Vulnerability Analysis Using Google and Shodan

被引:4
作者
Simon, Kai [1 ]
机构
[1] Kai Simon Consulting, D-67663 Kaiserslautern, Germany
来源
CRYPTOLOGY AND NETWORK SECURITY, CANS 2016 | 2016年 / 10052卷
关键词
D O I
10.1007/978-3-319-48965-0_51
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There is a continuously increasing number of attacks on publicly available systems in the internet. This requires an intensified consideration of security issues and vulnerabilities of IT systems by security responsibles and service providers. Beside classical methods and tools for penetration testing, there exist additional approaches using publicly available search engines. In this paper we present an alternative approach for vulnerability analysis with both classical as well as subject-specific engines. Based on an extension and combination of their functionality, this approach provides a method for obtaining promising results for audits of IT systems, both quantitatively and qualitatively.
引用
收藏
页码:725 / 730
页数:6
相关论文
共 7 条
[1]  
[Anonymous], 2015, Thesis
[2]  
Genge B., 2015, SECUR COMMUN NETW
[3]  
Long J., 2007, GOOGLE HACKING PENET
[4]  
Opp A., 2014, THESIS
[5]  
Oswald M., 2015, THESIS
[6]  
Schmidt O, 2015, THESIS
[7]  
Zhang J., 2015, CHARACTERIZING GOOGL