You are not signed in. Sign in.

List Books: Buy books on ListBooks.org

Google Hacking for Penetration Testers, Vol. 2 »

Book cover image of Google Hacking for Penetration Testers, Vol. 2 by Johnny Long

Authors: Johnny Long, Roelof Temmingh (Contribution by), Petko Petkov
ISBN-13: 9781597491761, ISBN-10: 1597491764
Format: Paperback
Publisher: Elsevier Science
Date Published: November 2007
Edition: (Non-applicable)

Find Best Prices for This Book »

Author Biography: Johnny Long

Johnny Long is a “clean-living” family guy who just so happens to like hacking stuff. Over the past two years, Johnny’s most visible focus has been on this Google hacking “thing” which has served as yet another diversion to a serious (and bill-paying) job as a professional hacker and security researcher for Computer Sciences Corporation. In his spare time, Johnny enjoys making random pirate noises (“Yarrrrr!”), spending time with his wife and kids, convincing others that acting like a kid is part of his job as a parent, feigning artistic ability with programs like Bryce and Photoshop, pushing all the pretty shiny buttons on them new-fangled Mac computers, and making much-too-serious security types either look at him funny or start laughing uncontrollably. Johnny has written or contributed to several books, including “Google Hacking for Penetration Testers” from Syngress Publishing, which has secured rave reviews and has lots of pictures.

Book Synopsis

This guide describes techniques the bad guys use to locate sensitive information about an individual or company, particularly the specific ways Google searches can discover forgotten network systems and devices that have fallen off the radar of overworked administrators. The author, who maintains johnny.ihackstuff.com, recommends writing a sound security policy, securing a web site from Google's crawlers, and checking Google exposure with automated tools. Distributed in the U.S. by O'Reilly. Annotation ©2004 Book News, Inc., Portland, OR

Slashdot.org

Whether you're a penetration tester wanting to exploit Google, a Web administrator wanting to protect yourself from information leaks, or even a newbie wanting to harness Google's full potential, Google Hacking for Penetration Testers makes an excellent resource. If you, too, use Google as a second brain, pick up Johnny Long's book and learn how to exploit this powerful search engine to its full capacity.

Table of Contents

Ch. 1Google searching basics1
Ch. 2Advanced operators41
Ch. 3Google hacking basics87
Ch. 4Preassessment121
Ch. 5Network mapping151
Ch. 6Locating exploits and finding targets181
Ch. 7Ten simple security searches that work203
Ch. 8Tracking down Web servers, login portals, and network hardware221
Ch. 9Usernames, passwords, and secret stuff, oh my!263
Ch. 10Document grinding and database digging289
Ch. 11Protecting yourself from Google hackers321
Ch. 12Automating Google searches363
App. AProfessional security testing417
App. BAn introduction to Web application security437
App. CGoogle hacking database

Subjects