Skip to Main Content
Google Hacking for Penetration Testers
book

Google Hacking for Penetration Testers

by Johnny Long
December 2004
Intermediate to advanced content levelIntermediate to advanced
448 pages
16h 25m
English
Syngress
Content preview from Google Hacking for Penetration Testers
Table 10.2 Log File Search Examples
Query Program
intext:”Session Start IRC/AIM log files
****:*:**” filetype:log
filetype:cfg login “LoginServer=” Ultima Online log files
ext:log password END_FILE Java password files
“”ZoneAlarm Logging Client” ZoneAlarm log files
filetype:log “PHP Parse error” PHP error logs
| “PHP Warning” | “
Log files reveal various types of information, as shown in the search for file-
type:log username putty in Figure 10.6.This log file lists machine names and asso-
ciated usernames that could be reused in an attack against the machine.
Office Documents
The term office document generally refers to documents created by word pro-
cessing softw ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Google Hacks

Google Hacks

Tara Calishain, Rael Dornfest
Dissecting the Hack

Dissecting the Hack

Jayson E Street

Publisher Resources

ISBN: 1931836361