SlideShare une entreprise Scribd logo
1  sur  48
Télécharger pour lire hors ligne
T23
Concurrent Class
10/3/2013 3:00:00 PM

"The Google Hacking Database:
A Key Resource to Exposing
Vulnerabilities"
Presented by:
Kiran Karnad
Mimos Berhad

Brought to you by:

340 Corporate Way, Suite 300, Orange Park, FL 32073
888-268-8770 ∙ 904-278-0524 ∙ sqeinfo@sqe.com ∙ www.sqe.com
Kiran Karnad
MIMOS Berhad
After more than sixteen years in software testing and implementation, Kiran Karnad found his
true calling in penetration testing. Proudly calling himself a hands-on lead for information
security, Kiran has worked with several Fortune 500 companies and mentored software test
teams in multiple geographies. Currently leading the functional and security efforts at MIMOS,
Kiran strives to identify process improvement opportunities throughout the organization and to
implement them effectively.
9/19/2013

The Google Hacking Database

Product Quality and Reliability Engineering
Team
– Kiran Karnad, MIMOS Bhd
A Key Resource to exposing vulnerabilities

1
9/19/2013

Disclaimer

Disclaimer

2
9/19/2013

What’s This All About?
Google & Bing Basics - OSINT
Basic, Phrase, Advanced Search
What’s Google Hacks All About?
Sample Hacks
Script for OS INT

In the Recent Past

If you are not hacked, you are not important!

3
9/19/2013

What all can be hacked
Network
Hardware hacking
Wireless
Social Engineering
Mobile
Lock Picking

Web hacking

OS INT
What you don’t know might hurt…

4
9/19/2013

OSINT – Let’s define

Intelligence collected
from public sources

• Google
• Social Engines
• Details on next slide

OSINT
Communities

•
•
•
•

Government – FBI, CBI etc
Military – Defence Intel Agency
Homeland Security
Business – Commercial,
Competitor INT, BI
• Anonymous & LulzSec– shodan,
GHDB

OSINT – Some methods

5
9/19/2013

GOOGLE HACKING
It’s what you expose

How Google Works

6
9/19/2013

Search Types Supported

Basic Search

Advanced
Operators

Phrase
Search

BASIC SEARCH
The most used type of search

7
9/19/2013

So InSenSItiVe

5W 1H – Google doesn’t mind

8
9/19/2013

Mark my Ten Words, that’s it

The reason for the previous results…

9
9/19/2013

* Avoiding * 10-word limitation *

And I’m Always There

10
9/19/2013

Now, try this… +the * *

Search Types
General Search
•
•
•
•
•

Not cAsE seNSitiVE
No more than 10 keywords in a search
Google ignores “a”, 5w1h, this, to, we
AND is always implied
Date of birth of Hugh Jackman

Phrase Search
•
•
•
•

“Use quotes”
Use + to force a term and – to exclude
No space follows these signs
See the SERPs for with and without
quotes

11
9/19/2013

PHRASE SEARCH
“More shrewd searches”

“Is there a difference?”

12
9/19/2013

Force The Plus, Exclude The Minus

OR vs. AND

13
9/19/2013

OR | or

A quick Recap
Operators
• Logical
• OR – case sensitive
• Mathematical
• + (must) and – (not) have special meaning
• No Stemming
• OK: “It’s the end of the * as we know it”
• KO: “American Psycho*” – wont give psychology or
psychophysics
• * represents a word, not the completion of a word
• Period is a single character wild card
• Let’s try some

14
9/19/2013

ADVANCED OPERATORS
Stop No More!

Know Thy Web Page

15
9/19/2013

Intitle:

inurl:

Intext:

Inanchor:

16
9/19/2013

filetype:

Numrange:
Let’s try one query:
http://www.google.com/#q=100000000..999999999+filetype:sql

Advanced Operators = advanced queries

List of most used Advanced
operators
Operator:search_term – no space
after and before the :

• Intitle:
• Inurl:
• Intext:
• Inanchor:
• Filetype:
• Continued…

17
9/19/2013

Advanced Operators contd…

More Advanced Operators
• Numrange:
• Daterange:
• Site:
• Related:
• Cache:
• Link:

Try a space between the operator
and the term and see the results
count

T1ll n0w, w3 534Rch3d…
B451c
Phr453
0p3r4t0r5

Fr0m n0w, w3 H4ck

18
9/19/2013

Intitle:index.of server.at

So What?
• What can a hacker do with this info?
– Go to http://www.cvedetails.com
– Check vulnerabilities for Apache 2.2.16
– Trigger Metasploit

19
9/19/2013

Intitle:index.of server.at site:aol.com
• Linux server installer files are obtained
Files on AOL
server.

Files on MIT
server.

Hyped Music
• Query is: Intitle:index.of name size
• Check out the site hypem.com in SERPS
Try directory traversal
from any page, you can
download tons of music!

Their business is selling
music online!

20
9/19/2013

Our Learning Till Now…
Directory
Listings
Show server
version
information
Useful for
an attacker

intitle:index.of server.at
intitle:index.of server.at site:aol.com

Finding
Directory
Listings

intitle:index.of "parent directory"
intitle:index.of name size

Piracy – MP3s
• Intitle:index.of mp3 jackson AND iso kaspersky

– Remember, Google stems!

21
9/19/2013

Piracy – MP3s
• Intitle:index.of mp3 jackson
– Yields 20+ pages of songs in mp3 format
– No need to wait for website instructions!
– Remember, Google stems!

• Intitle:index.of iso kaspersky
– Gets the AV installers from various websites
– Most of them with professional key or cracks
– Even beta versions are available

More Piracy – ISO
• Inurl:microsoft intitle:index.of filetype:iso
– Get MS ISO files from everywhere!

22
9/19/2013

Johnny’s Disclaimer

Listing all the index pages…
Each of these pages can be hacked since the
hacker knows the version and type for the
App Server, Database & the Web Server

23
9/19/2013

Listing all the subdomains

HR Intranet with details on…
Some details a hacker
gets from here:
• HR Forms and
Policies
• New Staff Info
• Consultation
• Health Benefits
• Salary packaging
• Contact Person
• Office and
Meeting Room
Layout
• Emails and Phones
• Training
• Pay Calculation
inurl:intranet intitle:intranet +intext:"human resources"

24
9/19/2013

PuTTY SSH Logs with juicy info

Usernames and Passwords

Results here: d:officialwhite papersstarwest2013uname-pwd.xls
And uname-pwd2.xls

25
9/19/2013

SQL Injectable Websites

The first query brought
38K results

Just by reordering, we got
3.3 Mil in lesser time!

Each of these can be
hacked with SQLI and all
these are just PHP!

Our Learning Till Now…
Combining Inurl:microsoft.com –inurl:www.microsoft.com
operators
does the
Inurl:intranet intitle:intranet +intext:”human resource”
magic
Filetype:log username putty
inurl:admin intext:username= AND email= AND
password= OR pass= filetype:xls
intitle:index.of inurl:admin
“Filetype:php inurl:id=“

26
9/19/2013

Database Querying

Query to get mySQL
connection details

This also enumerates all
the tables via the SQL

So you know the
connection details, IP and
the tables!

