SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Downloaden Sie, um offline zu lesen
Outline
                          Google Hacking
                    Cryptographic Secrets
                         Automatic Tools
                        Countermeasures
                     Google Code Search
                              Conclusion




 Google Hacking for Cryptographic Secrets

                          Emin ˙
                               Islam Tatlı
               tatli@th.informatik.uni-mannheim.de

       Department of Computer Science, University of Mannheim


       NEC Research-Heidelberg, 10 November 2006



     ˙
Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                  Google Hacking
                            Cryptographic Secrets
                                 Automatic Tools
                                Countermeasures
                             Google Code Search
                                      Conclusion


Outline


  1   Google Hacking

  2   Cryptographic Secrets

  3   Automatic Tools

  4   Countermeasures

  5   Google Code Search



             ˙
        Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                Google Hacking
                          Cryptographic Secrets   Motivation
                               Automatic Tools    Advanced Search Parameters
                              Countermeasures     Examples of Google Hacking
                           Google Code Search
                                    Conclusion


Motivation

     Google has the index size over 20 billion entries
           try to search -"fgkdfgjisdfgjsiod"
     Hackers use google to search vulnerabilities
           called Google Hacking
           vulnerable servers, files and applications, files containing
           usernames-passwords, sensitive directories, online devices, etc.
           Google Hacking Database [1] ⇒ 1468 entries in 14 groups (by
           October 2006)
     What about Cryptographic Secrets?
     In this talk, we find out cryptographic secrets with google


           ˙
      Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                Google Hacking
                          Cryptographic Secrets   Motivation
                               Automatic Tools    Advanced Search Parameters
                              Countermeasures     Examples of Google Hacking
                           Google Code Search
                                    Conclusion


Advanced Search Parameters



     [all]inurl
     [all]intext
     [all]intitle
     site
     ext, filetype
     symbols: - . * |




           ˙
      Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                Google Hacking
                          Cryptographic Secrets   Motivation
                               Automatic Tools    Advanced Search Parameters
                              Countermeasures     Examples of Google Hacking
                           Google Code Search
                                    Conclusion


Examples of Google Hacking I

  Unauthenticated programs
  "PHP Version" intitle:phpinfo inurl:info.php

  Applications containing SQL injection & path modification
  vulnerabilities
       "advanced guestbook * powered" inurl:addentry.php
      intitle:"View Img" inurl:viewimg.php

  Security Scanner Reports
  "Assessment Report" "nessus" filetype:pdf

           ˙
      Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                Google Hacking
                          Cryptographic Secrets   Motivation
                               Automatic Tools    Advanced Search Parameters
                              Countermeasures     Examples of Google Hacking
                           Google Code Search
                                    Conclusion


Examples of Google Hacking II


  Private data listings
       "index of private|privat|¨zel"
                                o
     phone address email intitle:"Curriculum Vitae"

  Database applications&error files
      "Welcome to phpmyadmin ***" "running on * as
      root@*" intitle:phpmyadmin
     "mysql error with query"



           ˙
      Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                Google Hacking
                          Cryptographic Secrets   Motivation
                               Automatic Tools    Advanced Search Parameters
                              Countermeasures     Examples of Google Hacking
                           Google Code Search
                                    Conclusion


Examples of Google Hacking III



  Online Devices
       inurl:"hp/device/this.LCDispatcher"
      intitle:liveapplet inurl:LvAppl
      "Please wait....." intitle:"SWW link"




           ˙
      Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                                     Hashed Passwords
                                   Google Hacking
                                                     Secret Keys
                             Cryptographic Secrets
                                                     Public Keys
                                  Automatic Tools
                                                     Private Keys
                                 Countermeasures
                                                     Encrypted Messages
                              Google Code Search
                                                     Signed Messages
                                       Conclusion


Cryptographic Secrets


    1   Hashed Passwords
    2   Secret Keys
    3   Public Keys
    4   Private Keys
    5   Encrypted Messages
    6   Signed Messages




