Cerita Rakyat Indonesia - Kumpulan Cerita Cerita Rakyat Dari Indonesia

Thursday, January 7, 2010

Google Hacking FOR PENETRATION TESTERS



Google Hacking FOR PENETRATION TESTERS

Explore the Dark Side of Googling

Morph Google from "Directory Assistance Please" into a Rig Mounted Pneumatic Rock Drill
See How Bad Guys Use Portscans, CGI Scans,and Web Server Fingerprinting to stroll in the backdoor of your Enterprise
Slam th Door on Malicious Google Hack that expose your Organization's Information Caches,Firewalls,IDS logs, and Password Databases

content :
Chapter 1 Google Searching Basics
Chapter 2 Advanced Operators
Chapter 3 Google Hacking Basics
Chapter 4 Preassessment
Chapter 5 Network Mapping
Chapter 6 Locating Exploits and Finding Targets
Chapter 7 Ten Simple Security Searches That Work
Chapter 8 Tracking Down Web Servers, Login Portals, and Network Hardware
Chapter 9 Usernames, Passwords, and Secret Stuff
Chapter 10 Document Grinding and Database Digging
Chapter 11 Protecting Yourself from Google Hackers
Chapter 12 Automating Google Searches
Appendix A Professional Security Testing
Appendix B An Introduction to Web Application Security
Appendix C Google Hacking Database




Stumble
Delicious
Technorati
Twitter
Facebook

0 Comments:

Post a Comment

Advertising

 

njajal Copyright © 2010 LKart Theme is Designed by Lasantha