Google Hacking Week : Grab juicy info with the right search query.

Feb 28

So we showed you how powerful a good Google search could be this week. Time to turn to the dark side and give you some examples of how hackers can use these skills to get to some pretty scary things. To create a dangerous situation where the wrong information can fall into the wrong hands, you need 2 ingredients. Somebody who is stupid enough to put it online, and somebody who is clever enough to find it. Below are some pretty creepy examples of how some Google dorks spill some information that was supposed to be private.

hackers_4996108_lrg

Some juicy searches.

Some people write down their domain registration information in a .doc file .. and then put it on the internet. Whoever can put two and two together .. can steal their domain.

  • filetype:docx Domain Registrar $user $pass

How about finding product licence files for the Avast antivirus program ? Some of them are just up for grabs.

  •  

    filetype:avastlic

How about we go searching for a randomly published list of phonenumbers.

  • allinurl:phonenumbers filetype:xls

Search for random resume’s that candidates (or their employees) put online.

  • inurl:Curriculum Vitae filetype:pdf

How about some “Confidential Salary” documents that people put online. (we stood in awe at the first hit )

  • ext:(doc | pdf | xls | txt | ps | rtf | odt | sxw | psw | ppt | pps | xml) (intext:confidential salary | intext:”budget approved”) inurl:confidential

Or take a peek at people’s random downloaded hotmail emails. 

  • inurl:getmsg.html intitle:hotmail

Its a little bit of history .. but how about a random netscape browser history file. (we giggled at THIS one)

  • inurl:netscape.hst

And when combining this generic search query for root directories of certain FTP servers with a certain domain .. you can find out a lot. If you use it as listed below .. its just an interesting way to browse random file directories.

  • intitle:”FTP root at”

Msn messenger does not exist anymore, but there are plenty of contact lists well stocked with juicy email addresses up for grabs.

  • filetype:ctt “msn”

And the list goes on and on and on. Now, standing by themselves the Google searches above are quite harmless. They are too generic to do any harm and are only good for a chuckle. The dangerous part begins when these queries are targeted at a certain person, site our domain. Armed with ONLY their browser and an internet connection, the wrong people can find out all the right things they need to know to make you / your company / your website have a really bad day. Knowledge is power and it is also ambivalent. It can be used for good and for evil… So are you SURE that there is not digital flotsam with your username/passwords floating around on the internet ? Because once Google indexes it .. anybody with the right skills can find it.

Related Posts

Keep track of all your passwords on your Android phone with Keepass2android.

Dec 04

Keeping track of all your logins and passwords for the hundreds of sites and services you are registered with is something that is a terrible hassle. For convenience sake we use the same logins (and even passwords) on different services and constantly need to request ‘resets’ and ‘reminders’ when we forget the password to our “One Direction” fanpage. So instead of getting Rainman as a permanent sidekick to help us remember all our passwords and logins , why not use an app for that ? 

keepass2android

There are plenty of password management applications out there, but because you are a “slider” and go from operating system to operating system, having your password management software available “everywhere” is a MUST. Our favorite app that lives both on Windows, Linux and the Mac is KeepassX. A free application that lets you organise and keep track of all the logins and passwords you have AND can generate supercool “random” passwords that are very very hard to crack.

The password database that KeepassX uses is “locked” with a master password (for example abc123 ?) so nobody can open up your “black book” without your knowledge or permission. When you store the database on a network share (or in the cloud via Dropbox or Bittorrent Sync) you can access it from different machines on different locations… So how about from your mobile ? 

Enter Keepass2android : A keepassX client for your android mobile phone. The interface is “mobile friendly” and in combination with Dropbox or another cloud service like Skydrive or whatever. Store the database somewhere where you can reach it, open it up with the keepass2android client and you will never have to write down a password on the inside of your shoe .. ever again.

But beware : The ‘master password’ of your database file is your achilles heel. If you lose your phone and have an offline copy of that database on your phone … all that stands between the “evil one” and ALL your passwords is that one master password. So make it a pass-phrase. We have some examples for you : 

“0MG1soLOVEjusTinBieBerRightNow!!!” “W3@llL1v31nAY3ll0w_SubM@r1n3” “supercalligragulasslyexpealidocious1049!!!_X” … And so on …

Keepass2android is free and is available in the Google Play store.

 

Related Posts

kw608 : Sniffing anyones Wifi with a Pineapple.

Jul 26

sniffing-wifi
Time to raise the hairs on the neck of all Wifi-enabled laptop and mobile phone users in this interesting interview with Gerjon McVries ( @mcvries on Twitter) about “The pineapple” and its awesome (and malevolent) potential when it comes to exploiting basic flaws in Wifi enabled devices. If you were worried about the NSA sniffing your traffic in the Prism debacle, then try not to realise that a 14 year old scriptkiddie with a paypall account could buy this awesome toy and sniff every bit you transmit.

Shownotes

Related Posts


Do we need cyber-locksmiths?

Aug 25

 

By Daniel "Captain Command Line" Turner. (more at http://dannyturner.dyndns.org/ )

DanComputerized.

Everything today is computerized, your comunications, you finances, many people's enjoyment, travel, even friendships! And all of this is passworded. Imagine, having to recite a secret code just to talk to a friend, it sounds stupid, but millions of people are doing it every day, with MySpace, Instant Messaging and VoIP. But what about the things that hide below, the things that no-one talks about–the OS. Mac, Windows, Linux and BSD, They all now have the capability to require a password to login. Linux, Mac and BSD are the worst here, password this, password that. Root to install this, root to tweak that, root to fix something. What happens when end users use this passwording capability? Windows has it covered, with the "Forgot Password" button, that shows a preset hint. But what of Linux, Mac and BSD? Is their security too strong? Say I give a Ubuntu or PC-BSD desktop to a family, give them all a username and a password, but not root priviledges. I wisper the root password in old dad's ear, tell him it's special, to change it, to remember it well.Fast forward 2 weeks, or a month or what ever, and little Johnny wants to install program xyz for his homework (especially easy for  PC-BSD), but keeps getting the dialogue box "Please input root password" What's he to do? He's confused. He goes and asks dear ol' Dad, who by now, having no need for the root password has completely forgotten it, he didn't even change it. Oh dear, they're locked out of their own PC.

Lost.

They've effectivley lost they keys to their virtual home.Who do they call? Where's a locksmith when you need one. Get a LiveCD you say, change the GRUB kernel arguments you say, use John the Ripper you cry? Sure, this non-techie family is going to know exactly what to do, where to get a live CD, how to find the shadowed password, what program to put it in, how long to wait, what to look for. Yes, they're going to  know all of this. Sure. To them, this magic black box that holds all that is dear to them is refusing to play nice.So, pick up the phone they do, phone up the computer support guy and ask "What's the root password, and why do I need it?" Many computer support operations are Windows-only (not the one in my home town, but many that I know of). So they get the answer back "The what password?" Oh dear, now they're in deep doo-doos. They take it to PC World, who last time I checked in Britain, is a Windows only operation. So what to they see? They see PC-BSD or Ubuntu boot. They see a different login window. They have no idea what "root" is, or why it's asking for his password. If you're lucky, a Linux or BSD 'nerd' might work there, and immediately know what to do, pulling a LiveCD from his kit, loading BackTrack, going straight for /etc/passwd and then the shadow, if there is one. Pulling a seemingly random string of characters, and loading it into John the Ripper. Sure, that might happen, but it might not. So you're back to square one, a 'broken' but some how functional PC.
Who do you call when you're locked out of your virtual house? Grab the yellow pages and look under "Cyber Locksmiths"? No, there's no one, unless you are lucky when you walk through the door of PC World, your home-grown computer support shop round the corner, or you have an extremely techie friend. Failing this, you are done for.

Where is the button ?

So where's the reset password button, I ask, When's the password hint going to make it into Linux and BSD, or is this just to stupid, to question the security of the OS, just for the user to actually be able to use the OS? So far, this has been fine (well, almost) for Microsoft. Microsoft have been to busy putting out patches of XP to even get an OS out in 5 Years, where as Linux and BSD have grown by leaps and bounds, grabbing market share in government and school computers. Even in the developing world, Linux is taking hold. Linux has had a hold for years in the hobbyist, enthusiast market since it was born as a terminal emulator that ran off a floppy so that Linus Torvalds could use his university account, and learn to use the 386 instruction set. By it's very nature, it's heavily technical.So,  I call unto the gods of the copmuter world (Jobs, Torvlads and Gates) create Cyber-Locksmiths!

Related Posts