Cargando…

Google hacking for penetration testers. Volume 2 /

A self-respecting Google hacker spends hours trolling the Internet for juicy stuff. Firing off search after search, they thrive on the thrill of finding clean, mean, streamlined queries and get a real rush from sharing those queries and trading screenshots of their findings. I know because Ive seen...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Long, Johnny
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Burlington, MA : Syngress Pub., ©2008.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn228148115
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 080516s2008 maua o 001 0 eng d
040 |a OPELS  |b eng  |e pn  |c OPELS  |d OCLCQ  |d N$T  |d YDXCP  |d IDEBK  |d E7B  |d DKDLA  |d OCLCQ  |d TEFOD  |d A7U  |d OCLCQ  |d OCLCF  |d OCLCO  |d UMI  |d DEBSZ  |d OCLCO  |d OCLCQ  |d OCLCO  |d NLE  |d OCLCO  |d TEFOD  |d OCLCO  |d OCLCQ  |d OCLCO  |d COO  |d OCLCO  |d OCLCQ  |d OCLCO  |d OTZ  |d OCLCQ  |d JBG  |d OCLCA  |d D6H  |d VTS  |d OCLCQ  |d OCLCO  |d NTG  |d OCLCQ  |d OCLCO  |d UKMGB  |d WYU  |d STF  |d LEAUB  |d M8D  |d VT2  |d OCLCQ  |d OCLCO  |d K6U  |d MERUC  |d EBLCP  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
015 |a GBA767297  |2 bnb 
015 |a GBB6H3745  |2 bnb 
016 7 |a 013824787  |2 Uk 
016 7 |a 017581761  |2 Uk 
019 |a 243695435  |a 437211965  |a 473205368  |a 476160629  |a 646747470  |a 759004970  |a 824498939  |a 847908388  |a 859898792  |a 935246389  |a 994972299  |a 1062898427  |a 1103260258  |a 1129343942  |a 1153040303  |a 1192334666  |a 1240512880 
020 |a 9780080484266  |q (electronic bk.) 
020 |a 0080484263  |q (electronic bk.) 
020 |z 9781597491761 
020 |z 1597491764 
029 1 |a AU@  |b 000043178419 
029 1 |a AU@  |b 000048833892 
029 1 |a AU@  |b 000050492447 
029 1 |a AU@  |b 000051557190 
029 1 |a AU@  |b 000058959549 
029 1 |a CHNEW  |b 001007529 
029 1 |a DEBBG  |b BV041119733 
029 1 |a DEBBG  |b BV042305689 
029 1 |a DEBBG  |b BV043045206 
029 1 |a DEBSZ  |b 396676162 
029 1 |a DEBSZ  |b 405318189 
029 1 |a DEBSZ  |b 422116424 
029 1 |a DEBSZ  |b 430488203 
029 1 |a DKDLA  |b 810010-katalog:007398810 
029 1 |a NZ1  |b 12541569 
029 1 |a NZ1  |b 15189635 
029 1 |a UKMGB  |b 017581761 
029 1 |a DKDLA  |b 820120-katalog:9910110648605765 
035 |a (OCoLC)228148115  |z (OCoLC)243695435  |z (OCoLC)437211965  |z (OCoLC)473205368  |z (OCoLC)476160629  |z (OCoLC)646747470  |z (OCoLC)759004970  |z (OCoLC)824498939  |z (OCoLC)847908388  |z (OCoLC)859898792  |z (OCoLC)935246389  |z (OCoLC)994972299  |z (OCoLC)1062898427  |z (OCoLC)1103260258  |z (OCoLC)1129343942  |z (OCoLC)1153040303  |z (OCoLC)1192334666  |z (OCoLC)1240512880 
037 |a 141246:141389  |b Elsevier Science & Technology  |n http://www.sciencedirect.com 
037 |a 0872186A-BD70-4D3D-ABF9-418253E3A1EF  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a TK5105.885.G66  |b L66 2008eb 
072 7 |a COM  |x 069010  |2 bisacsh 
072 7 |a COM  |x 030000  |2 bisacsh 
082 0 4 |a 025.04  |2 22 
049 |a UAMI 
100 1 |a Long, Johnny. 
