Google Hacking Gs1004

156
Hacking with Google for fun and profit! October 2004 Robert Masse & Jian Hui Wang Robert Masse & Jian Hui Wang

Transcript of Google Hacking Gs1004

Page 1: Google Hacking Gs1004

Hacking with Google for fun and profit!

October 2004

Robert Masse & Jian Hui WangRobert Masse & Jian Hui Wang

Page 2: Google Hacking Gs1004

02/12/2004GoSecure Inc.2

AgendaAgenda

Google Introduction & FeaturesGoogle Search TechniqueGoogle Basic OperatorsGoogle Advanced OperatorsGoogle Hacking

Digging for “vulnerability gold”Identifying operating systemsVulnerability scanningProxying

Protect your information from Google

Page 3: Google Hacking Gs1004

02/12/2004GoSecure Inc.3

Google HackingGoogle Hacking

Google Search Technique– Just put the word and run the search

You need to audit your Internet presence– One database, Google almost has it all!

One of the most powerful databases in the worldConsolidate a lot of infoUsage:– Student …– Business … – Al’Qaeda …

One stop shop for attack, maps, addresses, photos, technical information

Page 4: Google Hacking Gs1004

02/12/2004GoSecure Inc.4

Page 5: Google Hacking Gs1004

02/12/2004GoSecure Inc.5

Google HackingGoogle Hacking

Google Advance Search– A little more sophisticated ……

Page 6: Google Hacking Gs1004

02/12/2004GoSecure Inc.6

Page 7: Google Hacking Gs1004

02/12/2004GoSecure Inc.7

Google HackingGoogle Hacking

Google Operators:– Operators are used to refine the results and to maximize

the search value. They are your tools as well as hackers’ weapons

Basic Operators:+, -, ~ , ., *, “”, |, ORAdvanced Operators:– allintext:, allintitle:, allinurl:, bphonebook:, cache:,

define:, filetype:, info:, intext:, intitle:, inurl:, link:, phonebook:, related:, rphonebook:, site:, numrange:, daterange

Page 8: Google Hacking Gs1004

02/12/2004GoSecure Inc.8

Google HackingGoogle Hacking

Basic Operators– (+) force inclusion of something common– Google ignores common words (where, how, digit, single

letters) by default:Example: StarStar Wars Episode +I

– (-) exclude a search termExample: apple –red

– (“) use quotes around a search term to search exact phrases:Example: “Robert Masse”

– Robert masse without “” has the 309,000 results, but “robert masse” only has 927 results. Reduce the 99% irrelevant results

Page 9: Google Hacking Gs1004

02/12/2004GoSecure Inc.9

Google HackingGoogle Hacking

Basic Operators– (~) search synonym:

Example: ~food

– Return the results about food as well as recipe, nutrition and cooking information

– ( . ) a single-character wildcard:Example: m.trix

– Return the results of M@trix, matrix, metrix…….– ( * ) any word wildcard

Page 10: Google Hacking Gs1004

02/12/2004GoSecure Inc.10

Google HackingGoogle Hacking

Advanced Operators: “Site:”– Site: Domain_name– Find Web pages only on the specified domain. If we

search a specific site, usually we get the Web structure of the domain

– Examples:site:casite:gosecure.casite:www.gosecure.ca

Page 11: Google Hacking Gs1004

02/12/2004GoSecure Inc.11

4. Google Hacking4. Google Hacking

Page 12: Google Hacking Gs1004

02/12/2004GoSecure Inc.12

Google HackingGoogle Hacking

Advanced Operators: “Filetype:”– Filetype: extension_type– Find documents with specified extensions– The supported extensions are:- HyperText Markup Language (html) - Microsoft PowerPoint (ppt) - Adobe Portable Document Format (pdf) - Microsoft Word (doc) - Adobe PostScript (ps) - Microsoft Works (wks, wps, wdb) - Lotus 1-2-3 - Microsoft Excel (xls)

(wk1, wk2, wk3, wk4, wk5, wki, wks, wku) - Microsoft Write (wri) - Lotus WordPro (lwp) - Rich Text Format (rtf) - MacWrite (mw) - Shockwave Flash (swf) - Text (ans, txt)

– Note: We actually can search asp, php and cgi, pl files as long as it is text-compatible.Example: Budget filetype: xls

Page 13: Google Hacking Gs1004

02/12/2004GoSecure Inc.13

Google HackingGoogle Hacking

Advanced Operators – A budget file we found …….

Page 14: Google Hacking Gs1004

02/12/2004GoSecure Inc.14

Page 15: Google Hacking Gs1004

02/12/2004GoSecure Inc.15

Google HackingGoogle Hacking

Advanced Operators “Intitle:”– Intitle: search_term – Find search term within the title of a Webpage– Allintitle: search_term1 search_term2 search_term3– Find multiple search terms in the Web pages with the

title that includes all these words– These operators are specifically useful to find the

directory lists– Example:

Find directory list:Intitle: Index.of “parent directory”

Page 16: Google Hacking Gs1004

02/12/2004GoSecure Inc.16

Page 17: Google Hacking Gs1004

02/12/2004GoSecure Inc.17

Google HackingGoogle Hacking

Advanced Operators “Inurl:”– Inurl: search_term– Find search term in a Web address– Allinurl: search_term1 search_term2 search_term3– Find multiple search terms in a Web address – Examples:

Inurl: cgi-binAllinurl: cgi-bin password

Page 18: Google Hacking Gs1004

02/12/2004GoSecure Inc.18

Page 19: Google Hacking Gs1004

02/12/2004GoSecure Inc.19

Google HackingGoogle Hacking

Advanced Operators “Intext;”– Intext: search_term– Find search term in the text body of a document.– Allintext: search_term1 search_term2 search_term3– Find multiple search terms in the text body of a

document.– Examples:

Intext: Administrator loginAllintext: Administrator login

Page 20: Google Hacking Gs1004

02/12/2004GoSecure Inc.20

Page 21: Google Hacking Gs1004

02/12/2004GoSecure Inc.21

Google HackingGoogle Hacking

Advanced Operators: “Cache:”– Cache: URL– Find the old version of Website in Google cache– Sometimes, even the site has already been updated, the

old information might be found in cache– Examples:

Cache: www.gosecure.com

Page 22: Google Hacking Gs1004

02/12/2004GoSecure Inc.22

Page 23: Google Hacking Gs1004

02/12/2004GoSecure Inc.23

Google HackingGoogle Hacking

Advanced Operators – <number1>..<number2>– Conduct a number range search by specifying two

numbers, separated by two periods, with no spaces. Be sure to specify a unit of measure or some other indicator of what the number range represents

– Examples:Computer $500..1000DVD player $250..350

Page 24: Google Hacking Gs1004

02/12/2004GoSecure Inc.24

Page 25: Google Hacking Gs1004

02/12/2004GoSecure Inc.25

Google HackingGoogle Hacking

Advanced Operators: “Daterange:”– Daterange: <start_date>-<end date> – Find the Web pages between start date and end date– Note: start_date and end date use the Julian date– The Julian date is calculated by the number of days

since January 1, 4713 BC. For example, the Julian date for August 1, 2001 is 2452122

– Examples:2004.07.10=24531962004.08.10=2453258

– Vulnerabilities date range: 2453196-2453258

Page 26: Google Hacking Gs1004

02/12/2004GoSecure Inc.26

Page 27: Google Hacking Gs1004

02/12/2004GoSecure Inc.27

Google HackingGoogle Hacking

Advanced Operators “Link:”– Link: URL– Find the Web pages having a link to the specified URL– Related: URL– Find the Web pages that are “similar” to the specified Web page– info: URL – Present some information that Google has about that Web page– Define: search_term– Provide a definition of the words gathered from various online

sources– Examples:

Link: gosecure.ca Related: gosecure.caInfo: gosecure.caDefine: Network security

Page 28: Google Hacking Gs1004

02/12/2004GoSecure Inc.28

Page 29: Google Hacking Gs1004

02/12/2004GoSecure Inc.29

Page 30: Google Hacking Gs1004

02/12/2004GoSecure Inc.30

Page 31: Google Hacking Gs1004

02/12/2004GoSecure Inc.31

Page 32: Google Hacking Gs1004

02/12/2004GoSecure Inc.32

Google HackingGoogle Hacking

Advanced Operators “phonebook:”– Phonebook – Search the entire Google phonebook – rphonebook – Search residential listings only – bphonebook – Search business listings only – Examples:

Phonebook: robert las vegas (robert in Las Vegas)Phonebook: (702) 944-2001 (reverse search, not always work)The phonebook is quite limited to U.S.A

Page 33: Google Hacking Gs1004

02/12/2004GoSecure Inc.33

Page 34: Google Hacking Gs1004

02/12/2004GoSecure Inc.34

Page 35: Google Hacking Gs1004

02/12/2004GoSecure Inc.35

Google HackingGoogle Hacking

Google, Friend or Enemy?– Google is everyone’s best friend (yours or hackers)– Information gathering and vulnerability identification

are the tasks in the first phase of a typical hacking scenario

– Passitive, stealth and huge data collection– Google can do more than search– Have you used Google to audit your organization

today?

Page 36: Google Hacking Gs1004

02/12/2004GoSecure Inc.36

Google HackingGoogle Hacking

What can Google can do for a hacker?– Search sensitive information like payroll, SIN, even

the personal email box– Vulnerabilities scanner– Transparent proxy

Page 37: Google Hacking Gs1004

02/12/2004GoSecure Inc.37

Google HackingGoogle Hacking

Salary – Salary filetype: xls site: edu

Page 38: Google Hacking Gs1004

02/12/2004GoSecure Inc.38

Page 39: Google Hacking Gs1004

02/12/2004GoSecure Inc.39

Google HackingGoogle Hacking

Security social insurance number– Intitle: Payroll intext: ssn filetype: xls site: edu

Page 40: Google Hacking Gs1004

02/12/2004GoSecure Inc.40

Page 41: Google Hacking Gs1004

02/12/2004GoSecure Inc.41

Google Hacking Google Hacking

Security Social Insurance Number– Payroll intext: Employee intext: ssn iletype: xls

Page 42: Google Hacking Gs1004

02/12/2004GoSecure Inc.42

Page 43: Google Hacking Gs1004

02/12/2004GoSecure Inc.43

Google HackingGoogle Hacking

Financial Information– Filetype: xls “checking account” “credit card” -

intext: Application -intext: Form (only 39 results)

Page 44: Google Hacking Gs1004

02/12/2004GoSecure Inc.44

Page 45: Google Hacking Gs1004

02/12/2004GoSecure Inc.45

Google HackingGoogle Hacking

Financial Information– Intitle: “Index of” finances.xls (9)

Page 46: Google Hacking Gs1004

02/12/2004GoSecure Inc.46

Page 47: Google Hacking Gs1004

02/12/2004GoSecure Inc.47

Google HackingGoogle Hacking

Personal Mailbox– Intitle: Index.of inurl: Inbox (456) (mit mailbox)

Page 48: Google Hacking Gs1004

02/12/2004GoSecure Inc.48

Page 49: Google Hacking Gs1004

02/12/2004GoSecure Inc.49

Google HackingGoogle Hacking

Personal Mailbox– After several clicks , got the private email

messages

Page 50: Google Hacking Gs1004

02/12/2004GoSecure Inc.50

Page 51: Google Hacking Gs1004

02/12/2004GoSecure Inc.51

Google HackingGoogle Hacking

Personal Mailbox– Intitle: Index.of inurl: Inbox (inurl: User OR

inurl: Mail) (220)

Page 52: Google Hacking Gs1004

02/12/2004GoSecure Inc.52

Page 53: Google Hacking Gs1004

02/12/2004GoSecure Inc.53

Google HackingGoogle Hacking

Confidential Files– “not for distribution” confidential (1,760)

Page 54: Google Hacking Gs1004

02/12/2004GoSecure Inc.54

Page 55: Google Hacking Gs1004

02/12/2004GoSecure Inc.55

Google HackingGoogle Hacking

Confidential Files– “not for distribution” confidential filetype: pdf

(marketing info) (456)

