Google Hacking for Penetration Testers: 2 and over one million other books are available for Amazon Kindle. Learn more
Buy New
$36.25
Qty:1
  • List Price: $49.95
  • Save: $13.70 (27%)
Temporarily out of stock.
Order now and we'll deliver when available.
Order now and we'll deliver when available. We'll e-mail you with an estimated delivery date as soon as we have more information. Your account will only be charged when we ship the item.
Details
Ships from and sold by Amazon.com.
Gift-wrap available.
Google Hacking for Penetr... has been added to your Cart
Trade in your item
Get a $2.00
Gift Card.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

Google Hacking for Penetration Testers Paperback – November 2, 2007

ISBN-13: 978-1597491761 ISBN-10: 1597491764 Edition: 1st

Buy New
Price: $36.25
13 New from $32.04 15 Used from $17.84
Amazon Price New from Used from
Kindle
"Please retry"
Paperback
"Please retry"
$36.25
$32.04 $17.84
Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


Frequently Bought Together

Google Hacking for Penetration Testers + No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
Price for both: $66.70

One of these items ships sooner than the other.

Buy the selected items together

NO_CONTENT_IN_FEATURE

Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Product Details

  • Paperback: 560 pages
  • Publisher: Syngress; 1 edition (November 2, 2007)
  • Language: English
  • ISBN-10: 1597491764
  • ISBN-13: 978-1597491761
  • Product Dimensions: 9.3 x 7.6 x 1.3 inches
  • Shipping Weight: 2.4 pounds (View shipping rates and policies)
  • Average Customer Review: 3.6 out of 5 stars  See all reviews (14 customer reviews)
  • Amazon Best Sellers Rank: #744,974 in Books (See Top 100 in Books)

Editorial Reviews

About the Author

Johnny Long is a Christian by grace, a professional hacker by trade, a pirate by blood, a ninja in training, a security researcher and author. He can be found lurking at his website (http://johnny.ihackstuff.com). He is the founder of Hackers For Charity(http://ihackcharities.org), an organization that provides hackers with job experience while leveraging their skills for charities that need those skills.

Bill Gardner is an Assistant Professor at Marshall University, where he teaches information security and foundational technology courses in the Department of Integrated Science and Technology. He is also President and Principal Security Consultant at BlackRock Consulting. In addition, Bill is Vice President and Information Security Chair at the Appalachian Institute of Digital Evidence. AIDE is a non-profit organization that provides research and training for digital evidence professionals including attorneys, judges, law enforcement officers and information security practitioners in the private sector. Prior to joining the faculty at Marshall, Bill co-founded the Hack3rCon convention, and co-founded 304blogs, and he continues to serve as Vice President of 304Geeks. In addition, Bill is a founding member of the Security Awareness Training Framework, which will be a prime target audience for this book.

Justin Brown is an Information Security professional who works at One World Labs where he focuses on reconnaissance and Open Source Intelligence. In particular, Justin spends his time crafting advanced Google searches for identifying the digital footprint of his clients and assisting his company's penetration testers to be successful in their engagements.

More About the Author

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

3.6 out of 5 stars
Share your thoughts with other customers

Most Helpful Customer Reviews

30 of 32 people found the following review helpful By Anomalophobe on February 27, 2012
Format: Paperback Verified Purchase
In the (four) years since its publication, this book has suffered "technological attrition" - Google's search engine has changed significantly enough to make the material unusable, and most of the referenced links are either no longer valid or have ceased further development shortly after 2008.
1 Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
Format: Paperback
This review mainly focuses on evaluating how valuable is to get a copy of "Google Hacking for Penetration Testers - VOLUME 2" if you already own a copy of the first edition, and the scores rates exactly that. If you don't have neither of them, I strongly encourage you to acquire Volume 2 (see details below), no matter what area of the information security field you work in (and specially if you are a penetration tester), as the contents affect to you in multiple ways. On my day-to-day security consulting practice, I'm still very surprised about how many IT people don't know about these techniques. The book is a masterpiece for information disclosure and mining from public sources, such as (but not only) Google. If I had to evaluate the book on itself, not comparing between editions, it would definitely get a score of 5/5.

The first edition was released in 2005 and opened the world of the Google Hacking techniques to the general public, together with the GHDB. The second edition title is (at least) confusing, as Volume 2 seems to denote it is a complementary book to the first edition. It is not, so I do not recommend you to get the first edition today. Volume 2, or the second edition as it should have been called, has been thoroughly updated (including most of the screenshots) to cover the latest changes and Google applications. I did a major update to the SANS "Power Search with Google" course on the first half of 2006, when some of the new Google functionality (not in the first edition) was already available. The second edition reflects those updates I identified and put back together then, even the tiny ones, such as the maximum search terms, that changed from 10 to 32.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
2 of 2 people found the following review helpful By RP Faber on February 8, 2008
Format: Paperback
While Google is for most of us just a search engine, for hackers it is a great tool to gather information and present the attack vector and first of steps against your organization.

The opposite side of Google as a search engine is that a lot of networks and organizations out there have no idea what kind information (classified and potentially dangerous) is presented out on the internet and how data leakage is accomplished that way. This leakage give a significant amounts of password files, confidential information, and configuration data and so on that can be easily found with ingenius queries.

After you read Google Hacking, volume 2, the real power and potential danger of Google is clearly understood. Author Johnny Long does a superb job by presenting insight information on how -not so fiendly - people out there but also penetration testers can use this knowledge and easily harvest information that has been gathered by the Google engine. He's wirting is great and keeps me interested the whole book and besides that he gives away plenty of interesting examples on how to built your own query.

So really worth buying!

Rob Faber , CISSP, CEH, MCTS, MCSE
Sr. Information Security Consultant
The Netherlands
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
2 of 2 people found the following review helpful By Ken R. Pence on October 22, 2012
Format: Kindle Edition Verified Purchase
The book is a good primer on how to twerp Google searches but the folks at Google have examined it also -- then they made changes so the searches described in the book rarely work as stated and a lot of twerping has to go on until they do -- kind-of...worth the price if you know nothing about search strings
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
1 of 1 people found the following review helpful By Garot M. Conklin on February 6, 2008
Format: Paperback Verified Purchase
In reading through this book, I found a wealth of information that was quite useful, most notably the links to all of the other tools, sites and techniques available on the web. I am an internal corporate web application pen tester for a financial institution and will certainly use the techniques described in this text in our next vulnerability assessment. I do have one complaint however in that the corresponding website for the text [...] does not have the code from the book. Overall a great book and a fun read. Highly recommended.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
1 of 1 people found the following review helpful By GeekyDad on September 23, 2011
Format: Paperback Verified Purchase
The contents of this book are still relevant today even though it was published 4 years ago. Google hasn't change enough to make the examples obsolete. After working through the book I was able to create standard searches that helped me find sensitive information posted on a company web site and on 3rd party web sites. I've used what I learned in this book during penetration tests as well. I would recommend it for both auditors and penetration testers.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
By Jason Wagner on July 10, 2014
Format: Kindle Edition Verified Purchase
It's an ok reference tool but .. Not necessary to purchase when you can simply find everything on Google - First thing you need to do is go here https://www.google.com/get/googletips?originalReferrer=https://www.google.com/url?sa=t ... Use all the tips that fit your needs. Then learn how to search effectively using https://support.google.com/websearch/answer/134479?hl=en and ensure you click everything under the "Become a search expert" section .. After you've read all of that you'll have enough knowledge to find the rest of the "hacking" info
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again