245 1 0 |a Google hacking for penetration testers.  |p Volume 2 /  |c Johnny Long. 
260 |a Burlington, MA :  |b Syngress Pub.,  |c ©2008. 
300 |a 1 online resource (xix, 534 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a A self-respecting Google hacker spends hours trolling the Internet for juicy stuff. Firing off search after search, they thrive on the thrill of finding clean, mean, streamlined queries and get a real rush from sharing those queries and trading screenshots of their findings. I know because Ive seen it with my own eyes. As the founder of the Google Hacking Database (GHDB) and the Search engine hacking forums at http://johnny.ihackstuff.com, I am constantly amazed at what the Google hacking community comes up with. It turns out the rumors are truecreative Google searches can reveal medical, financial, proprietary and even classified information. Despite government edicts, regulation and protection acts like HIPPA and the constant barking of security watchdogs, this problem still persists. Stuff still makes it out onto the web, and Google hackers snatch it right up. Protect yourself from Google hackers with this new volume of information. Johnny Long Learn Google Searching Basics Explore Googles Web-based Interface, build Google queries, and work with Google URLs. Use Advanced Operators to Perform Advanced Queries Combine advanced operators and learn about colliding operators and bad search-fu. Learn the Ways of the Google Hacker See how to use caches for anonymity and review directory listings and traversal techniques. Review Document Grinding and Database Digging See the ways to use Google to locate documents and then search within the documents to locate information. Understand Googles Part in an Information Collection Framework Learn the principles of automating searches and the applications of data mining. Locate Exploits and Finding Targets Locate exploit code and then vulnerable targets. See Ten Simple Security Searches Learn a few searches that give good results just about every time and are good for a security assessment. Track Down Web Servers Locate and profile web servers, login portals, network hardware and utilities. See How Bad Guys Troll for Data Find ways to search for usernames, passwords, credit card numbers, social security numbers, and other juicy information. Hack Google Services Learn more about the AJAX Search API, Calendar, Blogger, Blog Search, and more. 
505 0 |a Why Bother w/Google for an Assessment -- Advanced Operators -- Google Hacking Basics -- Pre-Assessment -- Mapping the Target Network -- Locating Exploits and Finding Targets -- 10 Simple searches -- Tracking Down Web Servers, Login Portals and Network Hardware -- Usernames, Passwords and Other Secret Stuff -- Document Grinding and Database Digging -- Protecting Yourself From Google Hackers -- Programming Google Searches. 
588 0 |a Print version record. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a Google. 
630 0 7 |a Google.  |2 blmlsh 
630 0 7 |a Google  |2 fast 
650 0 |a Web search engines. 
650 0 |a Computer security. 
650 0 |a Internet programming. 
650 0 |a Internet  |x Security measures. 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Moteurs de recherche sur Internet. 
650 6 |a Sécurité informatique. 
650 6 |a Programmation Internet. 
650 6 |a Internet  |x Sécurité  |x Mesures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Online Services.  |2 bisacsh 
650 7 |a COMPUTERS  |x System Administration  |x Storage & Retrieval.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Internet programming  |2 fast 
650 7 |a Internet  |x Security measures  |2 fast 
650 7 |a Web search engines  |2 fast 
776 0 8 |i Print version:  |a Long, Johnny.  |t Google hacking for penetration testers. Volume 2.  |d Burlington, MA : Syngress Pub., ©2008  |z 1597491764  |z 9781597491761  |w (DLC) 2008530223  |w (OCoLC)141386427 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781597491761/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a EBL - Ebook Library  |b EBLB  |n EBL344652 
938 |a ebrary  |b EBRY  |n ebr10229535 
938 |a EBSCOhost  |b EBSC  |n 230833 
938 |a YBP Library Services  |b YANK  |n 2820966 
994 |a 92  |b IZTAP