Google hacking for penetration tester - part 13 doc

Google hacking for penetration tester - part 13 doc

Google hacking for penetration tester - part 13 doc

... intext:password -sample -test -tutorial -download GNU Zebra configuration file inurl:ospfd.conf intext:password -sample -test -tutorial -download YAST configuration file filetype:cfg ks intext:rootpw -sample - test ... intext:rootpw -sample - test -howto Netscape server configuration file allinurl:”.nsconfig” -sample -howto - tutorial UnrealIRCd configuration file filetype:conf inurl:unreali...

Ngày tải lên: 04/07/2014, 17:20

10 399 0
Google hacking for penetration tester - part 12 docx

Google hacking for penetration tester - part 12 docx

... example, consider a document called exhc-1.xls, found with Google. You could easily modify the URL for that document, changing the 1 to a 2, making the filename exhc-2.xls. If the document is found, you ... almost cer- tainly alert the site that you’re scanning. WebInspect is better suited for this task than Google Hacking, but many times a low-profile Google scan can be used to get a...

Ngày tải lên: 04/07/2014, 17:20

10 675 0
Google hacking for penetration tester - part 18 docx

Google hacking for penetration tester - part 18 docx

... terms that will yield better results. For example, when looking for e-mail addresses, you can add Google s Part in an Information Collection Framework • Chapter 5 171 452 _Google_ 2e_05.qxd 10/5/07 12:46 ... directly to Google s Web server and send the request by hand. Figure 5.8 shows how it is done: Figure 5.8 A Raw HTTP Request and Response from Google for Simple Search Google...

Ngày tải lên: 04/07/2014, 17:20

10 288 0
Google hacking for penetration tester - part 21 doc

Google hacking for penetration tester - part 21 doc

... “Shadow Conservatory?” 208 Chapter 5 • Google s Part in an Information Collection Framework 452 _Google_ 2e_05.qxd 10/5/07 12:46 PM Page 208 link two e-mail addresses together? Consider Johnny’s e-mail address johnny@ihackstuff.com and ... Chapter 5 • Google s Part in an Information Collection Framework 452 _Google_ 2e_05.qxd 10/5/07 12:46 PM Page 210 Figure 5.21 Zero Results for “Sha...

Ngày tải lên: 04/07/2014, 17:20

10 282 0
Google hacking for penetration tester - part 22 docx

Google hacking for penetration tester - part 22 docx

... en-us,en;q=0.5\r\nAccept-Encoding: gzip,deflate\r\nAccept-Charset: ISO-885 9-1 ,utf-8;q=0.7,*;q=0.7\r\nKeep-Alive: 300\r\nProxy-Connection: keep-alive\r\nReferer: http://www .google. co.za/\r\nCookie: PREF=ID=35d1cc1c7089ceba:TM=1184106010:LM=1184106010:S=gBAPGByiXrA7ZPQN\r\n] [HTTP/1.0 ... private Set-Cookie: PREF=ID=329773239358a7d2:TM=1184228424:LM=1184228424:S=MQ6vKrgT4f9up_gj; expires=S...

Ngày tải lên: 04/07/2014, 17:20

10 292 0
Google hacking for penetration tester - part 23 docx

Google hacking for penetration tester - part 23 docx

... then search for specific content within that code. Since source code is the text-based representa- tion of the difficult-to-read machine code, Google is well suited for this task. For example, ... uses for these visitors than just their search terms. Google s Part in an Information Collection Framework • Chapter 5 221 452 _Google_ 2e_05.qxd 10/5/07 12:46 PM Page 221 against the dum...

Ngày tải lên: 04/07/2014, 17:20

10 253 0
w