Finding Vulnerabilities with Google Api without leaving traces (Bachelor thesis)

Χαλκιάδης, Ιωάννης


Google’s Web interface is unmistakable. Its “look and feel” is copyright-protected, and for good reason. It is clean and simple. What most people fail to realize is that the interface is also extremely powerful. A different approach on finding vulnerabilities without even attacking the host will be reached throughout the context of this paper and also a way to anonymize the actions behind the procedure.
Institution and School/Department of submitter: Σχολή Τεχνολογικών Εφαρμογών-Τμήμα Μηχανικών Πληροφορικής
Subject classification: Google
Εφαρμογή λογισμικού
Application software
Keywords: Promblem statement;Google;Database files;Exploiting google
Description: Πτυχιακή εργασία –Σχολή Τεχνολογικών Εφαρμογών-Τμήμα Μηχανικών Αυτοματισμού
URI: http://195.251.240.227/jspui/handle/123456789/12476
Appears in Collections:Πτυχιακές Εργασίες

Files in This Item:
There are no files associated with this item.



 Please use this identifier to cite or link to this item:
http://195.251.240.227/jspui/handle/123456789/12476
  This item is a favorite for 0 people.

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.