Page 56: Google Hacking Gs1004

02/12/2004GoSecure Inc.56

Page 57: Google Hacking Gs1004

02/12/2004GoSecure Inc.57

Google HackingGoogle Hacking

OS DetectionUse the keywords of the default installation page of a Web server to search.Use the title to searchUse the footer in a directory index page

Page 58: Google Hacking Gs1004

02/12/2004GoSecure Inc.58

Google HackingGoogle Hacking

OS Detection-Windows– “Microsoft-IIS/5.0 server at”

Page 59: Google Hacking Gs1004

02/12/2004GoSecure Inc.59

Page 60: Google Hacking Gs1004

02/12/2004GoSecure Inc.60

Google HackingGoogle Hacking

OS Detection - Windows– Default web page?– Intitle: “Welcome to Windows 2000 Internet Services”

IIS 5.0

Page 61: Google Hacking Gs1004

02/12/2004GoSecure Inc.61

Page 62: Google Hacking Gs1004

02/12/2004GoSecure Inc.62

Google HackingGoogle Hacking

OS Detection –Apache 1.3.11-1.3.26– Intitle: Test.Page.for.Apache seeing.this.instead

Page 63: Google Hacking Gs1004

02/12/2004GoSecure Inc.63

Page 64: Google Hacking Gs1004

02/12/2004GoSecure Inc.64

Google HackingGoogle Hacking

OS Detection-Apache SSL enable– Intitle: Test.page “SSL/TLS-aware” (127)

Page 65: Google Hacking Gs1004

02/12/2004GoSecure Inc.65

Page 66: Google Hacking Gs1004

02/12/2004GoSecure Inc.66

Google HackingGoogle Hacking

Search Passwords– Search the well known password filenames in URL– Search the database connection files or

configuration files to find a password and username– Search specific username file for a specific product

Page 67: Google Hacking Gs1004

02/12/2004GoSecure Inc.67

Search Passwords– Inurl: etc inurl: passwd

Page 68: Google Hacking Gs1004

02/12/2004GoSecure Inc.68

Page 69: Google Hacking Gs1004

02/12/2004GoSecure Inc.69

Page 70: Google Hacking Gs1004

02/12/2004GoSecure Inc.70

Google HackingGoogle Hacking

Search Passwords– Intitle: “Index of..etc” passwd

Page 71: Google Hacking Gs1004

02/12/2004GoSecure Inc.71

Page 72: Google Hacking Gs1004

02/12/2004GoSecure Inc.72

Google HackingGoogle Hacking

Search Passwords – "# -FrontPage-" inurl: service.pwd (then crack it)

Page 73: Google Hacking Gs1004

02/12/2004GoSecure Inc.73

Page 74: Google Hacking Gs1004

02/12/2004GoSecure Inc.74

Google HackingGoogle Hacking

Search Passwords– Inurl: admin.pwd filetype: pwd

Page 75: Google Hacking Gs1004

02/12/2004GoSecure Inc.75

Page 76: Google Hacking Gs1004

02/12/2004GoSecure Inc.76

Google HackingGoogle Hacking

Search Passwords– Filetype: inc dbconn

Page 77: Google Hacking Gs1004

02/12/2004GoSecure Inc.77

Page 78: Google Hacking Gs1004

02/12/2004GoSecure Inc.78

Google HackingGoogle Hacking

Search Passwords– Filetype: inc intext: mysql_connect

Page 79: Google Hacking Gs1004

02/12/2004GoSecure Inc.79

Page 80: Google Hacking Gs1004

02/12/2004GoSecure Inc.80

Google HackingGoogle Hacking

Search Passwords– Filetype: ini +ws_ftp +pwd (get the encrypted

passwords)

Page 81: Google Hacking Gs1004

02/12/2004GoSecure Inc.81

Page 82: Google Hacking Gs1004

02/12/2004GoSecure Inc.82

Google HackingGoogle Hacking

Search Passwords– Filetype: log inurl: “password.log”

Page 83: Google Hacking Gs1004

02/12/2004GoSecure Inc.83

Page 84: Google Hacking Gs1004

02/12/2004GoSecure Inc.84

Google HackingGoogle Hacking

Search Username– +intext: "webalizer" +intext: “Total Usernames” +intext:

“Usage Statistics for”

