Escolar Documentos
Profissional Documentos
Cultura Documentos
Penetration Testing
and Security Analysis
Module 2
Advanced Googling
g g
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Module Objective
A ssite
te sea
search
c ca
can be used to gat
gather
e information
o at o about tthee
servers and hosts that a target hosts.
Usingg simple
p reduction techniques,
q , we can quickly
q y get
g an
idea about a targets online presence.
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
intitle:index.of
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
intitle:index.of
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
error | warning
Often overlooked, error messages can provide insight into the application or
operating system software a target is running, the architecture of the network the
target is on
on, information about users on the system
system, and much more
more.
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
error | warning (contd)
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
login | logon
These assistants,
assistants or help desk operators,
operators are perfect targets for
a social engineering attack.
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
login | logon (contd)
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
username | userid |
employee ID | your
employee.ID your username is
is
There are many different ways to obtain a username from a target system.
Even though a username is the less important half of most authentication mechanisms, it
should at least be marginally protected from outsiders.
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
password | passcode | your password is
During an assessment,
assessment its
it s very likely that results for
this query combined with a site operator will include
pages that provide help to users who have forgotten
their passwords.
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
password | passcode | your
password is
is (cont
(contd)
d)
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
admin | administrator
The word administrator can also be used to locate administrative login pages, or
login portals.
The phrase Contact your system administrator is a fairly common phrase on the
web, as are several basic derivations.
A query such as please contact your * administrator will return results that
reference local,
local company
company, site
site, department
department, server
server, system
system, network
network, database
database,
email, and even tennis administrators.
If a web user is told to contact an administrator, the odds are that theres data of
at least moderate importance to a security tester.
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
admin | administrator (contd)
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
admin login
admin login reveals administrative login pages.
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
ext:html ext:htm
ext:shtml
ext:shtml ext:asp
ext:asp ext:php
ext:php
The ext:html ext:htm ext:shtml ext:asp p ext:php
p pqqueryy uses ext,, a
synonym for the filetype operator, and is a negative query.
It returns no results when used alone and should be combined with a site
operator to work properly.
The idea behind this query is to exclude some of the most common
Internet file types in an attempt to find files that might be more
interesting.
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
ext:html ext:htm ext:shtml
ext:asp ext:php
ext:php (cont
(contd)
d)
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
inurl:temp | inurl:tmp |
inurl:backup | inurl:bak
Although there are many possible naming conventions for temporary or backup
files, this search focuses on the most common terms.
Since this search uses the inurl operator, it will also locate files that contain these
terms as file extensions, such as index.html.bak.
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Google Advanced Search Form
Googles advanced search form is easy to use and provides more options for the
search.
search
One can categorize the search by giving all word, exact phrase, or at least one
word.
B following
By f ll i the
h below
b l procedure,
d iit iis simple
i l to perform
f an advanced
d d search:
h
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Google Advanced Search
Form: Screenshot
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Categorization of the
Operators
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
allinanchor:
allinanchor:
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Screenshot - allinanchor:
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
allintext:
allintext:
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Screenshot - allintext:
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
allintitle:
allintitle:
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Screenshot - allintitle:
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
author:
author:
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Screenshot - author:
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
cache:
cache:
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Screenshot - cache:
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
define:
define:
f
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Screenshot - define:
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
filetype:
ffiletype:
yp
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Screenshot - filetype:
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
group:
group:
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Screenshot - group:
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
inanchor:
inanchor:
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Screenshot - inanchor:
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
insubject:
insubject:
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Screenshot in subject:
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
intext:
intext:
The q
queryy with intext:term restricts results to documents
containing the term in the text.
There must be no space between the intext: and the following
word.
Example: intext:poem
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Screenshot - intext:
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
link:
link:
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Screenshot - link:
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
location:
location:
The q
queryy with location will show articles from Google
g
News, and only from the location specified.
Example: Hackers location: China:
It shows articles that match the term Hackers from sites in
China.
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Screenshot - location:
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Viewing Live Web Cams
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Viewing Live Web Cams
(cont d)
(contd)
inurl:/view.shtml
inurl:ViewerFrame?Mode=
inurl:ViewerFrame?Mode=Refresh
inurl:axis cgi/jpg
inurl:axis-cgi/jpg
intitle:liveapplet inurl:LvAppl
intitle:EvoCam inurl:webcam.html
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Screenshot - Live Web
Cams
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
At a Traffic
ffi Signal
i l
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Live Web Cams Traffic
Signals 1
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Live Web Cams Traffic
Signals 2
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Live Web Cams Traffic
Signals 3
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Live Web Cams Traffic
Signals 4
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Live Web Cams Traffic
Signals 5
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Live Web Cams Traffic
Signals 6
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Live Web Cams Traffic
Signals 7
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Live Web Cams Traffic
Signals 8
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Live Web Cams Traffic
Signals 9
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Live Web Cams Traffic
Signals 10
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
intranet | help.desk
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Locating Public Exploit Sites
One way to locate exploit code is to focus on the file extension of the source code and then
search for specific content within that code.
code
Since source code is the text-based representation of the difficult-to-read machine code,
Google is well suited for this task.
