Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • 1
    Online Resource
    Online Resource
    Waltham, MA :Syngress,
    UID:
    almafu_9958098657602883
    Format: 1 online resource (viii, 225 pages) : , color illustrations
    Edition: 3rd ed.
    ISBN: 9780128029824 , 012802982X
    Series Statement: Gale eBooks
    Content: Google is the most popular search engine ever created, but Google’s search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers, Third Edition, shows you how security professionals and system administratord manipulate Google to find this sensitive information and "self-police" their own organizations. You will learn how Google Maps and Google Earth provide pinpoint military accuracy, see how bad guys can manipulate Google to create super worms, and see how they can "mash up" Google with Facebook, LinkedIn, and more for passive reconnaissance. This third edition includes completely updated content throughout and all new hacks such as Google scripting and using Google hacking with other search engines and APIs. Noted author Johnny Long, founder of Hackers for Charity, gives you all the tools you need to conduct the ultimate open source reconnaissance and penetration testing. Third edition of the seminal work on Google hacking Google hacking continues to be a critical phase of reconnaissance in penetration testing and Open Source Intelligence (OSINT) Features cool new hacks such as finding reports generated by security scanners and back-up files, finding sensitive info in WordPress and SSH configuration, and all new chapters on scripting Google hacks for better searches as well as using Google hacking with other search engines and APIs
    Note: Includes index. , Cover; Title Page; Copyright Page; Contents; Chapter 1 - Google Search Basics; Introduction; Exploring Google's web-based interface; Google's Web Search Page; Google Web Results Page; Google Groups; Google Image Search; Google Preferences; Language Tools; Building Google Queries; The Golden Rules of Google Searching; Google Queries are not Case Sensitive; Google Wildcards; Google Reserves the Right to Ignore You; 32-Word Limit; Basic Searching; Using Boolean Operators and Special Characters; Search Reduction; Working With Google URLs; URL Syntax; Special Characters , Putting the Pieces TogetherSummary; Fast track solutions; Exploring Google's Web-Based Interface; Building Google Queries; Working With Google URLs; Links to Sites; Platform Tool Location; Frequently Asked Questions; Chapter 2 - Advanced Operators; Introduction; Operator syntax; Troubleshooting your syntax; Introducing Google's advanced operators; "Intitle" and "allintitle": search within the title of a page; Allintext: locate a string within the text of a page; Inurl and allinurl: finding text in a URL; Site: narrow search to specific sites; Filetype: search for files of a specific type , Link: search for links to a pageInanchor: locate text within link text; Cache: show the cached version of a page; Numrange: search for a number; Daterange: search for pages published within a certain date range; Info: show Google's summary information; Related: show related sites; Stocks: search for stock information; Define: show the definition of a term; Colliding operators and bad search-fu; Summary; Fast track solutions; Links to sites; Chapter 3 - Google Hacking Basics; Introduction; Anonymity with caches; Directory listings; Locating directory listings; Finding specific directories , Finding specific filesServer versioning; Going out on a limb: traversal techniques; Directory Traversal; Incremental Substitutions; Extension Walking; Summary; Fast track solutions; Anonymity With Caches; Locating Directory Listings; Locating Specific Directories in a Listing; Locating Specific Files in a Directory Listing; Server Versioning With Directory Listings; Directory Traversal; Incremental Substitution; Extension Walking; Chapter 4 - Document Grinding and Database Digging; Introduction; Configuration files; Locating files; Log files; Office documents; Database digging; Login portals , Scraping it yourself: requesting and receiving responses , English
    Additional Edition: ISBN 9780128029640
    Additional Edition: ISBN 0128029641
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Amsterdam :Elsevier,
    UID:
    almafu_BV044392163
    Format: 1 Online-Ressource (viii, 225 Seiten) : , Illustrationen.
    Edition: Third edition
    ISBN: 978-0-12-802982-4 , 978-0-12-802964-0
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-0-12-802964-0
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Google ; Hacker ; Google ; Reverse Engineering ; Datensicherung ; Computersicherheit ; Google ; Penetrationstest ; Google ; Kryptoanalyse
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Waltham, MA :Elsevier,
    UID:
    almahu_9948622507802882
    Format: 1 online resource (236 pages) : , illustrations (some color)
    Edition: Third edition.
    ISBN: 9780128029824 (e-book)
    Note: Includes index.
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 9780128003824?
Did you mean 9780128022924?
Did you mean 9780128023822?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages