Your name or email adress:
Do you already have an account?
Forgot your password?
  • Log in or Sign up


    Results 1 to 2 of 2
    1. #1
      IfasehunReincarnated's Avatar
      IfasehunReincarnated is offline Never Let Them Disrespect the Ancestors

      Join Date
      Jan 2004
      Location
      Sirius & Onile Simultaneously
      Posts
      6,006
      Thumbs Up/Down
      Received: 11/0
      Given: 0/0
      Rep Power
      436

      Using Google for Hacking


      0 Not allowed! Not allowed!
      Is Google Exposing You to Hack Attacks?

      Robert McMillan, IDG News Service
      Tue Aug 2,11:00 AM ET

      Somewhere out on the Internet, an Electric Bong may be in danger. The threat: a well-crafted Google query that could allow a hacker to use Google's massive database as a resource for intrusion.
      ADVERTISEMENT


      "Electric Bong" was one of a number of household devices that security researcher Johnny Long came across when he found an unprotected Web interface to someone's household electrical network. To the right of each item were two control buttons, one labelled "on," the other, "off."

      Searching for Holes

      Long, a researcher with Computer Sciences Corporation and author of the book Google Hacking for Penetration Testers, was able to find the Electric Bong simply because Google contains a lot of information that wasn't intended to lie unexposed on the Web. The problem, he said at the Black Hat USA conference in Las Vegas last week, lies not with Google itself but with the fact that users often do not realize what Google's powerful search engine has been able to dig up.

      In addition to power systems, Long and other researchers were able to find unsecured Web interfaces that gave them control over a wide variety of devices, including printer networks, PBX (private branch exchange) enterprise phone systems, routers, Web cameras, and of course, Web sites themselves. All can be uncovered using Google, Long said.

      But the effectiveness of Google as a hacking tool does not end there. It can also be used as a kind of proxy service for hackers, Long said.

      Getting In Via Google

      Although security software can identify when an attacker is performing reconnaissance work on a company's network, attackers can find network topology information on Google instead of snooping for it on the network they're studying, he said. This makes it harder for the network's administrators to block the attacker. "The target does not see us crawling their sites and getting information," he said.

      Often, this kind of information comes in the form of apparently nonsensical information--something that Long calls "Google Turds." For example, because there is no such thing as a Web site with the URL "nasa," a Google search for the query "site:nasa" should turn up zero results. Instead, it turns up what appears to be a list of servers, offering an insight into the structure of the U.S. National Aeronautics and Space Administration's internal network, Long said.

      Combining well-structured Google queries with text processing tools can yield things like SQL passwords and even SQL error information. This could then be used to structure what is known as a SQL injection attack, which can be used to run unauthorized commands on a SQL database. "This is where it becomes Google hacking," he said. "You can do a SQL injection, or you can do a Google query and find the same thing."

      Although Google traditionally has not concerned itself with the security implications of its massive data store, the fact that it has been an unwitting participant in some worm attacks has the search engine now rejecting some queries for security reasons, Long said. "Recently, they've stepped into the game."
      All is Well. Workin' Hard - Tryin' to Save Time for Fam. Check in Periodically.

    2. #2
      IfasehunReincarnated's Avatar
      IfasehunReincarnated is offline Never Let Them Disrespect the Ancestors

      Join Date
      Jan 2004
      Location
      Sirius & Onile Simultaneously
      Posts
      6,006
      Thumbs Up/Down
      Received: 11/0
      Given: 0/0
      Rep Power
      436

    Thread Information

    Users Browsing this Thread

    There are currently 1 users browsing this thread. (0 members and 1 guests)

    Similar Threads

    1. Google Now Comes to iPhone, iPad as Part of Google Search
      By TTDC Bot in forum PC Tech Advice & Technology RSS
      Replies: 0
      Last Post: 04-30-2013, 01:00 AM
    2. MSN Site Hacking Went Undetected for Days
      By Jahness in forum P C Tech Advice & Technology
      Replies: 2
      Last Post: 06-08-2005, 11:16 AM
    3. 'puter Hacking Attacks Rarely Publicized
      By Baba Ahmed in forum Open Forum
      Replies: 0
      Last Post: 02-20-2005, 11:20 PM

    Posting Permissions

    • You may not post new threads
    • You may not post replies
    • You may not post attachments
    • You may not edit your posts
    •  


    About

      Assata Shakur Speaks is an Forum Devoted To Assata Shakur And All Political Prisoners Around The World.
      Assata Shakur Speaks Is An Oasis Of Pan African Information Geared Towards The Liberation Of Afrikan People.

    Follow Us On

    Twitter Facebook youtube Flickr DavianArt Dribbble RSS Feed



    BACK TO TOP