SlideShare a Scribd company logo
Outline
                          Google Hacking
                    Cryptographic Secrets
                         Automatic Tools
                        Countermeasures
                     Google Code Search
                              Conclusion




 Google Hacking for Cryptographic Secrets

                          Emin ˙
                               Islam Tatlı
               tatli@th.informatik.uni-mannheim.de

       Department of Computer Science, University of Mannheim


       NEC Research-Heidelberg, 10 November 2006



     ˙
Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                  Google Hacking
                            Cryptographic Secrets
                                 Automatic Tools
                                Countermeasures
                             Google Code Search
                                      Conclusion


Outline


  1   Google Hacking

  2   Cryptographic Secrets

  3   Automatic Tools

  4   Countermeasures

  5   Google Code Search



             ˙
        Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                Google Hacking
                          Cryptographic Secrets   Motivation
                               Automatic Tools    Advanced Search Parameters
                              Countermeasures     Examples of Google Hacking
                           Google Code Search
                                    Conclusion


Motivation

     Google has the index size over 20 billion entries
           try to search -"fgkdfgjisdfgjsiod"
     Hackers use google to search vulnerabilities
           called Google Hacking
           vulnerable servers, files and applications, files containing
           usernames-passwords, sensitive directories, online devices, etc.
           Google Hacking Database [1] ⇒ 1468 entries in 14 groups (by
           October 2006)
     What about Cryptographic Secrets?
     In this talk, we find out cryptographic secrets with google


           ˙
      Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                Google Hacking
                          Cryptographic Secrets   Motivation
                               Automatic Tools    Advanced Search Parameters
                              Countermeasures     Examples of Google Hacking
                           Google Code Search
                                    Conclusion


Advanced Search Parameters



     [all]inurl
     [all]intext
     [all]intitle
     site
     ext, filetype
     symbols: - . * |




           ˙
      Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                Google Hacking
                          Cryptographic Secrets   Motivation
                               Automatic Tools    Advanced Search Parameters
                              Countermeasures     Examples of Google Hacking
                           Google Code Search
                                    Conclusion


Examples of Google Hacking I

  Unauthenticated programs
  "PHP Version" intitle:phpinfo inurl:info.php

  Applications containing SQL injection & path modification
  vulnerabilities
       "advanced guestbook * powered" inurl:addentry.php
      intitle:"View Img" inurl:viewimg.php

  Security Scanner Reports
  "Assessment Report" "nessus" filetype:pdf

           ˙
      Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                Google Hacking
                          Cryptographic Secrets   Motivation
                               Automatic Tools    Advanced Search Parameters
                              Countermeasures     Examples of Google Hacking
                           Google Code Search
                                    Conclusion


Examples of Google Hacking II


  Private data listings
       "index of private|privat|¨zel"
                                o
     phone address email intitle:"Curriculum Vitae"

  Database applications&error files
      "Welcome to phpmyadmin ***" "running on * as
      root@*" intitle:phpmyadmin
     "mysql error with query"



           ˙
      Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                Google Hacking
                          Cryptographic Secrets   Motivation
                               Automatic Tools    Advanced Search Parameters
                              Countermeasures     Examples of Google Hacking
                           Google Code Search
                                    Conclusion


Examples of Google Hacking III



  Online Devices
       inurl:"hp/device/this.LCDispatcher"
      intitle:liveapplet inurl:LvAppl
      "Please wait....." intitle:"SWW link"




           ˙
      Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                                     Hashed Passwords
                                   Google Hacking
                                                     Secret Keys
                             Cryptographic Secrets
                                                     Public Keys
                                  Automatic Tools
                                                     Private Keys
                                 Countermeasures
                                                     Encrypted Messages
                              Google Code Search
                                                     Signed Messages
                                       Conclusion


Cryptographic Secrets


    1   Hashed Passwords
    2   Secret Keys
    3   Public Keys
    4   Private Keys
    5   Encrypted Messages
    6   Signed Messages




              ˙
         Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                                  Hashed Passwords
                                Google Hacking
                                                  Secret Keys
                          Cryptographic Secrets
                                                  Public Keys
                               Automatic Tools
                                                  Private Keys
                              Countermeasures
                                                  Encrypted Messages
                           Google Code Search
                                                  Signed Messages
                                    Conclusion


