Language:
繁體中文
English
日文
說明(常見問題)
南開科技大學
圖書館首頁
編目中圖書申請
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Google hacking for penetration testers
~
Long, Johnny.
Google hacking for penetration testers
紀錄類型:
書目-電子資源 : 單行本
正題名/作者:
Google hacking for penetration testers/ Johnny Long ; foreword by Ed Skoudis.
作者:
Long, Johnny.
其他作者:
Skoudis, Ed.
出版者:
Rockland, Mass. :Syngress,c2005.
面頁冊數:
xxiv, 502 p. :ill. ;24 cm.
附註:
Includes index.
標題:
Web search engines. -
電子資源:
An electronic book accessible through the World Wide Web; click for information
電子資源:
An electronic book accessible through the World Wide Web; click for information
ISBN:
9780080478050 (electronic bk.)
ISBN:
0080478050 (electronic bk.)
ISBN:
9781931836364 (paper)
ISBN:
1931836361 (paper)
Google hacking for penetration testers
Long, Johnny.
Google hacking for penetration testers
[electronic resource] /Johnny Long ; foreword by Ed Skoudis. - Rockland, Mass. :Syngress,c2005. - xxiv, 502 p. :ill. ;24 cm.
Includes index.
Google searching basics -- Advanced operators -- Google hacking basics -- Pre-assessment -- Network mapping -- Locating exploits and finding targets -- Ten simple security searches that work -- Tracking down web servers, login portals, and network hardware -- Usernames, passwords, and secret stuff, oh my! -- Document grinding and database digging -- Protecting yourself from Google hackers -- Automating Google searches / James C. Foster.
Google, the most popular search engine worldwide, provides web surfers with an easy-to-use guide to the Internet, with web and image searches, language translation, and a range of features that make web navigation simple enough for even the novice user. What many users dont realize is that the deceptively simple components that make Google so easy to use are the same features that generously unlock security flaws for the malicious hacker. Vulnerabilities in website security can be discovered through Google hacking, techniques applied to the search engine by computer criminals, identity thieves, and even terrorists to uncover secure information. This book beats Google hackers to the punch, equipping web administrators with penetration testing applications to ensure their site is invulnerable to a hackers search. Penetration Testing with Google Hacks explores the explosive growth of a technique known as "Google Hacking." When the modern security landscape includes such heady topics as "blind SQL injection" and "integer overflows," it's refreshing to see such a deceptively simple tool bent to achieve such amazing results; this is hacking in the purest sense of the word. Readers will learn how to torque Google to detect SQL injection points and login portals, execute port scans and CGI scans, fingerprint web servers, locate incredible information caches such as firewall and IDS logs, password databases, SQL dumps and much more - all without sending a single packet to the target! Borrowing the techniques pioneered by malicious "Google hackers," this talk aims to show security practitioners how to properly protect clients from this often overlooked and dangerous form of information leakage. *First book about Google targeting IT professionals and security leaks through web browsing. *Author Johnny Long, the authority on Google hacking, will be speaking about "Google Hacking" at the Black Hat 2004 Briefing. His presentation on penetrating security flaws with Google is expected to create a lot of buzz and exposure for the topic. *Johnny Long's Web site hosts the largest repository of Google security exposures and is the most popular destination for security professionals who want to learn about the dark side of Google.
Electronic reproduction.
Amsterdam :
Elsevier Science & Technology,
2007.
Mode of access: World Wide Web.
ISBN: 9780080478050 (electronic bk.)Subjects--Uniform Titles:
Google.
Subjects--Topical Terms:
160733
Web search engines.
Index Terms--Genre/Form:
172687
Electronic books.
LC Class. No.: TK5105.885.G66 / L66 2005eb
Dewey Class. No.: 004.6
Google hacking for penetration testers
LDR
:04132cmm 22003014a 4500
001
1000045964
003
OCoLC
005
20091026094528.0
006
m d
007
cr cn
008
070806s2005 maua s 001 0 eng d
020
$a
9780080478050 (electronic bk.)
020
$a
0080478050 (electronic bk.)
