Locating Exploits and Finding Targets
Abstract
This chapter is about finding vulnerable target computers and the exploits that can be used against those target computers through Google.
Keywords
Introduction
Get Google Hacking for Penetration Testers, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.