Web application security testing with Google Hacking

In this concise course, start by mastering the basics of crafting precise Google search queries to uncover hidden but exploitable information online. You'll learn to detect non-public directory listings, identify SQL syntax errors hinting at database vulnerabilities, and find exposed backup fil...

Full description

Bibliographic Details
Main Author: Czagan, Dawid (instructor)
Format: eBook
Language:English
Published: [Birmingham, United Kingdom] Packt Publishing Ltd. 2024
Edition:[First edition]
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 02882nmm a2200397 u 4500
001 EB002214158
003 EBX01000000000000001351119
005 00000000000000.0
007 cr|||||||||||||||||||||
008 240604 ||| eng
020 |a 9781836208372 
050 4 |a QA76.9.A25 
100 1 |a Czagan, Dawid  |e instructor 
245 0 0 |a Web application security testing with Google Hacking 
250 |a [First edition] 
260 |a [Birmingham, United Kingdom]  |b Packt Publishing Ltd.  |c 2024 
300 |a 1 video file (31 min.)  |b sound, color 
653 |a Sécurité informatique 
653 |a Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277 
653 |a Web search engines / http://id.loc.gov/authorities/subjects/sh97007463 
653 |a Google / http://id.loc.gov/authorities/names/nr2003021731 
653 |a Tests d'intrusion 
653 |a Programmation Internet 
653 |a Moteurs de recherche sur Internet 
653 |a Internet / Sécurité / Mesures 
653 |a Internet programming / http://id.loc.gov/authorities/subjects/sh96009904 
653 |a Réseaux d'ordinateurs / Sécurité / Mesures 
653 |a Penetration testing (Computer security) / http://id.loc.gov/authorities/subjects/sh2011003137 
653 |a Internet / Security measures 
653 |a Computer security / http://id.loc.gov/authorities/subjects/sh90001862 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
856 4 0 |u https://learning.oreilly.com/videos/~/9781836208372/?ar  |x Verlag  |3 Volltext 
082 0 |a 331 
082 0 |a 005.8 
520 |a In this concise course, start by mastering the basics of crafting precise Google search queries to uncover hidden but exploitable information online. You'll learn to detect non-public directory listings, identify SQL syntax errors hinting at database vulnerabilities, and find exposed backup files containing sensitive data. As the course advances, discover methods to identify internal server errors and data leaks in URLs—common breaches that pose significant security threats. Learn how to spot insecure HTTP web pages that could jeopardize both user and organizational safety. A key feature of the course is a practical walkthrough of the Google Hacking Database, an essential tool for security professionals that provides deep insights into using pre-compiled searches effectively. Apply what you've learned in a real-life scenario with a case study on the Microsoft Yammer Social Network. The course concludes with vital strategies on preventing the indexing of sensitive data by search engines, a crucial practice to protect your digital footprint. This short course is designed not only to teach you how to spot vulnerabilities but also to equip you with preventive measures, preparing you to think ahead of potential security threats in web applications