Professional Documents
Culture Documents
Presented by:
Francis Brown and Rob Ragan
Stach & Liu, LLC
www.stachliu.com
Goals
DROP KNOWLEDGE ON YOU
3
Google/Bing Hacking
SEARCH ENGINE ATTACKS
4
Attack Targets
GOOGLE HACKING DATABASE
5
Attack Targets
GOOGLE HACKING DATABASE
6
New Toolkit
STACH & LIU TOOLS
Google Diggity
• Uses Google AJAX API
• Not blocked by Google bot detection
• Does not violate Terms of Service
• Can leverage
Bing Diggity
• Uses Bing 2.0 SOAP API
• Company/Webapp Profiling
• Enumerate: URLs, IP-to-virtual hosts, etc.
• Bing Hacking Database (BHDB)
• Vulnerability search queries in Bing format
7
New Toolkit
GOOGLEDIGGITY
8
New Toolkit
BINGDIGGITY
9
New Toolkit
STACH & LIU TOOLS
GoogleScrape Diggity
• Uses Google mobile interface
• Light-weight, no advertisements
• Violates Terms of Service
10
New Hack Databases
ATTACK QUERIES
11
New Hack Databases
ATTACK QUERIES
SLDB Examples
• ext:(doc | pdf | xls | txt | ps | rtf | odt | sxw | psw |
ppt | pps | xml) (intext:confidential salary |
intext:"budget approved") inurl:confidential
12
NEW GOOGLE HACKING TOOLS
DEMO
13
Traditional Defenses
GOOGLE HACKING DEFENSES
14
Traditional Defenses
GOOGLE HACKING DEFENSES
15
Advanced Defenses
PROTECT YO NECK
16
Existing Defenses
“H A C K Y O U R S E L F”
9 Tools exist
8 Convenient
8 Real-time updates
8 Multi-engine results
8 Historical archived data
8 Multi-domain searching
17
Advanced Defenses
NEW HOT SIZZLE
18
Google Hacking Alerts
ADVANCED DEFENSES
19
Google Hacking Alerts
ADVANCED DEFENSES
20
Bing Hacking Alerts
ADVANCED DEFENSES
21
Bing/Google Alerts
THICK CLIENTS TOOLS
22
ADVANCED DEFENSE TOOLS
DEMO
23
New Defenses
“G O O G L E / B I N G H A C K A L E R T S”
9 Tools exist
9 Convenient
9 Real-time updates
9 Multi-engine results
9 Historical archived data
9 Multi-domain searching
24
Google Apps Explosion
SO MANY APPLICATIONS TO ABUSE
25
Google PhoneBook
SPEAR PHISHING
26
Google Code Search
VULNS IN OPEN SOURCE CODE
27
GOOGLE CODE SEARCH HACKING
DEMO
28
Google Code Search
VULNS IN OPEN SOURCE CODE
29
Google Code Search
VULNS IN OPEN SOURCE CODE
30
Black Hat SEO
SEARCH ENGINE OPTIMIZATION
31
Google Trends
BLACK HAT SEO RECON
32
Defenses
BLACKHAT SEO DEFENSES
• Sandbox Software
• Sandboxie (sandboxie.com)
• Dell KACE - Secure Browser
• Office 2010 (Protected Mode)
• Adobe Reader Sandbox (Protected Mode)
34
Mass Injection Attacks
MALWARE GONE WILD
35
Malware Browser Filters
URL BLACK LIST
36
Inconvenient Truth
DICKHEAD ALERTS
37
Advanced Defenses
PROTECT YO NECK
38
Malware Diggity
ADVANCED DEFENSES
Malware Diggity
• Uses Bing’s linkfromdomain: directive to identify off-site links of the domain(s)
you wish to monitor
• Immediately lets you know if you have been compromised by one of these
mass injection attacks or if your site has been black listed
39
Malware Diggity
ADVANCED DEFENSES
40
Malware Diggity
ADVANCED DEFENSES
41
42
Malware Monitoring
INFECTION DETECTION
Identify
External Links
Identify
Alert Incoming Links
Detect Compare to
Infections Black List
43
Search Engine deOptimization
BLACK LIST YOUR FOES
Identify
Malware Links
Mass Inject
Profit Competition
Competition Competition
PageRank is 0 Black Listed
44
Future Direction
PREDICTIONS
45
Predictions
FUTURE DIRECTIONS
46
Real-time Updates
FUTURE DIRECTIONS
47
Questions?
Ask us something
We’ll try to answer it.
For more info:
Email: contact@stachliu.com
Project: diggity@stachliu.com
Stach & Liu, LLC
www.stachliu.com
Thank You
49