Google hacking for penetration testers /
Annotation
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Rockland, Mass. :
Syngress,
©2005.
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | EBOOKCENTRAL_ocm57308594 | ||
003 | OCoLC | ||
005 | 20240329122006.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 041221s2005 mau o 001 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d OCLCQ |d OCLCO |d OCLCQ |d OCLCF |d DKDLA |d REDDC |d S4S |d NTG |d BMU |d CEF |d EBLCP |d ZCU |d MERUC |d CCO |d E7B |d OPELS |d OKU |d FVL |d NLGGC |d AU@ |d YDXCP |d IDEBK |d DEBSZ |d OCLCQ |d UMI |d MUX |d OCLCQ |d COO |d OCLCQ |d AZK |d COCUF |d CNNOR |d SUR |d PIFBR |d OCLCQ |d SAV |d OCLCQ |d OCLCO |d WY@ |d U3W |d LUE |d STF |d BRL |d WRM |d D6H |d NRAMU |d ICG |d INT |d VT2 |d TOF |d OCLCQ |d OCLCO |d G3B |d TKN |d OCLCQ |d OCLCO |d PUG |d LEAUB |d DKC |d OCLCQ |d M8D |d OCLCQ |d INARC |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 62792944 |a 70746517 |a 85789357 |a 122347573 |a 162598728 |a 181838823 |a 191034957 |a 475411152 |a 475723395 |a 507200730 |a 559434557 |a 646725673 |a 722324608 |a 728022500 |a 780914879 |a 823829937 |a 823899644 |a 824090912 |a 824138673 |a 856957715 |a 888766763 |a 961530387 |a 962663714 |a 1037508542 | ||
020 | |a 159749013X |q (electronic bk.) | ||
020 | |a 9781597490139 |q (electronic bk.) | ||
020 | |a 1931836361 | ||
020 | |a 9781931836364 | ||
020 | |a 9780080478050 | ||
020 | |a 0080478050 | ||
020 | |a 1281055948 | ||
020 | |a 9781281055941 | ||
029 | 1 | |a AU@ |b 000048757249 | |
029 | 1 | |a AU@ |b 000051860003 | |
029 | 1 | |a AU@ |b 000053246795 | |
029 | 1 | |a AU@ |b 000054936763 | |
029 | 1 | |a CHNEW |b 001004776 | |
029 | 1 | |a DEBBG |b BV042307377 | |
029 | 1 | |a DEBBG |b BV044124167 | |
029 | 1 | |a DEBSZ |b 355391899 | |
029 | 1 | |a DEBSZ |b 405314043 | |
029 | 1 | |a DEBSZ |b 430397364 | |
029 | 1 | |a DEBSZ |b 449065677 | |
029 | 1 | |a GBVCP |b 785347151 | |
029 | 1 | |a HEBIS |b 291465382 | |
029 | 1 | |a NZ1 |b 12018934 | |
035 | |a (OCoLC)57308594 |z (OCoLC)62792944 |z (OCoLC)70746517 |z (OCoLC)85789357 |z (OCoLC)122347573 |z (OCoLC)162598728 |z (OCoLC)181838823 |z (OCoLC)191034957 |z (OCoLC)475411152 |z (OCoLC)475723395 |z (OCoLC)507200730 |z (OCoLC)559434557 |z (OCoLC)646725673 |z (OCoLC)722324608 |z (OCoLC)728022500 |z (OCoLC)780914879 |z (OCoLC)823829937 |z (OCoLC)823899644 |z (OCoLC)824090912 |z (OCoLC)824138673 |z (OCoLC)856957715 |z (OCoLC)888766763 |z (OCoLC)961530387 |z (OCoLC)962663714 |z (OCoLC)1037508542 | ||
050 | 4 | |a TK5105.885.G66 |b L66 2005eb | |
072 | 7 | |a COM |x 069010 |2 bisacsh | |
072 | 7 | |a COM |x 030000 |2 bisacsh | |
072 | 7 | |a UZF |2 bicssc | |
082 | 0 | 4 | |a 025.04 |2 22 |
049 | |a UAMI | ||
100 | 1 | |a Long, Johnny. | |
245 | 1 | 0 | |a Google hacking for penetration testers / |c Johnny Long ; foreword by Ed Skoudis. |
260 | |a Rockland, Mass. : |b Syngress, |c ©2005. | ||
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file | ||
505 | 0 | |a Google searching basics -- Advanced operators -- Google hacking basics -- Pre-assessment -- Network mapping -- Locating exploits and finding targets -- Ten simple security searches that work -- Tracking down web servers, login portals, and network hardware -- Usernames, passwords, and secret stuff, oh my! -- Document grinding and database digging -- Protecting yourself from Google hackers -- Automating Google searches / James C. Foster. | |
520 | 8 | |a Annotation |b Penetration Testing with Google Hacks explores the explosive growth of a technique known as "Google Hacking." When the modern security landscape includes such heady topics as "blind SQL injection" and "integer overflows," it's refreshing to see such a deceptively simple tool bent to achieve such amazing results; this is hacking in the purest sense of the word. Readers will learn how to torque Google to detect SQL injection points and login portals, execute port scans and CGI scans, fingerprint web servers, locate incredible information caches such as firewall and IDS logs, password databases, SQL dumps and much more - all without sending a single packet to the target! Borrowing the techniques pioneered by malicious "Google hackers," this talk aims to show security practitioners how to properly protect clients from this often overlooked and dangerous form of information leakage | |
520 | 8 | |a Annotation |b You Got that With Google? What many users don't realize is that the deceptively simple components that make Google so easy to use are the same features that generously unlock security flaws for the malicious hacker. Vulnerabilities in website security can be discovered through Google hacking, techniques applied to the search engine by computer criminals, identity thieves, and even terrorists to uncover secure information. This book beats Google hackers to the punch. | |
590 | |a ProQuest Ebook Central |b Ebook Central Academic Complete | ||
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
630 | 0 | 0 | |a Google. |
630 | 0 | 7 | |a Google. |2 blmlsh |
630 | 0 | 7 | |a Google |2 fast |
650 | 0 | |a Web search engines. | |
650 | 0 | |a Internet searching. | |
650 | 0 | |a Internet programming. | |
650 | 6 | |a Moteurs de recherche sur Internet. | |
650 | 6 | |a Recherche sur Internet. | |
650 | 6 | |a Programmation Internet. | |
650 | 7 | |a COMPUTERS |x Online Services. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x System Administration |x Storage & Retrieval. |2 bisacsh | |
650 | 7 | |a Web search engines. |2 blmlsh | |
650 | 7 | |a Internet searching. |2 blmlsh | |
650 | 7 | |a Internet programming. |2 blmlsh | |
650 | 7 | |a Internet programming |2 fast | |
650 | 7 | |a Internet searching |2 fast | |
650 | 7 | |a Web search engines |2 fast | |
653 | |a Andre fag (naturvidenskab og teknik) |a Andre fag | ||
758 | |i has work: |a Google hacking (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGGkTPcwcgVXMcxWhYhQC3 |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Long, Johnny. |t Google hacking for penetration testers. |d Rockland, Mass. : Syngress, ©2005 |z 9781931836364 |w (OCoLC)57496423 |
856 | 4 | 0 | |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=294147 |z Texto completo |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/1931836361/?ar |z Texto completo |
938 | |a ProQuest Ebook Central |b EBLB |n EBL218363 | ||
938 | |a ebrary |b EBRY |n ebr10070405 | ||
938 | |a EBSCOhost |b EBSC |n 123959 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n 105594 | ||
938 | |a Internet Archive |b INAR |n googlehackingfor0000long | ||
938 | |a YBP Library Services |b YANK |n 2360390 | ||
938 | |a YBP Library Services |b YANK |n 2613255 | ||
994 | |a 92 |b IZTAP |