Usernames, Passwords, and Secret Stuff, Oh My!
This chapter covers searching for usernames, passwords, social security numbers, credit card numbers, and other juicy info.
social security numbers
credit card numbers
This chapter is not about finding sensitive data during an assessment as much as it is about what the “bad guys” might do to troll for the data. The examples presented in this chapter generally represent the lowest-hanging fruit on the security tree. Hackers target this information on a daily basis. To protect against this type of attacker, we need to be fairly candid about the worst-case possibilities. We won’t be overly candid, however. We don’t want to give the ...
Get Google Hacking for Penetration Testers, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.