Chapter 8

Tracking Down Web Servers, Login Portals, and Network Hardware


This chapter covers finding Web servers, login portals, and network hardware.


Web servers
login portals
network hardware
Web utilities
Web-enabled network devices


Penetration (pen) testers are sometimes thought of as professional hackers since they essentially break into their customers’ networks in an attempt to locate, document, and ultimately help resolve security flaws in a system or network. However, pen testers and hackers differ quite a bit in several ways.
For example, most penetration testers are provided with specific instructions about which networks and systems they will be testing. Their targets are specified for many reasons, but ...

Get Google Hacking for Penetration Testers, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.