Presentation is loading. Please wait.

Presentation is loading. Please wait.

Copyright ©2004 Foundstone, Inc. All Rights Reserved »Google Hacking Searching For Ways To Stop Hackers Copyright ©2004 Foundstone, Inc. All Rights Reserved.

Similar presentations


Presentation on theme: "Copyright ©2004 Foundstone, Inc. All Rights Reserved »Google Hacking Searching For Ways To Stop Hackers Copyright ©2004 Foundstone, Inc. All Rights Reserved."— Presentation transcript:

1 Copyright ©2004 Foundstone, Inc. All Rights Reserved »Google Hacking Searching For Ways To Stop Hackers Copyright ©2004 Foundstone, Inc. All Rights Reserved George Kurtz McAfee, Inc. Senior Vice President Risk Management

2 “Using public sources openly and without resorting to illegal means, it is possible to gather at least 80 percent of all information required about the enemy” - Al Qaeda training manual

3 AGENDA  How Google works  Threats  Tools  Countermeasures

4 How Google Works

5

6  Advanced Search Operators  site (.edu,.gov, foundstone.com, usc.edu)  filetype (txt, xls, mdb, pdf,.log)  Daterange (julian date format)  Intitle / allintitle  Inurl / allinurl

7 Threats - filetype:pwd service

8 Threats – allinurl: admin mdb

9 Threats - intitle:Remote.Desktop.Web.Connection inurl:tsweb

10 Threats  intitle:"Index of" finances.xls  "Network Vulnerability Assessment Report“ / filetype:pdf "Assessment Report" nessus  "not for distribution" confidential  site:edu grades admin  "ORA-00921: unexpected end of SQL command“  "VNC Desktop" inurl:5800  intitle:guestbook "advanced guestbook 2.2 powered“  intitle:"index of" trillian.ini

11 Threats - Categories  Private information  Usernames / passwords  Configuration management / Remote Admin Interface  Error messages  Backup files / log files  Public vulnerabilities

12 Tools  Using Web interface  GooScan  Athena  Using Web Service API  SiteDigger

13 Tools - GooScan

14 Tools - Athena

15 Tools - SiteDigger By: Kartik Trivedi Foundstone

16 Tools - SiteDigger

17  Version 2 features  Proxy support / Google appliance support  XML signatures in OASIS WAS format  Adding signatures for OWASP top 10  Signature contribution option  Raw search tab  Configurable # of results

18 Countermeasures  Keep sensitive data off the web!!  Perform periodic Google Assessments  Update robots.txt  Use meta-tags: NOARCHIVE  http://www.google.com/remove.html http://www.google.com/remove.html

19 SUMMARY How is Google exposing my information??

20 Thanks ….for listening george.kurtz@foundstone.com


Download ppt "Copyright ©2004 Foundstone, Inc. All Rights Reserved »Google Hacking Searching For Ways To Stop Hackers Copyright ©2004 Foundstone, Inc. All Rights Reserved."

Similar presentations


Ads by Google