Presentation is loading. Please wait.

Presentation is loading. Please wait.

Copyright Security-Assessment.com 2005 GoogleMonster Using The Google Search Engine For Underhand Purposes by Nick von Dadelszen.

Similar presentations


Presentation on theme: "Copyright Security-Assessment.com 2005 GoogleMonster Using The Google Search Engine For Underhand Purposes by Nick von Dadelszen."— Presentation transcript:

1 Copyright Security-Assessment.com 2005 GoogleMonster Using The Google Search Engine For Underhand Purposes by Nick von Dadelszen

2 Copyright Security-Assessment.com 2005 Introduction Google is a great search tool Trolls Internet searching for pages Finds pages based on links Finds even those pages you don’t want people to know about Caches pages

3 Copyright Security-Assessment.com 2005 Simple Start We can use a standard Google search to find interesting pages such as indexes. “index of /etc” “index of /etc” passwd “index of /etc” shadow Lots of irrelevant results

4 Copyright Security-Assessment.com 2005 Advanced Operators Google allows us to do more than just simple searching using advanced operators E.g. – filetype: – inanchor: – intext: – intitle: – inurl: – site:

5 Copyright Security-Assessment.com 2005 Using Advanced Operators We can now search in the Title field for indexed pages intitle:index.of./etc passwd intitle:index.of./etc shadow Results are now a lot more relevant

6 Copyright Security-Assessment.com 2005 Filetype We can use the filetype: operator to find particular files such as Excel spreadsheets, configuration files and databases password filetype:xls filetype:config web.config -CVS filetype:mdb users.mdb

7 Copyright Security-Assessment.com 2005 Combining Operators We can combine multiple operators to create very specific searches filetype:eml eml +intext:"Subject" +intext:"From" +intext:"To“ "# -FrontPage-" ext:pwd inurl:(service | authors | administrators | users) "# -FrontPage-" inurl:service.pwd

8 Copyright Security-Assessment.com 2005 Searching For Vulnerabilities We can use Google to search for specific web vulnerabilities +"Powered by phpBB 2.0.6..10" -phpbb.com - phpbb.pl inurl:citrix/metaframexp/default/login.asp? ClientDetection=On

9 Copyright Security-Assessment.com 2005 Enter the GHDB GHDB = Google Hacking Database Over 900 unique search criteria for finding information Created and maintained at johhny.ihackstuff.com

10 Copyright Security-Assessment.com 2005 Targeting Websites With all these searches, we can use the site: operator to restrict queries to a particular domain This allows an attacker to use google to test a site for vulnerabilities without actually touching that site. Enter Wikto – Web Server Assessment Tool

11 Copyright Security-Assessment.com 2005 Wikto Functionality Back-end Miner Nikto-like functionality Googler file searcher GoogleHacks GHDB tester

12 Copyright Security-Assessment.com 2005 Googler

13 Copyright Security-Assessment.com 2005 GoogleHacks

14 Copyright Security-Assessment.com 2005 Defending Against Google Attacks Ensure your web servers are well configured Regularly assess what information is available through Google


Download ppt "Copyright Security-Assessment.com 2005 GoogleMonster Using The Google Search Engine For Underhand Purposes by Nick von Dadelszen."

Similar presentations


Ads by Google