Jump to ratings and reviews
Rate this book

Dangerous Google - Searching for Secrets

Rate this book
Information which should be
protected is very often publicly
available, revealed by careless
or ignorant users. The result is
that lots of confidential data is
freely available on the Internet
– just Google for it.

This ebook provides many example of Google queries for hacking, providing security-minded administrators information to defend against hacks using Google searches.

12 pages, ebook

First published January 1, 2005

3 people are currently reading
54 people want to read

About the author

Michał Piotrowski

4 books2 followers

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
5 (41%)
4 stars
4 (33%)
3 stars
2 (16%)
2 stars
1 (8%)
1 star
0 (0%)
Displaying 1 - 3 of 3 reviews
Profile Image for Curtis Seven.
98 reviews1 follower
July 1, 2011
This is a very interesting book the topic of which is not very widely known despite the fact that Google is the #1 search engine in the United States.

It does not concern the risk of using Google mind you it is how to exploit the company's spiders to find security holes and confidential information on other sites. It is so simple to do in fact that anyone reading it can more or less just type in the examples from the book, change or two things, and that's frankly all it takes.

I took one star because a little bit of it is outdated and because it does not address the fact that doing this without masking your identity will very quickly get you caught thus it might get some folks in trouble etc.

I also took one because I think it could have been more complete however that being said it's a great eye opener for all manner of IT folks not just the hacker community who probably already knew all this anyways. Just take what is provided and change the variables and so forth to your own domains and see if any of these holes exist.

Also examine the actual files your server are using and assuming that things change over time and in relation to the exploits discussed in this book and if you find the files are still there just moved then adjust your use of the search engine.

Another thing I'd note is that while this book details Google specifically you can probably adjust the language and certainly the concepts to virtually any half decent search engine or even into those who specialize in the deep search capabilities used by universities, government entities, and corporations and such.

So ya if you were ever just curious how all these hacker types get a start this is a very approachable book that will give you some ideas but all it really is to be succinct is an introductory text that leaves out a lot of things hackers really do use.

That is in a constant state of flux anyways so you have to look at it more conceptually and stay up to day on how various things are being adapted and adapted to over time.
Displaying 1 - 3 of 3 reviews

Can't find what you're looking for?

Get help and learn more about the design.