Google Hacking (Kind of)
Transcription
Google Hacking (Kind of)
Google Hacking (Kind of) and Other Cool Searches But first a warning GRAMMAR MATTERS Agenda Google Introduction Features and Magic (Maybe) Google Search Technique Google Basic Operators Google Advanced Operators Facebook Search Technique (and why) Google Hacking Digging for “vulnerability gold” Identifying operating systems Vulnerability scanning Proxying Protect your information from Google / Facebook • • Google Hacking Google Search Technique − • Just put the word and run the search You need to audit your Internet presence − One database, Google almost has it all! • One of the most powerful databases in the world • Consolidate a lot of info • Usage: − Student … − Business … − Al’Qaeda … • One stop shop for attack, maps, addresses, photos, technical information • • Google Hacking Google Search - Variations on a Theme − Image Search − Variations on an Image Search − Academic − Maps − Translate − Calculations – type into search − Conversions – type into search • • Google Hacking Google Advanced Search − A little more sophisticated …… − But first .... − Parameters − ..... what’s a parameter? − Settings • Google Hacking • Google Operators: − • Operators are used to refine the results and to maximize the search value. They are your tools as well as hackers’ weapons Basic Operators: +, -, ~ , ., *, “”, |, OR Advanced Operators: − allintext:, allintitle:, allinurl:, bphonebook:, cache:, define:, filetype:, info:, intext:, intitle:, inurl:, link:, phonebook:, related:, rphonebook:, site:, numrange:, daterange • Google Hacking Basic Operators (+) force inclusion of word (No longer works this way. - B****cks!) (-) exclude a search term Example: apple –red (Still works. But with added magic – wait ) • • Google Hacking Basic Operators − (~) search synonym: Example: ~food − Return the results about food as well as recipe, nutrition and cooking information − ( . ) a single-character wildcard: Example: m.trix Return the results of M@trix, matrix, metrix……. − (No longer works. B****cks) Remember this for other data searches (e.g. Perl) − ( * ) any word/wildcard − at least this still works • Google Hacking − Google uses a maximum of 32 words/terms in a search (used to be 10) − Google ignores common words by default − Google usually ignores punctuation and special characters ! ? , . ; [ ] @ / # < > − Try AROUND e.g. computer AROUND(5) forensics − (“) use quotes around a search term to search exact phrases: − Search: eventually out of the windows. Between them they were never, ever lost for words, but this one had run them pretty close. 4,800,000 results • Google Hacking Remember the + - @ # from the last two slides - Heres what happens now • Facebook Hacking • • And now for something completely different − Almost Facebook has recently introduced Graph Search – it may or may not be enabled for your account • It has a different search method to Google • It is very scary • The numbers are staggering ... • • • Facebook Hacking 651,835,100 million active users 900 million objects ( pages, groups, events etc.) > 250 million users accessing through their mobile devices Average user has 130 friends - is connected to 80 pages, groups and events - creates 90 pieces of content each month > 30 billion pieces of content (web links, news stories, blog posts, notes, photo albums, etc.) shared each month. Entrepreneurs and developers from more than 190 countries build with Facebook Platform • People on Facebook install 20 million applications every day • 10,000 new websites integrate with Facebook every day • > 2.5 million websites have integrated with Facebook • Mobile users are twice as non-mobile users. • 200 mobile operators in 60 countries working to deploy and promote Facebook mobile products • • Facebook Hacking Facebook Users Top 10 Largest Countries 1. United States 150,055,580 2. Indonesia 36,358,100 3. United Kingdom 29,894,820 4. Turkey 27,315,800 5. India 24,028,940 6. Philippines 23,169,300 7. Mexico 22,858,440 8. France 21,887,780 9. Italy 19,171,180 10. Germany 18,198,720 • Facebook Users Male / Female Usage Statistic (USA) • Female Users % 56.2 • Male Users % 43.8 http://howmanyarethere.net/how-many-facebook-users-are-there/ • Facebook Hacking High-profile public figure in Hong Kong hired Trustwave to test if its experts could get his passwords. •They turned to Facebook. •Man gave Trustwave's team no-holds barred permission to try and snatch his data, a so-called "Red Team" test. •"We found out through Facebook who his wife was," .. "We found out through her likes -- her public likes -that she ran a pilates studio. We could then send a phishing email to her based around the fact that she ran a pilates studio that was hiring." • • • • • Facebook Hacking The man's wife opened an email with a video demonstration of the bogus job candidate conducting a class. The malicious attachment infected her computer with malware, which gave analysts access, known as a spear-phishing attack. The computer she was using was a hand-me-down from her husband. The passwords he wished to protect were in the Apple computer's keychain, so the hacking exercise "turned out to be a lot easier than we otherwise expected,”. http://www.infoworld.com/d/security/facebook-stalker-tool-uses-graph-search-powerful-datamining-229063 • Facebook Hacking Traditional Search Need to know who or what you are looking for • Facebook Hacking • Facebook Hacking Designed by team led by Lars Rasmussen (Google Maps designer) and Tom Stocky (designer on several Google products) Completely new approach