• Aucun résultat trouvé

Google Hacking

N/A
N/A
Protected

Academic year: 2022

Partager "Google Hacking"

Copied!
27
0
0

Texte intégral

(1)

Google Hacking

Making Competitive

Intelligence Work for You

Google Hacking

Making Competitive Making Competitive

Intelligence Work for You

Intelligence Work for You

(2)

Copyright 2008 Security Constructs, LLC All rights Reserved

Competitive Intelligence Competitive Intelligence

1. What is it?

2. How is it done?

3. Is it legal?

4. How do we prevent it?

1. What is it?

2. How is it done?

3. Is it legal?

4. How do we prevent it?

(3)

Asking Questions

Asking Questions

Basics

– Who – What – When – Why – Where – How Basics

– Who

– What – When

– Why

– Where

– How

“Godiva Chocolatier Inc”

– What business is it in?

– How big is it?

– Where are they located?

– Is it publicly traded?

– What are the annual sales and growth?

– Pending legal issues?

(4)

Copyright 2008 Security Constructs, LLC All rights Reserved

Refining the

Search Refining

the

Search

1. Use “intitle” versus “inurl” (looking for dirt)

2. Scour news sites and newsgroups 3. Check financial filings

4. Check security analyst reports 5. Use Google Groups and Blogs

1. Use “intitle” versus “inurl” (looking for dirt)

2. Scour news sites and newsgroups 3. Check financial filings

4. Check security analyst reports

5. Use Google Groups and Blogs

(5)

Google Tools Google Tools Google Tools

Google Answers (retired) answers.google.com Google Scholar scholar.google.com

Google Earth earth.google.com

Google Patent Search www.google.com/patents Google Blog Search blogsearch.google.com Google Alerts www.google.com/alerts

Google Maps maps.google.com

(6)

Copyright 2008 Security Constructs, LLC All rights Reserved

Google Options

Google Options

(7)

Google Maps

Google Maps

(8)

Copyright 2008 Security Constructs, LLC All rights Reserved

Google Maps – Satellite

Google Maps – Satellite

(9)

Google Maps – Satellite

Google Maps – Satellite

(10)

Copyright 2008 Security Constructs, LLC All rights Reserved

Google Earth – 3D Satellite Google Earth – 3D Satellite

3 Levels:

Free

Plus - $20

Pro - $400

(11)

Google Maps - Intel Google Maps - Intel

1. Auto traffic

1. Manufacturing schedules 2. Production cycles

2. Parking lot analysis – personnel

1. Executives – dedicated parking 2. Department Heads – early arrivals

3. Security arrangements 4. Plant expansion

1. Auto traffic

1. Manufacturing schedules 2. Production cycles

2. Parking lot analysis – personnel

1. Executives – dedicated parking 2. Department Heads – early arrivals

3. Security arrangements

4. Plant expansion

(12)

Copyright 2008 Security Constructs, LLC All rights Reserved

Looking Inside Looking Inside

View Operationally:

Type of Equipment

OS used / vulnerabilities Personnel traffic

Business Operations

(13)

Google Alerts Google Alerts

Constant Information Leakage Monitoring (counter-intelligence)

Note that some search terms are

“explicit”

and

others

(14)

Copyright 2008 Security Constructs, LLC All rights Reserved

Additional Google Related Tools Additional Google Related Tools

•Open Directory Project dmoz.org

•ResearchBuzz

www.researchbuzz.org

•TouchGraph GoogleBrowser

www.touchgraph.com/TGGoogleBrowser.html

(15)

Open Directory Project

Open Directory Project

(16)

Copyright 2008 Security Constructs, LLC All rights Reserved

ResearchBuzz

ResearchBuzz

(17)

TouchGraph

TouchGraph

(18)

Copyright 2008 Security Constructs, LLC All rights Reserved

Document Grinding Document Grinding

Username password email Filetype:xls

Notice that this is

a spreadsheet

With the search

terms highlighted

(19)

Metadata analysis Metadata analysis

Author

Creation dates…

Hidden Hyperlinks

Additional points of data leakage

Using Metadata Assistant

(20)

Copyright 2008 Security Constructs, LLC All rights Reserved

Counter Competitive Intelligence

Counter Competitive Intelligence

1. Conduct CI on yourself – your competitors are 1. Build a competitive profile

2. Who are the movers and shakers 3. Lines of business…….

2. What type of information is leaking and from where?

3. Can a business process be modified?

4. Active disinformation? (running equipment at odd times…) 5. Will a new policy help? (business or security)

6. Can I leverage existing security technologies?

7. Are there new technologies?

(21)

Case Study Case Study

1. Los Alamos and Oak Ridge Spear Phishing attack 1. Visitor database only

2. 12 different attackers, 7 emails to 1000's of employees

3. Which scientist visited, how often and what is their expertise.

4. Allows us to build a competitive profile of the type of research being done at these facilities and by extension what type of research these facilities are capable of.

2. What about your business?

1. Whaling Attack – phishing your executives 2. Specific companies

3. Specific groups within a company 1. Who are the movers and shakers

2. Email addressing schema (look and feel)

(22)

Copyright 2008 Security Constructs, LLC All rights Reserved

What Can I Learn?

What Can I Learn?

(23)

Interpretation

Interpretation

(24)

Copyright 2008 Security Constructs, LLC All rights Reserved

Flexible Protection Architecture

Flexible Protection Architecture

1. Policies

2. Procedures 3. Contracts

4. Vendor selection 5. Auditing

6. Active Protections 7. Passive Protections 1. Policies

2. Procedures 3. Contracts

4. Vendor selection 5. Auditing

6. Active Protections

7. Passive Protections

(25)

Johnny.ihackstuff.com Johnny.ihackstuff.com Johnny.ihackstuff.com

Google Hacking for Penetration Testers Johnny Long

Google Hacking for Penetration Testers Johnny Long

Building Research Tools with Google for Dummies

Harold Davis

(26)

Copyright 2008 Security Constructs, LLC All rights Reserved

Conclusions Conclusions

•If its on Google its probably public information

•Google has many tools built in

•Many tools are built on Google APIs

•Always start with "the question.”

Then refine, research, refine...

•Don't forget the documents themselves

•Build a profile, use it to improve your security

(27)

Questions?

Questions?

Tom.Bowers@securityconstructs.com

Références

Documents relatifs

+ Ne pas supprimer V attribution Le filigrane Google contenu dans chaque fichier est indispensable pour informer les internautes de notre projet et leur permettre d’accéder à

Il continuait à s'assujettir à toutes les ré- ceptions officielles et privées et à toute» les étiquettes de sa chambre et du palais qui pou- vaient tromper tes courtisans et son

seule chose que je puisse admettre , c’est que , si la société des Templiers existait réellement , ce dont je doute beau- coup , du temps de Massillon , Fénélon et des autres

Que des hommes oififs don- nent dans ces jeux enfantins , on tolére- ra leur amufement ; mais qu’ils n’entrai- nent point avec eux des gens qui pou- roient pafler pour

Pour revenir à nous , mes Frères , je dois vous rappeler la position de la des Cœurs Fidèles au mo- ment de la reprise de ses travaux , il y a maintenant dix mois ; je dois vous

Il est possible de modifier par la suite le positionnement des points de repères (point de vitesse max positionné trop loin et donc dans la zone de

Dans cette manière ou trouve la prononciation pour xe, xu, mais avec les autres voyelles et à la fin des syllabes ce x se prononce plus fort encore et Ton sera forcé de consulter

Avec cette Google Analytics, vous avez la possibilité de voir les pages de votre site les plus vues et pendant combien de temps les internautes restent sur votre site. Ceci