Page 85: Google Hacking Gs1004

02/12/2004GoSecure Inc.85

Page 86: Google Hacking Gs1004

02/12/2004GoSecure Inc.86

Google HackingGoogle Hacking

License Key– Filetype: lic lic intext: key (33) (license key)

Page 87: Google Hacking Gs1004

02/12/2004GoSecure Inc.87

Page 88: Google Hacking Gs1004

02/12/2004GoSecure Inc.88

Google HackingGoogle Hacking

Cookies Syntax– Filetype: inc inc intext: setcookie -cvs -examples -

sourceforge -site: php.net (120) (cookie schema)

Page 89: Google Hacking Gs1004

02/12/2004GoSecure Inc.89

Page 90: Google Hacking Gs1004

02/12/2004GoSecure Inc.90

Google HackingGoogle Hacking

Sensitive Directories Listing– Powerful buzz word: Index of – Search the well known vulnerable directories names

Page 91: Google Hacking Gs1004

02/12/2004GoSecure Inc.91

Google HackingGoogle Hacking

Sensitive Directories Listing– “index of cgi-bin” (3590)

Page 92: Google Hacking Gs1004

02/12/2004GoSecure Inc.92

Page 93: Google Hacking Gs1004

02/12/2004GoSecure Inc.93

Google HackingGoogle Hacking

Sensitive Directories Listing– Intitle: “Index of” cfide (coldfusion directory)

Page 94: Google Hacking Gs1004

02/12/2004GoSecure Inc.94

Page 95: Google Hacking Gs1004

02/12/2004GoSecure Inc.95

Google HackingGoogle Hacking

Sensitive Directories Listing– Intitle: index.of.winnt

Page 96: Google Hacking Gs1004

02/12/2004GoSecure Inc.96

Page 97: Google Hacking Gs1004

02/12/2004GoSecure Inc.97

Google HackingGoogle Hacking

Sensitive Directories Listing– Intitle: “index of” iissamples (dangeous iissamples)

(32)

Page 98: Google Hacking Gs1004

02/12/2004GoSecure Inc.98

Page 99: Google Hacking Gs1004

02/12/2004GoSecure Inc.99

Google HackingGoogle Hacking

Sensitive Directories Listing– Inurl: iissamples (1080)

Page 100: Google Hacking Gs1004

02/12/2004GoSecure Inc.100

Page 101: Google Hacking Gs1004

02/12/2004GoSecure Inc.101

Google HackingGoogle Hacking

Database Manipulation– Different database applications leave different signatures

on the database files

Page 102: Google Hacking Gs1004

02/12/2004GoSecure Inc.102

Google HackingGoogle Hacking

Database Manipulation– “Welcome to phpMyAdmin” AND “Create new

database” -intext: “No Priviledge” (find a page that might have privilege to update mysql)

Page 103: Google Hacking Gs1004

02/12/2004GoSecure Inc.103

Page 104: Google Hacking Gs1004

02/12/2004GoSecure Inc.104

Google HackingGoogle Hacking

Database Manipulation– “Welcome to phpMyAdmin” AND “Create new

database” (after several hits, we got this)

Page 105: Google Hacking Gs1004

02/12/2004GoSecure Inc.105

Page 106: Google Hacking Gs1004

02/12/2004GoSecure Inc.106

Google HackingGoogle Hacking

Database Manipulation– “Select a database to view” intitle: “filemaker pro”

(94) Filemaker

Page 107: Google Hacking Gs1004

02/12/2004GoSecure Inc.107

Page 108: Google Hacking Gs1004

02/12/2004GoSecure Inc.108

Google HackingGoogle Hacking

Database Manipulation– After several clicks and you can query the table

Page 109: Google Hacking Gs1004

02/12/2004GoSecure Inc.109

Page 110: Google Hacking Gs1004

02/12/2004GoSecure Inc.110

Google HackingGoogle Hacking

Database Manipulation– “# Dumping data for table

(username|user|users|password)” -site: mysql.com –cvs (289) (backup data of mysqldump)

