Article Categories
» Arts & Entertainment
» Automotive
» Business
» Careers & Jobs
» Education & Reference
» Finance
» Food & Drink
» Health & Fitness
» Home & Family
» Internet & Online Businesses
» Miscellaneous
» Self Improvement
» Shopping
» Society & News
» Sports & Recreation
» Technology
» Travel & Leisure
» Writing & Speaking

  Listed Article

  Category: Articles » Internet & Online Businesses » Article
 

Hacking With The Google Search Engine




By Darren Miller

Title
-----
Hacking With The Google Search Engine

Google: Yes, You Can Find Just About Anything
----------------------------
Hackers and security experts use various custom and open source tools to complete their tasks. In fact, one of the tools they use you probably use every time you browse the web, the Google Search Engine.

I remember the first time I used the Google Search Engine years ago. I was amazed at how quickly it fulfilled my search request. Google's huge index of systems / information and it's ability to perform complex searches have evolved over the years. When we performed security assessments and penetration test, we regularly use Google to locate information that organizations typically want to keep private and confidential.

The reason for me writing this article is to give you several examples of basic and complex Google search terms and queries. As a disclaimer, it is not my intention that you use this information to invade the privacy of someone else or access data and files on systems that do not belong to you. It is strictly educational information and a way to make people more aware of what kind of information they may be exposing to the rest of the world.

Using Google To Locate Password Files
--------------------------
One of the most common remote web authoring tools is Microsoft's Front Page. Front page extensions and WebDav, the services on the web server that allow you to remotely connect and author web pages, can be configured with a certain degree of security. However, in certain configurations, the userID and password are stored in local files on the server. Using a Google query, you can easily locate thousands of these files and dump the contents.

The query form is quite simple: "inurl:(filename).pwd", where (filename) is the name of the .pwd file. This query can be expanded to be very specific and target a specific site by using a command to search for a specific site or domain. The results of a specific search like this would list hundreds if not thousands of these files that would contain something like "# -FrontPage- dmiller:I1KEaH1TZqxEw". Basically dumping the userID and password.

This type of basic query can be used to find all kinds of interesting information such as using the "intitle:"index of" (name of directory you want to locate)" which not only reveals many web directory structures of "index of/", it also reveals how many web servers on the Internet do not have even the most basic forms of permissions and directory security. You will find that once you access a particular directory, that you can then move up the directory tree and you never know what you may find.

More Complex Search Queries
--------------------------------------------------
The Google Search Engine supports very complex query types. For instance, if you were to construct a query like ""parent directory " Gamez -xxx -html -htm -php -shtml -opendivx -md5 -md5sums", the query would result in lists upon list of systems that have a /Gamez directory off the root of the "parent directory" of the web server. Or, to locate music files of type mp3 you could issue a query like "intitle:index.of mp3 (name of band/song)".

The bottom line here is that it is possible to locate very specific types of files. It is also possible to perform queries for inline passwords from various search engines by performing a query similar to "http://*:*@www".

What Else Can Be Found With Google Search Queries
----------------------------
One of the things we do when we are performing a security assessment is perform a quick review of the various web servers to determine what types of scripting is being used. For instance, a lot of people use PHP code to create dynamic content. Many people install PHP example code and administrative tools to help them manage their site. Unfortunately, most of the time these files are not secured and contain login ID's and passwords. We then use Google search queries to locate these specific files on the servers in question. I'd say we are successful in finding files like these that help us gain access to systems approximately 60% of the time.

We recently learned of a financial institution that was taking credit card information from one of their partners using a web based upload service on their primary web server. The problem was this file was being indexed by the Microsoft Index Service, the information was being spidered by search engines, and the file itself did not have effective security permissions on it. The result, the file was indexed by Google and someone performing a Google query found it and was able to open it in the browser, revealing hundreds of credit card numbers, names, and other personal information. This happens all the time.

Conclusion
----------
The Google Search Engine is a powerful tool that can be used by people with ill intentions just as it can be used for basic web searching. If you are setting up a web server at home or the office, you need to understand that you may be publishing information on the web that no one but you should see. This could include financial files, credit card information, and other private / personal information. There is a lot more to setting up a "secure" site than just following the Microsoft setup wizards.

 
 
About the Author
------------------
Darren Miller is an Information Security Consultant with
over sixteen years experience. He has written many
technology & security articles, some of which have been
published in nationally circulated magazines & periodicals.
If you would like to contact Darren you can e-mail him at
Darren.Miller@ParaLogic.Net. If you would like to know
more about computer security please
visit us at http://www.defendingthenet.com.


Article Source: http://www.simplysearch4it.com/article/20128.html
 
If you wish to add the above article to your website or newsletters then please include the "Article Source: http://www.simplysearch4it.com/article/20128.html" as shown above and make it hyperlinked.



  Some other articles by Darren Miller
My Identity Was Stolen Because Of Someone Else's Mistake
Giving Total Strangers Your Personal Information ---------------------------- How often would you say you trust total strangers with some of your most confidential information? I think I can answer this ...

Step Away From The Computer Before You Have A Mental Meltdown
Do I Read A Technical Manual Tonight, or The Lord Of The Rings? ---------------------------- Just out of courtesy, I think I should tell ...

Finding Your MAC Address On Wired And Wireless Network Cards
The Answer To The Media Access Control Question ---------------------------- Over the past few weeks I have received quite a few e-mails about Ethernet cards, both wired and wireless, and more specifically, about Media Access ...

What Are Survivable Computer Systems
Definition Of A Survivable Computer System ---------------------------- A computer system, which may be made up of multiple individual systems and components, designed to ...

Is Your Data Encryption Really Secure
How Do You Know Your Data Encryption is Really Secure ---------------------------- There are various types and methods of data encryption. Some of the most popular forms of data encryption include single ...

Why Easy To Use Software Is Putting You At Risk
Can Easy To Use Software Also Be Secure ---------------------------- Anyone who has been working with computers for a long time will have noticed that mainstream operating systems and applications have become easier to use ...

  
  Recent Articles
What do blogs and Britney Spears have in common?
by Rick Martin

12 Tips for Using Survey Software
by Brian Henderson

Adsense – up-to-the-minute technology
by Ken Wilson

MySpace Comments- Not Just Plain Text Anymore!
by Susan Cox

4 Keys to Building Your Own Opt-In List
by Michael Smith

Quick Start Your Online Business With Drop-Shipping
by Jenny Harvard

Five Ways To Create Content For Your Website
by Glenn Jones

Practical Internet Home Based Business Ideas, for the Young and the 50 + Entrepreneur.
by Kanaga Siva

5 Online Group Meeting Tips
by Lynette Chandler

MySpace- A Way of Life
by Susan Cox

Open Some New Doors With Your Own Video Products!
by Art Luff

Plug-In-Profit-Site Review
by carol king

Can't connect to database