Authors: Johnny Long, Roelof Temmingh (Contribution by), Petko Petkov
ISBN-13: 9781597491761, ISBN-10: 1597491764
Format: Paperback
Publisher: Elsevier Science
Date Published: November 2007
Edition: (Non-applicable)
Johnny Long is a “clean-living” family guy who just so happens to like hacking stuff. Over the past two years, Johnny’s most visible focus has been on this Google hacking “thing” which has served as yet another diversion to a serious (and bill-paying) job as a professional hacker and security researcher for Computer Sciences Corporation. In his spare time, Johnny enjoys making random pirate noises (“Yarrrrr!”), spending time with his wife and kids, convincing others that acting like a kid is part of his job as a parent, feigning artistic ability with programs like Bryce and Photoshop, pushing all the pretty shiny buttons on them new-fangled Mac computers, and making much-too-serious security types either look at him funny or start laughing uncontrollably. Johnny has written or contributed to several books, including “Google Hacking for Penetration Testers” from Syngress Publishing, which has secured rave reviews and has lots of pictures.
This guide describes techniques the bad guys use to locate sensitive information about an individual or company, particularly the specific ways Google searches can discover forgotten network systems and devices that have fallen off the radar of overworked administrators. The author, who maintains johnny.ihackstuff.com, recommends writing a sound security policy, securing a web site from Google's crawlers, and checking Google exposure with automated tools. Distributed in the U.S. by O'Reilly. Annotation ©2004 Book News, Inc., Portland, OR
Whether you're a penetration tester wanting to exploit Google, a Web administrator wanting to protect yourself from information leaks, or even a newbie wanting to harness Google's full potential, Google Hacking for Penetration Testers makes an excellent resource. If you, too, use Google as a second brain, pick up Johnny Long's book and learn how to exploit this powerful search engine to its full capacity.
Ch. 1 | Google searching basics | 1 |
Ch. 2 | Advanced operators | 41 |
Ch. 3 | Google hacking basics | 87 |
Ch. 4 | Preassessment | 121 |
Ch. 5 | Network mapping | 151 |
Ch. 6 | Locating exploits and finding targets | 181 |
Ch. 7 | Ten simple security searches that work | 203 |
Ch. 8 | Tracking down Web servers, login portals, and network hardware | 221 |
Ch. 9 | Usernames, passwords, and secret stuff, oh my! | 263 |
Ch. 10 | Document grinding and database digging | 289 |
Ch. 11 | Protecting yourself from Google hackers | 321 |
Ch. 12 | Automating Google searches | 363 |
App. A | Professional security testing | 417 |
App. B | An introduction to Web application security | 437 |
App. C | Google hacking database |