Goodreads helps you keep track of books you want to read.
Start by marking “Google Hacking for Penetration Testers, Volume 1” as Want to Read:
Google Hacking for Penetration Testers, Volume 1
Enlarge cover
Rate this book
Clear rating
Open Preview

Google Hacking for Penetration Testers, Volume 1

4.07  ·  Rating Details ·  128 Ratings  ·  9 Reviews
Google, the most popular search engine worldwide, provides web surfers with an easy-to-use guide to the Internet, with web and image searches, language translation, and a range of features that make web navigation simple enough for even the novice user. What many users don't realize is that the deceptively simple components that make Google so easy to use are the same ...more
Paperback, 448 pages
Published February 20th 2005 by Syngress (first published January 1st 2004)
More Details... edit details

Friend Reviews

To see what your friends thought of this book, please sign up.

Reader Q&A

To ask other readers questions about Google Hacking for Penetration Testers, Volume 1, please sign up.

Be the first to ask a question about Google Hacking for Penetration Testers, Volume 1

This book is not yet featured on Listopia. Add this book to your favorite list »

Community Reviews

(showing 1-30)
filter  |  sort: default (?)  |  Rating Details
Edwin
Jan 06, 2012 Edwin rated it really liked it
Must read for searchers. This is about using Google beyond advanced search. This is super advanced search
Ameen Ali
This book is amazing. I had no idea Google could be used in a completely different way!
This book will totally be a great reference for me through Penetration Testing of Web Apps.
Tab
Jul 06, 2008 Tab rated it it was amazing
Great book and perfect for people looking for a deeper dive into the information dumping ground of google. It's scary the information that can be pulled up just by following many of the techniques described in the book and you really don't need to be overly technical. I've uncovered some fantastic information. ;-)
Petett2011
Jul 05, 2011 Petett2011 rated it really liked it
Excellent book, after 7 years many of these techniques still work. It is not difficult to find some scary information in the Google megasphere.

FYI - Exploit-DB has re-established the initial Google Hackers Database
Chris
Jun 05, 2008 Chris rated it it was amazing
Great book by one of my favorite speakers, Johnny Long. This is much more than stupid pet tricks with Google. Now if Johnny would just publish his Hacking Hollywood style presentation!
Hàśšăņ Śhâhîđ
Hàśšăņ Śhâhîđ rated it it was amazing
Aug 17, 2016
Neil
Neil rated it liked it
Dec 08, 2010
Costel
Costel rated it liked it
Dec 16, 2012
Jim
Jim rated it liked it
Aug 18, 2007
MFG
MFG rated it liked it
Oct 31, 2016
Shawn Monk
Shawn Monk rated it liked it
Apr 24, 2009
Arash Tohidi
Arash Tohidi rated it it was amazing
May 28, 2016
John Clarke, Jr
John Clarke, Jr rated it it was amazing
May 29, 2014
Jigglypuff
Jigglypuff rated it it was amazing
Mar 21, 2015
Robert Lee
Robert Lee rated it it was amazing
Sep 30, 2013
Josh
Josh rated it it was ok
Aug 05, 2011
Neelu Mishra
Neelu Mishra rated it liked it
Feb 16, 2015
Dzidorius Martinaitis
Dzidorius Martinaitis rated it it was amazing
Jun 17, 2014
Sam Bowne
Sam Bowne rated it really liked it
Feb 13, 2010
Dan
Dan rated it it was amazing
Apr 12, 2007
Nick
Nick rated it it was amazing
Oct 12, 2007
David
Sep 17, 2013 David rated it really liked it
Getting old now, but the concepts are still useful.
Navneet Mehra
Navneet Mehra rated it really liked it
Dec 12, 2010
Micha
Micha rated it liked it
Mar 27, 2013
Wggg
Wggg rated it liked it
Apr 18, 2015
Sauradip Roy
Sauradip Roy rated it liked it
Feb 09, 2016
Boyd Webb
Boyd Webb rated it it was amazing
Jul 07, 2009
Micah
Micah rated it really liked it
Jan 07, 2015
Wayne Porter
Wayne Porter rated it it was amazing
Jun 13, 2008
Oleg Kireyenka
Oleg Kireyenka rated it liked it
Jul 22, 2014
« previous 1 3 4 5 next »
There are no discussion topics on this book yet. Be the first to start one »
  • Counter Hack Reloaded: A Step-By-Step Guide to Computer Attacks and Effective Defenses
  • Gray Hat Hacking: The Ethical Hacker's Handbook
  • Hacking Exposed: Network Security Secrets & Solutions, Fifth Edition
  • Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
  • Metasploit: The Penetration Tester's Guide
  • The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
  • The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
  • Gray Hat Python: Python Programming for Hackers and Reverse Engineers
  • Rootkits: Subverting the Windows Kernel
  • The Shellcoder's Handbook: Discovering and Exploiting Security Holes
  • The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
  • Hacking: The Art of Exploitation
  • Dissecting The Hack: The F0rb1dd3n Network
  • Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
  • Linux System Programming: Talking Directly to the Kernel and C Library
  • Reversing: Secrets of Reverse Engineering
  • Hacking the Xbox: An Introduction to Reverse Engineering
  • Learning the bash Shell

Goodreads is hiring!

If you like books and love to build cool products, we may be looking for you.
Learn more »

Share This Book