              ˙
         Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                                  Hashed Passwords
                                Google Hacking
                                                  Secret Keys
                          Cryptographic Secrets
                                                  Public Keys
                               Automatic Tools
                                                  Private Keys
                              Countermeasures
                                                  Encrypted Messages
                           Google Code Search
                                                  Signed Messages
                                    Conclusion


Hashed Passwords

  Cleartext passwords
       ext:log inurl:password

  Hashed passwords in dump files
      "create table" "insert into"
      "pass|passwd|password" (ext:sql | ext:dump |
      ext:dmp)
     intext:"password|pass|passwd"
     intext:"md5|sha1|crypt" (ext:sql | ext:dump |
     ext:dmp)


           ˙
      Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                                  Hashed Passwords
                                Google Hacking
                                                  Secret Keys
                          Cryptographic Secrets
                                                  Public Keys
                               Automatic Tools
                                                  Private Keys
                              Countermeasures
                                                  Encrypted Messages
                           Google Code Search
                                                  Signed Messages
                                    Conclusion


Secret Keys



  Secret keys in Kerberos
      inurl:"kdc.conf" ext:conf
     inurl:"slave datatrans" OR inurl:"from master"

  Java keystores
      keystore ext:ks




           ˙
      Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                                  Hashed Passwords
                                Google Hacking
                                                  Secret Keys
                          Cryptographic Secrets
                                                  Public Keys
                               Automatic Tools
                                                  Private Keys
                              Countermeasures
                                                  Encrypted Messages
                           Google Code Search
                                                  Signed Messages
                                    Conclusion


Public Keys


  PGP public keys
     "BEGIN PGP PUBLIC KEY BLOCK" (ext:txt | ext:asc |
     ext:key)

  Public keys in certificates
      "Certificate:Data:Version" "BEGIN CERTIFICATE"
      (ext:crt | ext:asc | ext:txt)




           ˙
      Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                                  Hashed Passwords
                                Google Hacking
                                                  Secret Keys
                          Cryptographic Secrets
                                                  Public Keys
                               Automatic Tools
                                                  Private Keys
                              Countermeasures
                                                  Encrypted Messages
                           Google Code Search
                                                  Signed Messages
                                    Conclusion


Private Keys



  PGP private keys
     "BEGIN (DSA|RSA)" ext:key
      "BEGIN PGP PRIVATE KEY BLOCK" inurl:txt|asc
      "index of" "secring.gpg"




           ˙
      Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                                  Hashed Passwords
                                Google Hacking
                                                  Secret Keys
                          Cryptographic Secrets
                                                  Public Keys
                               Automatic Tools
                                                  Private Keys
                              Countermeasures
                                                  Encrypted Messages
                           Google Code Search
                                                  Signed Messages
                                    Conclusion


Encrypted Messages


  PGP encrypted files
     -"public|pubring|pubkey|
     signature|pgp|and|or|release" ext:gpg

  More encrypted files
      -intext:"and" (ext:enc | ext:axx)

  XML encrypted elements
     "ciphervalue" ext:xml


           ˙
      Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                                  Hashed Passwords
                                Google Hacking
                                                  Secret Keys
                          Cryptographic Secrets
                                                  Public Keys
                               Automatic Tools
                                                  Private Keys
                              Countermeasures
                                                  Encrypted Messages
                           Google Code Search
                                                  Signed Messages
                                    Conclusion


Signed Messages

  Signed emails
      "BEGIN PGP SIGNED MESSAGE" "From" "Date"
      "Subject" (ext:eml | ext:txt | ext:asc)

  File signatures
       -"and|or" "BEGIN PGP SIGNATURE" ext:asc

  PGP signed messages
     "BEGIN PGP SIGNED MESSAGE" -"From" (ext:txt |
     ext:asc | ext:xml)


           ˙
      Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                  Google Hacking    Gooscan
                            Cryptographic Secrets   Sitedigger
                                 Automatic Tools    Goolink
                                Countermeasures     AdvancedDork
                             Google Code Search     Google Advanced Operations Toolbar
                                      Conclusion


