Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Penetration Testing
and Security Analysis
Module 2
Advanced Googling
g g
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
Module Objective
This module will familiarize you with:
EC-Council
Site Operator
intitle:index.of
error | warning
login
g | logon
g
admin | administrator
Google Advanced Search Form
Categorization of the Operators
Viewing
g Live Web Cams
Locating Source Code with Common Strings
Locating Vulnerable Targets
Locating Targets Via Demonstration Pages
Locating
g Targets
g Via Source Code
Vulnerable web Application Examples
Locating Targets Via CGI Scanning
A Single CGI Scan-Style Query
Directoryy Listings
g
Web Server Software Error Messages
The Goolag Scanner
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
Site Operator
The site operator is absolutely invaluable during the
information-gathering phase of an assessment.
A ssite
te sea
search
c ca
can be used to gat
gather
e information
o at o about tthee
servers and hosts that a target hosts.
Using
g simple
p reduction techniques,
q , we can quickly
q
y get
g an
idea about a targets online presence.
Consider the following
g simple
p example:
p
site:washingtonpost.com site:www.washingtonpost.com
This query effectively locates pages on the
washingtonpost.com
hi t
t
domain
d
i other
th th
than
www.washingtonpost.com
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
intitle:index.of
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
intitle:index.of
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
error | warning
Error messages can reveal a great deal of information about a target.
Often overlooked, error messages can provide insight into the application or
operating system software a target is running, the architecture of the network the
target is on
on, information about users on the system
system, and much more
more.
Not only are error messages informative, they are prolific.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
login | logon
Login portals can reveal the software and operating system of a
target and in many cases self-help
target,
self help documentation is linked
from the main page of a login portal.
These documents are designed
g
to assist users who run into
problems during the login process.
Whether the user has forgotten his or her password or even
username, thi
this d
documents
t can provide
id clues
l
that
th t might
i ht h
help
l an
attacker.
Documentation linked from login portals lists email addresses,
phone
h
numbers,
b
or URLs off h
human assistants
i
who
h can h
help
l a
troubled user regain lost access.
These assistants,
assistants or help desk operators,
operators are perfect targets for
a social engineering attack.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
username | userid |
employee ID | your
employee.ID
your username is
is
There are many different ways to obtain a username from a target system.
Even though a username is the less important half of most authentication mechanisms, it
should at least be marginally protected from outsiders.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
admin | administrator
The word administrator is often used to describe the person in control of a
network or system.
The word administrator can also be used to locate administrative login pages, or
login portals.
The phrase Contact your system administrator is a fairly common phrase on the
web, as are several basic derivations.
A query such as please contact your * administrator will return results that
reference local,
local company
company, site
site, department
department, server
server, system
system, network
network, database
database,
email, and even tennis administrators.
If a web user is told to contact an administrator, the odds are that theres data of
at least moderate importance to a security tester.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
admin login
admin login reveals administrative login pages.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
ext:html ext:htm
ext:shtml
ext:shtml ext:asp
ext:asp ext:php
ext:php
The ext:html ext:htm ext:shtml ext:asp
p ext:php
p pq
queryy uses ext,, a
synonym for the filetype operator, and is a negative query.
It returns no results when used alone and should be combined with a site
operator to work properly.
The idea behind this query is to exclude some of the most common
Internet file types in an attempt to find files that might be more
interesting.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
inurl:temp | inurl:tmp |
inurl:backup | inurl:bak
The inurl:temp
p | inurl:tmp
p | inurl:backup
p | inurl:bak q
query,
y, combined with the
site operator searches for temporary or backup files or directories on a server.
Although there are many possible naming conventions for temporary or backup
files, this search focuses on the most common terms.
Since this search uses the inurl operator, it will also locate files that contain these
terms as file extensions, such as index.html.bak.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
Categorization of the
Operators
Search Service
Search Operators
Web Search
Image Search
Groups
Directory
News
Froogle
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
allinanchor:
allinanchor:
The query with allinanchor restricts the results to the
pages containing all the query terms in their inboundlinks.
Avoid
A id the
th use off any other
th search
h operators
t
while
hil using
i
allinanchor.
Example: allinanchor: Longest river:
It will
ill return
t
th
the results
lt that
th t contain
t i l
longest
t and
d river
i iin th
the
anchor text of the pages.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
Screenshot - allinanchor:
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
allintext:
allintext:
The query with allintext restricts the results to the pages
containing
g all q
queryy terms onlyy in the text ((does not check
in the url, title).
