|This article is the original content of AppNee. All rights reserved. To repost or reproduce, please make a footnote with our article link!|
First of all, about the author of this book “Johnny Long“, he has begun to research using Google to test the potential safety hazards of websites and computers as early as in 1995. What he does has developed and formed today’s Google Hacking Techniques – the Google Hacking Database (GHDB) set up by him has been hosted by Exploits-DB now.
Google Hacking for Penetration Testers used the most detailed Google searching syntax and tools. After giving play to the Google’s largest search utility, how do we do the exact opposite, to let our privacy information can’t be searched by others? As long as read this book carefully, and follow the author’s reverse thinking hints, you can easily find a way to get rid of primary and intermediate hackers. Because its content is detailed and easy to understand, it also can be used as reference book for technicists.
BTW, if you’re looking for some search engine that is more powerful than Google with very surprising information gathering ability, then you should start to understand and learn to use Shodan search engine.
// Download URLs //
|Volume 1||13.1 MB|
|Volume 2||14.9 MB|