ss_blog_claim=a290fbfb2dabf576491bbfbeda3c15bc

Friday, February 29, 2008

It's called "Google hacking"the way to unearth sensitive material mistakenly posted to public Web sites.

Automated 'Google Hacking' Software for Unearthing Data on Other Sites Triggers Security Fears


SAN JOSE, Calif. (AP) -- It's called "Google hacking" -- a slick data-mining technique used by the Internet's cops and crooks alike to unearth sensitive material mistakenly posted to public Web sites.
ADVERTISEMENT




And it's just gotten easier, thanks to a program that automates what has typically been painstaking manual labor. The program's authors say they hope it will "screw a large Internet search engine and make the Web a safer place."

Google hacking doesn't mean anyone's hacking Google's Web site. Rather, it refers to a sophisticated searching technique used to uncover flaws in the way Web sites handle confidential details, such as public files containing password and credit card numbers and clues about the vulnerability of the site's own servers.

It works by examining the hidden recesses of a Web site, areas that have been indexed by Google but don't pop up in traditional searches. Sometimes Web sites accidentally post revealing information about themselves, either because employees mistakenly put confidential documents online, or the site wasn't properly configured to obscure sensitive areas.

Security experts say Google hacking wouldn't be an issue if Web sites had proper security safeguards in place.

By looking through Google for evidence of specific types of files used by a Web site or telling responses from the Web site's servers, hackers can learn a lot about how the site was built -- and thus how to begin crafting their attacks.

Although Google hacking has been used for several years by good guys and bad guys to monitor security, experts caution that the new program, called Goolag, could tip the balance in favor of criminals.

"It just makes their job that much easier -- in a very short period of time they can do all these searches for sensitive information," said Ryan Barnett, director of application security at Breach Security Inc. and a SANS Institute faculty member.

Google hackers have typically had to enter in detailed Google search strings by hand, using specially crafted queries to unearth links buried deep in the list of a site's contents. Google has been able to clamp down on past attempts to automate the process.

Experts say the new program, on the other hand, appears to work differently, tricking Google into believing a real person is typing the queries -- in other words, someone Google would be unlikely to block.

Google declined to comment on Goolag, released by the hacker group Cult of the Dead Cow.



Full Article

No comments:

 
ss_blog_claim=a290fbfb2dabf576491bbfbeda3c15bc