Rabu, 01 Desember 2010

Google Hacking for Penetration Testers, by Johnny Long, Bill Gardner, Justin Brown

Google Hacking for Penetration Testers, by Johnny Long, Bill Gardner, Justin Brown

When some people checking out you while reviewing Google Hacking For Penetration Testers, By Johnny Long, Bill Gardner, Justin Brown, you may really feel so proud. However, instead of other individuals feels you have to instil in yourself that you are reading Google Hacking For Penetration Testers, By Johnny Long, Bill Gardner, Justin Brown not because of that factors. Reading this Google Hacking For Penetration Testers, By Johnny Long, Bill Gardner, Justin Brown will provide you greater than people admire. It will guide to know greater than individuals staring at you. Even now, there are numerous sources to knowing, checking out a publication Google Hacking For Penetration Testers, By Johnny Long, Bill Gardner, Justin Brown still ends up being the front runner as a terrific means.

Google Hacking for Penetration Testers, by Johnny Long, Bill Gardner, Justin Brown

Google Hacking for Penetration Testers, by Johnny Long, Bill Gardner, Justin Brown



Google Hacking for Penetration Testers, by Johnny Long, Bill Gardner, Justin Brown

PDF Ebook Download Online: Google Hacking for Penetration Testers, by Johnny Long, Bill Gardner, Justin Brown

Google is the most popular search engine ever created, but Google’s search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers, Third Edition, shows you how security professionals and system administratord manipulate Google to find this sensitive information and "self-police" their own organizations.

You will learn how Google Maps and Google Earth provide pinpoint military accuracy, see how bad guys can manipulate Google to create super worms, and see how they can "mash up" Google with Facebook, LinkedIn, and more for passive reconnaissance.

This third edition includes completely updated content throughout and all new hacks such as Google scripting and using Google hacking with other search engines and APIs. Noted author Johnny Long, founder of Hackers for Charity, gives you all the tools you need to conduct the ultimate open source reconnaissance and penetration testing.

  • Third edition of the seminal work on Google hacking
  • Google hacking continues to be a critical phase of reconnaissance in penetration testing and Open Source Intelligence (OSINT)
  • Features cool new hacks such as finding reports generated by security scanners and back-up files, finding sensitive info in WordPress and SSH configuration, and all new chapters on scripting Google hacks for better searches as well as using Google hacking with other search engines and APIs

Google Hacking for Penetration Testers, by Johnny Long, Bill Gardner, Justin Brown

  • Amazon Sales Rank: #258314 in eBooks
  • Published on: 2015-11-12
  • Released on: 2015-11-12
  • Format: Kindle eBook
Google Hacking for Penetration Testers, by Johnny Long, Bill Gardner, Justin Brown

Review "This book should be a required read for system administrators and infosec pros in general, as it gives a sobering overview of what type of information that should not be publicly available can be found online - if you know how to look for it." --Help Net Security

About the Author Johnny Long is a Christian by grace, a professional hacker by trade, a pirate by blood, a ninja in training, a security researcher and author. He can be found lurking at his website (http://johnny.ihackstuff.com). He is the founder of Hackers For Charity(http://ihackcharities.org), an organization that provides hackers with job experience while leveraging their skills for charities that need those skills.Bill Gardner is an Assistant Professor at Marshall University, where he teaches information security and foundational technology courses in the Department of Integrated Science and Technology. He is also President and Principal Security Consultant at BlackRock Consulting. In addition, Bill is Vice President and Information Security Chair at the Appalachian Institute of Digital Evidence. AIDE is a non-profit organization that provides research and training for digital evidence professionals including attorneys, judges, law enforcement officers and information security practitioners in the private sector. Prior to joining the faculty at Marshall, Bill co-founded the Hack3rCon convention, and co-founded 304blogs, and he continues to serve as Vice President of 304Geeks. In addition, Bill is a founding member of the Security Awareness Training Framework, which will be a prime target audience for this book.Justin Brown (@spridel11) is an Information Assurance Analyst at a large financial institution. Previously, Justin worked for as a consultant specializing in Open Source Intelligence. Through Google Hacking and dorks Justin has uncovered numerous troves of information leaks regarding his clients. Justin can usually be found at conferences volunteering with Hackers for Charity.


