Web Application Security Testing With Google Hacking

Posted By: ELK1nG

Web Application Security Testing With Google Hacking
Published 12/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 138.22 MB | Duration: 0h 31m

Learn How Google Hacking Can Be Used to Find Security Weaknesses in Web Applications

What you'll learn

Learn how Google Hacking can be used to find security weaknesses in web applications

Use Google Hacking to find directory listings and SQL syntax errors

Find publicly exposed backup files and internal server errors by means of Google Hacking

Use Google Hacking to find sensitive data in URLs and insecure HTTP web pages

Discover how to find these security weaknesses step by step in practice (DEMOS)

Learn about Google Hacking Database

Become a successful penetration tester / ethical hacker

Requirements

Basic hacking skills

Description

Sensitive data from web applications can be indexed by Google and then it becomes publicly exposed to everyone on the Internet. In this course, you’ll learn about different types of sensitive data that can be indexed by Google. What’s more – you’ll learn about the technique known as Google Hacking and you’ll see how Google Hacking can be used by ethical hackers and professional penetration testers for finding security weaknesses in web applications.First, I’ll present how you can use Google Hacking to find directory listings and SQL syntax errors. After that, I’ll demonstrate how you can find publicly exposed backup files and internal server errors by means of Google Hacking. Next, I’ll show you how you can use Google Hacking to find sensitive data in URLs and insecure HTTP web pages. Then, I’ll explain to you what Google Hacking Database is and I’ll tell you about a critical vulnerability in Microsoft Yammer Social Network that allowed the attacker to gain unauthorized access to users’ accounts by means of Google Hacking. Finally, I’ll tell you how to prevent Google indexing from happening.What you’ll see primarily in this course are demos and real-world scenarios, because I want you to make the most of this course and apply this knowledge in your own penetration testing projects. I hope this sounds good to you and I can’t wait to see you in the class.

Overview

Section 1: Introduction

Lecture 1 Introduction

Section 2: Google Hacking: Finding Directory Listings

Lecture 2 Google Hacking: Finding Directory Listings

Section 3: Google Hacking: Finding SQL Syntax Errors

Lecture 3 Google Hacking: Finding SQL Syntax Errors

Section 4: Google Hacking: Finding Publicly Exposed Backup Files

Lecture 4 Google Hacking: Finding Publicly Exposed Backup Files

Section 5: Google Hacking: Finding Internal Server Errors

Lecture 5 Google Hacking: Finding Internal Server Errors

Section 6: Google Hacking: Finding Sensitive Data in URLs

Lecture 6 Google Hacking: Finding Sensitive Data in URLs

Section 7: Google Hacking: Finding Insecure HTTP Web Pages

Lecture 7 Google Hacking: Finding Insecure HTTP Web Pages

Section 8: Google Hacking Database

Lecture 8 Google Hacking Database

Section 9: Case Study: Microsoft Yammer Social Network

Lecture 9 Case Study: Microsoft Yammer Social Network

Section 10: How to Prevent Google Indexing from Happening

Lecture 10 How to Prevent Google Indexing from Happening

Section 11: Summary

Lecture 11 Summary

Penetration testers, ethical hackers, bug hunters, security engineers / consultants