Transfer from Wljhttp://risker.org/
Today, Google has become a search engine representative, smart people continue to explore Google's new usage, at the Blackhat conference held in Las Vegas in 2004, two security experts have called you Found That on Google? And the theme speech of Google Attacks. Personally feel quite wonderful, so compilation, brief introduction, do not understand, but hope can attract everyone's attention. 1. Views Google and similar search engines also have a certain potential risk while providing people with a lot of convenience. The "Senior Scene" in the network is numerous; using search engines quickly find hosts and other devices with vulnerability; use search engines to quickly find information containing sensitive data; use the "scan" of the search engine to hide, and due to its It is often more data from ARCHIVE, CACHE. Therefore, people need to improve the alertability, while making good use of search engines, it is also good at protecting themselves. 2. Case 2.1 Basic so-called "Want to do good things, must be aware," to use Google to perform "infiltration test", first of course, to understand Google, it is recommended to refer to this article for Google. Google Search is from getting started. Simply understand some of Google's operators, such as: Site, Inurl, FileType, Intitle, etc ...
2.2 Demonstration to do is not complex, and the penetration tester is often collected before implementing the attack, and then the vulnerability confirmation and the final vulnerability utilization, expand the results. Here our goal is: Find the host of the PHP Webshell back door with the Google lookup, and test whether it can be used. We fill in in Google's search box: INTITLE: "PHP shell *" "Enable stderr" FileType: PHP search results, maybe you can find a Web Shell that directly executes commands on the machine.
This is a way of operation similar to a hacker tool. In you found That on Google, you will see a lot of practical cases, Google found a large number of passwords, credit card accounts, network management information, etc. ... 2.3 Tools and anti-two sides, automated tools are You can improve efficiency, hereby introduce several tools: Gooscan is used to deal with a small command line program for search results, and can reduce the "physical labor" burden when Query Google is degrees to a certain extent. The interface is as follows:
Sitedigger This is a free software for Foundstone, with the Google's API interface, and the user needs to get a license string first to the Google API website to get a license string. Before using it, it is recommended to automatically connect to the network update rule base. You can also refer to its white paper.
Athena is similar to SITEDIGGER. It is a tool for finding information or abuse with a search engine to support multi-search engines.
3. Solution 3.1 How should we do? Our information is so easy to get it, what way should this adopt to avoid this attack or data collection? Strict audit and responsibility tracing of information release; use related tools to search on the Internet, if information is abused, remove the information you want to delete from Google; control robots.txt, control the search engine robot query . 3.2 Summary or end this short introduction with a picture drawn by a FreeMind: