-
Book Overview & Buying
-
Table Of Contents
Web Application Security Testing with Google Hacking
By :
Web Application Security Testing with Google Hacking
By:
Overview of this book
In this concise course, start by mastering the basics of crafting precise Google search queries to uncover hidden but exploitable information online. You'll learn to detect non-public directory listings, identify SQL syntax errors hinting at database vulnerabilities, and find exposed backup files containing sensitive data.
As the course advances, discover methods to identify internal server errors and data leaks in URLs—common breaches that pose significant security threats. Learn how to spot insecure HTTP web pages that could jeopardize both user and organizational safety.
A key feature of the course is a practical walkthrough of the Google Hacking Database, an essential tool for security professionals that provides deep insights into using pre-compiled searches effectively. Apply what you've learned in a real-life scenario with a case study on the Microsoft Yammer Social Network.
The course concludes with vital strategies on preventing the indexing of sensitive data by search engines, a crucial practice to protect your digital footprint. This short course is designed not only to teach you how to spot vulnerabilities but also to equip you with preventive measures, preparing you to think ahead of potential security threats in web applications.
Table of Contents (11 chapters)
Introduction
Google Hacking: Finding Directory Listings
Google Hacking: Finding SQL Syntax Errors
Google Hacking: Finding Publicly Exposed Backup Files
Google Hacking: Finding Internal Server Errors
Google Hacking: Finding Sensitive Data in URLs
Google Hacking: Finding Insecure HTTP Web Pages
Google Hacking Database
Case Study: Microsoft Yammer Social Network
How to Prevent Google Indexing from Happening
Summary