19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Figure 14-1:<br />

Using<br />

HTTrack<br />

to crawl a<br />

website.<br />

Chapter 14: Websites and Applications<br />

Inevitably, when performing web security assessments, I stumble across<br />

.zip or .rar files on web servers. Sometimes they contain junk, but oftentimes<br />

they hold sensitive information that shouldn’t be there for the public<br />

to access. One project in particular stands out. When I ran across a .zip file<br />

and tried to open it, WinZip asked me for a password. Using my handy dandy<br />

.zip file password-cracking tool from Elcomsoft (see Chapter 7 for details on<br />

password cracking), I had the password in mere milliseconds. Inside the .zip<br />

file was an Excel spreadsheet containing sensitive patient healthcare information<br />

(names, addresses, Social Security numbers, and more) that anyone<br />

and everyone in the world could access. In situations like this, your business<br />

might be required to notify everyone involved that their information was inadequately<br />

protected and possibly compromised. It pays to know the laws and<br />

regulations affecting your business. Better yet, make sure users aren’t posting<br />

improperly secured sensitive information on your web servers in the first place!<br />

Look at the output of your crawling program to see what files are available.<br />

Regular HTML and PDF files are probably okay because they’re most likely<br />

needed for normal web usage. But it wouldn’t hurt to open each file to make<br />

sure it belongs there and doesn’t contain sensitive information you don’t<br />

want to share with the world.<br />

Google<br />

Google, the search engine company that many love to hate, can also be used<br />

for directory traversal. In fact, Google’s advanced queries are so powerful<br />

that you can use them to root out sensitive information, critical web server<br />

281

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!