Monday, June 25, 2018

Google Hacking........


Hey , 
        I'm MahaKaaL . And you known me. Today i'ill telling you  What Is Google Hacking?



History of Google Hacking?

The concept of "Google Hacking" dates back to 2002,when Johnny Long began to collect interesting Google search queries that uncovered vulnable systems and sensitive information disclosures.

The list of google Dorks grew into large dictionary of queries,which were eventually organized into the original Google Hacking Database (GHDB) in 2004. These Google hacking techniques were the focus of a book released by Johnny Long in 2005 called Google Hacking for Penetration testers.

Since its heyday,the concepts explored in Google Hacking have been extended to other search engines , such as Bing and Shodan. Automated attack tools use custom search dictionaries to find vulnerable system and sensitive information disclosures in public system that have been indexed by search engines.

For a full visual timeline, delailing the major events and developments in Google Hacking from 2002 to present , see the Google Hacking History by Bishop Fox.






What Is  Google Hacking??

Google hacking involves using advanced operators  in the Google search engine to locate  specific strings of text within search results. Some of the more popular examples are finding specific versions of vulnerable Web applications. The following search query would locate all web pages that have that particular text contained within them.






There are two types of Google operators:-
  • Basic Operators
  • Advance Operators
Basic Operators: -(+, -, ~, ., *, “”, OR)
“ + ” (It force inclusion of something common)
Using “+”It forces Google to search for a particular keyword. Its includes all web pages where both keywords occur. Do not put a space after the “+”.
Google Hacking-1



The minus operator does reverse. It gives you search results without the keyword placed after the operator. Do not put a space after the “–“
google hacking
The tilde symbol generally suggests ‘similar to’.
google hacking


double dots help you to search within a range of two numbers.
google hacking


Asterisk operator (*) is handy when you are sure of more keywords are missing.
google hacking
Surround a word or a phrase with double forces Google to search for pages that contain it exactly in the same form.
google hacking
Using OR (in uppercase) with two or more keywords tells Google to search for pages that contain either of the words.
Example: apple OR samsung
google-7


Advance Operators?

OperatorPurposeMixes with Other Operators?Can be used Alone?WebImagesGroupsNews
intitleSearch page Titleyesyesyesyesyesyes
allintitle[3]Search page titlenoyesyesyesyesyes
inurlSearch URLyesyesyesyesnot reallylike intitle
allinurlSearch URLnoyesyesyesyeslike intitle
filetypespecific filesyesnoyesyesnonot really
intextSearch text of page onlyyesyesyesyesyesyes
allintextSearch text of page onlynot reallyyesyesyesyesyes
siteSearch specific siteyesyesyesyesnonot really
linkSearch for links to pagesnoyesyesnononot really
inanchorSearch link anchor textyesyesyesyesnot reallyyes
numrangeLocate numberyesyesyesnononot really
daterangeSearch in date rangeyesnoyesnot reallynot reallynot really
authorGroup author searchyesyesnonoyesnot really
groupGroup name searchnot reallyyesnonoyesnot really
insubjectGroup subject searchyesyeslike intitlelike intitleyeslike intitle
msgidGroup msgid searchnoyesnot reallynot reallyyesnot really

intitle:- Restricts your search to the titles of web pages and provide exact result.
Example:
armour-infosec-google

allintitle:- Find pages where in all word specified make up the title of the web page.
Example
allintitle:Armourinfosec
inurl : Restricts your search to the URLs of web pages.
inurl :armour-infosec
inurl:password
armour infosec google
intext :- searches only in body text and provide text results according to your search query (i.e., ignores link text, URLs, and titles).
Example:
google hacking
filetype :- Search for thesuffixes’ or filename extensions. These are usually, but notnecessarily, different file types.
Example:
armour-infosec-google-3


site:- It allows the user to narrow your search by either a site or a top-level domain.
Example:
google hacking

inanchor:- searches for texts in a page of link anchors. A link anchor is a descriptivetext of a link.
Example:
google hacking
link:- It giveslisting of pages those which are linked to a specified URL.
Example:
google hacking
cache:- It finds a copy of the page that Google indexed and it give exact date and time.
Example:
google hacking


related:- It finds those pages which are related to the specified page.
google hacking
info:- provides a page of links to more information about a specified URL.
google hacking
Google Hacking techniques?
    • Exploring title messages from servers, e.g. intitle:"Welcome to IIS 4.0" You can see the results here. This is a list of servers running what is in the message, in the case IIS 4.0.
    • Exploring server messages in the URL, e.g."VNC Desktop" inurl:5800 You can see the results here. This is a list of servers running VNC in port 5800 (we will study VNC as a remote control software and its vulnerabilities later in the course).
    • Exploring filetype to find servers with FrontPage vulnerabilities, e.g. filetype:pwd service Note that pwd is not one of the types listed above, but Google still looks for service.pwd and you can see the results here. This is a list of usernames and encrypted passwords. As we will study later in the course a hacker can use John the Ripper to crack the password using brute force. The damage here is defacing a Web site, but users tend to repeat username and passwords elsewhere.
    • Exploring filetype and inurl to find password files in servers, e.g. filetype:bak inurl:"htaccess|passwd|shadow|htusers" and you can see the results here. This is a list of usernames and encrypted passwords for login in servers. The damage here can be devastating, if the root password is available, as in one case it is. We will discuss UNIX/Linux vulnerabilities, the use of shadow passords, etc, later in the course.
    • Exploring filetypeinurl and intext to find DB passwords, e.g. filetype:properties inurl:db intext:password and you can see the results here. This is a list of files containing username and password in databases. Once more you can see the root password, and in one case is blank!?!?

    • Exploring security vulnerability scanners' output, not even using operators, e. g. "This file was generated by Nessus" and see the results here. This is a list of vulnerabilities found in servers generated by the Nessus scanner that were not deleted from the servers after it was run. The hacker has the vulnerabilities identified for him/her ...
                                                                                                                                          By: MahaKaaL

No comments:

Post a Comment