Usernames, Passwords, and Secret Stuff, Oh My!
This chapter covers searching for usernames, passwords, social security numbers, credit card numbers, and other juicy info.
social security numbers
credit card numbers
This chapter is not about finding sensitive data during an assessment as much as it is about what the “bad guys” might do to troll for the data. The examples presented in this chapter generally represent the lowest-hanging fruit on the security tree. Hackers target this information on a daily basis. To protect against this type of attacker, we need to be fairly candid about the worst-case possibilities. We won’t be overly candid, however. We don’t want to give the ...
Get Google Hacking for Penetration Testers, 3rd Edition now with O’Reilly online learning.
O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.