Login, Password, Website – All in One!
The Query: filetype:xls "username | password“
One of the results on page 1:
http://teachersites.schoolworld.com/.../files/teachers%20passwords.xls

Number of results: 46500

27
9/19/2013

Login, Password, Website – All in One!
The Query: filetype:xls "username | password“
One of the results on page 1:
http://teachersites.schoolworld.com/.../files/teachers%20passwords.xls

Number of results: 46500

A Quick Q
What do you think this query does?

inurl:"passes" OR inurl:"passwords" OR inurl:"credentials" -search download -techsupt -git -games -gz -bypass -exe filetype:txt @yahoo.com
OR @gmail OR @hotmail OR @rediff

28
9/19/2013

Our Learning Till Now…
“filetype:phps mysql_connect”

filetype:xls "username | password“

inurl:"passes" OR inurl:"passwords" OR inurl:"credentials" search -download -techsupt -git -games -gz -bypass -exe
filetype:txt @yahoo.com OR @gmail OR @hotmail OR
@rediff

NOT BORED YET?
Let’s dig in some more!

29
9/19/2013

Which sites have been hacked?
All hacked sites have a r00t.php
inurl:”r00t.php”

The Logs might help
Checking hacked website logs for more info
allintext:”fs-admin.php”

30
9/19/2013

Must Tries
Hacked websites  inurl:”r00t.php”
Hacked logs  allintext:”fs-admin.php”
Finding login for portals  intitle:admin intitle:login
SSH usernames  filetype:log username putty
Getting user list  Inurl:admin inurl:userlist
Passwords!  filetype:pass pass intext:userid
SQL Passwords  filetype:sql password
Usernames  inurl:admin filetype:xls
Passwords  inurl:password filetype:xls
More!!  inurl:passwd filetype:xls (pdf, doc, mdb)

More Stuff!
intitle:"Index of" passwords modified
allinurl:auth_user_file.txt
"access denied for user" "using password“
"A syntax error has occurred" filetype:ihtml
allinurl: admin mdb
"ORA-00921: unexpected end of SQL command“
inurl:passlist.txt
"Index of /backup“
"Chatologica MetaSearch" "stack tracking:"

31
9/19/2013

Listings of what you want
Change
the word
after the
parent
directory
to what
you
want

"parent directory " DVDRip -xxx -html -htm -php -shtml
opendivx -md5 -md5sums
"parent directory "Xvid -xxx -html -htm -php -shtml
opendivx -md5 -md5sums
"parent directory " Gamez -xxx -html -htm -php -shtml
opendivx -md5 -md5sums
"parent directory " MP3 -xxx -html -htm -php -shtml
opendivx -md5 -md5sums
"parent directory " Name of Singer or album” -xxx –html htm -php -shtml -opendivx md5 -md5sums

CGI Scanner
Google can be used as
a CGI scanner.

The index.of or inurl
searchs are good tools
to find vulnerable
targets. For example, a
Google search for this:

allinurl:/random_banner/index.cgi

Hurray! There are only
four two now… the
broken
random_banner
program will cough up
any file on that web
server, including the
password file…

32
9/19/2013

Passwords
"# -FrontPage-" inurl:service.pwd

FrontPage passwords.. very nice
clean search

results listing !!

This searches the password for
"Website Access Analyzer", a
Japanese software that creates
web statistics. For those who can
read Japanese, check out the
author's site at:
This is a query to get inline
passwords from search engines
(not just Google), you must type
in the query followed with the
domain name without the .com
or .net
Another way is by just typing

"AutoCreate=TRUE password=*"

http://www.coara.or.jp/~passy/
"http://*:*@www" domainname
"http://*:*@www" gamespy or http://*:*@www”gamespy

"http://bob:bob@www"

More Passwords – IRC and Access
"sets mode: +k"

This search reveals channel
keys (passwords) on IRC as
revealed from IRC chat
logs.

These are eggdrop config
files. Avoiding a fullblown
discussion about eggdrops
and IRC bots, suffice it to
say that this file contains
usernames and passwords
for IRC users.

eggdrop filetype:user user
allinurl: admin mdb

Not all of these pages are
administrator's access
databases containing
usernames, passwords and
other sensitive
information, but many are!

33
9/19/2013

MySQL Passwords & ETC directory
intitle:"Index of" config.php

This search brings up sites with
"config.php" files. To skip the
technical discussion, this
configuration file contains both a
username and a password for an
SQL database. Most sites with
forums run a PHP message base.
This file gives you the keys to that
forum, including FULL ADMIN
access to the database.

intitle:index.of.etc

This search gets you access to the
etc directory, where many, many,
many types of password files can
be found. This link is not as
reliable, but crawling etc
directories can be really fun!

Passwords in backup files
filetype:bak
inurl:"htaccess|passwd|shadow|htusers"

This will search for backup files (*.bak) created by
some editors or even by the administrator himself
(before activating a new version). Every attacker
knows that changing the extension of a file on a
web server can have ugly consequences.

34
9/19/2013

Serial Numbers
Let's pretend you need a serial number for Windows XP Pro.

In the Google search bar type in just like this - "Windows XP Professional"
94FBR the key is the 94FBR code.. it was included with many MS Office
registration codes so this will help you dramatically reduce the amount of
'fake' sites (usually pornography) that trick you. Or if you want to find the
serial for WinZip 8.1 "WinZip 8.1" 94FBR

Credit Cards!!
Number
Ranges to
find Credit
Card, SSN,
Account
Numbers
Numbers

Amex: (15 digits)

300000000000000..399999999999999

MC: (16 digits)

5178000000000000..5178999999999999

Visa : (16 digits)

4356000000000000..4356999999999999

35
9/19/2013

Working Samples!

Credit-Cards-Pastebin.txt

Some More Working Samples…

36
9/19/2013

CC TV Control
The first query produced
3000+ results!

Let’s click on one of
the SERPS

Pan, scan, tilt & zoom

You can control
the camera

Many more queries possible for CCTV
inurl:LvAppl intitle:liveapplet
inurl:"viewerframe?mode=motion"
intitle:"Live View / - AXIS"
intitle:"snc-rz30 home"
inurl:indexFrame.shtml "Axis Video Server“
So where is the database?
http://www.exploit-db.com/google-dorks/

37
9/19/2013

OK, I’M CONVINCED
So, how do I secure myself?

Securing ourselves from Google Hackers

38
9/19/2013

SOME ADDITIONAL INFO
To Inspire You To Be A Security Tester

BHDB

39
9/19/2013

How Vulnerability Scanners work

Scanner Limitations
If the DB doesn’t have it, it won’t detect it – purely signature based
Authentication by scanner is not trust-worthy
Lacks IDS detection bypass
No realistic fuzzing possible
Cant replace manual SQL Injection
No intelligence in detecting attack vectors and surfaces
Working with custom apps is a limitation
Can identify points of weakness but can’t anticipate complex attack schemes
Cant handle asynchronous & offline attack vectors
Limitations should be clearly understood
Can’t detect logic flaws, weak cryptographic functions, information leakage etc

40
9/19/2013

WHERE DO ACTUAL
HACKS COME FROM
So, who are these hackers?

Real-life hacker categories

41
9/19/2013

THE TAKE-AWAY
Top Simple Security Searches that Work!