Automatic Tools



   1   Gooscan
   2   Sitedigger
   3   Goolink
   4   AdvancedDork
   5   Google Advanced Operation Toolbar




             ˙
        Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                Google Hacking    Gooscan
                          Cryptographic Secrets   Sitedigger
                               Automatic Tools    Goolink
                              Countermeasures     AdvancedDork
                           Google Code Search     Google Advanced Operations Toolbar
                                    Conclusion


Gooscan [7]



     a Unix/Linux script to check google hacking queries against
     your system
     uses GHD [1]
     to execute:
     $ gooscan -t www.google.de -q "BEGIN (DSA|RSA)
     ext:key" -s de -o output.html




           ˙
      Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                 Google Hacking    Gooscan
                           Cryptographic Secrets   Sitedigger
                                Automatic Tools    Goolink
                               Countermeasures     AdvancedDork
                            Google Code Search     Google Advanced Operations Toolbar
                                     Conclusion


Sitedigger [6]



    free from Foundstone
    company
    supports both GHD and
    Foundstone’s own hacking
    database
    for a given host, all entries in
    the database are queried



            ˙
       Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                 Google Hacking    Gooscan
                           Cryptographic Secrets   Sitedigger
                                Automatic Tools    Goolink
                               Countermeasures     AdvancedDork
                            Google Code Search     Google Advanced Operations Toolbar
                                     Conclusion


Goolink [5]




    Goolink queries Google for a
    particular chosen search from
    GHD




            ˙
       Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                Google Hacking    Gooscan
                          Cryptographic Secrets   Sitedigger
                               Automatic Tools    Goolink
                              Countermeasures     AdvancedDork
                           Google Code Search     Google Advanced Operations Toolbar
                                    Conclusion


AdvancedDork [2]




   not specific to google
   hacking
   a Firefox extension for google
   searches




           ˙
      Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                Google Hacking    Gooscan
                          Cryptographic Secrets   Sitedigger
                               Automatic Tools    Goolink
                              Countermeasures     AdvancedDork
                           Google Code Search     Google Advanced Operations Toolbar
                                    Conclusion


Google Advanced Operations Toolbar [3]
     a Firefox extension
     provides a shortcut of Google’s advanced search functions




           ˙
      Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                  Google Hacking
                            Cryptographic Secrets
                                 Automatic Tools
                                Countermeasures
                             Google Code Search
                                      Conclusion


Security Countermeasures




   1   Use automatic tools to check your system
   2   Use Robot Exclusion Standart (robots.txt)
   3   Install and manage Google Honeypot [4]




             ˙
        Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                Google Hacking
                          Cryptographic Secrets
                               Automatic Tools
                              Countermeasures
                           Google Code Search
                                    Conclusion


Google Code Search




     search keywords within source files
     (www.google.com/codesearch)
     find application bugs (e.g. sql injection, xss injection, buffer
     overflows, etc.) in the source files




           ˙
      Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                Google Hacking
                          Cryptographic Secrets
                               Automatic Tools
                              Countermeasures
                           Google Code Search
                                    Conclusion


Conclusion




     Cryptography requires secrets to be kept secret
     Google indexes your secrets and makes public
     Take the required security countermeasures and protect your
     secrets




           ˙
      Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                 Google Hacking
                           Cryptographic Secrets
                                Automatic Tools
                               Countermeasures
                            Google Code Search
                                     Conclusion


References I


     Google Hacking Database. http://johnny.ihackstuff.com
     AdvancedDork- A Firefox extension for google searches.
     http://johnny.ihackstuff.com
     Google Advanced Operation Toolbar.
     https://addons.mozilla.org/firefox/1258/
     Google Hack Honeypot Project. http://ghh.sourceforge.net
     Goolink- Security Scanner.
     www.ghacks.net/2005/11/23/goolink-scanner-beta-preview/


            ˙
       Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                 Google Hacking
                           Cryptographic Secrets
                                Automatic Tools
                               Countermeasures
                            Google Code Search
                                     Conclusion


References II




      SiteDigger v2.0 - Information Gathering Tool.
      http://www.foundstone.com
      Gooscan - Google Security Scanner.
      http://johnny.ihackstuff.com




