The Art of Passive Recon

Slides:



Advertisements
Similar presentations
WordPress Installation for Beginners Sheila Bergman
Advertisements

USING WORDPRESS. WEEK 1 1.Why WP? 2.Setting Up WP 3.Exploring the Admin screen 4.Page Organization 5.Posting 6.Polls.
Revealing the Secrets: Source Code Disclosure, Techniques, and Impacts.
Google hacking & optimizing search results Faris Aloul November 2011.
Google Search Using internet search engine as a tool to find information related to creativity & innovation.
07 December 2009Slide 1 of 1207 December 2009Slide 1 of 12 SQL Injection Primer By Nicole Gray, Cliff McCullough, Joe Hernandez.
07 December 2009Slide 1 of 9 SQL Injection Primer By Nicole Gray, Cliff McCullough, Joe Hernandez.
Operating System & Application Files BACS 371 Computer Forensics.
OS and Application Files BACS 371 Computer Forensics.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
Session 5: Working with MySQL iNET Academy Open Source Web Development.
GOOGLE HACKING FOR PENETRATION TESTERS Chris Chromiak SentryMetrics March 27 th, 2007.
Lecturer: Ghadah Aldehim
1 Chapter 2 (Continued) Section 2.2 Section 2.2. Internet Service Provider (ISP) ISP - a company that connects you through your communications line to.
Tutorial 1 Getting Started with Adobe Dreamweaver CS3
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
CPSC 203 Introduction to Computers Lab 23 By Jie Gao.
Web Searching Basics Dr. Dania Bilal IS 530 Fall 2009.
MIS Week 3 Site:
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 5 1 Downloading and Storing Data Using FTP and Other Services to Transfer and.
Welcome to the Business Source Premier tutorial By the end of this tutorial you should be able to: Do a basic search to find references Use search techniques.
1 UNIT 13 The World Wide Web Lecturer: Kholood Baselm.
Technical Session I MCRDR Classifier & Database Design Presenter Yangsok Kim School of Computing.
A process of taking your best guesses. Companies have web sites where you can access your information.
Quick Launch. Google Drive 30 GB Cloud Space Document.
Google Hacking University of Sunderland CSEM02 Harry R Erwin, PhD Peter Dunne, PhD.
1 UNIT 13 The World Wide Web. Introduction 2 Agenda The World Wide Web Search Engines Video Streaming 3.
1 UNIT 13 The World Wide Web. Introduction 2 The World Wide Web: ▫ Commonly referred to as WWW or the Web. ▫ Is a service on the Internet. It consists.
Modern information gathering Dave van Stein 9 april 2009.
Google Hacking: Tame the internet Information Assurance Group 2011.
Third Grade Home Directory/H-Drive The location on the server where individual users can save their work. This directory is named the same as the username.
Employee Self Service (ESS) Version 2.15.
Responder Field Edition & Pro
Intro to Ethical Hacking
Intro to WordPress (Using XAMPP)
Creating & Customizing Business for Sale Websites
3.02H Publishing a Website 3.02 Develop webpages..
Unit 7 Learning Objectives
SEARCH ENGINE OPTIMIZATION
TEMS Parent Portal.
2 At the top of the zone in which you want to add the Web Part, click Add a Web Part. In the Add Web Parts to [zone] dialog box, select the check box of.
Computing Fundamentals
Internet Searching: Finding Quality Information
2 At the top of the zone in which you want to add the Web Part, click Add a Web Part. In the Add Web Parts to [zone] dialog box, select the check box of.
Browsing and Searching the Web
Intro to Ethical Hacking
CIW Lesson 6 Web Search Engines.
Responder Field Edition & Pro
Web Design/Internet Essentials
Big Picture How many ways can a system be attacked? What can we do about it?
SEARCH ENGINE OPTIMIZATION
Employee Self Service (ESS) Version 2.20.
INTERNET.
FTP and UNIX TOPICS Exploring your Web Hosting Site FTP UNIX
Part 2 Setting up a web server the easy way
ITE 130 Web Searching.
Search Techniques & Strategies
Exploring Microsoft® Access® 2016 Series Editor Mary Anne Poatsy
Part 2 Setting up a web server the easy way
Information Technology Ms. Abeer Helwa
Searching for Truth: Locating Information on the WWW
4.02 Develop web pages using various layouts and technologies.
Skills Development Program
Chapter 7 Searching Your Products
Searching for Truth: Locating Information on the WWW
Searching for Truth: Locating Information on the WWW
Unit 32 Every class minute counts! 2 assignments 3 tasks/assignment
Hinari Basic Course Module 3 Appendix 1
Google Hacking Damian Gordon.
Presentation transcript:

The Art of Passive Recon Dorking 101 The Art of Passive Recon By Christy Long

What is Dorking? The use of Google search engine to obtain information. Prioritized by page ranking Simplest search is a word Security Use of a Combination of words Cyber Threat Analyst Use of quotes to find a phrase or string “Certified Ethical Hacker” Google Searching is not Case Sensitive Some searches with operators or special characters are case sensitive

Character Limit for searching 32 – Character Limit for searches Wildcards * do not take up a character spot Example If we search “Certified * Systems *Professional” Google will see this as 4 words including the quote

