Vulnerability Analysis Using Google and Shodan
There is a continuously increasing number of attacks on publicly available systems in the internet. This requires an intensified consideration of security issues and vulnerabilities of IT systems by security responsibles and service providers. Beside classical methods and tools for penetration testi...
Saved in:
Published in | Cryptology and Network Security Vol. 10052; pp. 725 - 730 |
---|---|
Main Author | |
Format | Book Chapter |
Language | English |
Published |
Switzerland
Springer International Publishing AG
2016
Springer International Publishing |
Series | Lecture Notes in Computer Science |
Subjects | |
Online Access | Get full text |
ISBN | 9783319489643 331948964X |
ISSN | 0302-9743 1611-3349 |
DOI | 10.1007/978-3-319-48965-0_51 |
Cover
Summary: | There is a continuously increasing number of attacks on publicly available systems in the internet. This requires an intensified consideration of security issues and vulnerabilities of IT systems by security responsibles and service providers. Beside classical methods and tools for penetration testing, there exist additional approaches using publicly available search engines. In this paper we present an alternative approach for vulnerability analysis with both classical as well as subject-specific engines. Based on an extension and combination of their functionality, this approach provides a method for obtaining promising results for audits of IT systems, both quantitatively and qualitatively. |
---|---|
ISBN: | 9783319489643 331948964X |
ISSN: | 0302-9743 1611-3349 |
DOI: | 10.1007/978-3-319-48965-0_51 |