Goodreads helps you keep track of books you want to read.
Start by marking “Google Hacking for Penetration Testers, Volume 1” as Want to Read:
Google Hacking for Penetration Testers, Volume 1
Enlarge cover
Rate this book
Clear rating
Open Preview

Google Hacking for Penetration Testers, Volume 1

4.08  ·  Rating Details ·  125 Ratings  ·  9 Reviews
Google, the most popular search engine worldwide, provides web surfers with an easy-to-use guide to the Internet, with web and image searches, language translation, and a range of features that make web navigation simple enough for even the novice user. What many users don't realize is that the deceptively simple components that make Google so easy to use are the same feat ...more
Paperback, 448 pages
Published February 20th 2005 by Syngress (first published January 1st 2004)
More Details... edit details

Friend Reviews

To see what your friends thought of this book, please sign up.

Reader Q&A

To ask other readers questions about Google Hacking for Penetration Testers, Volume 1, please sign up.

Be the first to ask a question about Google Hacking for Penetration Testers, Volume 1

This book is not yet featured on Listopia. Add this book to your favorite list »

Community Reviews

(showing 1-30 of 419)
filter  |  sort: default (?)  |  Rating Details
Ameen Ali
This book is amazing. I had no idea Google could be used in a completely different way!
This book will totally be a great reference for me through Penetration Testing of Web Apps.
Edwin
Jan 06, 2012 Edwin rated it really liked it
Must read for searchers. This is about using Google beyond advanced search. This is super advanced search
Pedro Marcano Delbert
Jun 05, 2015 Pedro Marcano Delbert rated it it was amazing
1321312313
Kati Ais-ł
Nov 07, 2014 Kati Ais-ł rated it it was amazing
kkh
Tab
Jul 06, 2008 Tab rated it it was amazing
Great book and perfect for people looking for a deeper dive into the information dumping ground of google. It's scary the information that can be pulled up just by following many of the techniques described in the book and you really don't need to be overly technical. I've uncovered some fantastic information. ;-)
Petett2011
Jul 05, 2011 Petett2011 rated it really liked it
Excellent book, after 7 years many of these techniques still work. It is not difficult to find some scary information in the Google megasphere.

FYI - Exploit-DB has re-established the initial Google Hackers Database
Chris
Jun 05, 2008 Chris rated it it was amazing
Great book by one of my favorite speakers, Johnny Long. This is much more than stupid pet tricks with Google. Now if Johnny would just publish his Hacking Hollywood style presentation!
David
Sep 17, 2013 David rated it really liked it
Getting old now, but the concepts are still useful.
Imran
Apr 15, 2011 Imran added it
Shelves: essentials
High octane content. one of my all time favourites
Anna
Anna marked it as to-read
Sep 13, 2016
Rui
Rui marked it as to-read
Aug 30, 2016
BookDB
BookDB marked it as to-read
Aug 30, 2016
Jovany Agathe
Jovany Agathe rated it liked it
Aug 25, 2016
Arvid
Arvid marked it as to-read
Aug 21, 2016
Hàśšăņ Śhâhîđ
Hàśšăņ Śhâhîđ rated it it was amazing
Aug 17, 2016
Kranthi
Kranthi marked it as to-read
Aug 09, 2016
Eric Mutua
Eric Mutua rated it liked it
Aug 01, 2016
Khan
Khan marked it as to-read
Jul 25, 2016
Eric Fitzgerald
Eric Fitzgerald rated it really liked it
Jul 22, 2016
Mistu Dustu
Mistu Dustu marked it as to-read
Jul 12, 2016
Bud B
Bud B marked it as to-read
Jun 27, 2016
Alessandro
Alessandro marked it as to-read
Jun 24, 2016
Ryan
Ryan marked it as to-read
Jun 22, 2016
Sonu Kumar
Sonu Kumar marked it as to-read
Jun 21, 2016
Marta
Marta rated it really liked it
Jun 06, 2016
Samar
Samar marked it as to-read
Jun 05, 2016
Mikhail
Mikhail marked it as to-read
Jun 03, 2016
Karanpreet Singh
Karanpreet Singh rated it it was amazing
May 31, 2016
Arash Tohidi
Arash Tohidi rated it it was amazing
May 28, 2016
Landon Mayo
Landon Mayo rated it it was amazing
May 23, 2016
« previous 1 3 4 5 6 7 8 9 13 14 next »
There are no discussion topics on this book yet. Be the first to start one »
  • Counter Hack Reloaded: A Step-By-Step Guide to Computer Attacks and Effective Defenses
  • Gray Hat Hacking: The Ethical Hacker's Handbook
  • Hacking Exposed: Network Security Secrets & Solutions, Fifth Edition
  • Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
  • Metasploit: The Penetration Tester's Guide
  • The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
  • The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
  • Gray Hat Python: Python Programming for Hackers and Reverse Engineers
  • Rootkits: Subverting the Windows Kernel
  • The Shellcoder's Handbook: Discovering and Exploiting Security Holes
  • The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
  • Hacking: The Art of Exploitation
  • Dissecting The Hack: The F0rb1dd3n Network
  • Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
  • Linux System Programming: Talking Directly to the Kernel and C Library
  • Reversing: Secrets of Reverse Engineering
  • Hacking the Xbox: An Introduction to Reverse Engineering
  • Learning the bash Shell

Goodreads is hiring!

If you like books and love to build cool products, we may be looking for you.
Learn more »

Share This Book