            ˙
       Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets

Weitere ähnliche Inhalte

Andere mochten auch

Patent Risk and Countermeasures Related to Open Management in Interaction Design
Patent Risk and Countermeasures Related to Open Management in Interaction DesignPatent Risk and Countermeasures Related to Open Management in Interaction Design
Patent Risk and Countermeasures Related to Open Management in Interaction DesignYosuke Sakai
 
Brigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga GomesBrigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga GomesLuis Nassif
 
Brigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga GomesBrigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga GomesLuis Nassif
 
Apresentação Cyberpunk
Apresentação CyberpunkApresentação Cyberpunk
Apresentação CyberpunkOrlando Simões
 
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresSkyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresAirTight Networks
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasuresJorge Sebastiao
 
Dstl Medical Countermeasures for Dangerous Pathogens
Dstl   Medical Countermeasures for Dangerous PathogensDstl   Medical Countermeasures for Dangerous Pathogens
Dstl Medical Countermeasures for Dangerous Pathogenswarwick_amr
 
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...Jeremiah Grossman
 
VoIP: Attacks & Countermeasures in the Corporate World
VoIP: Attacks & Countermeasures in the Corporate WorldVoIP: Attacks & Countermeasures in the Corporate World
VoIP: Attacks & Countermeasures in the Corporate WorldJason Edelstein
 
Bone Loss in Long-Duration Spaceflight: Measurements and Countermeasures
Bone Loss in Long-Duration Spaceflight: Measurements and CountermeasuresBone Loss in Long-Duration Spaceflight: Measurements and Countermeasures
Bone Loss in Long-Duration Spaceflight: Measurements and CountermeasuresAmerican Astronautical Society
 
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011International Atomic Energy Agency
 
Cehv8 module 01 introduction to ethical hacking
Cehv8 module 01 introduction to ethical hackingCehv8 module 01 introduction to ethical hacking
Cehv8 module 01 introduction to ethical hackingpolichen
 
Penetration Test (Teste de invasão) – Saiba como ser um Hacker ético na pratica
Penetration Test (Teste de invasão) – Saiba como ser um Hacker ético na praticaPenetration Test (Teste de invasão) – Saiba como ser um Hacker ético na pratica
Penetration Test (Teste de invasão) – Saiba como ser um Hacker ético na praticaCampus Party Brasil
 
Digital Astroturfing: Definition, typology, and countermeasures.
Digital Astroturfing: Definition, typology, and countermeasures.Digital Astroturfing: Definition, typology, and countermeasures.
Digital Astroturfing: Definition, typology, and countermeasures.Marko Kovic
 
Return oriented programming
Return oriented programmingReturn oriented programming
Return oriented programminghybr1s
 
Iis Security Programming Countermeasures
Iis Security Programming CountermeasuresIis Security Programming Countermeasures
Iis Security Programming Countermeasuresguestc27cd9
 
Designing Countermeasures For Tomorrows Threats
Designing Countermeasures For Tomorrows ThreatsDesigning Countermeasures For Tomorrows Threats
Designing Countermeasures For Tomorrows ThreatsDarwish Ahmad
 

Andere mochten auch (20)

Patent Risk and Countermeasures Related to Open Management in Interaction Design
Patent Risk and Countermeasures Related to Open Management in Interaction DesignPatent Risk and Countermeasures Related to Open Management in Interaction Design
Patent Risk and Countermeasures Related to Open Management in Interaction Design
 
Brigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga GomesBrigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga Gomes
 
Formulario 3C
Formulario 3CFormulario 3C
Formulario 3C
 
Brigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga GomesBrigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga Gomes
 
Apresenta cyber (2)
Apresenta cyber (2)Apresenta cyber (2)
Apresenta cyber (2)
 
Apresentação Cyberpunk
Apresentação CyberpunkApresentação Cyberpunk
Apresentação Cyberpunk
 
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresSkyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Dstl Medical Countermeasures for Dangerous Pathogens
Dstl   Medical Countermeasures for Dangerous PathogensDstl   Medical Countermeasures for Dangerous Pathogens
Dstl Medical Countermeasures for Dangerous Pathogens
 
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
 
Seminar Presentation
Seminar PresentationSeminar Presentation
Seminar Presentation
 
