Skip to Main Content
Google Hacking for Penetration Testers
book

Google Hacking for Penetration Testers

by Johnny Long
December 2004
Intermediate to advanced content levelIntermediate to advanced
448 pages
16h 25m
English
Syngress
Content preview from Google Hacking for Penetration Testers
This brings us back, once again, to perhaps the most valuable weapon in a
Google hacker’s arsenal: effective search reduction. Here’s a list of the most
common points a Google hacker considers when trolling for configuration files:
Create a strong base search using unique words or phrases from live files.
Filter out the words sample, example, test, howto, and tutorial to narrow the
obvious example files.
Filter out CVS repositories, which often house default config files,
with –cvs.
Filter out manpage or Manual if you’re searching for a UNIX program’s
configuration file.
Locate the one most commonly changed field in a sample configuration
file and perform a ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Google Hacks

Google Hacks

Tara Calishain, Rael Dornfest
Dissecting the Hack

Dissecting the Hack

Jayson E Street

Publisher Resources

ISBN: 1931836361