- Johnny Long
Infobox Person
name = Johnny Long
occupation = Computer Consultant,Computer Sciences Corporation author
website = [http://johnny.ihackstuff.com http://johnny.ihackstuff.com]
footnotes =Johnny Long, otherwise known as j0hnny, or sometimes as j0hnnyhax is a renowned computer security expert, author, and public speaker in the
United States .Johnny is well known for his background in
Google Hacking , a process by which vulnerable servers on the Internet can be identified through specially constructed Google searches. He has also rose to fame due to his proliferation as an author and editor of numerous computer security books. In recent years, Johnny has become a regular speaker at many annual security conferences includingDEF CON , theBlack Hat Briefings , and ShmooCon. Recently, his efforts to start the [http://www.hackersforcharity.org/ Hackers for Charity] movement have gained notable press attention. [ [http://www.baltimoresun.com/technology/bal-te.bz.hacker17feb17,0,3936879.story?page=1 News Interview by the Baltimore Sun, published 17 FEB 2008] ]Career in Computer Security
Early in his career, in 1996, Johnny joined
Computer Sciences Corporation and formed the corporation's vulnerability assessment team known as Strike Force. Johnny remains with CSC as a computer researcher, providing talks at many well publicized security events around the world. He has spoken onGoogle Hacking at many venues, such as:DEF CON , theBlack Hat Briefings ,ShmooCon , and Microsoft's BlueHat internal security conferences. His talks have ranged from Google Hacking to how Hollywood movies portray hackers in movies.Google Hacking
Through his work with CSC's Strike Force, Johnny was an early pioneer in the field of Google Hacking. Through specially crafted search queries it was possible to locate servers on the Internet running vulnerable software. It was equally possible to locate servers that held no security and were openly sharing personal identifiable information such as
Social Security Numbers and credit card numbers. These efforts grew into the creation of the [http://johnny.ihackstuff.com/ghdb.php Google Hacking Database] , through which hundreds of Google Hacking search terms are stored and continually updated. The field of Google Hacking has evolved over time to not just using Google to passively search for vulnerable servers, but to actually use Google search queries to attack servers.Published Works
Johnny has contributed to the following published works:
* "Google Hacking for Penetration Testers", Syngress Publishing, 2004. ISBN 1-931-83636-1 (Author, book translated into five different languages)
* "Aggressive Network Self-Defense", Syngress Publishing, 2005. ISBN 1-931-83620-5 (Author, Chapter 4, "A VPN Victim’s Story: Jack’s Smirking Revenge" with Neil Archibald.
* "InfoSec Career Hacking", Syngress Publishing, 2005. ISBN 1-597-49011-3. (Author, Chapter 6, "No Place Like /home – Create an Attack Lab")
* "Stealing the Network: How to Own an Identity", Syngress Publishing, 2005. ISBN 1-597-49006-7. (Technical Editor, Author Chapter 7 "Chapter 7 Death by a Thousand Cuts" and Chapter 10 "There's something else" with Anthony Kokocinski and "Epilogue: The Chase")
* "OS X For Hackers at Heart", Syngress Publishing, 2005. ISBN 1-597-49040-7 (Author, Chapter 2 "Automation" and Chapter 5 "Mac OS X for Pen Testers")
* "Penetration Tester's Open Source Toolkit", Syngress Publishing, 2005. ISBN 1-597-49021-0 (Technical Editor, Author, "Running Nessus with Auditor")
* "Stealing the Network: How to Own a Shadow", Syngress Publishing, 2007. ISBN 1-597-49081-4
* "Google Talking", Syngress Publishing, 2007. ISBN 1-597-49055-5 (Technical Editor and Contributor)
* "Techno Security's Guide to Managing Risks for It Managers, Auditors and Investigators", Syngress Publishing, 2007 ISBN 1-597-49138-1. (Author, Chapter 8, "No-Tech Hacking")
* "Asterisk Hacking", Syngress Publishing, 2007. ISBN 1-597-49151-9 (Technical Editor)
* "Google Hacking for Penetration Testers, Volume 2", Syngress Publishing, 2007. ISBN 978-1597491761 (Author)
* "TechnoSecurity's Guide to E-Discovery and Digital Forensics", Elsevier Publishing, 2007 ISBN 9781597492232 (Author, "Death by 1000 cuts).
* "No-Tech Hacking", Elsevier Publishing, 2008 ISBN 1597492159 (Author)Hackers for Charity
In his latest endeavor, Johnny has created the [http://www.hackersforcharity.org/ Hackers for Charity] non-profit organization. Known by its byline, "I Hack Charities", the organization collects computer and office equipment to donate to underdeveloped countries. The movement was realized after a viewing of
Invisible Children , a documentary movie that showcases many brutalities committed in northern Uganda that have remained invisible to the global media. Along with coordinating the donation of goods and supplies, Johnny traveled to areas of Africa to personally setup computer networks and help build village infrastructures.Personal life
Unlike many in the field, Mr. Long is known to publicly pronounce his faith in
Christianity . He begins and ends each of his presentations with information regarding humanitarian efforts forInvisible Children Inc. , and regularly donates proceeds from his books to help such efforts.References
Wikimedia Foundation. 2010.