Queries
Combine searches with “site:” operator
Intitle:index.of  Leads to a direct hack
intitle:intranet | help.desk
Filetype:xls username OR password
Inurl:admin inurl:userlist

42
9/19/2013

More Queries…
Inurl:admin OR inurl:password filetype:xls (csv)
Inurl:lvappl Live Applet site:*.*
inurl:intranet intitle:intranet +intext:"human resources"
Filetype:log username putty

So where is the GH “database”?
Top Ten Searches PDF (http://tinyurl.com/starwestghdb2013)

AUTOMATION
Automating the Google Searches

43
9/19/2013

Search API OS Script
Google Web Search API Wsdl deprecated
Now Custom Search APIs used
Google controls the use: https://developers.google.com/web-search/terms
Open source script: http://pastebin.com/uE5wJWMy
1. Download the script 2. Rename as .JS 3. Create data file 4. Call in any HTML

http://www.exploit-db.com/google-dorks/

Tools within OS Systems
Open Source penetration testing platforms such as
Backtrack and Kali support tools for Google hacking. They
are:
• Exploit-DB
• Searchsploit
• Goodork
• Websploit
• Social Engineering Toolkit
• Burp Suite (decoder)

44
9/19/2013

So…

About the Presenter

45
9/19/2013

46

Contenu connexe

Tendances

Time based CAPTCHA protected SQL injection through SOAP-webservice
Time based CAPTCHA protected SQL injection through SOAP-webserviceTime based CAPTCHA protected SQL injection through SOAP-webservice
Time based CAPTCHA protected SQL injection through SOAP-webserviceFrans Rosén
 
Windows Threat Hunting
Windows Threat HuntingWindows Threat Hunting
Windows Threat HuntingGIBIN JOHN
 
Google Dorking Tutorial | What Is Google Dorks And How To Use It? | Ethical H...
Google Dorking Tutorial | What Is Google Dorks And How To Use It? | Ethical H...Google Dorking Tutorial | What Is Google Dorks And How To Use It? | Ethical H...
Google Dorking Tutorial | What Is Google Dorks And How To Use It? | Ethical H...Simplilearn
 
Understanding Windows Access Token Manipulation
Understanding Windows Access Token ManipulationUnderstanding Windows Access Token Manipulation
Understanding Windows Access Token ManipulationJustin Bui
 
DVWA BruCON Workshop
DVWA BruCON WorkshopDVWA BruCON Workshop
DVWA BruCON Workshoptestuser1223
 
Bug Bounty Hunter Methodology - Nullcon 2016
Bug Bounty Hunter Methodology - Nullcon 2016Bug Bounty Hunter Methodology - Nullcon 2016
Bug Bounty Hunter Methodology - Nullcon 2016bugcrowd
 
Ekoparty 2017 - The Bug Hunter's Methodology
Ekoparty 2017 - The Bug Hunter's MethodologyEkoparty 2017 - The Bug Hunter's Methodology
Ekoparty 2017 - The Bug Hunter's Methodologybugcrowd
 
Dangling DNS records takeover at scale
Dangling DNS records takeover at scaleDangling DNS records takeover at scale
Dangling DNS records takeover at scaleChandrapal Badshah
 
Breaking the cyber kill chain!
Breaking the cyber kill chain!Breaking the cyber kill chain!
Breaking the cyber kill chain!Nahidul Kibria
 
Fantastic Red Team Attacks and How to Find Them
Fantastic Red Team Attacks and How to Find ThemFantastic Red Team Attacks and How to Find Them
Fantastic Red Team Attacks and How to Find ThemRoss Wolf
 
Indexing and Query Optimization
Indexing and Query OptimizationIndexing and Query Optimization
Indexing and Query OptimizationMongoDB
 
MySQL Indexing - Best practices for MySQL 5.6
MySQL Indexing - Best practices for MySQL 5.6MySQL Indexing - Best practices for MySQL 5.6
MySQL Indexing - Best practices for MySQL 5.6MYXPLAIN
 
OWASP AppSecEU 2018 – Attacking "Modern" Web Technologies
OWASP AppSecEU 2018 – Attacking "Modern" Web TechnologiesOWASP AppSecEU 2018 – Attacking "Modern" Web Technologies
OWASP AppSecEU 2018 – Attacking "Modern" Web TechnologiesFrans Rosén
 
Hunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows EnvironmentHunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows EnvironmentTeymur Kheirkhabarov
 
Red Team Methodology - A Naked Look
Red Team Methodology - A Naked LookRed Team Methodology - A Naked Look
Red Team Methodology - A Naked LookJason Lang
 

Tendances (20)

Google Dorks
Google DorksGoogle Dorks
Google Dorks
 
Time based CAPTCHA protected SQL injection through SOAP-webservice
Time based CAPTCHA protected SQL injection through SOAP-webserviceTime based CAPTCHA protected SQL injection through SOAP-webservice
Time based CAPTCHA protected SQL injection through SOAP-webservice
 
Windows Threat Hunting
Windows Threat HuntingWindows Threat Hunting
Windows Threat Hunting
 
Google Dorking Tutorial | What Is Google Dorks And How To Use It? | Ethical H...
Google Dorking Tutorial | What Is Google Dorks And How To Use It? | Ethical H...Google Dorking Tutorial | What Is Google Dorks And How To Use It? | Ethical H...
Google Dorking Tutorial | What Is Google Dorks And How To Use It? | Ethical H...
 
Understanding Windows Access Token Manipulation
Understanding Windows Access Token ManipulationUnderstanding Windows Access Token Manipulation
Understanding Windows Access Token Manipulation
 
Frans Rosén Keynote at BSides Ahmedabad
Frans Rosén Keynote at BSides AhmedabadFrans Rosén Keynote at BSides Ahmedabad
Frans Rosén Keynote at BSides Ahmedabad
 
A Threat Hunter Himself
A Threat Hunter HimselfA Threat Hunter Himself
A Threat Hunter Himself
 
DVWA BruCON Workshop
DVWA BruCON WorkshopDVWA BruCON Workshop
DVWA BruCON Workshop
 
Bug Bounty Hunter Methodology - Nullcon 2016
Bug Bounty Hunter Methodology - Nullcon 2016Bug Bounty Hunter Methodology - Nullcon 2016
Bug Bounty Hunter Methodology - Nullcon 2016
 
Ekoparty 2017 - The Bug Hunter's Methodology
Ekoparty 2017 - The Bug Hunter's MethodologyEkoparty 2017 - The Bug Hunter's Methodology
Ekoparty 2017 - The Bug Hunter's Methodology
 
Dangling DNS records takeover at scale
Dangling DNS records takeover at scaleDangling DNS records takeover at scale
Dangling DNS records takeover at scale
 
Breaking the cyber kill chain!
Breaking the cyber kill chain!Breaking the cyber kill chain!
Breaking the cyber kill chain!
 
Fantastic Red Team Attacks and How to Find Them
Fantastic Red Team Attacks and How to Find ThemFantastic Red Team Attacks and How to Find Them
Fantastic Red Team Attacks and How to Find Them
 
Offzone | Another waf bypass
Offzone | Another waf bypassOffzone | Another waf bypass
Offzone | Another waf bypass
 
ORM Injection
ORM InjectionORM Injection
ORM Injection
 
Indexing and Query Optimization
Indexing and Query OptimizationIndexing and Query Optimization
Indexing and Query Optimization
 
MySQL Indexing - Best practices for MySQL 5.6
MySQL Indexing - Best practices for MySQL 5.6MySQL Indexing - Best practices for MySQL 5.6
MySQL Indexing - Best practices for MySQL 5.6
 
OWASP AppSecEU 2018 – Attacking "Modern" Web Technologies
OWASP AppSecEU 2018 – Attacking "Modern" Web TechnologiesOWASP AppSecEU 2018 – Attacking "Modern" Web Technologies
OWASP AppSecEU 2018 – Attacking "Modern" Web Technologies
 
Hunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows EnvironmentHunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows Environment
 
Red Team Methodology - A Naked Look
Red Team Methodology - A Naked LookRed Team Methodology - A Naked Look
Red Team Methodology - A Naked Look
 

En vedette

Influence Strategies for Software Professionals
Influence Strategies for Software ProfessionalsInfluence Strategies for Software Professionals
Influence Strategies for Software ProfessionalsTechWell
 
How to Jumpstart Enterprise Agile Adoption
How to Jumpstart Enterprise Agile AdoptionHow to Jumpstart Enterprise Agile Adoption
How to Jumpstart Enterprise Agile AdoptionTechWell
 
Seven Keys to Navigating Your Agile Testing Transition
Seven Keys to Navigating Your Agile Testing TransitionSeven Keys to Navigating Your Agile Testing Transition
Seven Keys to Navigating Your Agile Testing TransitionTechWell
 
Tests and Requirements: Like Ham and Eggs, Sugar and Spice, Lucy and Desi
Tests and Requirements: Like Ham and Eggs, Sugar and Spice, Lucy and DesiTests and Requirements: Like Ham and Eggs, Sugar and Spice, Lucy and Desi
Tests and Requirements: Like Ham and Eggs, Sugar and Spice, Lucy and DesiTechWell
 
Agile Redefines Global Economics: What Recent Data Reveals
Agile Redefines Global Economics: What Recent Data RevealsAgile Redefines Global Economics: What Recent Data Reveals
Agile Redefines Global Economics: What Recent Data RevealsTechWell
 
Agile Program Management: Networks, Not Hierarchies
Agile Program Management: Networks, Not HierarchiesAgile Program Management: Networks, Not Hierarchies
Agile Program Management: Networks, Not HierarchiesTechWell
 
Agile and CMMI: Yes, They Can Work Together
Agile and CMMI: Yes, They Can Work TogetherAgile and CMMI: Yes, They Can Work Together
Agile and CMMI: Yes, They Can Work TogetherTechWell
 
Governing Agile Teams: Disciplined Strategies to Increase Agile Effectiveness
Governing Agile Teams: Disciplined Strategies to Increase Agile EffectivenessGoverning Agile Teams: Disciplined Strategies to Increase Agile Effectiveness
Governing Agile Teams: Disciplined Strategies to Increase Agile EffectivenessTechWell
 
Software Metrics: Taking the Guesswork Out of Software Projects
Software Metrics: Taking the Guesswork Out of Software ProjectsSoftware Metrics: Taking the Guesswork Out of Software Projects
Software Metrics: Taking the Guesswork Out of Software ProjectsTechWell
 
Designing Your Team and Organization for Innovation
Designing Your Team and Organization for InnovationDesigning Your Team and Organization for Innovation
Designing Your Team and Organization for InnovationTechWell
 
Test Managers: How You Can Really Make a Difference
Test Managers: How You Can Really Make a DifferenceTest Managers: How You Can Really Make a Difference
Test Managers: How You Can Really Make a DifferenceTechWell
 
Agile Success with Scrum: It’s All about the People
Agile Success with Scrum: It’s All about the PeopleAgile Success with Scrum: It’s All about the People
Agile Success with Scrum: It’s All about the PeopleTechWell
 
Design for Testability: A Tutorial for Devs and Testers
Design for Testability: A Tutorial for Devs and TestersDesign for Testability: A Tutorial for Devs and Testers
Design for Testability: A Tutorial for Devs and TestersTechWell
 
Agile Testing: It’s a Team Sport
Agile Testing: It’s a Team SportAgile Testing: It’s a Team Sport
Agile Testing: It’s a Team SportTechWell
 
Protection Poker: An Agile Security Game
Protection Poker: An Agile Security GameProtection Poker: An Agile Security Game
Protection Poker: An Agile Security GameTechWell
 
Data Warehouse Testing: It’s All about the Planning
Data Warehouse Testing: It’s All about the PlanningData Warehouse Testing: It’s All about the Planning
Data Warehouse Testing: It’s All about the PlanningTechWell
 

En vedette (16)

Influence Strategies for Software Professionals
Influence Strategies for Software ProfessionalsInfluence Strategies for Software Professionals
Influence Strategies for Software Professionals
 
How to Jumpstart Enterprise Agile Adoption
How to Jumpstart Enterprise Agile AdoptionHow to Jumpstart Enterprise Agile Adoption
How to Jumpstart Enterprise Agile Adoption
 
Seven Keys to Navigating Your Agile Testing Transition
Seven Keys to Navigating Your Agile Testing TransitionSeven Keys to Navigating Your Agile Testing Transition
Seven Keys to Navigating Your Agile Testing Transition
 
Tests and Requirements: Like Ham and Eggs, Sugar and Spice, Lucy and Desi
Tests and Requirements: Like Ham and Eggs, Sugar and Spice, Lucy and DesiTests and Requirements: Like Ham and Eggs, Sugar and Spice, Lucy and Desi
Tests and Requirements: Like Ham and Eggs, Sugar and Spice, Lucy and Desi
 
Agile Redefines Global Economics: What Recent Data Reveals
Agile Redefines Global Economics: What Recent Data RevealsAgile Redefines Global Economics: What Recent Data Reveals
Agile Redefines Global Economics: What Recent Data Reveals
 
Agile Program Management: Networks, Not Hierarchies
Agile Program Management: Networks, Not HierarchiesAgile Program Management: Networks, Not Hierarchies
Agile Program Management: Networks, Not Hierarchies
 
Agile and CMMI: Yes, They Can Work Together
Agile and CMMI: Yes, They Can Work TogetherAgile and CMMI: Yes, They Can Work Together
Agile and CMMI: Yes, They Can Work Together
 
Governing Agile Teams: Disciplined Strategies to Increase Agile Effectiveness
Governing Agile Teams: Disciplined Strategies to Increase Agile EffectivenessGoverning Agile Teams: Disciplined Strategies to Increase Agile Effectiveness
Governing Agile Teams: Disciplined Strategies to Increase Agile Effectiveness
 
Software Metrics: Taking the Guesswork Out of Software Projects
Software Metrics: Taking the Guesswork Out of Software ProjectsSoftware Metrics: Taking the Guesswork Out of Software Projects
Software Metrics: Taking the Guesswork Out of Software Projects
 
Designing Your Team and Organization for Innovation
Designing Your Team and Organization for InnovationDesigning Your Team and Organization for Innovation
Designing Your Team and Organization for Innovation
 
Test Managers: How You Can Really Make a Difference
Test Managers: How You Can Really Make a DifferenceTest Managers: How You Can Really Make a Difference
Test Managers: How You Can Really Make a Difference
 
Agile Success with Scrum: It’s All about the People
Agile Success with Scrum: It’s All about the PeopleAgile Success with Scrum: It’s All about the People
Agile Success with Scrum: It’s All about the People
 
Design for Testability: A Tutorial for Devs and Testers
Design for Testability: A Tutorial for Devs and TestersDesign for Testability: A Tutorial for Devs and Testers
Design for Testability: A Tutorial for Devs and Testers
 
Agile Testing: It’s a Team Sport
Agile Testing: It’s a Team SportAgile Testing: It’s a Team Sport
Agile Testing: It’s a Team Sport
 
Protection Poker: An Agile Security Game
Protection Poker: An Agile Security GameProtection Poker: An Agile Security Game
Protection Poker: An Agile Security Game
 
Data Warehouse Testing: It’s All about the Planning
Data Warehouse Testing: It’s All about the PlanningData Warehouse Testing: It’s All about the Planning
Data Warehouse Testing: It’s All about the Planning
 

Similaire à The Google Hacking Database: A Key Resource to Exposing Vulnerabilities

Kiran karnad rtc2014 ghdb-final
Kiran karnad rtc2014 ghdb-finalKiran karnad rtc2014 ghdb-final
Kiran karnad rtc2014 ghdb-finalRomania Testing
 
A Spark-Based Intelligent Assistant: Making Data Exploration in Natural Langu...
A Spark-Based Intelligent Assistant: Making Data Exploration in Natural Langu...A Spark-Based Intelligent Assistant: Making Data Exploration in Natural Langu...
A Spark-Based Intelligent Assistant: Making Data Exploration in Natural Langu...Databricks
 