Hashed Passwords

  Cleartext passwords
       ext:log inurl:password

  Hashed passwords in dump files
      "create table" "insert into"
      "pass|passwd|password" (ext:sql | ext:dump |
      ext:dmp)
     intext:"password|pass|passwd"
     intext:"md5|sha1|crypt" (ext:sql | ext:dump |
     ext:dmp)


           ˙
      Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                                  Hashed Passwords
                                Google Hacking
                                                  Secret Keys
                          Cryptographic Secrets
                                                  Public Keys
                               Automatic Tools
                                                  Private Keys
                              Countermeasures
                                                  Encrypted Messages
                           Google Code Search
                                                  Signed Messages
                                    Conclusion


Secret Keys



  Secret keys in Kerberos
      inurl:"kdc.conf" ext:conf
     inurl:"slave datatrans" OR inurl:"from master"

  Java keystores
      keystore ext:ks




           ˙
      Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                                  Hashed Passwords
                                Google Hacking
                                                  Secret Keys
                          Cryptographic Secrets
                                                  Public Keys
                               Automatic Tools
                                                  Private Keys
                              Countermeasures
                                                  Encrypted Messages
                           Google Code Search
                                                  Signed Messages
                                    Conclusion


Public Keys


  PGP public keys
     "BEGIN PGP PUBLIC KEY BLOCK" (ext:txt | ext:asc |
     ext:key)

  Public keys in certificates
      "Certificate:Data:Version" "BEGIN CERTIFICATE"
      (ext:crt | ext:asc | ext:txt)




           ˙
      Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                                  Hashed Passwords
                                Google Hacking
                                                  Secret Keys
                          Cryptographic Secrets
                                                  Public Keys
                               Automatic Tools
                                                  Private Keys
                              Countermeasures
                                                  Encrypted Messages
                           Google Code Search
                                                  Signed Messages
                                    Conclusion


Private Keys



  PGP private keys
     "BEGIN (DSA|RSA)" ext:key
      "BEGIN PGP PRIVATE KEY BLOCK" inurl:txt|asc
      "index of" "secring.gpg"




           ˙
      Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                                  Hashed Passwords
                                Google Hacking
                                                  Secret Keys
                          Cryptographic Secrets
                                                  Public Keys
                               Automatic Tools
                                                  Private Keys
                              Countermeasures
                                                  Encrypted Messages
                           Google Code Search
                                                  Signed Messages
                                    Conclusion


Encrypted Messages


  PGP encrypted files
     -"public|pubring|pubkey|
     signature|pgp|and|or|release" ext:gpg

  More encrypted files
      -intext:"and" (ext:enc | ext:axx)

  XML encrypted elements
     "ciphervalue" ext:xml


           ˙
      Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                                  Hashed Passwords
                                Google Hacking
                                                  Secret Keys
                          Cryptographic Secrets
                                                  Public Keys
                               Automatic Tools
                                                  Private Keys
                              Countermeasures
                                                  Encrypted Messages
                           Google Code Search
                                                  Signed Messages
                                    Conclusion


Signed Messages

  Signed emails
      "BEGIN PGP SIGNED MESSAGE" "From" "Date"
      "Subject" (ext:eml | ext:txt | ext:asc)

  File signatures
       -"and|or" "BEGIN PGP SIGNATURE" ext:asc

  PGP signed messages
     "BEGIN PGP SIGNED MESSAGE" -"From" (ext:txt |
     ext:asc | ext:xml)


           ˙
      Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                  Google Hacking    Gooscan
                            Cryptographic Secrets   Sitedigger
                                 Automatic Tools    Goolink
                                Countermeasures     AdvancedDork
                             Google Code Search     Google Advanced Operations Toolbar
                                      Conclusion


Automatic Tools



   1   Gooscan
   2   Sitedigger
   3   Goolink
   4   AdvancedDork
   5   Google Advanced Operation Toolbar




             ˙
        Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                Google Hacking    Gooscan
                          Cryptographic Secrets   Sitedigger
                               Automatic Tools    Goolink
                              Countermeasures     AdvancedDork
                           Google Code Search     Google Advanced Operations Toolbar
                                    Conclusion