VoIP: Attacks & Countermeasures in the Corporate World
VoIP: Attacks & Countermeasures in the Corporate WorldVoIP: Attacks & Countermeasures in the Corporate World
VoIP: Attacks & Countermeasures in the Corporate World
 
Bone Loss in Long-Duration Spaceflight: Measurements and Countermeasures
Bone Loss in Long-Duration Spaceflight: Measurements and CountermeasuresBone Loss in Long-Duration Spaceflight: Measurements and Countermeasures
Bone Loss in Long-Duration Spaceflight: Measurements and Countermeasures
 
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011
 
Cehv8 module 01 introduction to ethical hacking
Cehv8 module 01 introduction to ethical hackingCehv8 module 01 introduction to ethical hacking
Cehv8 module 01 introduction to ethical hacking
 
Penetration Test (Teste de invasão) – Saiba como ser um Hacker ético na pratica
Penetration Test (Teste de invasão) – Saiba como ser um Hacker ético na praticaPenetration Test (Teste de invasão) – Saiba como ser um Hacker ético na pratica
Penetration Test (Teste de invasão) – Saiba como ser um Hacker ético na pratica
 
Digital Astroturfing: Definition, typology, and countermeasures.
Digital Astroturfing: Definition, typology, and countermeasures.Digital Astroturfing: Definition, typology, and countermeasures.
Digital Astroturfing: Definition, typology, and countermeasures.
 
Return oriented programming
Return oriented programmingReturn oriented programming
Return oriented programming
 
Iis Security Programming Countermeasures
Iis Security Programming CountermeasuresIis Security Programming Countermeasures
Iis Security Programming Countermeasures
 
Designing Countermeasures For Tomorrows Threats
Designing Countermeasures For Tomorrows ThreatsDesigning Countermeasures For Tomorrows Threats
Designing Countermeasures For Tomorrows Threats
 

Ähnlich wie Google Hacking for Cryptographic Secrets

AI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for ThoughtAI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for ThoughtNUS-ISS
 
DeepLocker - Concealing Targeted Attacks with AI Locksmithing
DeepLocker - Concealing Targeted Attacks with AI LocksmithingDeepLocker - Concealing Targeted Attacks with AI Locksmithing
DeepLocker - Concealing Targeted Attacks with AI LocksmithingPriyanka Aash
 
Ethical Hacking Workshop Presentation
Ethical Hacking Workshop PresentationEthical Hacking Workshop Presentation
Ethical Hacking Workshop PresentationDeepak Handke
 
Internet Security for Creative Professionals
Internet Security for Creative ProfessionalsInternet Security for Creative Professionals
Internet Security for Creative ProfessionalsDave LaFontaine
 
Crypto failures every developer should avoid
Crypto failures every developer should avoidCrypto failures every developer should avoid
Crypto failures every developer should avoidOwaspCzech
 
Crypto failures every developer should avoid
Crypto failures every developer should avoidCrypto failures every developer should avoid
Crypto failures every developer should avoidFilip Šebesta
 
Hacking with Skynet - How AI is Empowering Adversaries
Hacking with Skynet - How AI is Empowering AdversariesHacking with Skynet - How AI is Empowering Adversaries
Hacking with Skynet - How AI is Empowering AdversariesGTKlondike
 
Threat hunting in cyber world
Threat hunting in cyber worldThreat hunting in cyber world
Threat hunting in cyber worldAkash Sarode
 
Nagios Conference 2011 - Jared Bird - Using Nagios As A Security Tool
Nagios Conference 2011 - Jared Bird - Using Nagios As A Security ToolNagios Conference 2011 - Jared Bird - Using Nagios As A Security Tool
Nagios Conference 2011 - Jared Bird - Using Nagios As A Security ToolNagios
 
fucking shit
fucking shitfucking shit
fucking shiteyalrav
 
Ethical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxEthical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxFarhanaMariyam1
 
Password Cracking
Password CrackingPassword Cracking
Password CrackingSagar Verma
 
Security for Data Scientists
Security for Data ScientistsSecurity for Data Scientists
Security for Data ScientistsDavid Arcos
 
