Information which should be protected is very often publicly available, revealed by careless or ignorant users. The result is that lots of confidential data is freely available on the Internet – just Google for it.
This ebook provides many example of Google queries for hacking, providing security-minded administrators information to defend against hacks using Google searches.
This is a very interesting book the topic of which is not very widely known despite the fact that Google is the #1 search engine in the United States.
It does not concern the risk of using Google mind you it is how to exploit the company's spiders to find security holes and confidential information on other sites. It is so simple to do in fact that anyone reading it can more or less just type in the examples from the book, change or two things, and that's frankly all it takes.
I took one star because a little bit of it is outdated and because it does not address the fact that doing this without masking your identity will very quickly get you caught thus it might get some folks in trouble etc.
I also took one because I think it could have been more complete however that being said it's a great eye opener for all manner of IT folks not just the hacker community who probably already knew all this anyways. Just take what is provided and change the variables and so forth to your own domains and see if any of these holes exist.
Also examine the actual files your server are using and assuming that things change over time and in relation to the exploits discussed in this book and if you find the files are still there just moved then adjust your use of the search engine.
Another thing I'd note is that while this book details Google specifically you can probably adjust the language and certainly the concepts to virtually any half decent search engine or even into those who specialize in the deep search capabilities used by universities, government entities, and corporations and such.
So ya if you were ever just curious how all these hacker types get a start this is a very approachable book that will give you some ideas but all it really is to be succinct is an introductory text that leaves out a lot of things hackers really do use.
That is in a constant state of flux anyways so you have to look at it more conceptually and stay up to day on how various things are being adapted and adapted to over time.