Skip to Main Content
Google Hacking for Penetration Testers
book

Google Hacking for Penetration Testers

by Johnny Long
December 2004
Intermediate to advanced content levelIntermediate to advanced
448 pages
16h 25m
English
Syngress
Content preview from Google Hacking for Penetration Testers
Database Dumps
The output of a database into any format can be constituted as a database dump.
For the purposes of Google hacking, however, we’ll us the term database dump to
describe the text-based conversion of a database. As we’ll see next in this chapter,
it’s entirely possible for an attacker to locate just about any type of binary
database file, but standardized formats (such as the text-based SQL dump shown
in Figure 10.10) are very commonplace on the Internet.
Using a full database dump, a database administrator can completely rebuild a
database.This means that a full dump details not only the structure of the
database’s tables but also ever
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Google Hacks

Google Hacks

Tara Calishain, Rael Dornfest
Dissecting the Hack

Dissecting the Hack

Jayson E Street

Publisher Resources

ISBN: 1931836361