Example: allintext: Best travel:
It will return the results that contain Best and travel in the text
of the page.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
Screenshot - allintext:
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
allintitle:
allintitle:
The query with allintitle restricts results to pages containing
all query terms specified in the title.
Avoid the use of any other search operators while using
allintitle.
Example: allintitle: Vulnerability attacks:
It will return the results which contain vulnerability and attacks
in the title.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
Screenshot - allintitle:
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
author:
author:
The query with author includes newsgroup articles by the
author,
h specified
ifi d iin the
h query.
The author name can be full name, partial name, or email ID.
Example: Hacking author: Linda Lee:
It will return the articles that contain the word Hacking written by
Linda Lee.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
Screenshot - author:
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
cache:
cache:
The query cache:url displays Googles cached version of a
web
b page.
Do not put a space between cache: and the URL.
Example: cache:www.eccouncil.org:
It shows the cache version of eccouncil.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
Screenshot - cache:
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
define:
define:
f
The query with define shows definitions from pages on the
web
b for
f the
h term specified.
ifi d
It is useful for finding definitions of words, phrases, and
acronyms.
Example:
E
l define:
d fi
h
hacking:
ki
It shows the definitions for the term Hacking.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
Screenshot - define:
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
filetype:
ffiletype:
yp
The query with filetype:suffix shows the result pages whose
names end in suffix.
Example: web attacks filetype:pdf:
It returns Adobe Acrobat PDF files that match the term web
web and
attacks
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
Screenshot - filetype:
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
group:
group:
The query with group restricts results to newsgroup articles
from certain groups or subareas.
Example: Sleep group:misc.kids:
It returns articles in the subarea misc.kids
misc.kids that contain the word
sleep.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
Screenshot - group:
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
inanchor:
inanchor:
Searches for the text representation of the link.
The query with inanchor restricts results to pages
containing the query terms specified.
Example: restaurants inanchor: menu:
It returns pages with anchor text in the links to the pages
containing
i i the
h word
d menu and
d the
h page contains
i the
h word
d
restaurants.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
Screenshot - inanchor:
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
insubject:
insubject:
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
Screenshot in subject:
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
intext:
intext:
The q
queryy with intext:term restricts results to documents
containing the term in the text.
There must be no space between the intext: and the following
word.
Example: intext:poem
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
Screenshot - intext:
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
link:
link:
The query with link:URL shows pages that point to that
URL.
URL
Example: link:www.googleguide.com
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
Screenshot - link:
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
location:
location:
The q
queryy with location will show articles from Google
g
News, and only from the location specified.
Example: Hackers location: China:
It shows articles that match the term Hackers from sites in
China.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
Screenshot - location:
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
At a Traffic
ffi Signal
i
l
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
intranet | help.desk
The term intranet,
intranet despite more specific
technical meanings, has become a generic
term that describes a network confined to a
small group.
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
Directory Listings
The server tag at the bottom of a directory listing can provide explicit detail about the type of
web server software that
thatss running.
running
If an attacker has an exploit for Apache 2.0.52 running on a UNIX server, a query such as
server.at Apache/2.0.52 will locate servers that host a directory listing with an Apache
2 0 52 server tag.
2.0.52
tag
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
Default Pages
Another wayy to locate specific
p
types
yp of servers or web software is to search for
default web pages.
Most web software,, including
g the web server software itself,, ships
p with one or
more default or test pages.
These p
pages
g can make it easyy for a site administrator to test the installation of a
web server or application.
Google crawls a web server while it is in its earliest stages of installation, still
displaying a set of default pages.
In these cases, theres generally a short window of time between the moment
when Google crawls the site and when the intended content is actually placed on
the server.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
A Typical Apache
Default Web Page
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
Usernames, Cleartext
Passwords and Hostnames
Passwords,
A search for password information,
information intext:(password | passcode | pass)
intext:(username | userid | user), combines common words for
passwords and user IDs into one query.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
Goolag Scanner
Goolag Scanner is a software published by a famous hacker group, Cult
off the
h Dead
d Cow (CDC).
This software turns Googles
Google s search engine into a vulnerability scanner.
scanner
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
Features of Goolag
Goolag scanner uses simple and readable xml documents.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
Goolag Scanner
Screenshot
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
Summary
In this module, we have reviewed Google penetration
t ti
testing.
We have discussed the advanced
Google techniques:
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.
EC-Council
Copyright by EC-Council
All
Rights
Reserved.
Reproduction
is Strictly Prohibited
Copyright 2004 EC-Council. All rights reserved worldwide.