This document outlines a presentation on finding cryptographic secrets using Google searches. It covers advanced Google search parameters and examples of hacking techniques. The presentation will discuss finding hashed passwords, secret keys, public keys, private keys, encrypted messages, and signed messages through Google searches. Automatic tools for searching are also mentioned, as well as countermeasures to prevent discovery of sensitive information.
1 of 25
More Related Content
Google Hacking for Cryptographic Secrets
1. Outline
Google Hacking
Cryptographic Secrets
Automatic Tools
Countermeasures
Google Code Search
Conclusion
Google Hacking for Cryptographic Secrets
Emin
Islam Tatl脹
tatli@th.informatik.uni-mannheim.de
Department of Computer Science, University of Mannheim
NEC Research-Heidelberg, 10 November 2006
Emin Islam Tatl脹 (University of Mannheim) Google Hacking for Cryptographic Secrets
2. Outline
Google Hacking
Cryptographic Secrets
Automatic Tools
Countermeasures
Google Code Search
Conclusion
Outline
1 Google Hacking
2 Cryptographic Secrets
3 Automatic Tools
4 Countermeasures
5 Google Code Search
Emin Islam Tatl脹 (University of Mannheim) Google Hacking for Cryptographic Secrets
3. Outline
Google Hacking
Cryptographic Secrets Motivation
Automatic Tools Advanced Search Parameters
Countermeasures Examples of Google Hacking
Google Code Search
Conclusion
Motivation
Google has the index size over 20 billion entries
try to search -"fgkdfgjisdfgjsiod"
Hackers use google to search vulnerabilities
called Google Hacking
vulnerable servers, 鍖les and applications, 鍖les containing
usernames-passwords, sensitive directories, online devices, etc.
Google Hacking Database [1] 1468 entries in 14 groups (by
October 2006)
What about Cryptographic Secrets?
In this talk, we 鍖nd out cryptographic secrets with google
Emin Islam Tatl脹 (University of Mannheim) Google Hacking for Cryptographic Secrets
4. Outline
Google Hacking
Cryptographic Secrets Motivation
Automatic Tools Advanced Search Parameters
Countermeasures Examples of Google Hacking
Google Code Search
Conclusion
Advanced Search Parameters
[all]inurl
[all]intext
[all]intitle
site
ext, 鍖letype
symbols: - . * |
Emin Islam Tatl脹 (University of Mannheim) Google Hacking for Cryptographic Secrets
5. Outline
Google Hacking
Cryptographic Secrets Motivation
Automatic Tools Advanced Search Parameters
Countermeasures Examples of Google Hacking
Google Code Search
Conclusion
Examples of Google Hacking I
Unauthenticated programs
"PHP Version" intitle:phpinfo inurl:info.php
Applications containing SQL injection & path modi鍖cation
vulnerabilities
"advanced guestbook * powered" inurl:addentry.php
intitle:"View Img" inurl:viewimg.php
Security Scanner Reports
"Assessment Report" "nessus" filetype:pdf
Emin Islam Tatl脹 (University of Mannheim) Google Hacking for Cryptographic Secrets
6. Outline
Google Hacking
Cryptographic Secrets Motivation
Automatic Tools Advanced Search Parameters
Countermeasures Examples of Google Hacking
Google Code Search
Conclusion
Examples of Google Hacking II
Private data listings
"index of private|privat|即zel"
o
phone address email intitle:"Curriculum Vitae"
Database applications&error 鍖les
"Welcome to phpmyadmin ***" "running on * as
root@*" intitle:phpmyadmin
"mysql error with query"
Emin Islam Tatl脹 (University of Mannheim) Google Hacking for Cryptographic Secrets
7. Outline
Google Hacking
Cryptographic Secrets Motivation
Automatic Tools Advanced Search Parameters
Countermeasures Examples of Google Hacking
Google Code Search
Conclusion
Examples of Google Hacking III
Online Devices
inurl:"hp/device/this.LCDispatcher"
intitle:liveapplet inurl:LvAppl
"Please wait....." intitle:"SWW link"
Emin Islam Tatl脹 (University of Mannheim) Google Hacking for Cryptographic Secrets
8. Outline
Hashed Passwords
Google Hacking
Secret Keys
Cryptographic Secrets
Public Keys
Automatic Tools
Private Keys
Countermeasures
Encrypted Messages
Google Code Search
Signed Messages
Conclusion
Cryptographic Secrets
1 Hashed Passwords
2 Secret Keys
3 Public Keys
4 Private Keys
5 Encrypted Messages
6 Signed Messages
Emin Islam Tatl脹 (University of Mannheim) Google Hacking for Cryptographic Secrets
9. Outline
Hashed Passwords
Google Hacking
Secret Keys
Cryptographic Secrets
Public Keys
Automatic Tools
Private Keys
Countermeasures
Encrypted Messages
Google Code Search
Signed Messages
Conclusion
Hashed Passwords
Cleartext passwords
ext:log inurl:password
Hashed passwords in dump 鍖les
"create table" "insert into"
"pass|passwd|password" (ext:sql | ext:dump |
ext:dmp)
intext:"password|pass|passwd"
intext:"md5|sha1|crypt" (ext:sql | ext:dump |
ext:dmp)
Emin Islam Tatl脹 (University of Mannheim) Google Hacking for Cryptographic Secrets
10. Outline
Hashed Passwords
Google Hacking
Secret Keys
Cryptographic Secrets
Public Keys
Automatic Tools
Private Keys
Countermeasures
Encrypted Messages
Google Code Search
Signed Messages
Conclusion
Secret Keys
Secret keys in Kerberos
inurl:"kdc.conf" ext:conf
inurl:"slave datatrans" OR inurl:"from master"
Java keystores
keystore ext:ks
Emin Islam Tatl脹 (University of Mannheim) Google Hacking for Cryptographic Secrets
11. Outline
Hashed Passwords
Google Hacking
Secret Keys
Cryptographic Secrets
Public Keys
Automatic Tools
Private Keys
Countermeasures
Encrypted Messages
Google Code Search
Signed Messages
Conclusion
Public Keys
PGP public keys
"BEGIN PGP PUBLIC KEY BLOCK" (ext:txt | ext:asc |
ext:key)
Public keys in certi鍖cates
"Certificate:Data:Version" "BEGIN CERTIFICATE"
(ext:crt | ext:asc | ext:txt)
Emin Islam Tatl脹 (University of Mannheim) Google Hacking for Cryptographic Secrets
12. Outline
Hashed Passwords
Google Hacking
Secret Keys
Cryptographic Secrets
Public Keys
Automatic Tools
Private Keys
Countermeasures
Encrypted Messages
Google Code Search
Signed Messages
Conclusion
Private Keys
PGP private keys
"BEGIN (DSA|RSA)" ext:key
"BEGIN PGP PRIVATE KEY BLOCK" inurl:txt|asc
"index of" "secring.gpg"
Emin Islam Tatl脹 (University of Mannheim) Google Hacking for Cryptographic Secrets
13. Outline
Hashed Passwords
Google Hacking
Secret Keys
Cryptographic Secrets
Public Keys
Automatic Tools
Private Keys
Countermeasures
Encrypted Messages
Google Code Search
Signed Messages
Conclusion
Encrypted Messages
PGP encrypted 鍖les
-"public|pubring|pubkey|
signature|pgp|and|or|release" ext:gpg
More encrypted 鍖les
-intext:"and" (ext:enc | ext:axx)
XML encrypted elements
"ciphervalue" ext:xml
Emin Islam Tatl脹 (University of Mannheim) Google Hacking for Cryptographic Secrets
14. Outline
Hashed Passwords
Google Hacking
Secret Keys
Cryptographic Secrets
Public Keys
Automatic Tools
Private Keys
Countermeasures
Encrypted Messages
Google Code Search
Signed Messages
Conclusion
Signed Messages
Signed emails
"BEGIN PGP SIGNED MESSAGE" "From" "Date"
"Subject" (ext:eml | ext:txt | ext:asc)
File signatures
-"and|or" "BEGIN PGP SIGNATURE" ext:asc
PGP signed messages
"BEGIN PGP SIGNED MESSAGE" -"From" (ext:txt |
ext:asc | ext:xml)
Emin Islam Tatl脹 (University of Mannheim) Google Hacking for Cryptographic Secrets
15. Outline
Google Hacking Gooscan
Cryptographic Secrets Sitedigger
Automatic Tools Goolink
Countermeasures AdvancedDork
Google Code Search Google Advanced Operations Toolbar
Conclusion
Automatic Tools
1 Gooscan
2 Sitedigger
3 Goolink
4 AdvancedDork
5 Google Advanced Operation Toolbar
Emin Islam Tatl脹 (University of Mannheim) Google Hacking for Cryptographic Secrets
16. Outline
Google Hacking Gooscan
Cryptographic Secrets Sitedigger
Automatic Tools Goolink
Countermeasures AdvancedDork
Google Code Search Google Advanced Operations Toolbar
Conclusion
Gooscan [7]
a Unix/Linux script to check google hacking queries against
your system
uses GHD [1]
to execute:
$ gooscan -t www.google.de -q "BEGIN (DSA|RSA)
ext:key" -s de -o output.html
Emin Islam Tatl脹 (University of Mannheim) Google Hacking for Cryptographic Secrets
17. Outline
Google Hacking Gooscan
Cryptographic Secrets Sitedigger
Automatic Tools Goolink
Countermeasures AdvancedDork
Google Code Search Google Advanced Operations Toolbar
Conclusion
Sitedigger [6]
free from Foundstone
company
supports both GHD and
Foundstones own hacking
database
for a given host, all entries in
the database are queried
Emin Islam Tatl脹 (University of Mannheim) Google Hacking for Cryptographic Secrets
18. Outline
Google Hacking Gooscan
Cryptographic Secrets Sitedigger
Automatic Tools Goolink
Countermeasures AdvancedDork
Google Code Search Google Advanced Operations Toolbar
Conclusion
Goolink [5]
Goolink queries Google for a
particular chosen search from
GHD
Emin Islam Tatl脹 (University of Mannheim) Google Hacking for Cryptographic Secrets
19. Outline
Google Hacking Gooscan
Cryptographic Secrets Sitedigger
Automatic Tools Goolink
Countermeasures AdvancedDork
Google Code Search Google Advanced Operations Toolbar
Conclusion
AdvancedDork [2]
not speci鍖c to google
hacking
a Firefox extension for google
searches
Emin Islam Tatl脹 (University of Mannheim) Google Hacking for Cryptographic Secrets
20. Outline
Google Hacking Gooscan
Cryptographic Secrets Sitedigger
Automatic Tools Goolink
Countermeasures AdvancedDork
Google Code Search Google Advanced Operations Toolbar
Conclusion
Google Advanced Operations Toolbar [3]
a Firefox extension
provides a shortcut of Googles advanced search functions
Emin Islam Tatl脹 (University of Mannheim) Google Hacking for Cryptographic Secrets
21. Outline
Google Hacking
Cryptographic Secrets
Automatic Tools
Countermeasures
Google Code Search
Conclusion
Security Countermeasures
1 Use automatic tools to check your system
2 Use Robot Exclusion Standart (robots.txt)
3 Install and manage Google Honeypot [4]
Emin Islam Tatl脹 (University of Mannheim) Google Hacking for Cryptographic Secrets
22. Outline
Google Hacking
Cryptographic Secrets
Automatic Tools
Countermeasures
Google Code Search
Conclusion
Google Code Search
search keywords within source 鍖les
(www.google.com/codesearch)
鍖nd application bugs (e.g. sql injection, xss injection, bu鍖er
over鍖ows, etc.) in the source 鍖les
Emin Islam Tatl脹 (University of Mannheim) Google Hacking for Cryptographic Secrets
23. Outline
Google Hacking
Cryptographic Secrets
Automatic Tools
Countermeasures
Google Code Search
Conclusion
Conclusion
Cryptography requires secrets to be kept secret
Google indexes your secrets and makes public
Take the required security countermeasures and protect your
secrets
Emin Islam Tatl脹 (University of Mannheim) Google Hacking for Cryptographic Secrets
24. Outline
Google Hacking
Cryptographic Secrets
Automatic Tools
Countermeasures
Google Code Search
Conclusion
References I
Google Hacking Database. http://johnny.ihackstu鍖.com
AdvancedDork- A Firefox extension for google searches.
http://johnny.ihackstu鍖.com
Google Advanced Operation Toolbar.
https://addons.mozilla.org/鍖refox/1258/
Google Hack Honeypot Project. http://ghh.sourceforge.net
Goolink- Security Scanner.
www.ghacks.net/2005/11/23/goolink-scanner-beta-preview/
Emin Islam Tatl脹 (University of Mannheim) Google Hacking for Cryptographic Secrets
25. Outline
Google Hacking
Cryptographic Secrets
Automatic Tools
Countermeasures
Google Code Search
Conclusion
References II
SiteDigger v2.0 - Information Gathering Tool.
http://www.foundstone.com
Gooscan - Google Security Scanner.
http://johnny.ihackstu鍖.com
Emin Islam Tatl脹 (University of Mannheim) Google Hacking for Cryptographic Secrets