Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Google hacking for penetration testers
Bookmark Share

Text

Google hacking for penetration testers

Long, Johnny - Personal Name; Gardner, Bill - Personal Name; Brown, Justin - Personal Name;

Table of Contents

Chapter 1: Google Search Basics
Abstract
Introduction
Exploring Google’s web-based interface
Summary
Fast track solutions
Chapter 2: Advanced Operators
Abstract
Introduction
Operator syntax
Troubleshooting your syntax
Introducing Google’s advanced operators
“Intitle” and “allintitle”: search within the title of a page
Allintext: locate a string within the text of a page
Inurl and allinurl: finding text in a URL
Site: narrow search to specific sites
Filetype: search for files of a specific type
Link: search for links to a page
Inanchor: locate text within link text
Cache: show the cached version of a page
Numrange: search for a number
Daterange: search for pages published within a certain date range
Info: show Google’s summary information
Related: show related sites
Stocks: search for stock information
Define: show the definition of a term
Colliding operators and bad search-fu
Summary
Fast track solutions
Links to sites
Chapter 3: Google Hacking Basics
Abstract
Introduction
Anonymity with caches
Directory listings
Locating directory listings
Finding specific directories
Finding specific files
Server versioning
Going out on a limb: traversal techniques
Summary
Fast track solutions
Chapter 4: Document Grinding and Database Digging
Abstract
Introduction
Configuration files
Locating files
Log files
Office documents
Database digging
Login portals
Support files
Error messages
Database dumps
Actual database files
Automated grinding
Summary
Fast track solutions
Chapter 5: Google’s Part in an Information Collection Framework
Abstract
Introduction
The principles of automating searches
The original search term
Expanding search terms
Using “special” operators
Getting the data from the source
Scraping it yourself: requesting and receiving responses
Scraping it yourself: the butcher shop
Using other search engines
Parsing the data
Domains and subdomains
Telephone numbers
Postprocessing
Collecting search terms
Summary
Chapter 6: Locating Exploits and Finding Targets
Abstract
Introduction
Locating exploit code
Locating exploits via common code strings
Locating vulnerable targets
Locating targets via source code
Summary
Chapter 7: Ten Simple Security Searches That Work
Abstract
Introduction
site
intitle:index.of
error | warning
login | logon
username | userid | employee.ID \ “your username is”
password | passcode | “your password is”
admin | administrator
–ext:html –ext:htm –ext:shtml –ext:asp –ext:php
inurl:temp | inurl:tmp | inurl:backup | inurl.bak
intranet | help.desk
Summary
Chapter 8: Tracking Down Web Servers, Login Portals, and Network Hardware
Abstract
Introduction
Locating and profiling Web servers
Locating login portals
Using and locating various Web utilities
Targeting Web-enabled network devices
Locating network reports
Locating network hardware
Summary
Chapter 9: Usernames, Passwords, and Secret Stuff, Oh My!
Abstract
Introduction
Searching for usernames
Searching for passwords
Searching for credit card numbers, social security numbers, and more
Social security numbers
Personal financial data
Searching for other juicy info
Summary
Chapter 10: Hacking Google Services
Abstract
Calendar
Signaling alerts
Google Co-op
Google’s Custom Search Engine
Chapter 11: Hacking Google Showcase
Abstract
Introduction
Geek stuff
Open network devices
Open applications
Cameras
Telco gear
Power
Sensitive info
Summary
Chapter 12: Protecting Yourself from Google Hackers
Abstract
Introduction
A Good Solid Security Policy
Web server safeguards
Software default settings and programs
Hacking your own site
Wikto
Advance dork
Getting help from Google
Summary
Fast track solutions
Links to sites
Subject Index


Availability
#
Perpustakaan Poltek SSN (Rak 000) 005.84 LON g
b0001332
Available - Available
Detail Information
Series Title
--
Call Number
005.84 LON g
Publisher
Massachusetts : Syngress., 2016
Collation
225 hal.; ilus.; 23 cm
Language
English
ISBN/ISSN
9780128029640
Classification
005.84
Content Type
-
Media Type
-
Carrier Type
-
Edition
Third Edition
Subject(s)
Computer networks--Security measures
Internet -- Security Measures
google
Penetration testing (Computer security)
Specific Detail Info
--
Statement of Responsibility
Johnny Long, et.al
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?