Data Feed SEO for Affiliates by Will Critchlow
Data Feed SEO for Affiliates by Will CritchlowData Feed SEO for Affiliates by Will Critchlow
Data Feed SEO for Affiliates by Will Critchlowauexpo Conference
 
Data infrastructure architecture for medium size organization: tips for colle...
Data infrastructure architecture for medium size organization: tips for colle...Data infrastructure architecture for medium size organization: tips for colle...
Data infrastructure architecture for medium size organization: tips for colle...DataWorks Summit/Hadoop Summit
 
Tom Critchlow - Data Feed SEO & Advanced Site Architecture
Tom Critchlow - Data Feed SEO & Advanced Site ArchitectureTom Critchlow - Data Feed SEO & Advanced Site Architecture
Tom Critchlow - Data Feed SEO & Advanced Site Architectureauexpo Conference
 
Information Gathering with Google (c0c0n - India)
Information Gathering with Google (c0c0n - India)Information Gathering with Google (c0c0n - India)
Information Gathering with Google (c0c0n - India)Maximiliano Soler
 
2013 10-03-semantics-meetup-s buxton-mark_logic_pub
2013 10-03-semantics-meetup-s buxton-mark_logic_pub2013 10-03-semantics-meetup-s buxton-mark_logic_pub
2013 10-03-semantics-meetup-s buxton-mark_logic_pubStephen Buxton
 
Schema.org Structured data the What, Why, & How
Schema.org Structured data the What, Why, & HowSchema.org Structured data the What, Why, & How
Schema.org Structured data the What, Why, & HowRichard Wallis
 
Build Your Own World Class Directory Search From Alpha to Omega
Build Your Own World Class Directory Search From Alpha to OmegaBuild Your Own World Class Directory Search From Alpha to Omega
Build Your Own World Class Directory Search From Alpha to OmegaRavi Mynampaty
 
Searching the Web of Data (Tutorial)
Searching the Web of Data (Tutorial)Searching the Web of Data (Tutorial)
Searching the Web of Data (Tutorial)Gerard de Melo
 
FarisAloulSlides.ppt
FarisAloulSlides.pptFarisAloulSlides.ppt
FarisAloulSlides.pptaashnareddy1
 
(Re-) Discovering Lost Web Pages
(Re-) Discovering Lost Web Pages(Re-) Discovering Lost Web Pages
(Re-) Discovering Lost Web PagesMichael Nelson
 
A fresh new look into Information Gathering - OWASP Spain
A fresh new look into Information Gathering - OWASP SpainA fresh new look into Information Gathering - OWASP Spain
A fresh new look into Information Gathering - OWASP SpainChristian Martorella
 
Rental Cars and Industrialized Learning to Rank with Sean Downes
Rental Cars and Industrialized Learning to Rank with Sean DownesRental Cars and Industrialized Learning to Rank with Sean Downes
Rental Cars and Industrialized Learning to Rank with Sean DownesDatabricks
 
Search Analytics: Conversations with Your Customers
Search Analytics: Conversations with Your CustomersSearch Analytics: Conversations with Your Customers
Search Analytics: Conversations with Your Customersrichwig
 
YQL:: Select * from Internet
YQL:: Select * from InternetYQL:: Select * from Internet
YQL:: Select * from Internetdrgath
 

Similaire à The Google Hacking Database: A Key Resource to Exposing Vulnerabilities (20)

Kiran karnad rtc2014 ghdb-final
Kiran karnad rtc2014 ghdb-finalKiran karnad rtc2014 ghdb-final
Kiran karnad rtc2014 ghdb-final
 
3 google hacking
3 google hacking3 google hacking
3 google hacking
 
A Spark-Based Intelligent Assistant: Making Data Exploration in Natural Langu...
A Spark-Based Intelligent Assistant: Making Data Exploration in Natural Langu...A Spark-Based Intelligent Assistant: Making Data Exploration in Natural Langu...
A Spark-Based Intelligent Assistant: Making Data Exploration in Natural Langu...
 
Gray_Compass99.ppt
Gray_Compass99.pptGray_Compass99.ppt
Gray_Compass99.ppt
 
Data Feed SEO for Affiliates by Will Critchlow
Data Feed SEO for Affiliates by Will CritchlowData Feed SEO for Affiliates by Will Critchlow
Data Feed SEO for Affiliates by Will Critchlow
 
Data infrastructure architecture for medium size organization: tips for colle...
Data infrastructure architecture for medium size organization: tips for colle...Data infrastructure architecture for medium size organization: tips for colle...
Data infrastructure architecture for medium size organization: tips for colle...
 
Tom Critchlow - Data Feed SEO & Advanced Site Architecture
Tom Critchlow - Data Feed SEO & Advanced Site ArchitectureTom Critchlow - Data Feed SEO & Advanced Site Architecture
Tom Critchlow - Data Feed SEO & Advanced Site Architecture
 
Information Gathering with Google (c0c0n - India)
Information Gathering with Google (c0c0n - India)Information Gathering with Google (c0c0n - India)
Information Gathering with Google (c0c0n - India)
 
Google
GoogleGoogle
Google
 
2013 10-03-semantics-meetup-s buxton-mark_logic_pub
2013 10-03-semantics-meetup-s buxton-mark_logic_pub2013 10-03-semantics-meetup-s buxton-mark_logic_pub
2013 10-03-semantics-meetup-s buxton-mark_logic_pub
 
Schema.org Structured data the What, Why, & How
Schema.org Structured data the What, Why, & HowSchema.org Structured data the What, Why, & How
Schema.org Structured data the What, Why, & How
 
Build Your Own World Class Directory Search From Alpha to Omega
Build Your Own World Class Directory Search From Alpha to OmegaBuild Your Own World Class Directory Search From Alpha to Omega
Build Your Own World Class Directory Search From Alpha to Omega
 
Searching the Web of Data (Tutorial)
Searching the Web of Data (Tutorial)Searching the Web of Data (Tutorial)
Searching the Web of Data (Tutorial)
 
Google Searchology
Google SearchologyGoogle Searchology
Google Searchology
 
FarisAloulSlides.ppt
FarisAloulSlides.pptFarisAloulSlides.ppt
FarisAloulSlides.ppt
 
(Re-) Discovering Lost Web Pages
(Re-) Discovering Lost Web Pages(Re-) Discovering Lost Web Pages
(Re-) Discovering Lost Web Pages
 
A fresh new look into Information Gathering - OWASP Spain
A fresh new look into Information Gathering - OWASP SpainA fresh new look into Information Gathering - OWASP Spain
A fresh new look into Information Gathering - OWASP Spain
 
Rental Cars and Industrialized Learning to Rank with Sean Downes
Rental Cars and Industrialized Learning to Rank with Sean DownesRental Cars and Industrialized Learning to Rank with Sean Downes
Rental Cars and Industrialized Learning to Rank with Sean Downes
 
Search Analytics: Conversations with Your Customers
Search Analytics: Conversations with Your CustomersSearch Analytics: Conversations with Your Customers
Search Analytics: Conversations with Your Customers
 
YQL:: Select * from Internet
YQL:: Select * from InternetYQL:: Select * from Internet
YQL:: Select * from Internet
 

Plus de TechWell

Failing and Recovering
Failing and RecoveringFailing and Recovering
Failing and RecoveringTechWell
 
Instill a DevOps Testing Culture in Your Team and Organization
Instill a DevOps Testing Culture in Your Team and Organization Instill a DevOps Testing Culture in Your Team and Organization
Instill a DevOps Testing Culture in Your Team and Organization TechWell
 
Test Design for Fully Automated Build Architecture
Test Design for Fully Automated Build ArchitectureTest Design for Fully Automated Build Architecture
Test Design for Fully Automated Build ArchitectureTechWell
 