Password hacking
Password hackingPassword hacking
Password hackingMr. FM
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical HackingDivyank Jindal
 
Angelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Angelo Alviar OSINT 101 Presentation - Forensics and Security TechnologyAngelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Angelo Alviar OSINT 101 Presentation - Forensics and Security TechnologyAngelo Alviar
 

Ähnlich wie Google Hacking for Cryptographic Secrets (20)

AI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for ThoughtAI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for Thought
 
DeepLocker - Concealing Targeted Attacks with AI Locksmithing
DeepLocker - Concealing Targeted Attacks with AI LocksmithingDeepLocker - Concealing Targeted Attacks with AI Locksmithing
DeepLocker - Concealing Targeted Attacks with AI Locksmithing
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking Workshop Presentation
Ethical Hacking Workshop PresentationEthical Hacking Workshop Presentation
Ethical Hacking Workshop Presentation
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Internet Security for Creative Professionals
Internet Security for Creative ProfessionalsInternet Security for Creative Professionals
Internet Security for Creative Professionals
 
Crypto failures every developer should avoid
Crypto failures every developer should avoidCrypto failures every developer should avoid
Crypto failures every developer should avoid
 
Crypto failures every developer should avoid
Crypto failures every developer should avoidCrypto failures every developer should avoid
Crypto failures every developer should avoid
 
Seminar1
Seminar1Seminar1
Seminar1
 
Hacking with Skynet - How AI is Empowering Adversaries
Hacking with Skynet - How AI is Empowering AdversariesHacking with Skynet - How AI is Empowering Adversaries
Hacking with Skynet - How AI is Empowering Adversaries
 
Threat hunting in cyber world
Threat hunting in cyber worldThreat hunting in cyber world
Threat hunting in cyber world
 
Nagios Conference 2011 - Jared Bird - Using Nagios As A Security Tool
Nagios Conference 2011 - Jared Bird - Using Nagios As A Security ToolNagios Conference 2011 - Jared Bird - Using Nagios As A Security Tool
Nagios Conference 2011 - Jared Bird - Using Nagios As A Security Tool
 
fucking shit
fucking shitfucking shit
fucking shit
 
Ethical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxEthical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptx
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
Security for Data Scientists
Security for Data ScientistsSecurity for Data Scientists
Security for Data Scientists
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Password hacking
Password hackingPassword hacking
Password hacking
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
Angelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Angelo Alviar OSINT 101 Presentation - Forensics and Security TechnologyAngelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Angelo Alviar OSINT 101 Presentation - Forensics and Security Technology
 