Page 111: Google Hacking Gs1004

02/12/2004GoSecure Inc.111

Page 112: Google Hacking Gs1004

02/12/2004GoSecure Inc.112

Google HackingGoogle Hacking

Database Manipulation– “# Dumping data for table

(username|user|users|password)” –site: mysql.com -cvs

Page 113: Google Hacking Gs1004

02/12/2004GoSecure Inc.113

Page 114: Google Hacking Gs1004

02/12/2004GoSecure Inc.114

Google HackingGoogle Hacking

Database Manipulation– “# Dumping data for table

(username|user|users|password)” -site: mysql.com –cvs

Page 115: Google Hacking Gs1004

02/12/2004GoSecure Inc.115

Page 116: Google Hacking Gs1004

02/12/2004GoSecure Inc.116

Google HackingGoogle Hacking

Sensitive System Information– Network security reports have lists of vulnerabilities for

your system– Configuration files often contain the application

parameters inventory

Page 117: Google Hacking Gs1004

02/12/2004GoSecure Inc.117

Google HackingGoogle Hacking

Network Security Report (ISS)– “Network Host Assessment Report” “Internet Scanner”

(iss report) (13)

Page 118: Google Hacking Gs1004

02/12/2004GoSecure Inc.118

Page 119: Google Hacking Gs1004

02/12/2004GoSecure Inc.119

Google HackingGoogle Hacking

Network Security Report (ISS)– “Host Vulnerability Summary Report” (ISS report) (25)

Page 120: Google Hacking Gs1004

02/12/2004GoSecure Inc.120

Page 121: Google Hacking Gs1004

02/12/2004GoSecure Inc.121

Google HackingGoogle Hacking

Network Security Report (nessus)– “This file was generated by Nessus” || intitle:”Nessus

Scan Report” -site:nessus.org (185)

Page 122: Google Hacking Gs1004

02/12/2004GoSecure Inc.122

Page 123: Google Hacking Gs1004

02/12/2004GoSecure Inc.123

Google HackingGoogle Hacking

Network Scanner Report (Snort)– “SnortSnarf alert page” (15,500)

Page 124: Google Hacking Gs1004

02/12/2004GoSecure Inc.124

Page 125: Google Hacking Gs1004

02/12/2004GoSecure Inc.125

Google HackingGoogle Hacking

Network Security Report (Snort)– Intitle: “Analysis Console for Intrusion Databases”

+intext:”by Roman Danyliw” inurl:acid/acid_main.php (13 results, acid alert database)

Page 126: Google Hacking Gs1004

02/12/2004GoSecure Inc.126

Page 127: Google Hacking Gs1004

02/12/2004GoSecure Inc.127

Google HackingGoogle Hacking

Configuration Files (robots.txt)– (inurl: “robot.txt” | inurl: “robots.txt”) intext:disallow

filetype:txt– Robots.txt means to protect you privacy from crawlers– But allows you to determine the file system architecture

Page 128: Google Hacking Gs1004

02/12/2004GoSecure Inc.128

Page 129: Google Hacking Gs1004

02/12/2004GoSecure Inc.129

Google HackingGoogle Hacking

A vulnerable targets scanning example– Get the new vulnerabilities from advisory– Find the signature from vendor Website– Google search to find the targets– Perform further malicious actions

