1. Trang chủ
  2. » Công Nghệ Thông Tin

Search Engine Hacking

52 236 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Search Engine Hacking
Chuyên ngành Computer Security
Thể loại essay
Định dạng
Số trang 52
Dung lượng 1,51 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Search Engine Hacking tài liệu dành cho các bạn nghiên cứu về bảo mật mạng, cách thức tấn công và phòng thủ, bảo vệ, cũng như tìm kiếm thông tin trên mạng, tài liệu cần thiết cho các bạn thuộc lĩnh vực công nghệ thông tin, cũng như những bạn muốn tìm hiểu về hacking và security

Trang 1

LOGO

Search Engine Hacking

Trang 2

Search Engine Hacking

Trang 3

Search Engine Hacking

1 What is SEH?

2 Tools Armoury

3 Exploiting SEH

4 Countermeasures

Trang 4

Search Engine Hacking

Trang 5

What is SEH?

Definition: Search Engine Hacking (SEH)

Function: noun

SEH is the malicious use of indexing

technologies in order to identify, fingerprint and exploit at-risk systems, data and people.

In other words: Using Search Engines and other indexing facilities to find juicy

information and 0wnable b0x3n/w4r3z/d00dz

Trang 6

What is SEH?

How much data are we talking about?

Trang 7

Search Engine Hacking

Trang 8

Search Engine Hacking

Trang 9

Search Engine Hacking

Trang 10

What is SEH?

Only now there’s much more to contend with

IRC Search Engines

Bit Torrent/P2P Search engines

Trang 11

What is SEH?

Trang 12

What is SEH?

Trang 14

•Searches deliberately restricted

•The ‘Internet Scanner’ of SEH tools

Trang 15

Tools Armoury

SiteDigger

Trang 16

Tools Armoury

SiteDigger

Trang 18

Tools Armoury

•Written by Mimi & Spark of the Good Cat Studio

•No Google Key required, but still Google only

•No restrictions on Search

•Similar functionality to SiteDigger, minus the snazzy reporting

Trang 19

Tools Armoury

Trang 21

Tools Armoury

Wikto

(http://www.sensepost.com/research/wikto/)

•Port of Nikto to Windows with bells and whistles

•Google Hacking functionality a la GooScan

•Needs Google API Key

•Site orientated

•Requires registration with Foundstone’s portal!!!!

Trang 22

Tools Armoury

Wikto

•Uses a ‘Googler’ to identify directories worth investigating

Trang 23

Tools Armoury

Wikto

Trang 24

Tools Armoury

Wikto

•‘BackEnd’ module imports data from Googler for use in data mining…

Trang 25

Tools Armoury

Wikto

Trang 26

Tools Armoury

Wikto

•‘Wikto’ module functions as Nikto on other systems, with ability

to import dirs from Googler and BackEnd

Trang 27

Tools Armoury

Wikto

Trang 28

Tools Armoury

Wikto

•‘GoogleHacks’ Module provides an automated GoogleDork searching facility

Trang 29

Tools Armoury

Wikto

Trang 31

Tools Armoury

Athena (http://www.snakeoillabs.com)

•The ‘original’ Search Engine Hacking tool (other than a web browser, of course)

•No API Key required

•Features GHDB editor and extensive logging functionality

•Not Google Specific!

•Manual tool

Trang 32

Tools Armoury

Athena

Trang 33

Tools Armoury

Athena

Trang 34

Tools Armoury

Athena

Trang 35

Tools Armoury

Athena

Trang 36

Tools Armoury

Athena

Trang 37

Tools Armoury

Athena

•Pros

•Cool logging/note-taking functionality

•Can edit GHDB information within Athena

•Use datagrid or raw XML editing facilities

•Designed for non-techies as well as power users

•Suitable for Yahoo, Altavista, <your search facility here>

•Cons

•No automation

•Tabbed browsing would be nice

•Overall

Trang 38

Exploiting SEH

It’s easy as 1-2-3

• Load the GHDB.xml into Athena

• Select your query type

(and enter any filters)

• Hit Search

Trang 39

Exploiting SEH

Trang 40

Exploiting SEH

Trang 41

Exploiting SEH

Thinking of buying a digital camera?

• Load Digicams.xml into Athena

• Select your camera manufacturer

(and enter any filters – e.g wedding, holiday, ‘amateur’)

• Hit Go!

Trang 42

Exploiting SEH

Trang 43

Exploiting non-Google SEH

An example

•Create a Catalog in Indexing Server for file store

•Associate the Catalog with the default web site via the catalog properties

•Use the index server query object in ASP (ixsso.Query)

•Voila! Instant Search facility!

Trang 44

Exploiting non-Google SEH

Indexing Service MMC Snap-in

Trang 45

Exploiting non-Google SEH

Example query

Trang 46

Exploiting non-Google SEH

What happens when you’re not sure what you’re indexing?

Trang 47

Exploiting non-Google SEH

Things to try on your own app

•.htaccess/.htpasswd stuff

•GET POST

•Deny from all

•IIS Indexing

•REM (from autoexec.bat)

•SELECT (from backup asp and aspx files)

•Other stuff

•<?php

•#!/usr/bin/perl

•root:0:

Trang 48

Google-specific countermeasures

•Add the following to specific pages to be left out

•<META NAME="GOOGLEBOT" CONTENT="NOINDEX, NOFOLLOW">

•Remove ‘snippets’ but still index link

•<META NAME="GOOGLEBOT"

CONTENT="NOSNIPPET">

•Stop archiving

•<META NAME="GOOGLEBOT"

Trang 49

•Make sure indexed files are held in a specific directory, not

the web root!

•Figure out what you’re indexing – you’re only indexing files

with specific extensions, right?

Trang 50

Procedural countermeasures

•Newsgroups/Mailing lists

•Use a hushmail/hotmail account

•Use X-No-Archive: Yes headers in Usenet postings

•Don’t post information about your systems, data or people

(e.g: specify Solaris rather than specific Solaris patch levels)

•Check for information leakage periodically

•Don’t use site: restrictions – you want to find all

occurrences that affect you, not just the ones on your site!

Trang 52

LOGO

Questions?

Ngày đăng: 13/06/2014, 13:01

TỪ KHÓA LIÊN QUAN

w