The Google Hacking Database Tool is an online application that automates Google searches for files and other data associated with Web site vulnerabilities.
GnuCitizen, a computer security consultancy, today released an updated version of its Google Hacking Database Tool (GHDB), an online application that automates Google searches for files and other data associated with Web site vulnerabilities.
SiteDigger 2.0 is a similar application offered by Foundstone. It requires a Google Web services API license key. Other examples of this type of tool include Gooscan and Wikto. Blogger Alessandro Tanasi offers a more complete list of penetration testing software on his Web site.
While Google hasn't actively fought the use of such tools, it will block automated search queries after a detecting a high volume of them. Google didn't immediately respond to a request for comment.
Automated vulnerability scanning tools should be thought of as a necessity in today's security environment. Those disinclined to scan their sites for vulnerabilities should be aware that unethical hackers are doing so.
"I believe that penetration testing and hacking tools like this one will become more and more popular among the community, although not all types of tools are suitable to be made available online," said Petkov.
Building A Mobile Business MindsetAmong 688 respondents, 46% have deployed mobile apps, with an additional 24% planning to in the next year. Soon all apps will look like mobile apps – and it's past time for those with no plans to get cracking.
Top IT Trends to Watch in Financial ServicesIT pros at banks, investment houses, insurance companies, and other financial services organizations are focused on a range of issues, from peer-to-peer lending to cybersecurity to performance, agility, and compliance. It all matters.
Join us for a roundup of the top stories on InformationWeek.com for the week of September 25, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."