Gooscan [7]



     a Unix/Linux script to check google hacking queries against
     your system
     uses GHD [1]
     to execute:
     $ gooscan -t www.google.de -q "BEGIN (DSA|RSA)
     ext:key" -s de -o output.html




           ˙
      Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                 Google Hacking    Gooscan
                           Cryptographic Secrets   Sitedigger
                                Automatic Tools    Goolink
                               Countermeasures     AdvancedDork
                            Google Code Search     Google Advanced Operations Toolbar
                                     Conclusion


Sitedigger [6]



    free from Foundstone
    company
    supports both GHD and
    Foundstone’s own hacking
    database
    for a given host, all entries in
    the database are queried



            ˙
       Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                 Google Hacking    Gooscan
                           Cryptographic Secrets   Sitedigger
                                Automatic Tools    Goolink
                               Countermeasures     AdvancedDork
                            Google Code Search     Google Advanced Operations Toolbar
                                     Conclusion


Goolink [5]




    Goolink queries Google for a
    particular chosen search from
    GHD




            ˙
       Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                Google Hacking    Gooscan
                          Cryptographic Secrets   Sitedigger
                               Automatic Tools    Goolink
                              Countermeasures     AdvancedDork
                           Google Code Search     Google Advanced Operations Toolbar
                                    Conclusion


AdvancedDork [2]




   not specific to google
   hacking
   a Firefox extension for google
   searches




           ˙
      Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                Google Hacking    Gooscan
                          Cryptographic Secrets   Sitedigger
                               Automatic Tools    Goolink
                              Countermeasures     AdvancedDork
                           Google Code Search     Google Advanced Operations Toolbar
                                    Conclusion


Google Advanced Operations Toolbar [3]
     a Firefox extension
     provides a shortcut of Google’s advanced search functions




           ˙
      Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                  Google Hacking
                            Cryptographic Secrets
                                 Automatic Tools
                                Countermeasures
                             Google Code Search
                                      Conclusion


Security Countermeasures




   1   Use automatic tools to check your system
   2   Use Robot Exclusion Standart (robots.txt)
   3   Install and manage Google Honeypot [4]




             ˙
        Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                Google Hacking
                          Cryptographic Secrets
                               Automatic Tools
                              Countermeasures
                           Google Code Search
                                    Conclusion


Google Code Search




     search keywords within source files
     (www.google.com/codesearch)
     find application bugs (e.g. sql injection, xss injection, buffer
     overflows, etc.) in the source files




           ˙
      Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                Google Hacking
                          Cryptographic Secrets
                               Automatic Tools
                              Countermeasures
                           Google Code Search
                                    Conclusion


Conclusion




     Cryptography requires secrets to be kept secret
     Google indexes your secrets and makes public
     Take the required security countermeasures and protect your
     secrets




           ˙
      Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                 Google Hacking
                           Cryptographic Secrets
                                Automatic Tools
                               Countermeasures
                            Google Code Search
                                     Conclusion


References I


     Google Hacking Database. http://johnny.ihackstuff.com
     AdvancedDork- A Firefox extension for google searches.
     http://johnny.ihackstuff.com
     Google Advanced Operation Toolbar.
     https://addons.mozilla.org/firefox/1258/
     Google Hack Honeypot Project. http://ghh.sourceforge.net
     Goolink- Security Scanner.
     www.ghacks.net/2005/11/23/goolink-scanner-beta-preview/


            ˙
       Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets
Outline
                                 Google Hacking
                           Cryptographic Secrets
                                Automatic Tools
                               Countermeasures
                            Google Code Search
                                     Conclusion


References II




      SiteDigger v2.0 - Information Gathering Tool.
      http://www.foundstone.com
      Gooscan - Google Security Scanner.
      http://johnny.ihackstuff.com




            ˙
       Emin Islam Tatlı (University of Mannheim)   Google Hacking for Cryptographic Secrets

More Related Content

ODP
BSides Cincy: Active Defense - Helping threat actors hack themselves!
ThreatReel Podcast
 
PDF
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
OWASP Delhi
 
PDF
(SACON) Shomiron das gupta - threat hunting use cases
Priyanka Aash
 
PDF
Practical White Hat Hacker Training - Passive Information Gathering(OSINT)
PRISMA CSI
 
PPTX
Utilizing OSINT in Threat Analytics and Incident Response
Christopher Beiring
 
PDF
Formulario 3C
CLT Valuebased Services
 
PPTX
Como ser um Hacker Ético Profissional
Strong Security Brasil
 
PPT
Oracle UCM Security: Challenges and Best Practices
Brian Huff
 
BSides Cincy: Active Defense - Helping threat actors hack themselves!
ThreatReel Podcast
 
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
OWASP Delhi
 
(SACON) Shomiron das gupta - threat hunting use cases
Priyanka Aash
 
Practical White Hat Hacker Training - Passive Information Gathering(OSINT)
PRISMA CSI
 
Utilizing OSINT in Threat Analytics and Incident Response
Christopher Beiring
 
Como ser um Hacker Ético Profissional
Strong Security Brasil
 
Oracle UCM Security: Challenges and Best Practices
Brian Huff
 

Viewers also liked (20)

PDF
Patent Risk and Countermeasures Related to Open Management in Interaction Design
Yosuke Sakai
 
PDF
Brigadeiro Engº VenâNcio Alvarenga Gomes
Luis Nassif
 
PDF
Formulario 3C
CLT Valuebased Services
 
PDF
Brigadeiro Engº VenâNcio Alvarenga Gomes
Luis Nassif
 
PDF
Apresenta cyber (2)
Orlando Simões
 
PPT
Apresentação Cyberpunk
Orlando Simões
 
PPT
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
AirTight Networks
 
PPTX
Email phishing and countermeasures
Jorge Sebastiao
 
PPTX
Dstl Medical Countermeasures for Dangerous Pathogens
warwick_amr
 
PPT
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Jeremiah Grossman
 
PDF
Seminar Presentation
Sergey Rubinsky, Ph.D.
 
PDF
VoIP: Attacks & Countermeasures in the Corporate World
Jason Edelstein
 
PPTX
Bone Loss in Long-Duration Spaceflight: Measurements and Countermeasures
American Astronautical Society
 
PDF
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011
International Atomic Energy Agency
 
PDF
Cehv8 module 01 introduction to ethical hacking
polichen
 
PDF
Penetration Test (Teste de invasão) – Saiba como ser um Hacker ético na pratica
Campus Party Brasil
 
PDF
Digital Astroturfing: Definition, typology, and countermeasures.
Marko Kovic
 
PDF
Return oriented programming
hybr1s
 
PDF
Iis Security Programming Countermeasures
guestc27cd9
 
PDF
Webinar Gratuito: "Herramientas Graficas en Kali Linux 2.0"
Alonso Caballero
 
Patent Risk and Countermeasures Related to Open Management in Interaction Design
Yosuke Sakai
 
Brigadeiro Engº VenâNcio Alvarenga Gomes
Luis Nassif
 
Brigadeiro Engº VenâNcio Alvarenga Gomes
Luis Nassif
 
Apresenta cyber (2)
Orlando Simões
 
Apresentação Cyberpunk
Orlando Simões
 
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
AirTight Networks
 
Email phishing and countermeasures
Jorge Sebastiao
 
Dstl Medical Countermeasures for Dangerous Pathogens
warwick_amr
 
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Jeremiah Grossman
 
Seminar Presentation
Sergey Rubinsky, Ph.D.
 
VoIP: Attacks & Countermeasures in the Corporate World
Jason Edelstein
 
Bone Loss in Long-Duration Spaceflight: Measurements and Countermeasures
American Astronautical Society
 
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011
International Atomic Energy Agency
 
Cehv8 module 01 introduction to ethical hacking
polichen
 
Penetration Test (Teste de invasão) – Saiba como ser um Hacker ético na pratica
Campus Party Brasil
 
Digital Astroturfing: Definition, typology, and countermeasures.
Marko Kovic
 
Return oriented programming
hybr1s
 
Iis Security Programming Countermeasures
guestc27cd9
 
Webinar Gratuito: "Herramientas Graficas en Kali Linux 2.0"
Alonso Caballero
 

Similar to Google Hacking for Cryptographic Secrets (20)

PDF
Google Hacking by Ali Jahangiri
Devetol
 
DOCX
Google Hack
Nutan Kumar Panda
 
PDF
Pki Training V1.5
Sylvain Maret
 
PDF
Data Storage and Security Strategies of Network Identity
Antiy Labs
 
PDF
E Crime Mid Year Meeting London
Hartj
 
PDF
Hacking
Praval Sharma
 
PPTX
Passwords & security
Per Thorsheim
 
PDF
Secrets of a super hacker
Decarl Decarl
 
PDF
Ipsec And Ssl Protocols ( Vpn )
Monique Jones
 
PDF
TH3 Professional Developper google hacking
th3prodevelopper
 
DOC
Demystifying google hacks
darwinah retno
 
PDF
CITEC #CON2-Dirty Attack with Google Hacking
Prathan Phongthiproek
 
DOC
eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS USING SE-TOOLKIT – A CA...
Kevin M. Moker, CFE, CISSP, ISSMP, CISM
 
PDF
Stephen McHenry - Chanecellor of Site Reliability Engineering, Google
IE Group
 
PDF
Dangerous google searching for secrets
Decarl Decarl
 
PDF
Dangerous Google searching for secrets
Pim Piepers
 
PDF
D google searching tactics
Aniket Sharma
 
PPT
Ethical Hacking and Network Security
sumit dimri
 
PPT
C:\Fakepath\Ethical Hacking
sumit dimri
 
PPTX
Cybersecurity cyberlab1
rayborg
 
Google Hacking by Ali Jahangiri
Devetol
 
Google Hack
Nutan Kumar Panda
 
Pki Training V1.5
Sylvain Maret
 
Data Storage and Security Strategies of Network Identity
Antiy Labs
 
E Crime Mid Year Meeting London
Hartj
 
Hacking
Praval Sharma
 
Passwords & security
Per Thorsheim
 
Secrets of a super hacker
Decarl Decarl
 
Ipsec And Ssl Protocols ( Vpn )
Monique Jones
 
TH3 Professional Developper google hacking
th3prodevelopper
 
Demystifying google hacks
darwinah retno
 
CITEC #CON2-Dirty Attack with Google Hacking
Prathan Phongthiproek
 
eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS USING SE-TOOLKIT – A CA...
Kevin M. Moker, CFE, CISSP, ISSMP, CISM
 
Stephen McHenry - Chanecellor of Site Reliability Engineering, Google
IE Group
 
Dangerous google searching for secrets
Decarl Decarl
 
Dangerous Google searching for secrets
Pim Piepers
 
D google searching tactics
Aniket Sharma
 
Ethical Hacking and Network Security
sumit dimri
 
C:\Fakepath\Ethical Hacking
sumit dimri
 
Cybersecurity cyberlab1
rayborg
 

Google Hacking for Cryptographic Secrets

  • 1. Outline Google Hacking Cryptographic Secrets Automatic Tools Countermeasures Google Code Search Conclusion Google Hacking for Cryptographic Secrets Emin ˙ Islam Tatlı [email protected] Department of Computer Science, University of Mannheim NEC Research-Heidelberg, 10 November 2006 ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 2. Outline Google Hacking Cryptographic Secrets Automatic Tools Countermeasures Google Code Search Conclusion Outline 1 Google Hacking 2 Cryptographic Secrets 3 Automatic Tools 4 Countermeasures 5 Google Code Search ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 3. Outline Google Hacking Cryptographic Secrets Motivation Automatic Tools Advanced Search Parameters Countermeasures Examples of Google Hacking Google Code Search Conclusion Motivation Google has the index size over 20 billion entries try to search -"fgkdfgjisdfgjsiod" Hackers use google to search vulnerabilities called Google Hacking vulnerable servers, files and applications, files containing usernames-passwords, sensitive directories, online devices, etc. Google Hacking Database [1] ⇒ 1468 entries in 14 groups (by October 2006) What about Cryptographic Secrets? In this talk, we find out cryptographic secrets with google ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 4. Outline Google Hacking Cryptographic Secrets Motivation Automatic Tools Advanced Search Parameters Countermeasures Examples of Google Hacking Google Code Search Conclusion Advanced Search Parameters [all]inurl [all]intext [all]intitle site ext, filetype symbols: - . * | ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 5. Outline Google Hacking Cryptographic Secrets Motivation Automatic Tools Advanced Search Parameters Countermeasures Examples of Google Hacking Google Code Search Conclusion Examples of Google Hacking I Unauthenticated programs "PHP Version" intitle:phpinfo inurl:info.php Applications containing SQL injection & path modification vulnerabilities "advanced guestbook * powered" inurl:addentry.php intitle:"View Img" inurl:viewimg.php Security Scanner Reports "Assessment Report" "nessus" filetype:pdf ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 6. Outline Google Hacking Cryptographic Secrets Motivation Automatic Tools Advanced Search Parameters Countermeasures Examples of Google Hacking Google Code Search Conclusion Examples of Google Hacking II Private data listings "index of private|privat|¨zel" o phone address email intitle:"Curriculum Vitae" Database applications&error files "Welcome to phpmyadmin ***" "running on * as root@*" intitle:phpmyadmin "mysql error with query" ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 7. Outline Google Hacking Cryptographic Secrets Motivation Automatic Tools Advanced Search Parameters Countermeasures Examples of Google Hacking Google Code Search Conclusion Examples of Google Hacking III Online Devices inurl:"hp/device/this.LCDispatcher" intitle:liveapplet inurl:LvAppl "Please wait....." intitle:"SWW link" ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 8. Outline Hashed Passwords Google Hacking Secret Keys Cryptographic Secrets Public Keys Automatic Tools Private Keys Countermeasures Encrypted Messages Google Code Search Signed Messages Conclusion Cryptographic Secrets 1 Hashed Passwords 2 Secret Keys 3 Public Keys 4 Private Keys 5 Encrypted Messages 6 Signed Messages ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 9. Outline Hashed Passwords Google Hacking Secret Keys Cryptographic Secrets Public Keys Automatic Tools Private Keys Countermeasures Encrypted Messages Google Code Search Signed Messages Conclusion Hashed Passwords Cleartext passwords ext:log inurl:password Hashed passwords in dump files "create table" "insert into" "pass|passwd|password" (ext:sql | ext:dump | ext:dmp) intext:"password|pass|passwd" intext:"md5|sha1|crypt" (ext:sql | ext:dump | ext:dmp) ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 10. Outline Hashed Passwords Google Hacking Secret Keys Cryptographic Secrets Public Keys Automatic Tools Private Keys Countermeasures Encrypted Messages Google Code Search Signed Messages Conclusion Secret Keys Secret keys in Kerberos inurl:"kdc.conf" ext:conf inurl:"slave datatrans" OR inurl:"from master" Java keystores keystore ext:ks ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 11. Outline Hashed Passwords Google Hacking Secret Keys Cryptographic Secrets Public Keys Automatic Tools Private Keys Countermeasures Encrypted Messages Google Code Search Signed Messages Conclusion Public Keys PGP public keys "BEGIN PGP PUBLIC KEY BLOCK" (ext:txt | ext:asc | ext:key) Public keys in certificates "Certificate:Data:Version" "BEGIN CERTIFICATE" (ext:crt | ext:asc | ext:txt) ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 12. Outline Hashed Passwords Google Hacking Secret Keys Cryptographic Secrets Public Keys Automatic Tools