Google Hacking for Penetration Testers, by Johnny Long, Bill Gardner, Justin Brown

Where to Download Google Hacking for Penetration Testers, by Johnny Long, Bill Gardner, Justin Brown

Most helpful customer reviews

1 of 1 people found the following review helpful. Overall, this is an interesting and informative read, highly recommended. By Ian Stirk Hi,I have written a detailed chapter-by-chapter review of this book on www DOT i-programmer DOT info, the first and last parts of this review are given here. For my review of all chapters, search i-programmer DOT info for STIRK together with the book's title.With regular breaching of websites/data in the news (e.g. eBay, Three, VTech), this book should be of interest to many.This book aims to show you what information can be found via Google search queries, much of it never intended for a public audience (e.g. credit card numbers, passwords). The book is targeted at those wanting to protect their sites/data, those wanting to get more out of Google search queries, hackers, and the curious.Some of the tools are introduced with little discussion, so some degree of IT-awareness is required. Also a few areas require scripting knowledge (typically using perl).Below is a chapter-by-chapter exploration of the topics covered.Chapter 1 Google Search BasicsThe chapter opens with a look at Google’s deceptively simple interface, being void of clutter and having a single place to enter search criteria. Various related screens are examined, including image search, groups, preferences, language tools, and the results page.The chapter continues with a look at rules for Google searching, including the use of wildcard characters, and the 32-word search limit. The use of quote marks for exact phrase searching, and Boolean operators for joining/omitting results is discussed with examples. Getting more targeted search results by search reduction is examined.The chapter ends with a look at the format of the Google URL for submitted queries, where search parameters and their values are separated by an ampersand. Looking at the advanced search page, and submitting a query from it, identifies the names of these search parameters. These can be used subsequently to build your own advanced queries (programmatically).This chapter provides a useful introduction to the basic functionality available via the Google web page.The Google groups menu hasn’t appeared on the Google main menu for a while, suggesting the book hasn’t been updated as thoroughly as it might have been. Some of the tools are introduced too abruptly, without sufficient background information for the total beginner.Useful, well-written discussions, tips, screenshots, practical search examples, inter-chapter links, and website links are given throughout the chapter. A useful summary and a ‘fast track solutions’ section concludes the chapter. These traits apply to the whole of the book....ConclusionThis book aims to show you what information can be found via Google search queries, much of it never intended for a public audience (e.g. credit card numbers, passwords etc). Having identified various vulnerabilities, it highlights how these can be reduced.The book is an interesting read, with useful, well-written discussions, tips, screenshots, practical search examples, inter-chapter links, website links, and helpful chapter summaries. The book provides some useful template queries together with approaches to thinking about problems.The book does assume some IT knowledge and some tools (e.g. Tcpdump, MRTG, Nmap, ntop) are introduced with insufficient detail for the beginner, but this should be ok for many developers.The book is suitable for those wanting to get more out of Google searching, those wanting to protect their websites/data, hackers, and curious people.Sometimes the book felt a bit dated. Checking the table of contents with the previous 2007 edition of the book, shows they are around 90% the same. The screenshots should have titles, this would make subsequent searching easier.Overall, this is an interesting and informative read. In these times of frequent data breaches (e.g. eBay, Three, VTech), this should be required reading for anyone interesting in protecting data. Highly recommended.

1 of 1 people found the following review helpful. Very Much worth the price! By Clark The reason I purchased this book were scammers were trying to rent my house for half the market rate. Law enforcement and the FBI were not able to help. Law Enforcement because it was out of their jurisdiction, plus there was no crime, because money never changed hands. And the FBI because the dollar amount was too low.With this book I was able to track down the money mule, and was able to get the mules banking information, name, bank routing code, Home address, phone number etc.The main focus of the book is finding unsecured information over the internet. The tools that were provided were very valuable. One of the tools that I am currently using Alerts me via Email when anyone puts up one of these half price ads on Craig’s list or the internet in general.Some of the searches I did showed how unsecured the internet really is. With some simple searches I was able to find information that should have been confidential. A must read if you’re a LAN Administrator on how to protect your severs from curious lookers.

0 of 0 people found the following review helpful. Good content, Bad proof-reading By Michael The information contained in the book is very good. Unfortunately it is obvious that no one looked at the images during the proof-reading process. Almost none of the images show what the text claims that they show. If not for that, I would have rated this book a 5.

See all 5 customer reviews... Google Hacking for Penetration Testers, by Johnny Long, Bill Gardner, Justin Brown


Google Hacking for Penetration Testers, by Johnny Long, Bill Gardner, Justin Brown PDF
Google Hacking for Penetration Testers, by Johnny Long, Bill Gardner, Justin Brown iBooks
Google Hacking for Penetration Testers, by Johnny Long, Bill Gardner, Justin Brown ePub
Google Hacking for Penetration Testers, by Johnny Long, Bill Gardner, Justin Brown rtf
Google Hacking for Penetration Testers, by Johnny Long, Bill Gardner, Justin Brown AZW
Google Hacking for Penetration Testers, by Johnny Long, Bill Gardner, Justin Brown Kindle

Google Hacking for Penetration Testers, by Johnny Long, Bill Gardner, Justin Brown

Google Hacking for Penetration Testers, by Johnny Long, Bill Gardner, Justin Brown

Google Hacking for Penetration Testers, by Johnny Long, Bill Gardner, Justin Brown
Google Hacking for Penetration Testers, by Johnny Long, Bill Gardner, Justin Brown

Tidak ada komentar:

Posting Komentar