• 🌙 Community Spirit

    Ramadan Mubarak! To honor this month, Crax has paused NSFW categories. Wishing you peace and growth!

Web Application Security Testing with Google Hacking (1 Viewer)

Currently reading:
 Web Application Security Testing with Google Hacking (1 Viewer)

Recently searched:

mayoufi

Member
Amateur
LV
5
Joined
Oct 22, 2023
Threads
3,471
Likes
389
Awards
12
Credits
1,958©
Cash
0$
Th CY10P9XH5klB8Tl2nDNktUDQzdqGm8Nt


MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Language: English | Duration: 30m | Size: 138 MB
Learn How Google Hacking Can Be Used to Find Security Weaknesses in Web Applications

What you'll learn
Learn how Google Hacking can be used to find security weaknesses in web applications
Use Google Hacking to find directory listings and SQL syntax errors
Find publicly exposed backup files and internal server errors by means of Google Hacking
Use Google Hacking to find sensitive data in URLs and insecure HTTP web pages
Discover how to find these security weaknesses step by step in practice (DEMOS)
Learn about Google Hacking Database
Become a successful penetration tester / ethical hacker

Requirements
Basic hacking skills

Description
Sensitive data from web applications can be indexed by Google and then it becomes publicly exposed to everyone on the Internet. In this course, you’ll learn about different types of sensitive data that can be indexed by Google. What’s more – you’ll learn about the technique known as Google Hacking and you’ll see how Google Hacking can be used by ethical hackers and professional penetration testers for finding security weaknesses in web applications.

First, I’ll present how you can use Google Hacking to find directory listings and SQL syntax errors. After that, I’ll demonstrate how you can find publicly exposed backup files and internal server errors by means of Google Hacking. Next, I’ll show you how you can use Google Hacking to find sensitive data in URLs and insecure HTTP web pages. Then, I’ll explain to you what Google Hacking Database is and I’ll tell you about a critical vulnerability in Microsoft Yammer Social Network that allowed the attacker to gain unauthorized access to users’ accounts by means of Google Hacking. Finally, I’ll tell you how to prevent Google indexing from happening.

What you’ll see primarily in this course are demos and real-world scenarios, because I want you to make the most of this course and apply this knowledge in your own penetration testing projects. I hope this sounds good to you and I can’t wait to see you in the class.

Who this course is for
Penetration testers, ethical hackers, bug hunters, security engineers / consultants
 
  • Like
Reactions: tedio

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Tips
Recently searched:

Similar threads

Users who are viewing this thread

Top Bottom