Private Keys Countermeasures Encrypted Messages Google Code Search Signed Messages Conclusion Private Keys PGP private keys "BEGIN (DSA|RSA)" ext:key "BEGIN PGP PRIVATE KEY BLOCK" inurl:txt|asc "index of" "secring.gpg" ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 13. Outline Hashed Passwords Google Hacking Secret Keys Cryptographic Secrets Public Keys Automatic Tools Private Keys Countermeasures Encrypted Messages Google Code Search Signed Messages Conclusion Encrypted Messages PGP encrypted files -"public|pubring|pubkey| signature|pgp|and|or|release" ext:gpg More encrypted files -intext:"and" (ext:enc | ext:axx) XML encrypted elements "ciphervalue" ext:xml ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 14. Outline Hashed Passwords Google Hacking Secret Keys Cryptographic Secrets Public Keys Automatic Tools Private Keys Countermeasures Encrypted Messages Google Code Search Signed Messages Conclusion Signed Messages Signed emails "BEGIN PGP SIGNED MESSAGE" "From" "Date" "Subject" (ext:eml | ext:txt | ext:asc) File signatures -"and|or" "BEGIN PGP SIGNATURE" ext:asc PGP signed messages "BEGIN PGP SIGNED MESSAGE" -"From" (ext:txt | ext:asc | ext:xml) ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 15. Outline Google Hacking Gooscan Cryptographic Secrets Sitedigger Automatic Tools Goolink Countermeasures AdvancedDork Google Code Search Google Advanced Operations Toolbar Conclusion Automatic Tools 1 Gooscan 2 Sitedigger 3 Goolink 4 AdvancedDork 5 Google Advanced Operation Toolbar ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 16. Outline Google Hacking Gooscan Cryptographic Secrets Sitedigger Automatic Tools Goolink Countermeasures AdvancedDork Google Code Search Google Advanced Operations Toolbar Conclusion Gooscan [7] a Unix/Linux script to check google hacking queries against your system uses GHD [1] to execute: $ gooscan -t www.google.de -q "BEGIN (DSA|RSA) ext:key" -s de -o output.html ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 17. Outline Google Hacking Gooscan Cryptographic Secrets Sitedigger Automatic Tools Goolink Countermeasures AdvancedDork Google Code Search Google Advanced Operations Toolbar Conclusion Sitedigger [6] free from Foundstone company supports both GHD and Foundstone’s own hacking database for a given host, all entries in the database are queried ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 18. Outline Google Hacking Gooscan Cryptographic Secrets Sitedigger Automatic Tools Goolink Countermeasures AdvancedDork Google Code Search Google Advanced Operations Toolbar Conclusion Goolink [5] Goolink queries Google for a particular chosen search from GHD ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 19. Outline Google Hacking Gooscan Cryptographic Secrets Sitedigger Automatic Tools Goolink Countermeasures AdvancedDork Google Code Search Google Advanced Operations Toolbar Conclusion AdvancedDork [2] not specific to google hacking a Firefox extension for google searches ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 20. Outline Google Hacking Gooscan Cryptographic Secrets Sitedigger Automatic Tools Goolink Countermeasures AdvancedDork Google Code Search Google Advanced Operations Toolbar Conclusion Google Advanced Operations Toolbar [3] a Firefox extension provides a shortcut of Google’s advanced search functions ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 21. Outline Google Hacking Cryptographic Secrets Automatic Tools Countermeasures Google Code Search Conclusion Security Countermeasures 1 Use automatic tools to check your system 2 Use Robot Exclusion Standart (robots.txt) 3 Install and manage Google Honeypot [4] ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 22. Outline Google Hacking Cryptographic Secrets Automatic Tools Countermeasures Google Code Search Conclusion Google Code Search search keywords within source files (www.google.com/codesearch) find application bugs (e.g. sql injection, xss injection, buffer overflows, etc.) in the source files ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 23. Outline Google Hacking Cryptographic Secrets Automatic Tools Countermeasures Google Code Search Conclusion Conclusion Cryptography requires secrets to be kept secret Google indexes your secrets and makes public Take the required security countermeasures and protect your secrets ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 24. Outline Google Hacking Cryptographic Secrets Automatic Tools Countermeasures Google Code Search Conclusion References I Google Hacking Database. http://johnny.ihackstuff.com AdvancedDork- A Firefox extension for google searches. http://johnny.ihackstuff.com Google Advanced Operation Toolbar. https://addons.mozilla.org/firefox/1258/ Google Hack Honeypot Project. http://ghh.sourceforge.net Goolink- Security Scanner. www.ghacks.net/2005/11/23/goolink-scanner-beta-preview/ ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets
  • 25. Outline Google Hacking Cryptographic Secrets Automatic Tools Countermeasures Google Code Search Conclusion References II SiteDigger v2.0 - Information Gathering Tool. http://www.foundstone.com Gooscan - Google Security Scanner. http://johnny.ihackstuff.com ˙ Emin Islam Tatlı (University of Mannheim) Google Hacking for Cryptographic Secrets