1 / 12

Exercise: Google for Penetration Testing

Exercise: Google for Penetration Testing. C.W. Perr, Auburn University. Overview. Hacking Anatomy What is a search engine? Why is this a hacking/ pentest tool? What can you find? Threats Exercise 1: Insecure Web Cams Exercise 2 : Insecure Information The Proper Defenses Conclusion.

garson
Download Presentation

Exercise: Google for Penetration Testing

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Exercise: Google for Penetration Testing C.W. Perr, Auburn University

  2. Overview • Hacking Anatomy • What is a search engine? • Why is this a hacking/pentest tool? • What can you find? • Threats • Exercise 1: Insecure Web Cams • Exercise 2: Insecure Information • The Proper Defenses • Conclusion

  3. Hacking Anatomy • Targeting/Footprinting • Scanning • Enumeration/Testing/Planning • System Hacks • Attack • Cover Up/Misinformation

  4. What is a search engine? • A search engine is an information retrieval system designed to help people find information • If you know how to use it correctly you can find all kinds of things…

  5. Why is this a Pen Test tool? • Part 1 – of Hacking exposed begins with a case study – Googling your Way to Insecurity • “VNC Desktop” inurl:5800 • Shows VNC servers, and can hope that some have default or no passwords • filetype:pwd service • Improperly secured MS Front Page Extensions • filetype:propertiesinurl:dbintext:password • Reveals database passwords in clear text

  6. This doesn’t still work, does it? • 92,900 results on 2 Sep 2012

  7. So, what can you find? • Straight to confidential documents • “not for distribution” confidential site:edu • Prior penetration test results • This file was generated by Nessus • Password files as show before • If you know what you are looking for and how look then Google can be your best friend

  8. Exercise - Insecure Webcams • Open a browser, and navigate to google.com • Search for this specifically • inurl:\view\index.shtml

  9. Exercise: Insecure File Systems • In your browser go back to Google • Search for the following • “parent directory” (name of file you want to search for) –xxx –html –htm –php –shtml –md5 –md5sums • You can also try searching for specific file names • Inurl:(htm|html|php) intitle:”index of” + (exam_1)

  10. The Proper Defense • Patch • Keep the system up to date • Follow the proper configuration guidelines

  11. Conclusion • Hacking Anatomy • What is a search engine? • Why is this a hacking/pentest tool? • What can you find? • Threats • Search 1: Insecure Web Cams • Search 2: Insecure Information • The Proper Defenses • Conclusion

  12. Questions?

More Related