Enjoy fast, free delivery, exclusive deals, and award-winning movies & TV shows with Prime
Try Prime
and start saving today with fast, free delivery
Amazon Prime includes:
Fast, FREE Delivery is available to Prime members. To join, select "Try Amazon Prime and start saving today with Fast, FREE Delivery" below the Add to Cart button.
Amazon Prime members enjoy:- Cardmembers earn 5% Back at Amazon.com with a Prime Credit Card.
- Unlimited Free Two-Day Delivery
- Instant streaming of thousands of movies and TV episodes with Prime Video
- A Kindle book to borrow for free each month - with no due dates
- Listen to over 2 million songs and hundreds of playlists
- Unlimited photo storage with anywhere access
Important: Your credit card will NOT be charged when you start your free trial or if you cancel during the trial period. If you're happy with Amazon Prime, do nothing. At the end of the free trial, your membership will automatically upgrade to a monthly membership.
Buy new:
$62.19$62.19
FREE delivery:
Thursday, Dec 21
Ships from: Amazon Sold by: PARADISE 30
Buy used: $9.99
Other Sellers on Amazon
+ $3.99 shipping
88% positive over last 12 months
100% positive over last 12 months
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Follow the author
OK
Google Hacking for Penetration Testers, Volume 1 1st Edition
| Price | New from | Used from |
- Kindle
$37.09 Read with our free app - Paperback
$9.99 - $62.1935 Used from $2.25 6 New from $54.30
Purchase options and add-ons
Penetration Testing with Google Hacks explores the explosive growth of a technique known as "Google Hacking." When the modern security landscape includes such heady topics as "blind SQL injection" and "integer overflows," it's refreshing to see such a deceptively simple tool bent to achieve such amazing results; this is hacking in the purest sense of the word. Readers will learn how to torque Google to detect SQL injection points and login portals, execute port scans and CGI scans, fingerprint web servers, locate incredible information caches such as firewall and IDS logs, password databases, SQL dumps and much more - all without sending a single packet to the target! Borrowing the techniques pioneered by malicious "Google hackers," this talk aims to show security practitioners how to properly protect clients from this often overlooked and dangerous form of information leakage.
*First book about Google targeting IT professionals and security leaks through web browsing.
*Author Johnny Long, the authority on Google hacking, will be speaking about "Google Hacking" at the Black
Hat 2004 Briefing. His presentation on penetrating security flaws with Google is expected to create a lot of buzz and exposure for the topic.
*Johnny Long's Web site hosts the largest repository of Google security exposures and is the most popular destination for security professionals who want to learn about the dark side of Google.
- ISBN-101931836361
- ISBN-13978-1931836364
- Edition1st
- PublisherSyngress
- Publication date
2005
February 20
- Language
EN
English
- Dimensions
7.1 x 1.3 x 9.1
inches
- Length
448
Pages
Customers who bought this item also bought
Editorial Reviews
About the Author
Product details
- Publisher : Syngress; 1st edition (February 20, 2005)
- Language : English
- Paperback : 448 pages
- ISBN-10 : 1931836361
- ISBN-13 : 978-1931836364
- Item Weight : 1.85 pounds
- Dimensions : 7.06 x 1.25 x 9.08 inches
- Best Sellers Rank: #2,971,904 in Books (See Top 100 in Books)
- #1,837 in Computer Hacking
- #14,361 in Computer Science (Books)
- Customer Reviews:
Important information
To report an issue with this product, click here.
About the author

Discover more of the author’s books, see similar authors, read author blogs and more
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on Amazon-
Top reviews
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
This book will illustrate how Google can used by the bad guys to profile and enumerate your network infrastructure. Johnny Long does an excellent job explaining how Google works with advanced operators and how fiddling with syntax can yield interesting results.
He shows how a hacker can learn a ton of information about your network and company without ever sending a packet at your network.
You will learn how to find out information about misconfigured servers, "interesting" files left laying around servers, locating exploits, mapping networks and quite a bit more. But, you will learn how to defend and protect yourself against the evil Google hacker.
You will learn how to Google hack yourself as part of your penetration testing.
This is an easy read. You don't have to know about the OSI model or ACL rulesets. It should be on the bookshelf of every IT professional, and should be referred to often.
Hats off to Johnny Long for writing such an incredibly valuable resource.
It is also a nice additional feature that each chapter has its summary at the end.
The actual "contents" of the book is (currently) well worth the money, however there are a few things which I didnt like about the book:
- Book layout should be easier readable / accessable
- The physical pages look like photocopies or copy of a novell that I picked up in a sale.
- optional overview chart tables (take out) would have been a very helpful addition.
- The book reads like an interview or keynote speech, but should actually be more engineering like.
- Whats the point in printing pages of scripts ? Shouldnt that be downloadable or on a cd ? Or at least in the Appendix ?
Summary:
For now probably the "best search engine feature summary on the marcet". The layout of the book should be newly structured to be in an easier accessable format. I guess what I dislike most about the book is the casual writing style and the missing engineer style. The book is hardly usable as a reference but more as a one time read.
If the contents wouldnt be worth it, I would rate it with less. Unfortunately the layout absolutely disvalues the contents value. Usually casual writing style is used to fill the pages, with content thats not thoroughly researched.
I have used google with simplistic searches and obtained good results (e.g. pictures of site being tested, too much detail in job postings ...). This book is an excelent source of ideas and techniques, for both social engineering, and more technical tests.
It has also made me consider what the google desktop search tool could be used for, when run on key servers in internal nets.
Authors writing style is very easy to read yet packed with valuable information.
This book is likely to be of significant value to forensic investigators and for those with an interest in competitive intelligence.
First and foremost, before scouting a target, you must cover your tracks. GHPT first focuses on anonymity (I was particularly impressed with using Google as a proxy server on page 95). After masking yourself, the book focuses on network mapping, and locating exploitable targets. The book then offers 10 searches to find oodles of information that website owners probably don't want you to have. One chapter is devoted to tips to hunt usernames and passwords. Chapter 12, on automating Google Searches, was particularly valuable to me as I'm an extreme novice at scripting.
The book is written in a very simple, plain-spoken (or, more correctly, plain-written) style. While this book should not be the first book on one's security shelf, the subject cannot be any better defined than this book.
I give this book 4 pings out of 5:
!!!.!
Buy the book, try the searches, learn what is possible. It wouldn't hurt to use the book for its intended purpose as well, to see what information about you, about your organization is exposed on the Internet.
Top reviews from other countries
I think the book tells us: be careful! Google sees, finds and caches everything you put on the web, even if you think it will not be found.
What is annoying with the book: sides full of search examples. After you have found your way through the Google search-parameters it definitevly makes no sense to cram the book full with loads of examples. Somehow I think the author had to achieve a minimum number of pages...? With regards to that, the price of the book seems high. You may visit the authors homepage to see the examples there (and much more actual searches as well).


