O'Reilly logo

Google Hacking for Penetration Testers, 3rd Edition by Justin Brown, Bill Gardner, Johnny Long

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8

Tracking Down Web Servers, Login Portals, and Network Hardware

Abstract

This chapter covers finding Web servers, login portals, and network hardware.

Keywords

Web servers
login portals
network hardware
Web utilities
Web-enabled network devices

Introduction

Penetration (pen) testers are sometimes thought of as professional hackers since they essentially break into their customers’ networks in an attempt to locate, document, and ultimately help resolve security flaws in a system or network. However, pen testers and hackers differ quite a bit in several ways.
For example, most penetration testers are provided with specific instructions about which networks and systems they will be testing. Their targets are specified for many reasons, but ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required