Chapter 6

Locating Exploits and Finding Targets

Abstract

This chapter is about finding vulnerable target computers and the exploits that can be used against those target computers through Google.

Keywords

locating exploit code
locating vulnerable targets

Introduction

Exploits are tools of the hacker trade. Designed to penetrate a target, most hackers have many different exploits at their disposal. Some exploits, termed zero day or 0day, remain underground for some period of time, eventually becoming public, posted to newsgroups or Web sites for the world to share. With so many Web sites dedicated to the distribution of exploit code, it’s fairly simple to harness the power of Google to locate these tools. It can be a slightly more difficult exercise ...

Get Google Hacking for Penetration Testers, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.