Skip to Main Content
Google Hacking for Penetration Testers
book

Google Hacking for Penetration Testers

by Johnny Long
December 2004
Intermediate to advanced content levelIntermediate to advanced
448 pages
16h 25m
English
Syngress
Content preview from Google Hacking for Penetration Testers
Locating Exploits
and Finding Targets
Solutions in this Chapter:
Locating Exploit Code
Locating Vulnerable Targets
Links to Sites
Frequently Asked Questions
Chapter 6
181
Summary
Solutions Fast Track
Frequently Asked Questions
315_PTG_06.qxd 11/22/04 4:57 PM Page 181
Introduction
Exploit code, collectively called exploits, is a tool of the hacker trade. Designed to
penetrate a target, most hackers have many different exploits at their disposal.
Some exploits, termed zero day or 0day, remain underground for some period of
time, eventually becoming public ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Google Hacks

Google Hacks

Tara Calishain, Rael Dornfest
Dissecting the Hack

Dissecting the Hack

Jayson E Street

Publisher Resources

ISBN: 1931836361