Skip to Main Content
Google Hacking for Penetration Testers, 3rd Edition
book

Google Hacking for Penetration Testers, 3rd Edition

by Bill Gardner, Johnny Long, Justin Brown
November 2015
Intermediate to advanced content levelIntermediate to advanced
234 pages
6h 28m
English
Syngress
Content preview from Google Hacking for Penetration Testers, 3rd Edition
Chapter 6

Locating Exploits and Finding Targets

Abstract

This chapter is about finding vulnerable target computers and the exploits that can be used against those target computers through Google.

Keywords

locating exploit code
locating vulnerable targets

Introduction

Exploits are tools of the hacker trade. Designed to penetrate a target, most hackers have many different exploits at their disposal. Some exploits, termed zero day or 0day, remain underground for some period of time, eventually becoming public, posted to newsgroups or Web sites for the world to share. With so many Web sites dedicated to the distribution of exploit code, it’s fairly simple to harness the power of Google to locate these tools. It can be a slightly more difficult exercise ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

The Basics of Hacking and Penetration Testing, 2nd Edition

The Basics of Hacking and Penetration Testing, 2nd Edition

Patrick Engebretson
Web Penetration Testing with Kali Linux - Third Edition

Web Penetration Testing with Kali Linux - Third Edition

Gilberto Najera-Gutierrez, Juned Ahmed Ansari

Publisher Resources

ISBN: 9780128029824