364 
020 |a 9780080478050 
020 |a 0080478050 
020 |a 1281055948 
020 |a 9781281055941 
035 |a (OCoLC)57308594  |z (OCoLC)62792944  |z (OCoLC)70746517  |z (OCoLC)85789357  |z (OCoLC)122347573  |z (OCoLC)162598728  |z (OCoLC)181838823  |z (OCoLC)191034957  |z (OCoLC)475411152  |z (OCoLC)475723395  |z (OCoLC)507200730  |z (OCoLC)559434557  |z (OCoLC)646725673  |z (OCoLC)722324608  |z (OCoLC)728022500  |z (OCoLC)780914879  |z (OCoLC)823829937  |z (OCoLC)823899644  |z (OCoLC)824090912  |z (OCoLC)824138673  |z (OCoLC)856957715  |z (OCoLC)888766763  |z (OCoLC)961530387  |z (OCoLC)962663714  |z (OCoLC)1037508542 
050 4 |a TK5105.885.G66  |b L66 2005eb 
072 7 |a COM  |x 069010  |2 bisacsh 
072 7 |a COM  |x 030000  |2 bisacsh 
072 7 |a UZF  |2 bicssc 
049 |a HCDD 
100 1 |a Long, Johnny. 
245 1 0 |a Google hacking for penetration testers /  |c Johnny Long ; foreword by Ed Skoudis. 
260 |a Rockland, Mass. :  |b Syngress,  |c ©2005. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file 
505 0 |a Google searching basics -- Advanced operators -- Google hacking basics -- Pre-assessment -- Network mapping -- Locating exploits and finding targets -- Ten simple security searches that work -- Tracking down web servers, login portals, and network hardware -- Usernames, passwords, and secret stuff, oh my! -- Document grinding and database digging -- Protecting yourself from Google hackers -- Automating Google searches / James C. Foster. 
520 8 |a Annotation  |b Penetration Testing with Google Hacks explores the explosive growth of a technique known as "Google Hacking." When the modern security landscape includes such heady topics as "blind SQL injection" and "integer overflows," it's refreshing to see such a deceptively simple tool bent to achieve such amazing results; this is hacking in the purest sense of the word. Readers will learn how to torque Google to detect SQL injection points and login portals, execute port scans and CGI scans, fingerprint web servers, locate incredible information caches such as firewall and IDS logs, password databases, SQL dumps and much more - all without sending a single packet to the target! Borrowing the techniques pioneered by malicious "Google hackers," this talk aims to show security practitioners how to properly protect clients from this often overlooked and dangerous form of information leakage 
520 8 |a Annotation  |b You Got that With Google? What many users don't realize is that the deceptively simple components that make Google so easy to use are the same features that generously unlock security flaws for the malicious hacker. Vulnerabilities in website security can be discovered through Google hacking, techniques applied to the search engine by computer criminals, identity thieves, and even terrorists to uncover secure information. This book beats Google hackers to the punch. 
630 0 0 |a Google. 
630 0 7 |a Google.  |2 blmlsh 
630 0 7 |a Google  |2 fast 
650 0 |a Web search engines. 
650 0 |a Internet searching. 
650 0 |a Internet programming. 
650 7 |a COMPUTERS  |x Online Services.  |2 bisacsh 
650 7 |a COMPUTERS  |x System Administration  |x Storage & Retrieval.  |2 bisacsh 
650 7 |a Web search engines.  |2 blmlsh 
650 7 |a Internet searching.  |2 blmlsh 
650 7 |a Internet programming.  |2 blmlsh 
650 7 |a Internet programming  |2 fast 
650 7 |a Internet searching  |2 fast 
650 7 |a Web search engines  |2 fast 
758 |i has work:  |a Google hacking (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGGkTPcwcgVXMcxWhYhQC3  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Long, Johnny.  |t Google hacking for penetration testers.  |d Rockland, Mass. : Syngress, ©2005  |z 9781931836364  |w (OCoLC)57496423 
856 4 0 |u https://ebookcentral.proquest.com/lib/holycrosscollege-ebooks/detail.action?docID=294147  |y Click for online access 
903 |a EBC-AC 
994 |a 92  |b HCD