to retrieving data Dynamically creates web pages based on search criteria Makes use of the basic objects (people, places, events, groups, likes, comments, photos etc.) Does not rely on indexes (think Google, Yahoo, DuckDuckGo type searching) Does not permit not/negative/exclusive searches • Facebook Hacking https://www.facebook.com/search/115063718504722/ users-religious-view/113009932047080/likers/intersect • • Facebook Hacking • Facebook Hacking • Facebook Hacking • Facebook Hacking • Facebook Hacking • Facebook Hacking • FQL – Facebook Query Language "SELECT name, url, pic FROM profile WHERE id IN (SELECT uid FROM (SELECT uid, rsvp_status FROM event_member WHERE eid=12345678 )“ • Tables album app_role application apprequest checkin column comment comments_info connection cookies developer domain domain_admin event event_member family friend friend_request friendlist friendlist_member group group_member insights like link link_image_src link_stat location_post mailbox_folder message note notification object_url offer page page_admin page_blocked_user page_fan page_global_brand_child page_milestone permissions permissions_info photo photo_src photo_tag place privacy privacy_setting profile profile_pic profile_tab profile_view question question_option question_option_votes review score square_profile_pic square_profile_pic_size standard_friend_info standard_user_info status stream stream_filter stream_tag subscription table thread translation unified_message unified_message_count unified_message_sync unified_thread unified_thread_action unified_thread_count unified_thread_sync url_like user video video_tag Currently only app developers • Google Hacking • Back to Google • : “Site:” Advanced Operators − Site: Domain_name − Find Web pages only on the specified domain. If we search a specific site, usually we get the Web structure of the domain − Examples: site:ca site:hackme.ca site:www.hackme.ca • 4. Google Hacking • • Google Hacking • • Advanced Operators: “Filetype:” − Filetype: extension_type − Find documents with specified extensions − The supported extensions are: - HyperText Markup Language (html) - Microsoft PowerPoint (ppt) - Adobe Portable Document Format (pdf) - Adobe PostScript (ps) - Microsoft Word (doc) - Microsoft Works (wks, wps, wdb) - Lotus 1-2-3 (wk1, wk2, wk3, wk4, wk5, wki, wks, wku) -Microsoft Excel (xls) ( - Microsoft Write (wri) - Lotus WordPro (lwp) - Rich Text Format (rtf) - MacWrite (mw) - Shockwave Flash (swf) - Text (ans, txt) Note: We actually can search asp, php and cgi, pl files as long as it is textcompatible. • Google Hacking • • Advanced Operators − A budget file we found ……. − Example: Budget filetype: xls • Google Hacking • • Advanced Operators “Intitle:” − Intitle: search_term − Find search term within the title of a Webpage − Allintitle: search_term1 search_term2 search_term3 − Find multiple search terms in the Web pages with the title that includes all these words − These operators are specifically useful to find the directory lists − Example: Find directory list: Intitle: Index.of “parent directory” • Google Hacking • • Advanced Operators “Inurl:” − Inurl: search_term − Find search term in a Web address − Allinurl: search_term1 search_term2 search_term3 − Find multiple search terms in a Web address − Examples: Inurl: cgi-bin Allinurl: cgi-bin password • Google Hacking • • Advanced Operators “Intext;” − Intext: search_term − Find search term in the text body of a document. − Allintext: search_term1 search_term2 search_term3 − Find multiple search terms in the text body of a document. − Examples: Intext: Administrator login Allintext: Administrator login • Google Hacking • • Advanced Operators: “Cache:” − Cache: URL − Find the old version of Website in Google cache − Sometimes, even if the site has already been updated, the old information might be found in cache − Examples: Cache: www.hackme.com • Google Hacking • • Advanced Operators − <number1>..<number2> − Conduct a number range search by specifying two numbers, separated by two periods, with no spaces. Be sure to specify a unit of measure or some other indicator of what the number range represents − Examples: Computer $500..1000 DVD player $250..350 • Google Hacking • • Advanced Operators: “Daterange:” − Daterange: <start_date>-<end date> − Find the Web pages between start date and end date − Note: start_date and end date use the Julian date − The Julian date is calculated by the number of days since January 1, 4713 BC. For example, the Julian date for August 1, 2001 is 2452122 − Examples: 2004.07.10=2453196 2004.08.10=2453258 − Vulnerabilities date range: 2453196-2453258 • Google Hacking • • Advanced Operators “Link:” − Link: URL − Find the Web pages having a link to the specified URL − Related: URL − Find the Web pages that are “similar” to the specified Web page − info: URL − Present some information that Google has about that Web page − Define: search_term − Provide a definition of the words gathered from various online sources − Examples: Link: hackme.ca Related: hackme.ca Info: hackme.ca Define: Network security • • Google Hacking Let’s put some of it together Wireless Security Webcams intitle:HtmlAnvView:D7B039C1 Plex Media Servers inurl:32400/web/index.html Printers using "Web Image Monitor" control inurl:32400/web/index.html Plugin errors in wordpress websites intext:"Fatal error: Class 'Red_Action' not found in" This will never work enable password|secret "current configuration" -intext:the -inurl:cisco Nobody is that stupid. Are they? filetype:xls user||username pass||pwd||passwd||password