Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

CHAPTER 1. Recon > Google Hacking

Google Hacking

The Hack Dissected

Then Stepan had listed some names and e-mail addresses that belonged to the 3DNF.net domain. Vlad could only guess that Stepan had “googled” the domain name to harvest the addresses. If so, Stepan was a fairly resourceful researcher. (p. 10)

Nearly everyone in the information security industry has been made aware of the issue of Google Hacking. But even though “Google” has become an acceptable verb in our common speech, the concept of Google Hacking is still a new concept to many outside the industry.

Google Hacking is a concept coined and perfected by Johnny Long, a well-known security researcher and founder of “Hackers for Charity,” and author of a line of Google Hacking books, the latest being Google Hacking for Penetration Testers, Volume 2 (ISBN: 978-1-59749-176-1, Syngress). Upon discovering that carefully crafted Google search queries could return results that showed that the target is running vulnerable software ripe for attack, Johnny created the Google Hacking Database (GHDB) at www.hackersforcharity.org/ghdb/, which quickly grew from hundreds of submissions by Johnny and teams of volunteers.


  

You are currently reading a PREVIEW of this book.

                                                                                                                    

Get instant access to over $1 million worth of books and videos.

  

Start a Free 10-Day Trial


  
  • Safari Books Online
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint