Ahmad Radaideh.  Abstract  Introduction  Google Cached Content  GOOGLE HACKING Procedures  Google Advance Operators  Google hacking Result Categories.

Slides:



Advertisements
Similar presentations
Classification & Your Intranet: From Chaos to Control Susan Stearns Inmagic, Inc. E-Libraries E204 May, 2003.
Advertisements

4.01 How Web Pages Work.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Social Engineering J Nivethan. Social Engineering The process of deceiving people into giving away access or confidential information Onlinne Phone Offline.
Introduction The Basic Google Hacking Techniques How to Protect your Websites.
Server-Side vs. Client-Side Scripting Languages
Searching The Web Search Engines are computer programs (variously called robots, crawlers, spiders, worms) that automatically visit Web sites and, starting.
1 of 6 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Introduction Web Development II 5 th February. Introduction to Web Development Search engines Discussion boards, bulletin boards, other online collaboration.
What’s New in WatchGuard XCS 10.0 Update 3 WatchGuard Training.
Browser and Basics Tutorial 1. Learn about Web browser software and Web pages The Web is a collection of files that reside on computers, called.
Course 201 – Administration, Content Inspection and SSL VPN
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
Browsing the Web Session 3. Objectives Student will knowhow to search on the internet, how to complete a form.
Sharepoint Portal Server Basics. Introduction Sharepoint server belongs to Microsoft family of servers Integrated suite of server capabilities Hosted.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Lecturer: Ghadah Aldehim
Data Access Worldwide May 16 – 18, 2007 Copyright 2007, Data Access Worldwide May 16 – 18, 2007 Copyright 2007, Data Access Worldwide Search Engine Optimization.
Introduction to the Enterprise Library. Sounds familiar? Writing a component to encapsulate data access Building a component that allows you to log errors.
DIRECT CERTIFICATION Patricia Winders Director’s Conference July 29, 2015.
GOOGLE HACKING FOR PENETRATION TESTERS Chris Chromiak SentryMetrics March 27 th, 2007.
+ Websites Vulnerabilities. + Content Expand of The Internet Use of the Internet Examples Importance of the Internet How to find Security Vulnerabilities.
Build a Free Website1 Build A Website For Free 2 ND Edition By Mark Bell.
Penetration Testing James Walden Northern Kentucky University.
Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine.
XHTML Introductory1 Linking and Publishing Basic Web Pages Chapter 3.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
Using a Web Browser What does a Web Browser do? A web browser enables you to surf the World Wide Web. What are the most popular browsers?
PERSONALIZED SEARCH Ram Nithin Baalay. Personalized Search? Search Engine: A Vital Need Next level of Intelligent Information Retrieval. Retrieval of.
IIS Security Sridurga Mavram. Contents -Introduction -Security Consideration -Creating a web page -Drawbacks -Security Tools -Conclusion -References.
Office of Educational Technology School District of Philadelphia Introduction to Sites Google Sites This presentation is available at
Quick Start Guide to Zscaler. Purpose Greater understanding of Zscaler including; How to backup and restore configurations. How to change rules to comply.
RateMyService: Lessons SANS group Milestone 2. Status Report Currently, users to our site can: Search on our site, either by browsing or by using the.
By Gianluca Stringhini, Christopher Kruegel and Giovanni Vigna Presented By Awrad Mohammed Ali 1.
ONE® Pages Training Presentation North York General Hospital.
Welcome to the Logging into the NCIR lesson for the North Carolina Immunization Branch.
PHP Error Handling & Reporting. Error Handling Never allow a default error message or error number returned by the mysql_error() and mysql_errno() functions.
Search Engines A Web search engine is a tool designed to search for information on the World Wide Web. The search results are usually presented in a list.
Family Connection Collaborative Webs A Tool for Creating and Managing Web sites.
HINDU STYLE PORTFOLIO TEMPLATE
BZUPAGES.COM WEB SERVER PRESENTED TO: SIR AHMAD KAREEM.
Microsoft Office 2008 for Mac – Illustrated Unit D: Getting Started with Safari.
COM: 111 Introduction to Computer Applications Department of Information & Communication Technology Panayiotis Christodoulou.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
By Collin Donaldson. Hacking is only legal under the following circumstances: 1.You hack (penetration test) a device/network you own. 2.You gain explicit,
1 UNIT 13 The World Wide Web. Introduction 2 Agenda The World Wide Web Search Engines Video Streaming 3.
Modern information gathering Dave van Stein 9 april 2009.
Google Hacking: Tame the internet Information Assurance Group 2011.
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
Fourth Grade Home Directory/H-Drive The location on the server where individual users can save their work. This directory is named the same as the username.
TechKnowlogy Conference August 2, 2011 Using GoogleDocs for Collaboration.
● The most common website platform ● User friendly-easy to edit ● Constantly improving-updates, plugins, themes Why WordPress?
SEMINAR ON INTERNET SEARCHING PRESENTED BY:- AVIPSA PUROHIT REGD NO GUIDED BY:- Lect. ANANYA MISHRA.
Tools We Are Going To Use
Chapter Objectives Explain how to test a website before it is published Describe how to publish a website to a web server Identify ways to promote a published.
SQL Database Management
BUILD SECURE PRODUCTS AND SERVICES
Google’s Gruyere1 : An XSS Example Presented by: Terry Gregory
CSCE 548 Student Presentation Ryan Labrador
McGraw-Hill Technology Education
Browsing and Searching the Web
UNIT 15 Webpage Creator.
LGC Website, Software updates, Documentation, and Videos
ONE® Pages Training Presentation
Home Internet Vulnerabilities
The Internet and the World Wide Web
Computer Security.
Presentation transcript:

Ahmad Radaideh

 Abstract  Introduction  Google Cached Content  GOOGLE HACKING Procedures  Google Advance Operators  Google hacking Result Categories  Directories and documents Browsing  Google Hacking Countermeasure  Conclusion

 as long as we have a cached content of any site inside Google cache server and if we were able to access to this cached contents including the documents, logs, files this will be so usefully and valuable to any hacker plus hacking attempts to access these data will not be logged on the real host server that contain the information, or even we don’t care that this server is still working or offline  Google Hacking is the term of how to use Google search box to get some sensitive Information about users or organization

 When a site administrator attempt to add his site to Google search engine to be available for search in special term query, Google use automated spider or Google boters to crawl this site to Google cache server (find the documents, files, code pages copy all these information to Google search engine server) this cached page will contain the site name, the site URL,the site content that match your search query and this cached page is what we see in the result page of our search and when the user click on any of these cached pages he or she will be redirected to the host server that really contain these pages.

The search result are cached content inside Google servers, when the user click on the cached content he or she will be redirected to the real hosting server of these contents Google Cached Content

1- Hack throw search Google URL When you click on any cached content in your search result you will be redirected to the host throw special URL generated by Google 2-Using Google Advance Operators inside Google search box such as Intitle, inurl, file Type, site and Link

Google Advance Operators

 1-Error message Error message contains rich data, which can be used to gain access to the server.  2-Directories browsing This makes you able to navigate inside the directories that contain the hosted website

3-File Browsing In case we have access to website directory then we are free to access to any document that founded inside this directory such as word document, excel separate sheets, access DB, WS-FTP logs, and source Code

Directories and documents Browsing

 4- Network device Such as printers, webcams, and network routers that mainly give the hacker away to control the behavior of these devices  5-Personal information gathering Search symbol will return all the pages that contain addresses in the cached content site, which allow spammers to send mail to all this mails

 The Site administrator should Make sure host and network security basics are in place construct/publish security  The Site administrator should be aware of security policies specially Google hacking procedures  Determine which files should be placed on the site directory.  Administrator should test Google hacked procedure before he or she added there site to Google search engine.  Create share standard strategy.  Classify entrance locations and gather necessary artifacts.

 Know all regulatory pressures and unify approach.  Classify personally identifiable information obligations.  Present awareness training.  Generate security standards.  Execute security characteristic review.  Classify software defects originate in operations monitoring and feed them back to growth.  Exploit automated tools along with physical evaluation.

 Good defense always start throw understanding your opponent’s offense.  Google hacking provide access to so sensitive private information related to users or organization by different means, these means are so clear and occurred in easy scenarios so the safest way to prevent this thread is by studying these means and test our sites against these threads Is our safest way to make before we link our site to Google search engine

 Lancor, L. and Workman, R., Using Google Hacking to Enhance Defense Strategies. SIGCSE Bull. 39, 1 (Mar. 2007), DOI=  Billig, J., Danilchenko, Y. & Frank, C.E. (2008). Evaluation of Google Hacking. Proceedings of InfoSecCD Conference‘08, p , September 26-27, 2008, Kennesaw, GA, USA.  M Lubis, N Yaacob, H Reh, M Abdulghani,” A STUDY ON IMPLEMENTATION AND IMPACT OF GOOGLE HACKING TO INTERNET SECURITY”.  Long, J. (2007). The Google Hacker‘s Guide: Understanding and Defending against the Google Hacker. Retrieved January 20, 2010, from encription website: uide_v1.0.pdf. uide_v1.0.pdf  Long, J. & Skoudis, E. (2005), Google Hacking for Penetration Testers. Syngress.  Wikipedia Google Hacking Web Site,

 Thank you