Manage Learn to apply best practices and optimize your operations.

Google Hacking for Penetration Testers, Volume 2: Chapter 6, Locating Exploits and Finding Targets

Penetration testers may be happy to learn that they can use Google as an application security tool to find common exploits. This chapter explains how to find Web vulnerabilities using the search engine.

As a registered member of, you're entitled to a complimentary copy of Chapter 6 of Google Hacking for Penetration Testers, Vol. 2 written by Johnny Long and published by Syngress, a division of Elsevier. " Locating Exploits and Finding Targets" shows you how to find all sorts of horrifyingly common exploits like SQL injection and cross-site scripting (XSS) using Google as an application security tool. The information in this chapter is accessible to the beginner penetration tester. Screenshots and code samples are scattered throughout. Long also includes a large table of vulnerable Web application examples from the Google Hacking Database.

Google Hacking for Penetration Testers, Volume 2

Book description:

Google is one of the 5 most popular sites on the Internet with more than 380 million unique users per month (Nielsen/NetRatings 8/05). But, Google's search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web including: social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers, Volume 2 shows the art of torqueing Google used by security professionals and system administrators to find this sensitive information and "self-police" their own organizations.

Completely updated and revised for this all new volume! Read about all the new and amazing things that can be done with Google. Johnny reveals basic and advanced search techniques, basic and advanced hacking techniques, multi-engine attack query morphing, and zero-packet target foot printing and recon techniques. Check out Google's search-blocking tactics (and see them bypassed), and learn all about using Google to locate targets Google doesn't even know about!


  • Completely revised and updated second edition of the best-selling Google Hacking for Penetration Testers.
  • Written by "The Google Guy," Johnny Long, who maintains the world's largest database of Google Hacks.
  • Find your own sensitive data through Google before the bad guys do....which is just a matter of time!
  • >> Read Chapter 6: Locating Exploits and Finding Targets

    >> Buy the book

    Printed with permission from Syngress, a division of Elsevier. Copyright 2008. "Google Hacking for Penetration Testers, Volume 2" by Johnny Long. For more information about this book, please visit
    This was last published in November 2007

    Dig Deeper on Software Security Test Best Practices

    Start the conversation

    Send me notifications when other members comment.

    Please create a username to comment.