Sei sulla pagina 1di 11

GOOGLE HACKING FOR PENETRATION TESTERS

GOOGLE HACKING FOR


PENETRATION TESTERS

Chris Chromiak
SentryMetrics
March 27th, 2007

www.TASK.to
GOOGLE HACKING FOR PENETRATION TESTERS

What is Google Hacking?

 It is NOT hacking into Google!!


 Johnny Long is the “grandfather” of Google hacking.
 His website http://johnny.ihackstuff.com is exclusively dedicated to
Google Hacking and you will find all sorts of cool information there.
 Google is much more than just a simple search interface and engine.
 Google crawls public websites for information every 6-8 weeks using an
automated search and record program called Googlebot.
 As more of our business processes, intellectual property and research
and development moves to a web environment, it will be more important
for security professionals to have the skills required to evaluate their sites
from the perspective of a malicious search engine user.

© Toronto Area Security Klatch 2007 www.TASK.to


GOOGLE HACKING FOR PENETRATION TESTERS

Basic Google Operators

 Exclude terms using the NOT operator (minus sign)


 For example, searching SANS –GIAC will give you everything that has
SANS but not GIAC
 Include common words using the AND operator (plus sign)
 For example, searching SANS +GIAC will give you everything with the
words SANS and GIAC
 Searching for exact phrases must be surrounded by double quotes
 For example, “SANS and GIAC” will return all results that have SANS and
GIAC as a phrase
 Wildcards are represented by an asterisk
 Searching for SANS * “Storm Center” will return all entries with SANS any
word Storm Center
 Google searching is not case sensitive so SANS, sans and SaNs are all
the same

www.TASK.to
GOOGLE HACKING FOR PENETRATION TESTERS

Some of the Advanced Google Search Techniques

 Site - restricts a search to a particular site or domain

 Intitle – finds strings in the title of a page

 Inurl – finds strings in the URL of a page

 Filetype – finds specific types of files based on file extension

 Link – searches for links to a site or URL

 Inanchor – finds text in the descriptive text of links

www.TASK.to
GOOGLE HACKING FOR PENETRATION TESTERS

Google Hacking Tools

 Gooscan – Johnny Long’s free command line UNIX tool. It violates the
Google TOS. Gooscan automates queries designed to find potential
vulnerabilities on web pages against Google.
http://www.johnny.ihackstuff.com
 SiteDigger – A Windows tool that searches Google’s cache to look for
vulnerabilities, errors, configuration issues and proprietary information on
websites. http://www.foundstone.com/resources/proddesc/sitedigger.htm
 Wikto – Wikto is a Windows based web server assessment tool that uses
the Google hacking database (GHDB). This tool requires a Google
developer license. http://www.sensepost.com/research/wikto
 Advanced Dork – AdvancedDork is a Firefox extension designed to
quickly search for specific text inside Google’s Advanced Operators.
https://addons.mozilla.org/firefox/2144

www.TASK.to
GOOGLE HACKING FOR PENETRATION TESTERS

How to use the GHDB

 The GHDB is the main repository for Google hacking tips and tricks
 Go to the GHDB at http://johnny.ihackstuff.com/ghdb.php
 Select the category you are interested in
 Some very juicy information here such as sensitive directories, vulnerable
servers, files containing passwords, error messages (which give out way
too much information), web server detection and sensitive online
shopping information such as customer data and credit card numbers
 Select the search criteria
 Select the entry name to get more details

www.TASK.to
GOOGLE HACKING FOR PENETRATION TESTERS

Google Hacking Examples

 Information Disclosure – Google can gather sensitive and private


information and contents as well as intellectual property assets

 Vulnerability Assessment – Google is another component in the


penetration testing toolkit that allows you to identify, with a very low false
positive rate, vulnerable resources published on the Internet. These
mainly affect web based devices such as web servers, application servers
and network devices with a web based interface

 Social Engineering – Google can also be used to map information from


the virtual world to the real world in order to perform social engineering
testing

www.TASK.to
GOOGLE HACKING FOR PENETRATION TESTERS

Information Disclosure

 Database definitions and dumps


1. “#mysql dump” filetype:sql (for SQL definition files)
2. filetype:ora ora (for Oracle configuration files)

 Exported Registry Settings


1. filetype:reg reg +intext:”internet account manager” (allows you to download the
registry to get juicy info like usernames, mail server settings, etc.)

 Login Credentials: Usernames and Passwords


1. filetype:pot inurl:john (passwords stored in a file john.pot by John the Ripper
publicly available on the Internet)

www.TASK.to
GOOGLE HACKING FOR PENETRATION TESTERS

Vulnerability Assessment and Penetration Testing

 Identifying vulnerabilities and use Google to do your intelligence gathering


 Look for misconfigurations or “non” configurations
 Examples would include default installations, private web interfaces and
identifying devices such as printers
 Intitle:”Welcome to IIS 4.0” will find many default installations of IIS 4.0 –
you now own that server – scary!!
 Intitle:”Cisco Systems, Inc. VPN 3000 Concentrator” will get you access
to the web interface and chances are many of these have the default
username and password
 inurl:printer/main.html intext:settings will give you ownership of publicly
accessible network printers
 Filetype:rdp rdp will get you RDP access to many systems on the Internet
(some of which don’t have usernames or passwords!!)

www.TASK.to
GOOGLE HACKING FOR PENETRATION TESTERS

Social Engineering

 Google groups is an online public discussion forum


 Thousands of newsgroup messages are posted here daily, some of them
containing very sensitive information
 A simple search for your organization’s domain name can return a lot of social
engineering information such as valid employee names, email addresses,
resources and other details
 Google group operators include:
1. author – searches for the author of a post based on name – author:@sans.org
2. group – allows you to find specific groups related to a given topic –
group:*.hacking.*
3. insubject – allows you to find searched terms within the message subject line –
insubject:”google hacking”
4. msgid – newsgroup messages uniquely identified by a message ID that looks
like an email address with a random username – msgid:123456@sans.org

www.TASK.to
GOOGLE HACKING FOR PENETRATION TESTERS

Google Hacking Defenses

 Use common sense!! Basic security practices is all it takes. Defense in


depth, act diligently when configuring web based devices and have a
strong corporate security policy

 Use Google hacking techniques to uncover your own security problems.


So…..Google hack yourself!

 Work with Google for help in removing security breaches. They are easy
to work with and want to help! You can find contact info on their site.

www.TASK.to

Potrebbero piacerti anche