(单词翻译:单击)
Written by Robyn Winder and Charlie Speight and published in 2007 by the NSA's Center for Digital Content, Untangling the Web: An Introduction to Internet Research is a 643-page long introduction to everything from the very basics of web research to finding confidential information that has accidentally slipped into the public domain. The document became available as a result of an April Freedom of Information Act request by MuckRock, a service-provider for journalists and researchers.
: An Introduction to Internet Research)的手册一共643页,由罗宾·温德和查理·斯佩特两人合著,2007年由美国国家安全局数字内容中心(he NSA's Center for Digital Content)出版,内容从网络调查的基础知识到如何查找意外流入公共领域的保密信息,无所不包。今年4月,面向媒体从业人员和研究人员提供服务的MuckRock根据美国《自由信息法案》申请信息公开,这份手册也因此重见天日。
At George R. R. Martin length, the document is thorough to say the least. The introduction alone is filled with references to 10th-century Persia, Jorge Luis Borges, Sigmund Freud, and the Minotaur in the Labyrinth. As Wired pointed out, the chapter titled "Google Hacking" is getting the most immediate play. (Showing the document's age, perhaps, there are also sections on Yahoo Search, Windows Live Search, and Ask.com.) "Nothing I am going to describe to you is illegal, nor does it in any way involve accessing unauthorized data, " the authors write. Instead, it "involves using publicly available search engines to access publicly available information that almost certainly was not intended for public distribution."
这本手册的篇幅堪与乔治·RR·马丁的巨著媲美,因此手册内容不可谓不详实。单是前言部分就援引了10世纪的波斯、西班牙作家豪尔赫·路易斯·博尔赫斯、弗洛伊德和迷宫神牛等丰富的内容。正如《连线》杂志(Wired)所指出的那样,手册中的“谷歌黑客”(Google Hacking)一章迅速发了公众的效法。(也许是因为手册编撰的年代,里面一些章节还涉及了雅虎搜索、Windows Live Search和Ask.com等渠道。)“我要介绍的方法没有一样是违法的,也不存在获取未经授权数据的问题,”两位作者这样写道。事实上,它“探讨的是如何使用公开搜索引擎,查找几乎肯定不打算向公众发布的信息。”
The book is replete with tips and tricks, ranging from undocumented filetypes Google (GOOG) can look for, to how-to's on running searches that include all the synonyms of a given term (a.k.a. use the magic ~). The entire document is available here , but here are the three hacks getting the most attention:
书里充斥着各种窍门和诀窍,比如谷歌(Google)可以搜索的、未公开的文件类型,再比如怎样运行包含某一特定术语所有同义词的搜索(即运行神奇的“~”符号)。手册全文可点击这里,但其中尤以下面三项黑客技巧最受关注:
1. Find Passwords : The authors suggest the following search term to look for Russian spreadsheets that may contain login credentials: "filetype:xls site:ru login." The filetype tells the search engine to look for Microsoft (MSFT) spreadsheets, the site indicates Russian domain names, and login -- because "login" and "password" are often written in English even in foreign countries.
1.搜索密码 :作者建议使用下面的搜索条件来搜索可能包含登陆信息的俄罗斯电子数据表格:“filetype:xls site:ru login”(文件类型:xls 网址:ru login)。文件类型是为了告诉搜索引擎寻找微软(Microsoft)的电子数据表格,网址则限定俄罗斯域名,使用login是因为美国以外的地区也往往用英语表达“login(登陆名)”和“password(密码)”。
2. Find Confidential Spreadsheets : Again, a term like "filetype:xls site:za confidential" will pull confidential spreadsheets that have been accidentally posted in public, in this case in Brazil.
2.搜索机密电子表格 :搜索条件类似“filetype:xls site:za confidential”(文件类型:xls 网址:za 机密)将搜寻出意外公布的机密电子表格,例子中的国家是巴西。
3. Find Misconfigured Web Servers : Web servers "that list the contents of directories not intended to be on the web often offer a rich load of information to Google hackers, " the document states. To find them, it suggest search: "—intitle: 'index of' site:kr password.
3.搜索设置错误的网络服务器 :这份手册称:“那些所含目录原本不应显示在互联网上的”网络服务器“往往能给谷歌搜索黑客提供丰富的信息”。要找到这样的网络服务器,这本书建议使用下面的条件:“—intitle: 'index of' site:kr password”(-标题中:“指向” 网址:kr 密码)。