For example, a large number of exploits are written in C, which generally uses source code
ending in a .c extension.
These are the most popular sites hosting C source code containing the word exploit, the
returned list is a good start for a list of bookmarks.
Using page-scraping techniques, we can isolate these sites by running a UNIX command
against the dumped Google results page.
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Locating Exploits via
Common Code Strings
Another way to locate exploit code is to focus on common strings within the
source code itself.
A query like this would locate C source code that contained the word exploit,
exploit
regardless of the files extension.
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Locating Source Code with
Common Strings
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Locating Vulnerable Targets
Attackers are increasingly using Google to locate web-based targets that are
p
vulnerable to specific exploits.
p
In fact, its not uncommon for public vulnerability announcements to contain
Google links to potentially vulnerable targets.
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Locating Targets via
Demonstration Pages
Our goal is to develop a query string to locate vulnerable targets on the web; the vendors
website is a good place to discover what exactly the products
product s web pages look like.
like
For example, some administrators might modify the format of a vendor-supplied web page to
fit the theme of the site.
These types of modifications can impact the effectiveness of a Google search that targets a
vendor-supplied page format.
We can find that most sites look very similar and that nearly every site has a powered by
message at the bottom of the main page.
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Powered by Tags are Common Query
Fodder for Finding Web Applications
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Locating Targets via Source
Code
Lets take a look at how a hacker might
g use the source code of a p
program
g to
discover ways to search for that software with Google.
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Vulnerable Web Application
Examples
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Vulnerable Web Application
Examples (cont
(contd)
d)
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Locating Targets via CGI
Scanning
One of the oldest and most familiar techniques for locating vulnerable web servers is
through
g the use of a CGI scanner.
These programs parse a list of known bad or vulnerable web files and attempt to locate
those files on a web server.
Based on various response
p codes,, the scanner could detect the presence
p of these p
potentiallyy
vulnerable files.
A CGI scanner can list vulnerable files and directories in a data file, such as:
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
A Single CGI Scan-Style Query
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Directory Listings
The server tag at the bottom of a directory listing can provide explicit detail about the type of
web server software that
thatss running.
running
If an attacker has an exploit for Apache 2.0.52 running on a UNIX server, a query such as
server.at Apache/2.0.52 will locate servers that host a directory listing with an Apache
2 0 52 server tag.
2.0.52 tag
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Finding IIS 5.0 Servers
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Web Server Software Error
Messages
Error messages contain a lot of useful information, but in the context of locating specific
servers,, we can use portions
p of various error messages
g to locate servers running g specific
p
software versions.
The absolute best way to find error messages is to figure out what messages the server is
capable of generating.
You could gather these messages by examining the server source code or configuration files
or by actually generating the errors on the server yourself.
The best way to get this information from IIS is by examining the source code of the error
pages themselves.
IIS 5 and 6, by default, display static HTTP/1.1 error messages when the server encounters
some sort of problem.
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Web Server Software Error
Messages (cont
(contd)
d)
A query such as intitle: The page cannot be found please following Internet *
S i can b
Services be used d tto search
h ffor IIS servers that
th t presentt a 400 error.
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
IIS HTTP/1.1 Error Page Titles
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
IIS HTTP/1.1 Error Page Titles
(cont d)
(contd)
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Object Not Found Error
Message Used to Find IIS 5.0
50
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Apache Web Server
Apache web servers can also be located by focusing on server-generated error messages.
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Apache 2.0 Error Pages
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Application Software Error
Messages
Although this ASP message is fairly benign, some ASP error messages are
much more revealing.
These dumps reveal all sorts of information about the running application
and the web server that hosts that application.
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
ASP Dumps Provide
Dangerous Details
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Many Errors Reveal Pathnames
and Filenames
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
CGI Environment Listings
Reveal Lots of Information
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Default Pages
These p
pages
g can make it easyy for a site administrator to test the installation of a
web server or application.
Google crawls a web server while it is in its earliest stages of installation, still
displaying a set of default pages.
In these cases, theres generally a short window of time between the moment
when Google crawls the site and when the intended content is actually placed on
the server.
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
A Typical Apache
Default Web Page
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Locating Default Installations of
IIS 4.0
4 0 on Windows NT 4 4.0/OP
0/OP
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Default Pages Query for Web
Server
Many different types of web servers can be located by querying for default
pages as well.
ll
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Outlook Web Access Default
Portal
Query allinurl:exchange/logon.asp
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Searching for Passwords
Password data, one of the Holy Grails during a penetration test, should be
protected.
Unfortunately, many examples of Google queries can be used to locate passwords
on the web.
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Windows Registry Entries can
Reveal Passwords
A query, such as filetype:reg intext: internet account manager could reveal
interesting keys containing password data.
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Usernames, Cleartext
Passwords and Hostnames
Passwords,
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Goolag Scanner
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Features of Goolag
Knowledge of cryptic command line options and Google hacking basics are not
required to use this scanner.
scanner
It helps to check the website before criminals can attack weak points.
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Goolag Scanner
Screenshot
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Summary
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited
Copyright by EC-Council
EC-Council All Rights
Copyright 2004 EC-Council. All rights reserved worldwide.Reserved. Reproduction is Strictly Prohibited