Tags
Language
Tags
October 2025
Su Mo Tu We Th Fr Sa
28 29 30 1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31 1
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Web Application Security Testing With Google Hacking

    Posted By: ELK1nG
    Web Application Security Testing With Google Hacking

    Web Application Security Testing With Google Hacking
    Published 12/2023
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 138.22 MB | Duration: 0h 31m

    Learn How Google Hacking Can Be Used to Find Security Weaknesses in Web Applications

    What you'll learn

    Learn how Google Hacking can be used to find security weaknesses in web applications

    Use Google Hacking to find directory listings and SQL syntax errors

    Find publicly exposed backup files and internal server errors by means of Google Hacking

    Use Google Hacking to find sensitive data in URLs and insecure HTTP web pages

    Discover how to find these security weaknesses step by step in practice (DEMOS)

    Learn about Google Hacking Database

    Become a successful penetration tester / ethical hacker

    Requirements

    Basic hacking skills

    Description

    Sensitive data from web applications can be indexed by Google and then it becomes publicly exposed to everyone on the Internet. In this course, you’ll learn about different types of sensitive data that can be indexed by Google. What’s more – you’ll learn about the technique known as Google Hacking and you’ll see how Google Hacking can be used by ethical hackers and professional penetration testers for finding security weaknesses in web applications.First, I’ll present how you can use Google Hacking to find directory listings and SQL syntax errors. After that, I’ll demonstrate how you can find publicly exposed backup files and internal server errors by means of Google Hacking. Next, I’ll show you how you can use Google Hacking to find sensitive data in URLs and insecure HTTP web pages. Then, I’ll explain to you what Google Hacking Database is and I’ll tell you about a critical vulnerability in Microsoft Yammer Social Network that allowed the attacker to gain unauthorized access to users’ accounts by means of Google Hacking. Finally, I’ll tell you how to prevent Google indexing from happening.What you’ll see primarily in this course are demos and real-world scenarios, because I want you to make the most of this course and apply this knowledge in your own penetration testing projects. I hope this sounds good to you and I can’t wait to see you in the class.

    Overview

    Section 1: Introduction

    Lecture 1 Introduction

    Section 2: Google Hacking: Finding Directory Listings

    Lecture 2 Google Hacking: Finding Directory Listings

    Section 3: Google Hacking: Finding SQL Syntax Errors

    Lecture 3 Google Hacking: Finding SQL Syntax Errors

    Section 4: Google Hacking: Finding Publicly Exposed Backup Files

    Lecture 4 Google Hacking: Finding Publicly Exposed Backup Files

    Section 5: Google Hacking: Finding Internal Server Errors

    Lecture 5 Google Hacking: Finding Internal Server Errors

    Section 6: Google Hacking: Finding Sensitive Data in URLs

    Lecture 6 Google Hacking: Finding Sensitive Data in URLs

    Section 7: Google Hacking: Finding Insecure HTTP Web Pages

    Lecture 7 Google Hacking: Finding Insecure HTTP Web Pages

    Section 8: Google Hacking Database

    Lecture 8 Google Hacking Database

    Section 9: Case Study: Microsoft Yammer Social Network

    Lecture 9 Case Study: Microsoft Yammer Social Network

    Section 10: How to Prevent Google Indexing from Happening

    Lecture 10 How to Prevent Google Indexing from Happening

    Section 11: Summary

    Lecture 11 Summary

    Penetration testers, ethical hackers, bug hunters, security engineers / consultants