Google hacking for penetration tester - part 37 doc

Google hacking for penetration tester - part 37 doc

Google hacking for penetration tester - part 37 doc

... 10/5/07 1:08 PM Page 370 Table 9.5 continued Queries That Locate Various Sensitive Information Query Description inurl:forward filetype:forward –cvs UNIX mail forward files reveal e-mail addresses intitle:index.of ... responsi- bility for encouraging potential illegal activity. Most individuals interested in this kind of information will use it for illegal purposes. If you are interested...

Ngày tải lên: 04/07/2014, 17:20

10 388 0
Google hacking for penetration tester - part 5 docx

Google hacking for penetration tester - part 5 docx

... tools: Platform Tool Location Mac Google Notifier, Google www .google. com/mac.html Desktop, Google Sketchup PC Google Pack (includes IE & www .google. com/tools Firefox toolbars, Google Desktop ...  www .google. com This is the main Google Web page, the entry point for most searches.  http://groups .google. com The Google Groups Web page.  http://images .google. com/...

Ngày tải lên: 04/07/2014, 17:20

10 410 0
Google hacking for penetration tester - part 7 docx

Google hacking for penetration tester - part 7 docx

... result lists [DOC] before the title of the document and a file format of Microsoft Word.This indicates that Google recognized the file as a Microsoft Word docu- ment. In addition, Google has provided ... 2.12. Figure 2.12 A Google- converted Word Document 64 Chapter 2 • Advanced Operators 452 _Google_ 2e_02.qxd 10/5/07 12:14 PM Page 64 When you click the link for a document that Google...

Ngày tải lên: 04/07/2014, 17:20

10 627 0
Google hacking for penetration tester - part 8 doc

Google hacking for penetration tester - part 8 doc

... your address information being in Google s databases for the world to see, have no fear. Google makes it possible for you to delete your infor- mation so others can’t access it via Google. Simply ... title of Google Groups posts for search terms.This operator only works within Google Groups.This is one of the operators that is very com- patible with wildcards. For example, to...

Ngày tải lên: 04/07/2014, 17:20

10 554 0
Google hacking for penetration tester - part 9 docx

Google hacking for penetration tester - part 9 docx

... Sites ■ The Google filetypes FAQ, www .google. com/help/faq_filetypes.html ■ The resource for file extension information, www.filext.com This site can help you figure out what program a particular extension ... page, an information snippet about the page, and a list of sites that seem related.This information can be retrieved with the cache, info, and related operators, respec- tively.To sear...

Ngày tải lên: 04/07/2014, 17:20

10 487 0
Google hacking for penetration tester - part 12 docx

Google hacking for penetration tester - part 12 docx

... example, consider a document called exhc-1.xls, found with Google. You could easily modify the URL for that document, changing the 1 to a 2, making the filename exhc-2.xls. If the document is found, you ... almost cer- tainly alert the site that you’re scanning. WebInspect is better suited for this task than Google Hacking, but many times a low-profile Google scan can be used to get a...

Ngày tải lên: 04/07/2014, 17:20

10 674 0
Google hacking for penetration tester - part 13 doc

Google hacking for penetration tester - part 13 doc

... intext:password -sample -test -tutorial -download GNU Zebra configuration file inurl:ospfd.conf intext:password -sample -test -tutorial -download YAST configuration file filetype:cfg ks intext:rootpw -sample - test ... intext:rootpw -sample - test -howto Netscape server configuration file allinurl:”.nsconfig” -sample -howto - tutorial UnrealIRCd configuration file filetype:conf inurl:unreali...

Ngày tải lên: 04/07/2014, 17:20

10 398 0
Google hacking for penetration tester - part 18 docx

Google hacking for penetration tester - part 18 docx

... terms that will yield better results. For example, when looking for e-mail addresses, you can add Google s Part in an Information Collection Framework • Chapter 5 171 452 _Google_ 2e_05.qxd 10/5/07 12:46 ... directly to Google s Web server and send the request by hand. Figure 5.8 shows how it is done: Figure 5.8 A Raw HTTP Request and Response from Google for Simple Search Google...

Ngày tải lên: 04/07/2014, 17:20

10 287 0
Google hacking for penetration tester - part 21 doc

Google hacking for penetration tester - part 21 doc

... “Shadow Conservatory?” 208 Chapter 5 • Google s Part in an Information Collection Framework 452 _Google_ 2e_05.qxd 10/5/07 12:46 PM Page 208 link two e-mail addresses together? Consider Johnny’s e-mail address johnny@ihackstuff.com and ... Chapter 5 • Google s Part in an Information Collection Framework 452 _Google_ 2e_05.qxd 10/5/07 12:46 PM Page 210 Figure 5.21 Zero Results for “Sha...

Ngày tải lên: 04/07/2014, 17:20

10 281 0
Google hacking for penetration tester - part 22 docx

Google hacking for penetration tester - part 22 docx

... en-us,en;q=0.5\r\nAccept-Encoding: gzip,deflate\r\nAccept-Charset: ISO-885 9-1 ,utf-8;q=0.7,*;q=0.7\r\nKeep-Alive: 300\r\nProxy-Connection: keep-alive\r\nReferer: http://www .google. co.za/\r\nCookie: PREF=ID=35d1cc1c7089ceba:TM=1184106010:LM=1184106010:S=gBAPGByiXrA7ZPQN\r\n] [HTTP/1.0 ... private Set-Cookie: PREF=ID=329773239358a7d2:TM=1184228424:LM=1184228424:S=MQ6vKrgT4f9up_gj; expires=S...

Ngày tải lên: 04/07/2014, 17:20

10 287 0
w