NOTE: In this index, a page number followed by the letter“t” indicates a table one or more pages long.
Symbols
.. (numrange:) operator, 69--70, 168--169
* (asterisk) as wildcard, 14
- (minus) operator, 17
| (OR) operator, 18
+ (plus) operator, 15, 17
&strip=1 parameter, 98--99
@ (at) sign
forms of, 166
ignored, 167
%20 (hex code for a space), 23--24
A
Advanced Search
+ (plus) operator,
15,
17
button,
See also Operators, advanced
AIM (AOL Instant Messenger) buddy lists,
367
AOL Instant Messenger (AIM) buddy lists,
367
Apache Web servers
API (application programming interface),
184--185
Asterisk (*) as wildcard,
14
At (@) sign
Automated searching. See Searching, automation of
Axis StorPoint servers,
327
B
Backup files on servers,
114,
118
Belkin cable/DSL routers,
326
Buddy lists, Instant Messenger (AOL),
367
Business telephone numbers, searching for,
79--80
Businesses’ data, searching for,
77--78
C
Cable routers, Belkin,
326
Cached pages
CGI scanning, finding exploit targets by,
257--259,
262
Cisco products, locating,
327
Code, exploit. See Exploit code, locating
Code, finding exploit targets by,
238--257
Code Search
Code strings, locating exploit code by,
226--227
Collecting search terms. See Search terms, collecting
Common code strings, locating exploit code by,
226--227
Company data, searching for,
77--78
Company telephone numbers, searching for,
79--80
Competing search engines,
185
Configuration files
Country codes, telephone,
172
D
Dapper scraper and Dapps,
184
Data, sensitive, in log files,
132
Data center geographical locations,
211
Data mining. See Information mining
Database digging. See Digging
Dates of publication, searching within,
70--71
Default pages
Deja.com acquired,
Deleting personal data from Google,
80
Demonstration pages, finding exploit targets by,
235--238
Digging
Directory listings of servers. See Web servers, listings of
DOC files, searching for,
61
Document digging. See Digging
Domains and sub-domains, parsing,
190--191
E
E-mail addresses
finding from telephone numbers,
196--199
Employee names, obtaining,
268
Encoding, hexadecimal,
23
Error messages
Exploit code, locating
Exploit code targets, ways to locate
See also filetype: operator
Extensions. See File extensions
F
Feeling Lucky button,
File extensions
See also ext: operator;filetype: operator
Filtering, SafeSearch, ,
11
Finding exploit code. See Exploit code, locating
Forums, Search Engine Hacking,
70
G
Geographical locations of data centers,
211
Golden rules of searching,
13--15
Google Groups search page,
Google Image searching,
7--8
Groups (newsgroups), Google. See Newsgroups
H
Hacker, definition of,
162
“Hacker speak”,
Hats, white and black,
224
Help desks, searching for,
275
HP Insight Management Agents,
326
Hypertext Markup Language (HTML) TITLE tags,
54
I
IGoogle link,
IIS (Microsoft)
ILAN Looking Glass servers,
327
I’m Feeling Lucky button,
Images, sexually explicit, ,
11
Incremental substitution,
112
Index Server, Microsoft,
307
Office documents, finding URLs of,
201--209
Insight Management Agents (HP),
326
Instant Messenger (AOL) buddy lists,
367
Interface Language option,
Intranets, searching for,
275
L
Language Tools
Languages
of interface,
restriction
(lr) variable,
26,
27t,
29
translation of result page,
5--6
Lantronix Web managers,
326
Leakage of information,
158
Letters,
Wheel of Fortune,
351
Libwhisker Perl library,
111
Link text, searching within,
68--69
Locating exploit code. See Exploit code, locating
Locations of data centers,
211
Log files
Login portals
Logon link,
lr (language restriction) variable,
26,
27t,
29
Lucky button,
M
Message IDs, searching for,
76--77
Microsoft IIS. See IIS (Microsoft)
Microsoft Index Server,
307
Mining, information. See Information mining
Moderate SafeSearch link,
N
Nessus security scanner,
368
Network documentation examples,