Google Hacking for Cryptographic Secrets

  • 1. Outline Google Hacking Cryptographic Secrets Automatic Tools Countermeasures Google Code Search Conclusion Google Hacking for Cryptographic Secrets Emin ˙ Islam Tatlı tatli@th.informatik.uni-mannheim.de Department of Computer Science, University of Mannheim NEC Research-Heidelberg, 10 November 2006 ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 2. Outline Google Hacking Cryptographic Secrets Automatic Tools Countermeasures Google Code Search Conclusion Outline 1 Google Hacking 2 Cryptographic Secrets 3 Automatic Tools 4 Countermeasures 5 Google Code Search ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 3. Outline Google Hacking Cryptographic Secrets Motivation Automatic Tools Advanced Search Parameters Countermeasures Examples of Google Hacking Google Code Search Conclusion Motivation Google has the index size over 20 billion entries try to search -"fgkdfgjisdfgjsiod" Hackers use google to search vulnerabilities called Google Hacking vulnerable servers, files and applications, files containing usernames-passwords, sensitive directories, online devices, etc. Google Hacking Database [1] ⇒ 1468 entries in 14 groups (by October 2006) What about Cryptographic Secrets? In this talk, we find out cryptographic secrets with google ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 4. Outline Google Hacking Cryptographic Secrets Motivation Automatic Tools Advanced Search Parameters Countermeasures Examples of Google Hacking Google Code Search Conclusion Advanced Search Parameters [all]inurl [all]intext [all]intitle site ext, filetype symbols: - . * | ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 5. Outline Google Hacking Cryptographic Secrets Motivation Automatic Tools Advanced Search Parameters Countermeasures Examples of Google Hacking Google Code Search Conclusion Examples of Google Hacking I Unauthenticated programs "PHP Version" intitle:phpinfo inurl:info.php Applications containing SQL injection & path modification vulnerabilities "advanced guestbook * powered" inurl:addentry.php intitle:"View Img" inurl:viewimg.php Security Scanner Reports "Assessment Report" "nessus" filetype:pdf ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 6. Outline Google Hacking Cryptographic Secrets Motivation Automatic Tools Advanced Search Parameters Countermeasures Examples of Google Hacking Google Code Search Conclusion Examples of Google Hacking II Private data listings "index of private|privat|¨zel" o phone address email intitle:"Curriculum Vitae" Database applications&error files "Welcome to phpmyadmin ***" "running on * as root@*" intitle:phpmyadmin "mysql error with query" ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 7. Outline Google Hacking Cryptographic Secrets Motivation Automatic Tools Advanced Search Parameters Countermeasures Examples of Google Hacking Google Code Search Conclusion Examples of Google Hacking III Online Devices inurl:"hp/device/this.LCDispatcher" intitle:liveapplet inurl:LvAppl "Please wait....." intitle:"SWW link" ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 8. Outline Hashed Passwords Google Hacking Secret Keys Cryptographic Secrets Public Keys Automatic Tools Private Keys Countermeasures Encrypted Messages Google Code Search Signed Messages Conclusion Cryptographic Secrets 1 Hashed Passwords 2 Secret Keys 3 Public Keys 4 Private Keys 5 Encrypted Messages 6 Signed Messages ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 9. Outline Hashed Passwords Google Hacking Secret Keys Cryptographic Secrets Public Keys Automatic Tools Private Keys Countermeasures Encrypted Messages Google Code Search Signed Messages Conclusion Hashed Passwords Cleartext passwords ext:log inurl:password Hashed passwords in dump files "create table" "insert into" "pass|passwd|password" (ext:sql | ext:dump | ext:dmp) intext:"password|pass|passwd" intext:"md5|sha1|crypt" (ext:sql | ext:dump | ext:dmp) ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 10. Outline Hashed Passwords Google Hacking Secret Keys Cryptographic Secrets Public Keys Automatic Tools Private Keys Countermeasures Encrypted Messages Google Code Search Signed Messages Conclusion Secret Keys Secret keys in Kerberos inurl:"kdc.conf" ext:conf inurl:"slave datatrans" OR inurl:"from master" Java keystores keystore ext:ks ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 11. Outline Hashed Passwords Google Hacking Secret Keys Cryptographic Secrets Public Keys Automatic Tools Private Keys Countermeasures Encrypted Messages Google Code Search Signed Messages Conclusion Public Keys PGP public keys "BEGIN PGP PUBLIC KEY BLOCK" (ext:txt | ext:asc | ext:key) Public keys in certificates "Certificate:Data:Version" "BEGIN CERTIFICATE" (ext:crt | ext:asc | ext:txt) ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 12. Outline Hashed Passwords Google Hacking Secret Keys Cryptographic Secrets Public Keys Automatic Tools Private Keys Countermeasures Encrypted Messages Google Code Search Signed Messages Conclusion Private Keys PGP private keys "BEGIN (DSA|RSA)" ext:key "BEGIN PGP PRIVATE KEY BLOCK" inurl:txt|asc "index of" "secring.gpg" ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 13. Outline Hashed Passwords Google Hacking Secret Keys Cryptographic Secrets Public Keys Automatic Tools Private Keys Countermeasures Encrypted Messages Google Code Search Signed Messages Conclusion Encrypted Messages PGP encrypted files -"public|pubring|pubkey| signature|pgp|and|or|release" ext:gpg More encrypted files -intext:"and" (ext:enc | ext:axx) XML encrypted elements "ciphervalue" ext:xml ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 14. Outline Hashed Passwords Google Hacking Secret Keys Cryptographic Secrets Public Keys Automatic Tools Private Keys Countermeasures Encrypted Messages Google Code Search Signed Messages Conclusion Signed Messages Signed emails "BEGIN PGP SIGNED MESSAGE" "From" "Date" "Subject" (ext:eml | ext:txt | ext:asc) File signatures -"and|or" "BEGIN PGP SIGNATURE" ext:asc PGP signed messages "BEGIN PGP SIGNED MESSAGE" -"From" (ext:txt | ext:asc | ext:xml) ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 15. Outline Google Hacking Gooscan Cryptographic Secrets Sitedigger Automatic Tools Goolink Countermeasures AdvancedDork Google Code Search Google Advanced Operations Toolbar Conclusion Automatic Tools 1 Gooscan 2 Sitedigger 3 Goolink 4 AdvancedDork 5 Google Advanced Operation Toolbar ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 16. Outline Google Hacking Gooscan Cryptographic Secrets Sitedigger Automatic Tools Goolink Countermeasures AdvancedDork Google Code Search Google Advanced Operations Toolbar Conclusion Gooscan [7] a Unix/Linux script to check google hacking queries against your system uses GHD [1] to execute: $ gooscan -t www.google.de -q "BEGIN (DSA|RSA) ext:key" -s de -o output.html ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 17. Outline Google Hacking Gooscan Cryptographic Secrets Sitedigger Automatic Tools Goolink Countermeasures AdvancedDork Google Code Search Google Advanced Operations Toolbar Conclusion Sitedigger [6] free from Foundstone company supports both GHD and Foundstone’s own hacking database for a given host, all entries in the database are queried ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 18. Outline Google Hacking Gooscan Cryptographic Secrets Sitedigger Automatic Tools Goolink Countermeasures AdvancedDork Google Code Search Google Advanced Operations Toolbar Conclusion Goolink [5] Goolink queries Google for a particular chosen search from GHD ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 19. Outline Google Hacking Gooscan Cryptographic Secrets Sitedigger Automatic Tools Goolink Countermeasures AdvancedDork Google Code Search Google Advanced Operations Toolbar Conclusion AdvancedDork [2] not specific to google hacking a Firefox extension for google searches ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 20. Outline Google Hacking Gooscan Cryptographic Secrets Sitedigger Automatic Tools Goolink Countermeasures AdvancedDork Google Code Search Google Advanced Operations Toolbar Conclusion Google Advanced Operations Toolbar [3] a Firefox extension provides a shortcut of Google’s advanced search functions ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 21. Outline Google Hacking Cryptographic Secrets Automatic Tools Countermeasures Google Code Search Conclusion Security Countermeasures 1 Use automatic tools to check your system 2 Use Robot Exclusion Standart (robots.txt) 3 Install and manage Google Honeypot [4] ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 22. Outline Google Hacking Cryptographic Secrets Automatic Tools Countermeasures Google Code Search Conclusion Google Code Search search keywords within source files (www.google.com/codesearch) find application bugs (e.g. sql injection, xss injection, buffer overflows, etc.) in the source files ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 23. Outline Google Hacking Cryptographic Secrets Automatic Tools Countermeasures Google Code Search Conclusion Conclusion Cryptography requires secrets to be kept secret Google indexes your secrets and makes public Take the required security countermeasures and protect your secrets ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 24. Outline Google Hacking Cryptographic Secrets Automatic Tools Countermeasures Google Code Search Conclusion References I Google Hacking Database. http://johnny.ihackstuff.com AdvancedDork- A Firefox extension for google searches. http://johnny.ihackstuff.com Google Advanced Operation Toolbar. https://addons.mozilla.org/firefox/1258/ Google Hack Honeypot Project. http://ghh.sourceforge.net Goolink- Security Scanner. www.ghacks.net/2005/11/23/goolink-scanner-beta-preview/ ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 25. Outline Google Hacking Cryptographic Secrets Automatic Tools Countermeasures Google Code Search Conclusion References II SiteDigger v2.0 - Information Gathering Tool. http://www.foundstone.com Gooscan - Google Security Scanner. http://johnny.ihackstuff.com ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets