19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

282<br />

Part V: Hacking Applications<br />

files and directories, credit card numbers, webcams — basically anything<br />

that Google has discovered on your site — without having to mirror your site<br />

and sift through everything manually. It’s already sitting there in Google’s<br />

cache waiting to be viewed.<br />

The following are a couple of advanced Google queries that you can enter<br />

directly into the Google search field:<br />

✓ site:hostname keywords — This query searches for any keyword you<br />

list, such as SSN, confidential, credit card, and so on. An example would be:<br />

site:www.principlelogic.com speaker<br />

✓ filetype:file-extension site:hostname — This query searches for specific<br />

file types on a specific website, such as doc, pdf, db, dbf, zip, and<br />

more. These file types might contain sensitive information. An example<br />

would be:<br />

filetype:pdf site:www.principlelogic.com<br />

Other advanced Google operators include the following:<br />

✓ allintitle searches for keywords in the title of a web page.<br />

✓ inurl searches for keywords in the URL of a web page.<br />

✓ related finds pages similar to this web page.<br />

✓ link shows other sites that link to this web page.<br />

Specific definitions and more can be found at www.googleguide.com/<br />

advanced_operators.html. Also, an excellent resource for Google hacking<br />

is Johnny Long’s Google Hacking Database (GHDB) site http://johnny.<br />

ihackstuff.com/ghdb. Additional hacking-related Google queries can be<br />

found at http://artkast.yak.net/81.<br />

When sifting through your site with Google, be sure to look for sensitive<br />

information about your servers, network, and organization in Google Groups<br />

(http://groups.google.com), which is the Usenet archive. I have found<br />

employee postings in newsgroups that reveal too much about the internal<br />

network and business systems — the sky is the limit. If you find something<br />

that doesn’t need to be there, you can work with Google to have it edited or<br />

removed. For more information, refer to Google’s Contact us page at www.<br />

google.com/intl/en/contact.<br />

Looking at the big picture of web security, Google hacking is pretty limited,<br />

but if you’re really into it, check out Johnny Long’s book, Google Hacking for<br />

Penetration Testers (Syngress).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!