Pages

Search This Blog

Sunday

Hands-on Project 1 – 2 (Practical 1)

Objective: Use Google Reconnaissance

Just as Google can be used to locate almost anything stored on web servers, it can also be used by attackers in order to uncover unprotected information or information that can be used in an attack. This is sometimes called “Google reconnaissance.” Thus, we will perform Google reconnaissance.

1) Open your Web browser and enter the URL http://www.google.com/.

2) Click Advanced Search to display the cool Advanced Search screen.

3) First you will search for any Microsoft Excel spreadsheet that contains the words login: and
    password=. In the text box “Find web pages that have . . . all these words:” enter “login:*”
    “password=*” (be sure to include the quotation marks).

4) Under File type click the down arrow and select Microsoft Excel (.xls).



5) Click Advanced Search. The pages of results will be displayed. Open selected documents and view
    their contents. Note that some of the results are only blank spreadsheets that had headings
    “Login:” and “Password=”. However, other documents actually contain user login names and passwords.
    Return back to the Google Advanced Search page.

6) This time you will look for a text file that contains a list of passwords in cleartext. In the text box
    “Find web pages that have . . . all these words.” erase any content and replace it with “index.of
    passlist” (be sure to include the quotation marks). Under File type click the down arrow and select any
    format.



7) Click Advanced Search. The pages of results will be displayed. Open selected documents and view their
    contents. Return to the Google Advanced Search page.

8) Google and other search engines are aware of these attempts by attackers to use their search engines for
    malicious means. Because of this, the search engines now will filter and deny requests for specific types of
    searches. For example, one type of search that attackers used was to look for a range of credit card
    numbers that might be available. In the text box “Find web pages that have. . . all these words.” erase any
    content and replace it with visa 4356000000000000.. 4356999999999999. Note how Google denies
    this request.





9) Close your Web browser.

Reflection

After doing this project, I finally know how the attackers use this simple search tool to search for unprotected information and password. In future, whenever I put my information or password online, I will make sure that they are protected so that the attackers can’t access to it.

2 comments:

  1. I hope to see more post from you. Thank you for sharing this post. Your blog posts are more interesting and impressive

    Umeed Career Portal

    ReplyDelete
  2. Your blog is filled with unique good articles! I was impressed how well you express your thoughts.

    Ultimatix App TCS | Ultimatix App Download

    ReplyDelete