System-Level Test Automation: Ensuring a Good Start
System-Level Test Automation: Ensuring a Good StartSystem-Level Test Automation: Ensuring a Good Start
System-Level Test Automation: Ensuring a Good StartTechWell
 
Build Your Mobile App Quality and Test Strategy
Build Your Mobile App Quality and Test StrategyBuild Your Mobile App Quality and Test Strategy
Build Your Mobile App Quality and Test StrategyTechWell
 
Testing Transformation: The Art and Science for Success
Testing Transformation: The Art and Science for SuccessTesting Transformation: The Art and Science for Success
Testing Transformation: The Art and Science for SuccessTechWell
 
Implement BDD with Cucumber and SpecFlow
Implement BDD with Cucumber and SpecFlowImplement BDD with Cucumber and SpecFlow
Implement BDD with Cucumber and SpecFlowTechWell
 
Develop WebDriver Automated Tests—and Keep Your Sanity
Develop WebDriver Automated Tests—and Keep Your SanityDevelop WebDriver Automated Tests—and Keep Your Sanity
Develop WebDriver Automated Tests—and Keep Your SanityTechWell
 
Eliminate Cloud Waste with a Holistic DevOps Strategy
Eliminate Cloud Waste with a Holistic DevOps StrategyEliminate Cloud Waste with a Holistic DevOps Strategy
Eliminate Cloud Waste with a Holistic DevOps StrategyTechWell
 
Transform Test Organizations for the New World of DevOps
Transform Test Organizations for the New World of DevOpsTransform Test Organizations for the New World of DevOps
Transform Test Organizations for the New World of DevOpsTechWell
 
The Fourth Constraint in Project Delivery—Leadership
The Fourth Constraint in Project Delivery—LeadershipThe Fourth Constraint in Project Delivery—Leadership
The Fourth Constraint in Project Delivery—LeadershipTechWell
 
Resolve the Contradiction of Specialists within Agile Teams
Resolve the Contradiction of Specialists within Agile TeamsResolve the Contradiction of Specialists within Agile Teams
Resolve the Contradiction of Specialists within Agile TeamsTechWell
 
Pin the Tail on the Metric: A Field-Tested Agile Game
Pin the Tail on the Metric: A Field-Tested Agile GamePin the Tail on the Metric: A Field-Tested Agile Game
Pin the Tail on the Metric: A Field-Tested Agile GameTechWell
 
Agile Performance Holarchy (APH)—A Model for Scaling Agile Teams
Agile Performance Holarchy (APH)—A Model for Scaling Agile TeamsAgile Performance Holarchy (APH)—A Model for Scaling Agile Teams
Agile Performance Holarchy (APH)—A Model for Scaling Agile TeamsTechWell
 
A Business-First Approach to DevOps Implementation
A Business-First Approach to DevOps ImplementationA Business-First Approach to DevOps Implementation
A Business-First Approach to DevOps ImplementationTechWell
 
Databases in a Continuous Integration/Delivery Process
Databases in a Continuous Integration/Delivery ProcessDatabases in a Continuous Integration/Delivery Process
Databases in a Continuous Integration/Delivery ProcessTechWell
 
Mobile Testing: What—and What Not—to Automate
Mobile Testing: What—and What Not—to AutomateMobile Testing: What—and What Not—to Automate
Mobile Testing: What—and What Not—to AutomateTechWell
 
Cultural Intelligence: A Key Skill for Success
Cultural Intelligence: A Key Skill for SuccessCultural Intelligence: A Key Skill for Success
Cultural Intelligence: A Key Skill for SuccessTechWell
 
Turn the Lights On: A Power Utility Company's Agile Transformation
Turn the Lights On: A Power Utility Company's Agile TransformationTurn the Lights On: A Power Utility Company's Agile Transformation
Turn the Lights On: A Power Utility Company's Agile TransformationTechWell
 

Plus de TechWell (20)

Failing and Recovering
Failing and RecoveringFailing and Recovering
Failing and Recovering
 
Instill a DevOps Testing Culture in Your Team and Organization
Instill a DevOps Testing Culture in Your Team and Organization Instill a DevOps Testing Culture in Your Team and Organization
Instill a DevOps Testing Culture in Your Team and Organization
 
Test Design for Fully Automated Build Architecture
Test Design for Fully Automated Build ArchitectureTest Design for Fully Automated Build Architecture
Test Design for Fully Automated Build Architecture
 
System-Level Test Automation: Ensuring a Good Start
System-Level Test Automation: Ensuring a Good StartSystem-Level Test Automation: Ensuring a Good Start
System-Level Test Automation: Ensuring a Good Start
 
Build Your Mobile App Quality and Test Strategy
Build Your Mobile App Quality and Test StrategyBuild Your Mobile App Quality and Test Strategy
Build Your Mobile App Quality and Test Strategy
 
Testing Transformation: The Art and Science for Success
Testing Transformation: The Art and Science for SuccessTesting Transformation: The Art and Science for Success
Testing Transformation: The Art and Science for Success
 
Implement BDD with Cucumber and SpecFlow
Implement BDD with Cucumber and SpecFlowImplement BDD with Cucumber and SpecFlow
Implement BDD with Cucumber and SpecFlow
 
Develop WebDriver Automated Tests—and Keep Your Sanity
Develop WebDriver Automated Tests—and Keep Your SanityDevelop WebDriver Automated Tests—and Keep Your Sanity
Develop WebDriver Automated Tests—and Keep Your Sanity
 
Ma 15
Ma 15Ma 15
Ma 15
 
Eliminate Cloud Waste with a Holistic DevOps Strategy
Eliminate Cloud Waste with a Holistic DevOps StrategyEliminate Cloud Waste with a Holistic DevOps Strategy
Eliminate Cloud Waste with a Holistic DevOps Strategy
 
Transform Test Organizations for the New World of DevOps
Transform Test Organizations for the New World of DevOpsTransform Test Organizations for the New World of DevOps
Transform Test Organizations for the New World of DevOps
 
The Fourth Constraint in Project Delivery—Leadership
The Fourth Constraint in Project Delivery—LeadershipThe Fourth Constraint in Project Delivery—Leadership
The Fourth Constraint in Project Delivery—Leadership
 
Resolve the Contradiction of Specialists within Agile Teams
Resolve the Contradiction of Specialists within Agile TeamsResolve the Contradiction of Specialists within Agile Teams
Resolve the Contradiction of Specialists within Agile Teams
 
Pin the Tail on the Metric: A Field-Tested Agile Game
Pin the Tail on the Metric: A Field-Tested Agile GamePin the Tail on the Metric: A Field-Tested Agile Game
Pin the Tail on the Metric: A Field-Tested Agile Game
 
Agile Performance Holarchy (APH)—A Model for Scaling Agile Teams
Agile Performance Holarchy (APH)—A Model for Scaling Agile TeamsAgile Performance Holarchy (APH)—A Model for Scaling Agile Teams
Agile Performance Holarchy (APH)—A Model for Scaling Agile Teams
 
A Business-First Approach to DevOps Implementation
A Business-First Approach to DevOps ImplementationA Business-First Approach to DevOps Implementation
A Business-First Approach to DevOps Implementation
 
Databases in a Continuous Integration/Delivery Process
Databases in a Continuous Integration/Delivery ProcessDatabases in a Continuous Integration/Delivery Process
Databases in a Continuous Integration/Delivery Process
 
Mobile Testing: What—and What Not—to Automate
Mobile Testing: What—and What Not—to AutomateMobile Testing: What—and What Not—to Automate
Mobile Testing: What—and What Not—to Automate
 