Common Boolean Operators Boolean operators are used to improve the efficiency of your search results by defining the relationship between the search terms Operators are case sensitive Word Symbol Result AND + Used to include multiple items in a search OR | Used to find either item in a search NOT - Used to remove items in a search

Search by Domain To search for information on a specific domain or server use site operator. Works with various operators Best used with web, images or group searches Cartek Consulting gave permission to use their domain https://www.cartekconsulting.com/ for the creation of this presentation

Searching Files File types can help you prepare for a presentation by looking for pdf’s or pptx Filetype:pdf filetypes such as xls, csv, txt can help you discover configuration files, passwords, or other sensitive data

Searching for Titles - intitle Intitle: Allows you to search for items or specifics within the title You can use “” to look for multiple words This example uses “index of” and “backup files” If this search were successful, we would have backup files to something on the domain of the site we searched. This search did not return any results. Great Job Cartek Consulting!

Searching within URLs - inurl Inurl allows you to search for strings within the address of the webpage The special characters such as :// can cause various results when used with inurl operator Searching for the word admin might bring up access to admin consoles, extranets Another common search is index.filetype Inurl:index.php Inurl:index.log

Searching in text - intext The intext operator allows you the hunter to find words within the body of text If you use intext:(password | passcode) you are looking for all search results with passwords or passcodes which could potentially allow you the ethical hacker to access something In this case, we learned how to protect our password

Complex Searches Combining multiple operators can refine a search to reveal important results only Intext:passcode | password intext:userid | username | email filetype:csv Intext:(passcode OR password) AND intext:(userid OR username OR email) filetype:csv Both examples produce the same results and read: find all pages which have passcodes, passwords, and show userid, usernames, or email located in a csv file Generic search without site operator

Cached Pages

Stealth Search Many companies log and monitor traffic on their websites. Use the Cache Operator to view older snapshots (Picture) of the site. Example: cache:cartekconsulting.com The page is a stored copy housed by google. Any investigating you do on the website will go undetected by the company. Cache command does not work well with other operators

Cached Pages If the company accidentally leaked sensitive data to the internet and removed it; a cached page may still display the information leak. Googles Cached Banner tells the viewer when the page was captured and may contain other clues which could help while investigating a company. If the cached page pulls a picture from the original domain, this may alert the company to your presence. Most Hackers use a VPN or Proxy Server for anonymity.

Capturing Your Actions Open PowerShell or CMD Change Directory Cd C:\Program Files\wireshark> Choose an Interface to Capture Traffic View interfaces type: .\tshark.exe –D Capture Traffic on the correct interface Save the traffic

Saving the Packet Capture Some environments will not allow Wireshark GUI to capture a PCAP file. It is essential to understand how the command line works. To save the PCAP append the capture command with a –w followed by the location to save the file and the file name Double Click the File to Open in Wireshark The cached site is hosted on Google and does not talk to the domain.

Directories

Directories Directories contain Many directories contain “Index of” Files Folders Sensitive data Many directories contain “Index of” If you search intitle:index.of of “index of” you will receive several false positives Try refining your directory search with “Parent Directory” Index.of name size Index.of.admin or intitle:index.of inurl:admin Index.of backup Intitle.index.of filetype.log Intitle.index.of inurl:software

Traversing Directories If you look at the URL https://www.cartekconsultin g.com/about-us/why-are-we- here/ The / represents different directories on the webpage. If you delete “why-we- are-here/” you will go to a directory 1 level above your current location The image shows three ways to move directories accessing the same information.

Directory Walking Changing the URL to find more information Delete the / at the end of the domain example /download Moreover, try replacing the foldername with /doc /backup or other common names for a directory If the site does not display directory folders and you have to guess directory names try using the site operator combined with inurl operator

Incremental Substitution Replacing numbers Find hidden directories or files You can increase or decrease the starting number in anything that contains a number Change 1005 to 1004 or 1006 and look for new documents or files

Database Digging Things to look for Search Terms Login Portals Support Files Error Messages Configuration Files Log Files Database Dumps Search Terms Login Welcome Copyright SQL “#dumping data for table”

Focused Search

Configuration Files Expose sensitive and/or confidential information A file containing data about a program, computer, file, and/or user Narrow search commands with site operator Common search terms Config Conf cfg Helpful file extensions filetype:config filetype:cfg filetype:ini filetype:txt

Log Files Log files show events, provide non-repudiation, these are messages written to a file Common search terms Filetype:log Ext:log Inurl:log Examples of Log Manager Splunk Snort Sumo Logic Qradar AlienVault Solar Winds Tenable Others Search key terms based on the log aggregator to help narrow the search criteria Common search terms

Office Documents Office documents are files created by software such as word processors, spreadsheet software, products commonly used for day to day operations Properties Usernames Passwords Backup File Extensions Doc, docx Pdf, pdfx Txt Xml, csv, xls Others

Questions

Additional References Google Dorking https://www.exploit-db.com/google-hacking- database/ File Extensions http://filext.com/ Resources https://www.cybrary.it/0p3n/advanced-google- dorking-commands/ Google Dorking Walk-Through Examples http://www.elp.com/articles/powergrid_internatio nal/print/volume-21/issue-11/features/google- dorking-and-shodan.html