020
$a
9781931836364 (paper)
020
$a
1931836361 (paper)
035
$a
(OCoLC)162598728
035
$a
ocn162598728
040
$a
OPELS
$c
OPELS
$d
OKU
050
1 4
$a
TK5105.885.G66
$b
L66 2005eb
082
0 4
$a
004.6
$2
22{me_controlnum}
100
1
$a
Long, Johnny.
$3
1000060460
245
1 0
$a
Google hacking for penetration testers
$h
[electronic resource] /
$c
Johnny Long ; foreword by Ed Skoudis.
260
$a
Rockland, Mass. :
$b
Syngress,
$c
c2005.
300
$a
xxiv, 502 p. :
$b
ill. ;
$c
24 cm.
500
$a
Includes index.
505
0
$a
Google searching basics -- Advanced operators -- Google hacking basics -- Pre-assessment -- Network mapping -- Locating exploits and finding targets -- Ten simple security searches that work -- Tracking down web servers, login portals, and network hardware -- Usernames, passwords, and secret stuff, oh my! -- Document grinding and database digging -- Protecting yourself from Google hackers -- Automating Google searches / James C. Foster.
520
$a
Google, the most popular search engine worldwide, provides web surfers with an easy-to-use guide to the Internet, with web and image searches, language translation, and a range of features that make web navigation simple enough for even the novice user. What many users dont realize is that the deceptively simple components that make Google so easy to use are the same features that generously unlock security flaws for the malicious hacker. Vulnerabilities in website security can be discovered through Google hacking, techniques applied to the search engine by computer criminals, identity thieves, and even terrorists to uncover secure information. This book beats Google hackers to the punch, equipping web administrators with penetration testing applications to ensure their site is invulnerable to a hackers search. Penetration Testing with Google Hacks explores the explosive growth of a technique known as "Google Hacking." When the modern security landscape includes such heady topics as "blind SQL injection" and "integer overflows," it's refreshing to see such a deceptively simple tool bent to achieve such amazing results; this is hacking in the purest sense of the word. Readers will learn how to torque Google to detect SQL injection points and login portals, execute port scans and CGI scans, fingerprint web servers, locate incredible information caches such as firewall and IDS logs, password databases, SQL dumps and much more - all without sending a single packet to the target! Borrowing the techniques pioneered by malicious "Google hackers," this talk aims to show security practitioners how to properly protect clients from this often overlooked and dangerous form of information leakage. *First book about Google targeting IT professionals and security leaks through web browsing. *Author Johnny Long, the authority on Google hacking, will be speaking about "Google Hacking" at the Black Hat 2004 Briefing. His presentation on penetrating security flaws with Google is expected to create a lot of buzz and exposure for the topic. *Johnny Long's Web site hosts the largest repository of Google security exposures and is the most popular destination for security professionals who want to learn about the dark side of Google.
533
$a
Electronic reproduction.
$b
Amsterdam :
$c
Elsevier Science & Technology,
$d
2007.
$n
Mode of access: World Wide Web.
$n
System requirements: Web browser.
$n
Title from title screen (viewed on Aug. 2, 2007).
$n
Access may be restricted to users at subscribing institutions.
630
0 0
$a
Google.
$3
189334
650
0
$a
Web search engines.
$3
160733
650
0
$a
Internet searching.
$3
159650
650
0
$a
Internet programming.
$3
147999
655
7
$a
Electronic books.
$2
local.
$3
172687
700
1
$a
Skoudis, Ed.
$3
1000060461
710
2
$a
ScienceDirect (Online service)
$3
1000060142
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9781931836364
$z
An electronic book accessible through the World Wide Web; click for information
856
4 0
$3
Referex
$u
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781931836364
$z
An electronic book accessible through the World Wide Web; click for information
0 筆讀者評論
館藏地:
全部
線上資料庫 (Online Resource)
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約人數
備註欄
附件
OE0040121
線上資料庫 (Online Resource)
線上資源
線上電子書
OE
一般(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
建立或儲存個人書籤
書目轉出
取書館別
處理中
...
變更密碼
登入