Page 130: Google Hacking Gs1004

02/12/2004GoSecure Inc.130

Google HackingGoogle Hacking

An advisory looks like……

Page 131: Google Hacking Gs1004

02/12/2004GoSecure Inc.131

Page 132: Google Hacking Gs1004

02/12/2004GoSecure Inc.132

Google HackingGoogle Hacking

Vendor Website Information

Page 133: Google Hacking Gs1004

02/12/2004GoSecure Inc.133

Page 134: Google Hacking Gs1004

02/12/2004GoSecure Inc.134

Google HackingGoogle Hacking

Google search……– Inurl: smartguestbook.asp

Page 135: Google Hacking Gs1004

02/12/2004GoSecure Inc.135

Page 136: Google Hacking Gs1004

02/12/2004GoSecure Inc.136

Google HackingGoogle Hacking

The victim’s Website

Page 137: Google Hacking Gs1004

02/12/2004GoSecure Inc.137

Page 138: Google Hacking Gs1004

02/12/2004GoSecure Inc.138

Google HackingGoogle Hacking

Download the database…… Game over

Page 139: Google Hacking Gs1004

02/12/2004GoSecure Inc.139

Page 140: Google Hacking Gs1004

02/12/2004GoSecure Inc.140

Google HackingGoogle Hacking

Transparent Proxy– Normal surfing on www.myip.nu

Page 141: Google Hacking Gs1004

02/12/2004GoSecure Inc.141

Page 142: Google Hacking Gs1004

02/12/2004GoSecure Inc.142

Google HackingGoogle Hacking

Transparent Proxy– When we use Google translation tool to surf

www.myip.nu

Page 143: Google Hacking Gs1004

02/12/2004GoSecure Inc.143

Page 144: Google Hacking Gs1004

02/12/2004GoSecure Inc.144

Google HackingGoogle Hacking

Google Automated Scanning– Google doesn’t like the idea about automating Google

scan. They issue a free licence limited to 1000 queries/day to Google

– Gooscan– Gooscan is a UNIX (Linux/BSD/Mac OS X) tool that

automates queries against Google search appliances, which helps to do the external vulnerability assessment. For more information about this tool, including the ethical implications of its use. See: http://johnny.ihackstuff.com

Page 145: Google Hacking Gs1004

02/12/2004GoSecure Inc.145

Google HackingGoogle Hacking

Google Automated Tools– SiteDigger – SiteDigger searches Google’s cache to look for

vulnerabilities, errors, configuration issues, proprietary information, and interesting security nuggets on Web sites. See: http://www.foundstone.com

Page 146: Google Hacking Gs1004

02/12/2004GoSecure Inc.146

Page 147: Google Hacking Gs1004

02/12/2004GoSecure Inc.147

Google HackingGoogle Hacking

Google Automated Tools– Athena– Another Google query tool. It supports an open XML

configuration format to support multiple search engines (not just Google)

Page 148: Google Hacking Gs1004

02/12/2004GoSecure Inc.148

Page 149: Google Hacking Gs1004

02/12/2004GoSecure Inc.149

Google HackingGoogle Hacking

Google Materials– Googledorks– The famous Google Hack Website, it has many different

examples of unbelievable things: http://johnny.ihackstuff.com.

Page 150: Google Hacking Gs1004

02/12/2004GoSecure Inc.150

Page 151: Google Hacking Gs1004

02/12/2004GoSecure Inc.151

Google HackingGoogle Hacking

Page 152: Google Hacking Gs1004

02/12/2004GoSecure Inc.152

Google HackingGoogle Hacking

Google Materials– Freshgoo– Search Google for the page published on today,

yesterday, within the last seven days or last 30 days:http://www.freshgoo.com/index.php

Page 153: Google Hacking Gs1004

02/12/2004GoSecure Inc.153

Page 154: Google Hacking Gs1004

02/12/2004GoSecure Inc.154

Google HackingGoogle Hacking

Protect Your Data– Keep patching your systems and applications– Keep your sensitive data off the Web apply authentication

– (RSA, Clienless VPN)

– Disable directory browsing– Google hack your Website– Consider removing your site from Google's index:

http://www.google.com/remove.html.– Use a robots.txt file to against Web crawlers:

http://www.robotstxt.org.

Page 155: Google Hacking Gs1004

02/12/2004GoSecure Inc.155

Google Hacking ReferencesGoogle Hacking References

Google APIS:www.google.com/apisRemove:http://www.google.com/remove.htmlGoogledorks:http://johnny.ihackstuff.com/O’reilly Google Hack:http://www.oreilly.com/catalog/googlehks/Google Hack Presentation, Jonhnny Long:http://johnny.ihackstuff.com/modules.php?op=modload&name= ownloads&file=index&req=viewdownload&cid=1“Autism: Using google to hack:www.smart-dev.com/texts/google.txt“Google: Net Hacker Tool du Jour: http://www.wired.com/news/infostructure/0,1377,57897,00.html

Page 156: Google Hacking Gs1004

02/12/2004GoSecure Inc.156

Contact Information:

Robert [email protected]

407 McGill, suite 900Montréal, Québec, CanadaH2Y 2G2

514-287-7427888-287-7427 24h Emergency Hotline