counter create hit Google Hacking for Penetration Testers, Volume 2 - Download Free eBook
Hot Best Seller

Google Hacking for Penetration Testers, Volume 2

Availability: Ready to download

This book helps people find sensitive information on the Web. Google is one of the 5 most popular sites on the internet with more than 380 million unique users per month (Nielsen/NetRatings 8/05). But, Google's search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web including: social security numbers This book helps people find sensitive information on the Web. Google is one of the 5 most popular sites on the internet with more than 380 million unique users per month (Nielsen/NetRatings 8/05). But, Google's search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web including: social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers Volume 2 shows the art of manipulating Google used by security professionals and system administrators to find this sensitive information and "self-police" their own organizations. Readers will learn how Google Maps and Google Earth provide pinpoint military accuracy, see how bad guys can manipulate Google to create super worms, and see how they can mash up Google with MySpace, LinkedIn, and more for passive reconaissance.


Compare

This book helps people find sensitive information on the Web. Google is one of the 5 most popular sites on the internet with more than 380 million unique users per month (Nielsen/NetRatings 8/05). But, Google's search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web including: social security numbers This book helps people find sensitive information on the Web. Google is one of the 5 most popular sites on the internet with more than 380 million unique users per month (Nielsen/NetRatings 8/05). But, Google's search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web including: social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers Volume 2 shows the art of manipulating Google used by security professionals and system administrators to find this sensitive information and "self-police" their own organizations. Readers will learn how Google Maps and Google Earth provide pinpoint military accuracy, see how bad guys can manipulate Google to create super worms, and see how they can mash up Google with MySpace, LinkedIn, and more for passive reconaissance.

52 review for Google Hacking for Penetration Testers, Volume 2

  1. 4 out of 5

    Rohit Gupta

    Good book to know basic search functions. What is explained in later chapters is not useful for day to day users. I picked this book to search google effectively and it taught me that in few chapters. This book is not useful now though i believe to know hos to search google effectively as google is now giving its own tutorial for free. Learn it from the makers of Web itself. :)

  2. 5 out of 5

    Jean-François

    A good, albeit a bit dated, introduction to information gathering using Google. This book will explain you how to find specific items when doing a penetration test, how to map a website without even connecting to it, how to gather credentials, and how to defend against all of that. If you are a pen-tester, this is a must read.

  3. 5 out of 5

    عَبدُالكَرِيمْ

    Get ready to use Google in a way a typical user wont. Google is always one of the first starting point to gather information about your target in this book you will learn how to use the advanced terms of google search to get the most sensitive data you could ever imagine.

  4. 4 out of 5

    Kevin Connery

    Solid.

  5. 4 out of 5

    Bill Gardner

  6. 5 out of 5

    Wayne Porter

  7. 4 out of 5

    Guy Barratt

  8. 4 out of 5

    Wiseacre2

  9. 4 out of 5

    Paul

  10. 4 out of 5

    Chubbytaro

  11. 4 out of 5

    Sien

  12. 5 out of 5

    Herm

  13. 5 out of 5

    David Buchanan

  14. 4 out of 5

    Juanjo Arrebola Arrebola

  15. 4 out of 5

    Jeff Stewart

    I coauthored this book.

  16. 4 out of 5

    Subhajit Das

  17. 4 out of 5

    magiceyebrows

  18. 4 out of 5

    Brian

  19. 4 out of 5

    Timo

  20. 4 out of 5

    Liam

  21. 5 out of 5

    Kevin

  22. 4 out of 5

    Mike Boya

  23. 5 out of 5

    Tom

  24. 5 out of 5

    Nukri

  25. 4 out of 5

    Nick

  26. 4 out of 5

    Eric Brookman

  27. 4 out of 5

    Boyd Webb

  28. 4 out of 5

    Matthew Aubert

  29. 5 out of 5

    Vinay Kumar

  30. 5 out of 5

    Adam

  31. 5 out of 5

    Joe Vaughn

  32. 4 out of 5

    notv

  33. 4 out of 5

    Panca Rajantara

  34. 4 out of 5

    Zarah

  35. 5 out of 5

    Aaron

  36. 4 out of 5

    Jaydee777

  37. 4 out of 5

    P. Es

  38. 4 out of 5

    Brad

  39. 4 out of 5

    Mrklingon

  40. 4 out of 5

    Nathan

  41. 4 out of 5

    Kaiser

  42. 5 out of 5

    Utkarsh

  43. 4 out of 5

    Jeff

  44. 5 out of 5

    Siju Odeyemi

  45. 4 out of 5

    Weston

  46. 5 out of 5

    Matt

  47. 5 out of 5

    Matt Potter

  48. 4 out of 5

    Shin Furuya

  49. 4 out of 5

    Ben

  50. 5 out of 5

    Meak

  51. 5 out of 5

    Carl

  52. 4 out of 5

    Feddy

Add a review

Your email address will not be published. Required fields are marked *

Loading...
We use cookies to give you the best online experience. By using our website you agree to our use of cookies in accordance with our cookie policy.