Cultural Intelligence: A Key Skill for Success
Cultural Intelligence: A Key Skill for SuccessCultural Intelligence: A Key Skill for Success
Cultural Intelligence: A Key Skill for Success
 
Turn the Lights On: A Power Utility Company's Agile Transformation
Turn the Lights On: A Power Utility Company's Agile TransformationTurn the Lights On: A Power Utility Company's Agile Transformation
Turn the Lights On: A Power Utility Company's Agile Transformation
 

Dernier

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 

Dernier (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 

The Google Hacking Database: A Key Resource to Exposing Vulnerabilities

  • 1. T23 Concurrent Class 10/3/2013 3:00:00 PM "The Google Hacking Database: A Key Resource to Exposing Vulnerabilities" Presented by: Kiran Karnad Mimos Berhad Brought to you by: 340 Corporate Way, Suite 300, Orange Park, FL 32073 888-268-8770 ∙ 904-278-0524 ∙ sqeinfo@sqe.com ∙ www.sqe.com
  • 2. Kiran Karnad MIMOS Berhad After more than sixteen years in software testing and implementation, Kiran Karnad found his true calling in penetration testing. Proudly calling himself a hands-on lead for information security, Kiran has worked with several Fortune 500 companies and mentored software test teams in multiple geographies. Currently leading the functional and security efforts at MIMOS, Kiran strives to identify process improvement opportunities throughout the organization and to implement them effectively.
  • 3. 9/19/2013 The Google Hacking Database Product Quality and Reliability Engineering Team – Kiran Karnad, MIMOS Bhd A Key Resource to exposing vulnerabilities 1
  • 5. 9/19/2013 What’s This All About? Google & Bing Basics - OSINT Basic, Phrase, Advanced Search What’s Google Hacks All About? Sample Hacks Script for OS INT In the Recent Past If you are not hacked, you are not important! 3
  • 6. 9/19/2013 What all can be hacked Network Hardware hacking Wireless Social Engineering Mobile Lock Picking Web hacking OS INT What you don’t know might hurt… 4
  • 7. 9/19/2013 OSINT – Let’s define Intelligence collected from public sources • Google • Social Engines • Details on next slide OSINT Communities • • • • Government – FBI, CBI etc Military – Defence Intel Agency Homeland Security Business – Commercial, Competitor INT, BI • Anonymous & LulzSec– shodan, GHDB OSINT – Some methods 5
  • 8. 9/19/2013 GOOGLE HACKING It’s what you expose How Google Works 6
  • 9. 9/19/2013 Search Types Supported Basic Search Advanced Operators Phrase Search BASIC SEARCH The most used type of search 7
  • 10. 9/19/2013 So InSenSItiVe 5W 1H – Google doesn’t mind 8
  • 11. 9/19/2013 Mark my Ten Words, that’s it The reason for the previous results… 9
  • 12. 9/19/2013 * Avoiding * 10-word limitation * And I’m Always There 10
  • 13. 9/19/2013 Now, try this… +the * * Search Types General Search • • • • • Not cAsE seNSitiVE No more than 10 keywords in a search Google ignores “a”, 5w1h, this, to, we AND is always implied Date of birth of Hugh Jackman Phrase Search • • • • “Use quotes” Use + to force a term and – to exclude No space follows these signs See the SERPs for with and without quotes 11
  • 14. 9/19/2013 PHRASE SEARCH “More shrewd searches” “Is there a difference?” 12
  • 15. 9/19/2013 Force The Plus, Exclude The Minus OR vs. AND 13
  • 16. 9/19/2013 OR | or A quick Recap Operators • Logical • OR – case sensitive • Mathematical • + (must) and – (not) have special meaning • No Stemming • OK: “It’s the end of the * as we know it” • KO: “American Psycho*” – wont give psychology or psychophysics • * represents a word, not the completion of a word • Period is a single character wild card • Let’s try some 14
  • 17. 9/19/2013 ADVANCED OPERATORS Stop No More! Know Thy Web Page 15
  • 19. 9/19/2013 filetype: Numrange: Let’s try one query: http://www.google.com/#q=100000000..999999999+filetype:sql Advanced Operators = advanced queries List of most used Advanced operators Operator:search_term – no space after and before the : • Intitle: • Inurl: • Intext: • Inanchor: • Filetype: • Continued… 17
  • 20. 9/19/2013 Advanced Operators contd… More Advanced Operators • Numrange: • Daterange: • Site: • Related: • Cache: • Link: Try a space between the operator and the term and see the results count T1ll n0w, w3 534Rch3d… B451c Phr453 0p3r4t0r5 Fr0m n0w, w3 H4ck 18
  • 21. 9/19/2013 Intitle:index.of server.at So What? • What can a hacker do with this info? – Go to http://www.cvedetails.com – Check vulnerabilities for Apache 2.2.16 – Trigger Metasploit 19
  • 22. 9/19/2013 Intitle:index.of server.at site:aol.com • Linux server installer files are obtained Files on AOL server. Files on MIT server. Hyped Music • Query is: Intitle:index.of name size • Check out the site hypem.com in SERPS Try directory traversal from any page, you can download tons of music! Their business is selling music online! 20
  • 23. 9/19/2013 Our Learning Till Now… Directory Listings Show server version information Useful for an attacker intitle:index.of server.at intitle:index.of server.at site:aol.com Finding Directory Listings intitle:index.of "parent directory" intitle:index.of name size Piracy – MP3s • Intitle:index.of mp3 jackson AND iso kaspersky – Remember, Google stems! 21
  • 24. 9/19/2013 Piracy – MP3s • Intitle:index.of mp3 jackson – Yields 20+ pages of songs in mp3 format – No need to wait for website instructions! – Remember, Google stems! • Intitle:index.of iso kaspersky – Gets the AV installers from various websites – Most of them with professional key or cracks – Even beta versions are available More Piracy – ISO • Inurl:microsoft intitle:index.of filetype:iso – Get MS ISO files from everywhere! 22
  • 25. 9/19/2013 Johnny’s Disclaimer Listing all the index pages… Each of these pages can be hacked since the hacker knows the version and type for the App Server, Database & the Web Server 23
  • 26. 9/19/2013 Listing all the subdomains HR Intranet with details on… Some details a hacker gets from here: • HR Forms and Policies • New Staff Info • Consultation • Health Benefits • Salary packaging • Contact Person • Office and Meeting Room Layout • Emails and Phones • Training • Pay Calculation inurl:intranet intitle:intranet +intext:"human resources" 24
  • 27. 9/19/2013 PuTTY SSH Logs with juicy info Usernames and Passwords Results here: d:officialwhite papersstarwest2013uname-pwd.xls And uname-pwd2.xls 25
  • 28. 9/19/2013 SQL Injectable Websites The first query brought 38K results Just by reordering, we got 3.3 Mil in lesser time! Each of these can be hacked with SQLI and all these are just PHP! Our Learning Till Now… Combining Inurl:microsoft.com –inurl:www.microsoft.com operators does the Inurl:intranet intitle:intranet +intext:”human resource” magic Filetype:log username putty inurl:admin intext:username= AND email= AND password= OR pass= filetype:xls intitle:index.of inurl:admin “Filetype:php inurl:id=“ 26
  • 29. 9/19/2013 Database Querying Query to get mySQL connection details This also enumerates all the tables via the SQL So you know the connection details, IP and the tables! Login, Password, Website – All in One! The Query: filetype:xls "username | password“ One of the results on page 1: http://teachersites.schoolworld.com/.../files/teachers%20passwords.xls Number of results: 46500 27
  • 30. 9/19/2013 Login, Password, Website – All in One! The Query: filetype:xls "username | password“ One of the results on page 1: http://teachersites.schoolworld.com/.../files/teachers%20passwords.xls Number of results: 46500 A Quick Q What do you think this query does? inurl:"passes" OR inurl:"passwords" OR inurl:"credentials" -search download -techsupt -git -games -gz -bypass -exe filetype:txt @yahoo.com OR @gmail OR @hotmail OR @rediff 28
