000 03630cam a2200577Ii 4500
001 ocn929448543
003 OCoLC
005 20190328114813.0
006 m o d
007 cr cnu|||unuuu
008 151116s2016 mau o 001 0 eng d
040 _aN$T
_beng
_erda
_epn
_cN$T
_dIDEBK
_dN$T
_dOCLCO
_dYDXCP
_dOCLCF
_dOCLCO
_dOPELS
_dCDX
_dCOO
_dTEFOD
_dOCLCQ
_dOCLCA
_dU3W
_dD6H
_dUWW
019 _a930332949
020 _a9780128029824
_q(electronic bk.)
020 _a012802982X
_q(electronic bk.)
020 _z9780128029640
035 _a(OCoLC)929448543
_z(OCoLC)930332949
050 4 _aTK5105.885.G66
072 7 _aLAN
_x025000
_2bisacsh
082 0 4 _a025.04252
_223
082 0 4 _a025.04
_222
100 1 _aLong, Johnny,
_eauthor.
245 1 0 _aGoogle hacking for penetration testers /
_h[electronic resource]
_cJohnny Long, Bill Gardner, Justin Brown.
250 _a3rd ed.
264 1 _aWaltham, MA :
_bElsevier Ltd.,
_c2016.
300 _a1 online resource (viii, 225 pages)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
500 _aIncludes index.
588 0 _aVendor-supplied metadata.
505 0 _aGoogle Search Basics -- Advanced Operators -- Google Hacking Basics -- Document Grinding and Database Digging -- Google's Part in an Information Collection Framework -- Locating Exploits and Finding Targets -- Ten Simple Security Searches That Work -- Tracking Down Web Servers, Login Portals, and Network Hardware -- Usernames, Passwords, and Secret Stuff, Oh My! -- Hacking Google Services -- Hacking Google Showcase -- Protecting Yourself from Google Hackers.
520 _a"Google is the most popular search engine ever created, but Google's search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers, Third Edition, shows you how security professionals and system administratord manipulate Google to find this sensitive information and "self-police" their own organizations. You see how bad guys can manipulate Google to create super worms, and see how they can "mash up" Google with Facebook, LinkedIn, and more for passive reconnaissance. This third edition includes completely updated content and all new hacks such as Google scripting and using Google hacking with other search engines and APIs. Noted author Johnny Long, founder of Hackers for Charity, gives you all the tools you need to conduct the ultimate open source reconnaissance and penetration testing."--Page 4 of cover.
630 0 0 _aGoogle.
630 0 7 _aGoogle.
_2fast
_0(OCoLC)fst01398583
650 0 _aWeb search engines.
650 0 _aComputer security.
650 0 _aInternet programming.
650 0 _aInternet
_xSecurity measures.
650 0 _aComputer networks
_xSecurity measures.
650 7 _aLANGUAGE ARTS & DISCIPLINES / Library & Information Science / General
_2bisacsh
650 7 _aComputer networks
_xSecurity measures.
_2fast
_0(OCoLC)fst00872341
650 7 _aComputer security.
_2fast
_0(OCoLC)fst00872484
650 7 _aInternet programming.
_2fast
_0(OCoLC)fst00977281
650 7 _aInternet
_xSecurity measures.
_2fast
_0(OCoLC)fst01751426
650 7 _aWeb search engines.
_2fast
_0(OCoLC)fst01173234
655 4 _aElectronic books.
700 1 _aGardner, Bill,
_eauthor.
700 1 _aBrown, Justin,
_eauthor.
856 4 0 _3ScienceDirect
_uhttp://www.sciencedirect.com/science/book/9780128029640
999 _c247223
_d247223