Dangerous Google. – Searching for Secrets. Michał Piotrowski. This article has been published in issue 4/ of the hakin9 magazine. All rights reserved. Sign in. Main menu. Hacking - Dangerous Google - Searching For Secrets by Michał bestthing.info via Hacking - Dangerous Google - Searching For Secrets by Michał Piotrowski.
|Language:||English, Japanese, German|
|ePub File Size:||27.37 MB|
|PDF File Size:||18.76 MB|
|Distribution:||Free* [*Sign up for free]|
Dangerous Google - Searching for Secrets - Download as PDF File .pdf), Text File .txt) or read online. Dangerous Google - Searching For Secrets - Free download as PDF File .pdf), Text File .txt) or read online for free. Read books online. Ebook viewer.
We will see how this works for two fairly popular programs: WebJeff Fileman- The first is a web-based file manager for uploading, browsing, managing and modifying files on a server. Unfortunately, WebJeff a bug which makes it possible to download any file on the server, as long as it's accessible to the user Figure 2. Locating IIS 5.
This works because in its 1. He could of course use many other server applications adds Guestbook — is a PHP application 4 www.
In April , information blank and entering? The potential aggres- banners, names and versions from ity in the application's 2.
Network scanners such as Nmap or amap are typically used for this purpose, but another possibility also exists. Many system administra- tors install Web-based applications which generate system load statis- tics, show disk space usage or even display system logs. All this can be valuable informa- tion to an intruder.
Simply querying Google for statistics generated and signed by the phpSystem applica- tion using the query "Generated by Figure 3. A vulnerable version of WebJeff Filemanager phpSystem" will result in a whole list of pages similar to the one shown in Figure 5.
Index of /repositories/repo.zenk-security.com/Others/
The intruder can also query for pages generated by the Sysinfo script using intitle:"Sysinfo written by The Gamblers. Obtaining such information may encourage the intruder to attack a given system and will help him find the right tools and Figure 4.
Advanced Guestbook login page exploits for the job. So if you decide to use Web applications to monitor computer resources, make sure ac- cess to them is password-protected. Looking for Errors HTTP error messages can be ex- tremely valuable to an attacker, as they can provide a wealth of infor- mation about the system, database structure and configuration.
In April , information was published about a vulnerability in the application's 2.
It's enough to navigate to the panel login screen see Figure 4 and log in leaving the username blank and entering ' OR as password or the other way around leaving password blank and entering?
A vulnerable version of WebJeff Filemanager to recognise running services, operating systems and specific service software.
See a Problem?
Network scanners such as Nmap or amap are typically used for this purpose, but another possibility also exists. Many system administrators install Web-based applications which generate system load statistics, show disk space usage or even display system logs. All this can be valuable information to an intruder.
Simply querying Google for statistics generated and signed by the phpSystem application using the query "Generated by phpSystem" will result in a whole list of pages similar to the one shown in Figure 5. Advanced Guestbook login page these pages contain much more system information Figure 6. This method offers numerous possibilities Table 4 shows sample queries for finding statistics and other information generated by several popular applications.
Obtaining such information may encourage the intruder to attack a given system and will help him find the right tools and exploits for the job. So if you decide to use Web applications to monitor computer resources, make sure access to them is password-protected. Looking for Errors HTTP error messages can be extremely valuable to an attacker, as they can provide a wealth of information about the system, database structure and configuration. For example, finding errors generated by an Informix database merely requires querying for "A syntax error has occurred" filetype:ihtml.
The result will provide the intruder with error messages containing information on database configuration, a system's file structure and sometimes even passwords see Figure 7. The results can be narrowed down to only those containing passwords by altering the query slightly: "A syntax Basics Figure 5.
Table 5 contains more sample queries using the same method. The only way of preventing our systems from publicly revealing error information is removing all bugs as soon as we can and if possible configuring applications to log any errors to files instead of displaying them for the users to see. Remember that even if you react quickly and thus make the error pages indicated by Google out-of-date , a potential intruder will still be able to examine the version of the page cached by Google by simply clicking the link to the page copy.
Fortunately, the sheer volume of Web resources means Figure 6. Statistics generated by Sysinfo Table 4.
Dangerous Google - Searching for Secrets
Prowling for Passwords Figure 7. Querying for Informix database errors Figure 8.
MySQL database error Web pages contain a great many passwords to all manner of resources e-mail accounts, FTP servers or even shell accounts. This is mostly due to the ignorance of users who unwittingly store their passwords in publicly accessible locations, but also due to the carelessness of software manufacturers who either provide insufficient measures of protecting user data or supply no information about the necessity of modifying their products' standard configuration.
Unfortunately, not everyone realises that gaining access to an FTP client's configuration is synonymous with gaining access to a user's FTP resources.
Using Google, of course. Another example is a Web application called DUclassified , used for managing website advertising materials.Locating IIS 5.
This works because in its 1. These may include project plans, technical documentation, surveys, reports, presentations and a whole host of other company-internal materials. Advanced Guestbook login page exploits for the job. All this can be valuable informa- tion to an intruder.
Also examine the actual files your server are using and assuming that things change over time and in relation to the exploits discussed in this book and if you find the files are still there just moved then adjust your use of the search engine. Confidential document found through Google The Web also contains docu- ments that have been marked as confidential and therefore contain sensitive information. Google queries for locating passwords Query Result "http: Jump to Page.
- GERMAN BOOKS FOR LEARNING PDF
- ESSENTIALS OF NURSING RESEARCH PDF
- WE CAN REMEMBER IT FOR YOU WHOLESALE EBOOK
- THE SECRET LIBRO PDF
- PDF APPLICATION FOR COMPUTER
- VISIO 2010 FOR DUMMIES PDF
- PADUKA AUDIT BOOK FOR CA FINAL EPUB
- EFFORTLESS E-COMMERCE WITH PHP AND MYSQL PDF
- CONADEP NUNCA MAS DOWNLOAD
- GOTYE MAKING MIRRORS DIGITAL BOOKLET PDF
- HVAC DESIGN BOOK
- MEDICAL ASSISTANT BOOK
- LED PDF FILE
- KITAB RIYADHUS SHALIHIN PDF
- OP AMP APPLICATIONS HANDBOOK PDF