Skip to content
You are not logged in |Login  

LEADER 00000cam a2200745Ia 4500 
001    ocn228148115 
003    OCoLC 
005    20160527040735.9 
006    m     o  d         
007    cr cn||||||||| 
008    080516s2008    maua    o     001 0 eng d 
019    243695435|a473205368|a646747470|a759004970|a824498939
       |a847908388|a859898792 
020    9780080484266|q(electronic book) 
020    0080484263|q(electronic book) 
020    |z9781597491761 
020    |z1597491764 
035    (OCoLC)228148115|z(OCoLC)243695435|z(OCoLC)473205368
       |z(OCoLC)646747470|z(OCoLC)759004970|z(OCoLC)824498939
       |z(OCoLC)847908388|z(OCoLC)859898792 
037    141246:141389|bElsevier Science & Technology|nhttp://
       www.sciencedirect.com 
037    0872186A-BD70-4D3D-ABF9-418253E3A1EF|bOverDrive, Inc.
       |nhttp://www.overdrive.com 
040    OPELS|beng|epn|cOPELS|dOCLCQ|dN$T|dYDXCP|dIDEBK|dE7B
       |dDKDLA|dOCLCQ|dTEFOD|dA7U|dOCLCQ|dOCLCF|dOCLCO|dUMI
       |dDEBSZ|dOCLCO|dOCLCQ|dOCLCO|dNLE|dOCLCO|dTEFOD|dOCLCO
       |dOCLCQ|dOCLCO 
049    RIDW 
050  4 TK5105.885.G66|bL66 2008eb 
072  7 COM|x069010|2bisacsh 
072  7 COM|x030000|2bisacsh 
082 04 025.04|222 
090    TK5105.885.G66|bL66 2008eb 
100 1  Long, Johnny.|0https://id.loc.gov/authorities/names/
       no2005090883 
245 10 Google hacking for penetration testers.|pVolume 2 /
       |cJohnny Long. 
264  1 Burlington, MA :|bSyngress Pub.,|c[2008] 
264  4 |c©2008 
300    1 online resource (xix, 534 pages) :|billustrations 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
340    |gpolychrome|2rdacc 
347    text file|2rdaft 
500    Includes index. 
505 0  Why Bother w/Google for an Assessment -- Advanced 
       Operators -- Google Hacking Basics -- Pre-Assessment -- 
       Mapping the Target Network -- Locating Exploits and 
       Finding Targets -- 10 Simple searches -- Tracking Down Web
       Servers, Login Portals and Network Hardware -- Usernames, 
       Passwords and Other Secret Stuff -- Document Grinding and 
       Database Digging -- Protecting Yourself From Google 
       Hackers -- Programming Google Searches. 
520    A self-respecting Google hacker spends hours trolling the 
       Internet for juicy stuff. Firing off search after search, 
       they thrive on the thrill of finding clean, mean, 
       streamlined queries and get a real rush from sharing those
       queries and trading screenshots of their findings. I know 
       because Ive seen it with my own eyes. As the founder of 
       the Google Hacking Database (GHDB) and the Search engine 
       hacking forums at http://johnny.ihackstuff.com, I am 
       constantly amazed at what the Google hacking community 
       comes up with. It turns out the rumors are truecreative 
       Google searches can reveal medical, financial, proprietary
       and even classified information. Despite government edicts,
       regulation and protection acts like HIPPA and the constant
       barking of security watchdogs, this problem still 
       persists. Stuff still makes it out onto the web, and 
       Google hackers snatch it right up. Protect yourself from 
       Google hackers with this new volume of information. Johnny
       Long Learn Google Searching Basics Explore Googles Web-
       based Interface, build Google queries, and work with 
       Google URLs. Use Advanced Operators to Perform Advanced 
       Queries Combine advanced operators and learn about 
       colliding operators and bad search-fu. Learn the Ways of 
       the Google Hacker See how to use caches for anonymity and 
       review directory listings and traversal techniques. Review
       Document Grinding and Database Digging See the ways to use
       Google to locate documents and then search within the 
       documents to locate information. Understand Googles Part 
       in an Information Collection Framework Learn the 
       principles of automating searches and the applications of 
       data mining. Locate Exploits and Finding Targets Locate 
       exploit code and then vulnerable targets. See Ten Simple 
       Security Searches Learn a few searches that give good 
       results just about every time and are good for a security 
       assessment. Track Down Web Servers Locate and profile web 
       servers, login portals, network hardware and utilities. 
       See How Bad Guys Troll for Data Find ways to search for 
       usernames, passwords, credit card numbers, social security
       numbers, and other juicy information. Hack Google Services
       Learn more about the AJAX Search API, Calendar, Blogger, 
       Blog Search, and more. 
588 0  Print version record. 
590    eBooks on EBSCOhost|bEBSCO eBook Subscription Academic 
       Collection - North America 
630 00 Google.|0https://id.loc.gov/authorities/names/nr2003021731
630  7 Google.|2fast|0https://id.worldcat.org/fast/1398583 
630 07 Google.|2blmlsh 
630 07 Google.|2fast|0https://id.worldcat.org/fast/1398583 
630 07 Google.|2blmsh 
650  0 Web search engines.|0https://id.loc.gov/authorities/
       subjects/sh97007463 
650  0 Computer security.|0https://id.loc.gov/authorities/
       subjects/sh90001862 
650  0 Internet programming.|0https://id.loc.gov/authorities/
       subjects/sh96009904 
650  0 Internet|xSecurity measures.|0https://id.loc.gov/
       authorities/subjects/sh2008104644 
650  0 Computer networks|xSecurity measures.|0https://id.loc.gov/
       authorities/subjects/sh94001277 
650  7 Web search engines.|2fast|0https://id.worldcat.org/fast/
       1173234 
650  7 Computer security.|2fast|0https://id.worldcat.org/fast/
       872484 
650  7 Internet programming.|2fast|0https://id.worldcat.org/fast/
       977281 
650  7 Internet|xSecurity measures.|2fast|0https://
       id.worldcat.org/fast/1751426 
650  7 Computer networks|xSecurity measures.|2fast|0https://
       id.worldcat.org/fast/872341 
655  4 Electronic books. 
776 08 |iPrint version:|aLong, Johnny.|tGoogle hacking for 
       penetration testers. Volume 2.|dBurlington, MA : Syngress 
       Pub., ©2008|z1597491764|z9781597491761|w(DLC)  2008530223
       |w(OCoLC)141386427 
856 40 |uhttps://rider.idm.oclc.org/login?url=http://
       search.ebscohost.com/login.aspx?direct=true&scope=site&
       db=nlebk&AN=230833|zOnline eBook. Access restricted to 
       current Rider University students, faculty, and staff. 
856 42 |3Instructions for reading/downloading this eBook|uhttp://
       guides.rider.edu/ebooks/ebsco 
901    MARCIVE 20231220 
948    |d201606016|cEBSCO|tebscoebooksacademic|lridw 
994    92|bRID