328t
Network hardware, locating examples,
332t
Network statistics via ntop program,
327--328
Newsgroups
authors, searching for, ,
72--74
email address searches,
150,
152
message IDs, searching for,
76--77
subject lines, searching within,
75
titles, searching within,
75
Novell BorderManager proxy/firewall,
326
ntop program for network statistics,
327--328
Numbers
See also Telephone numbers
Numeric ranges, searching within,
69--70
P
Page links, searching for,
65--68
Page-scraping. See Scraping
Page text, searching within,
57--59
Parameters for searches
&strip—1 for cached pages,
98--99
Parsing
Partial telephone numbers,
199
Password cracker John the Ripper,
358
“Password”, translations of,
361
Passwords
PDF files, searching for,
61,
65
Penetration (pen) testers,
282
Perl library, Lib whisker,
111
Personal data, removal from Google,
80
Phone numbers, searching for,
79--81
Plus (+) operator,
15,
17
Portals, login. See Login portals
Posters to newsgroups, searching for, ,
72--74
Postprocessing
Precedence of operators,
18
Previous site visits,
221
Product demonstration pages, finding exploit targets by,
235--238
Proxies
translation,
Proxy servers
Public sites, locating exploit code on,
225
Publication dates, searching within,
70--71
R
Rain Forest Puppy (RFP),
111
Related Web sites, searching for,
72
Removing personal data from Google,
80
Residential telephone numbers, searching for,
79--80
Restriction variable for languages
(lr),
26,
27t,
29
Results
Ripper, John the, password cracker,
358
Routers, Belkin cable/DSL,
326
S
SafeSearch filtering, ,
11
Scraping
Dapper scraper and Dapps,
184
finding URLs of Office documents,
201--209
Search Engine Hacking forums,
70
Search engines other than Google,
185,
219
Search term input field,
Search terms, collecting
previous site visits,
221
Searching
for company data by stock ticker,
77--78
for newsgroup authors, ,
72--74
for newsgroup message IDs,
76--77
for related Web sites,
72
query speed,
reduction (narrowing)
search-page links and functions,
3--4
Web sites’ summary information,
71--72
within newsgroup subject lines,
75
within newsgroup titles,
75
within publication dates,
70--71
within specific Web sites,
59--61
See also Parsing; Postprocessing; Scraping; Searching, automation of
Searching, automation of
See also Scraping
Secure Socket Layer (SSL),
219
SensePost s Aura API clone,
185
Sensitive data in log files,
132
Servers
Sexually explicit images, ,
11
Sign in link,
Site, searching within,
59--61
Source code
Space, hex code for (%20),
23--24
Speed of query,
SSL (Secure Socket Layer),
219
Stock ticker, searching for,
77--78
StorPoint (Axis) servers,
327
Strings, locating exploit code by,
226--227
Subject lines, searching within,
75
Substitution, incremental,
112
Summary information for Web sites,
71--72
Syntax
T
Telephone numbers
Text, searching within,
57--59
Ticker symbol, searching for,
77--78
Translation
proxies,
Traversal techniques
incremental substitution,
112
Types of files, searching for,
61--65
U
Uniform Resource Locators. See URLs
URLs (Uniform Resource Locators)
USENET newsgroups. See Newsgroups
W
Warning messages, Google’s,
17
Web managers, Lantronix,
326
Web servers, listings of
specific directories,
102
Web servers, locating and profiling
default pages with Microsoft IIS,
301t,
302
default pages with Netscape servers,
302--303
error messages with Apache Web servers,
288--296
error messages with application software,
296--299
list of other servers,
304t
See also Web servers, listings of
Web sites
deja.com acquired,
Google preferences,
Julian date converters,
90
Lib whisker Perl library,
111
Microsoft on metadata,
158
Nessus security scanner,
368
newsgroup FAQs,
related sites, searching for,
72
Search Engine Hacking forums,
70
summary information for,
71--72
Wheel of Fortune letters,
351
Words