  • 31. 9/19/2013 Our Learning Till Now… “filetype:phps mysql_connect” filetype:xls "username | password“ inurl:"passes" OR inurl:"passwords" OR inurl:"credentials" search -download -techsupt -git -games -gz -bypass -exe filetype:txt @yahoo.com OR @gmail OR @hotmail OR @rediff NOT BORED YET? Let’s dig in some more! 29
  • 32. 9/19/2013 Which sites have been hacked? All hacked sites have a r00t.php inurl:”r00t.php” The Logs might help Checking hacked website logs for more info allintext:”fs-admin.php” 30
  • 33. 9/19/2013 Must Tries Hacked websites  inurl:”r00t.php” Hacked logs  allintext:”fs-admin.php” Finding login for portals  intitle:admin intitle:login SSH usernames  filetype:log username putty Getting user list  Inurl:admin inurl:userlist Passwords!  filetype:pass pass intext:userid SQL Passwords  filetype:sql password Usernames  inurl:admin filetype:xls Passwords  inurl:password filetype:xls More!!  inurl:passwd filetype:xls (pdf, doc, mdb) More Stuff! intitle:"Index of" passwords modified allinurl:auth_user_file.txt "access denied for user" "using password“ "A syntax error has occurred" filetype:ihtml allinurl: admin mdb "ORA-00921: unexpected end of SQL command“ inurl:passlist.txt "Index of /backup“ "Chatologica MetaSearch" "stack tracking:" 31
  • 34. 9/19/2013 Listings of what you want Change the word after the parent directory to what you want "parent directory " DVDRip -xxx -html -htm -php -shtml opendivx -md5 -md5sums "parent directory "Xvid -xxx -html -htm -php -shtml opendivx -md5 -md5sums "parent directory " Gamez -xxx -html -htm -php -shtml opendivx -md5 -md5sums "parent directory " MP3 -xxx -html -htm -php -shtml opendivx -md5 -md5sums "parent directory " Name of Singer or album” -xxx –html htm -php -shtml -opendivx md5 -md5sums CGI Scanner Google can be used as a CGI scanner. The index.of or inurl searchs are good tools to find vulnerable targets. For example, a Google search for this: allinurl:/random_banner/index.cgi Hurray! There are only four two now… the broken random_banner program will cough up any file on that web server, including the password file… 32
  • 35. 9/19/2013 Passwords "# -FrontPage-" inurl:service.pwd FrontPage passwords.. very nice clean search results listing !! This searches the password for "Website Access Analyzer", a Japanese software that creates web statistics. For those who can read Japanese, check out the author's site at: This is a query to get inline passwords from search engines (not just Google), you must type in the query followed with the domain name without the .com or .net Another way is by just typing "AutoCreate=TRUE password=*" http://www.coara.or.jp/~passy/ "http://*:*@www" domainname "http://*:*@www" gamespy or http://*:*@www”gamespy "http://bob:bob@www" More Passwords – IRC and Access "sets mode: +k" This search reveals channel keys (passwords) on IRC as revealed from IRC chat logs. These are eggdrop config files. Avoiding a fullblown discussion about eggdrops and IRC bots, suffice it to say that this file contains usernames and passwords for IRC users. eggdrop filetype:user user allinurl: admin mdb Not all of these pages are administrator's access databases containing usernames, passwords and other sensitive information, but many are! 33
  • 36. 9/19/2013 MySQL Passwords & ETC directory intitle:"Index of" config.php This search brings up sites with "config.php" files. To skip the technical discussion, this configuration file contains both a username and a password for an SQL database. Most sites with forums run a PHP message base. This file gives you the keys to that forum, including FULL ADMIN access to the database. intitle:index.of.etc This search gets you access to the etc directory, where many, many, many types of password files can be found. This link is not as reliable, but crawling etc directories can be really fun! Passwords in backup files filetype:bak inurl:"htaccess|passwd|shadow|htusers" This will search for backup files (*.bak) created by some editors or even by the administrator himself (before activating a new version). Every attacker knows that changing the extension of a file on a web server can have ugly consequences. 34
  • 37. 9/19/2013 Serial Numbers Let's pretend you need a serial number for Windows XP Pro. In the Google search bar type in just like this - "Windows XP Professional" 94FBR the key is the 94FBR code.. it was included with many MS Office registration codes so this will help you dramatically reduce the amount of 'fake' sites (usually pornography) that trick you. Or if you want to find the serial for WinZip 8.1 "WinZip 8.1" 94FBR Credit Cards!! Number Ranges to find Credit Card, SSN, Account Numbers Numbers Amex: (15 digits) 300000000000000..399999999999999 MC: (16 digits) 5178000000000000..5178999999999999 Visa : (16 digits) 4356000000000000..4356999999999999 35
  • 39. 9/19/2013 CC TV Control The first query produced 3000+ results! Let’s click on one of the SERPS Pan, scan, tilt & zoom You can control the camera Many more queries possible for CCTV inurl:LvAppl intitle:liveapplet inurl:"viewerframe?mode=motion" intitle:"Live View / - AXIS" intitle:"snc-rz30 home" inurl:indexFrame.shtml "Axis Video Server“ So where is the database? http://www.exploit-db.com/google-dorks/ 37
  • 40. 9/19/2013 OK, I’M CONVINCED So, how do I secure myself? Securing ourselves from Google Hackers 38
  • 41. 9/19/2013 SOME ADDITIONAL INFO To Inspire You To Be A Security Tester BHDB 39
  • 42. 9/19/2013 How Vulnerability Scanners work Scanner Limitations If the DB doesn’t have it, it won’t detect it – purely signature based Authentication by scanner is not trust-worthy Lacks IDS detection bypass No realistic fuzzing possible Cant replace manual SQL Injection No intelligence in detecting attack vectors and surfaces Working with custom apps is a limitation Can identify points of weakness but can’t anticipate complex attack schemes Cant handle asynchronous & offline attack vectors Limitations should be clearly understood Can’t detect logic flaws, weak cryptographic functions, information leakage etc 40
  • 43. 9/19/2013 WHERE DO ACTUAL HACKS COME FROM So, who are these hackers? Real-life hacker categories 41
  • 44. 9/19/2013 THE TAKE-AWAY Top Simple Security Searches that Work! Queries Combine searches with “site:” operator Intitle:index.of  Leads to a direct hack intitle:intranet | help.desk Filetype:xls username OR password Inurl:admin inurl:userlist 42
  • 45. 9/19/2013 More Queries… Inurl:admin OR inurl:password filetype:xls (csv) Inurl:lvappl Live Applet site:*.* inurl:intranet intitle:intranet +intext:"human resources" Filetype:log username putty So where is the GH “database”? Top Ten Searches PDF (http://tinyurl.com/starwestghdb2013) AUTOMATION Automating the Google Searches 43
  • 46. 9/19/2013 Search API OS Script Google Web Search API Wsdl deprecated Now Custom Search APIs used Google controls the use: https://developers.google.com/web-search/terms Open source script: http://pastebin.com/uE5wJWMy 1. Download the script 2. Rename as .JS 3. Create data file 4. Call in any HTML http://www.exploit-db.com/google-dorks/ Tools within OS Systems Open Source penetration testing platforms such as Backtrack and Kali support tools for Google hacking. They are: • Exploit-DB • Searchsploit • Goodork • Websploit • Social Engineering Toolkit • Burp Suite (decoder) 44