Thursday, September 23, 2010

Google Hacking For Penetration Testers

image

Explore the Dark Side of Googling
Morph Google from "Directory Assistance Please" into a Rig Mounted Pneumatic Rock Drill
See How Bad Guys Use Portscans, CGI Scans,and Web Server Fingerprinting to stroll in the backdoor of your Enterprise
Slam th Door on Malicious Google Hack that expose your Organization's Information Caches,Firewalls,IDS logs, and Password Databases
content :
Chapter 1 Google Searching Basics
Chapter 2 Advanced Operators
Chapter 3 Google Hacking Basics
Chapter 4 Preassessment
Chapter 5 Network Mapping
Chapter 6 Locating Exploits and Finding Targets
Chapter 7 Ten Simple Security Searches That Work
Chapter 8 Tracking Down Web Servers, Login Portals, and Network Hardware
Chapter 9 Usernames, Passwords, and Secret Stuff
Chapter 10 Document Grinding and Database Digging
Chapter 11 Protecting Yourself from Google Hackers
Chapter 12 Automating Google Searches
Appendix A Professional Security Testing
Appendix B An Introduction to Web Application Security
Appendix C Google Hacking Database


Get Google Hacking FOR PENETRATION TESTERS ebook : 

http://www.ziddu.com/download/7937854/SyngressGoogleHackingforPenetrationtestersDec2004.rar.html

No comments:

Post a Comment