Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Web Application Security Testing with Google Hacking
  • Table Of Contents Toc
Web Application Security Testing with Google Hacking

Web Application Security Testing with Google Hacking

By : Dawid Czagan
close
close
Web Application Security Testing with Google Hacking

Web Application Security Testing with Google Hacking

By: Dawid Czagan

Overview of this book

In this concise course, start by mastering the basics of crafting precise Google search queries to uncover hidden but exploitable information online. You'll learn to detect non-public directory listings, identify SQL syntax errors hinting at database vulnerabilities, and find exposed backup files containing sensitive data. As the course advances, discover methods to identify internal server errors and data leaks in URLs—common breaches that pose significant security threats. Learn how to spot insecure HTTP web pages that could jeopardize both user and organizational safety. A key feature of the course is a practical walkthrough of the Google Hacking Database, an essential tool for security professionals that provides deep insights into using pre-compiled searches effectively. Apply what you've learned in a real-life scenario with a case study on the Microsoft Yammer Social Network. The course concludes with vital strategies on preventing the indexing of sensitive data by search engines, a crucial practice to protect your digital footprint. This short course is designed not only to teach you how to spot vulnerabilities but also to equip you with preventive measures, preparing you to think ahead of potential security threats in web applications.
Table of Contents (11 chapters)
close
close
1
Introduction
chevron up
2
Google Hacking: Finding Directory Listings
3
Google Hacking: Finding SQL Syntax Errors
4
Google Hacking: Finding Publicly Exposed Backup Files
5
Google Hacking: Finding Internal Server Errors
6
Google Hacking: Finding Sensitive Data in URLs
7
Google Hacking: Finding Insecure HTTP Web Pages
8
Google Hacking Database
9
Case Study: Microsoft Yammer Social Network
10
How to Prevent Google Indexing from Happening
11
Summary
You're currently viewing a free sample. Access the full title and Packt library for free now with a free trial.
Chapter: 1
Introduction
Icon This video is locked
Icon
Icon
0:00
2.0x
1.5x
1.25x
1.0x
0.5x
caption settings
caption off
English
Icon Icon
ShowHide Transcripts Icon
CONTINUE WATCHING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
Web Application Security Testing with Google Hacking
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon