Text
Google hacking for penetration testers
Table of Contents
Chapter 1: Google Search Basics
Abstract
Introduction
Exploring Google’s web-based interface
Summary
Fast track solutions
Chapter 2: Advanced Operators
Abstract
Introduction
Operator syntax
Troubleshooting your syntax
Introducing Google’s advanced operators
“Intitle” and “allintitle”: search within the title of a page
Allintext: locate a string within the text of a page
Inurl and allinurl: finding text in a URL
Site: narrow search to specific sites
Filetype: search for files of a specific type
Link: search for links to a page
Inanchor: locate text within link text
Cache: show the cached version of a page
Numrange: search for a number
Daterange: search for pages published within a certain date range
Info: show Google’s summary information
Related: show related sites
Stocks: search for stock information
Define: show the definition of a term
Colliding operators and bad search-fu
Summary
Fast track solutions
Links to sites
Chapter 3: Google Hacking Basics
Abstract
Introduction
Anonymity with caches
Directory listings
Locating directory listings
Finding specific directories
Finding specific files
Server versioning
Going out on a limb: traversal techniques
Summary
Fast track solutions
Chapter 4: Document Grinding and Database Digging
Abstract
Introduction
Configuration files
Locating files
Log files
Office documents
Database digging
Login portals
Support files
Error messages
Database dumps
Actual database files
Automated grinding
Summary
Fast track solutions
Chapter 5: Google’s Part in an Information Collection Framework
Abstract
Introduction
The principles of automating searches
The original search term
Expanding search terms
Using “special” operators
Getting the data from the source
Scraping it yourself: requesting and receiving responses
Scraping it yourself: the butcher shop
Using other search engines
Parsing the data
Domains and subdomains
Telephone numbers
Postprocessing
Collecting search terms
Summary
Chapter 6: Locating Exploits and Finding Targets
Abstract
Introduction
Locating exploit code
Locating exploits via common code strings
Locating vulnerable targets
Locating targets via source code
Summary
Chapter 7: Ten Simple Security Searches That Work
Abstract
Introduction
site
intitle:index.of
error | warning
login | logon
username | userid | employee.ID \ “your username is”
password | passcode | “your password is”
admin | administrator
–ext:html –ext:htm –ext:shtml –ext:asp –ext:php
inurl:temp | inurl:tmp | inurl:backup | inurl.bak
intranet | help.desk
Summary
Chapter 8: Tracking Down Web Servers, Login Portals, and Network Hardware
Abstract
Introduction
Locating and profiling Web servers
Locating login portals
Using and locating various Web utilities
Targeting Web-enabled network devices
Locating network reports
Locating network hardware
Summary
Chapter 9: Usernames, Passwords, and Secret Stuff, Oh My!
Abstract
Introduction
Searching for usernames
Searching for passwords
Searching for credit card numbers, social security numbers, and more
Social security numbers
Personal financial data
Searching for other juicy info
Summary
Chapter 10: Hacking Google Services
Abstract
Calendar
Signaling alerts
Google Co-op
Google’s Custom Search Engine
Chapter 11: Hacking Google Showcase
Abstract
Introduction
Geek stuff
Open network devices
Open applications
Cameras
Telco gear
Power
Sensitive info
Summary
Chapter 12: Protecting Yourself from Google Hackers
Abstract
Introduction
A Good Solid Security Policy
Web server safeguards
Software default settings and programs
Hacking your own site
Wikto
Advance dork
Getting help from Google
Summary
Fast track solutions
Links to sites
Subject Index
No other version available