Lord of the Bing
Taking Back Search Engine Hacking From Google and Bing
29 July 2010
Presented by: Francis Brown and Rob Ragan Stach & Liu, LLC www.stachliu.com
Lord of the Bing Taking Back Search Engine Hacking From Google and - - PowerPoint PPT Presentation
Lord of the Bing Taking Back Search Engine Hacking From Google and Bing 29 July 2010 Presented by: Francis Brown and Rob Ragan Stach & Liu, LLC www.stachliu.com Agenda O V E R V I E W Introduction Advanced Attacks
Taking Back Search Engine Hacking From Google and Bing
29 July 2010
Presented by: Francis Brown and Rob Ragan Stach & Liu, LLC www.stachliu.com
O V E R V I E W
exposures caused by publicly available sources
D E S I R E D O U T C O M E
G E T T I N G U P T O S P E E D
S
OSINT – is a form of intelligence collection management that involves finding, selecting, and acquiring information from publicly available sources and analyzing it to produce actionable intelligence.
W H A T Y O U S H O U L D K N O W
S E A R C H E N G I N E A T T A C K S
(215)
(232)
G O O G L E H A C K I N G D A T A B A S E
vulnerability data (59)
(9)
Error Messages
Files containing passwords
G O O G L E H A C K I N G D A T A B A S E
to the web interface
S T A T E O F T H E A R T
R
BingDiggity
S T A C H & L I U T O O L S
N E W G O O G L E H A C K I N G T O O L S
team
SLDB Examples – “Pastebin.com Disclosures”
S T A C H & L I U R E G E X S
ever Bing vulnerability database
limited to only basic footprinting techniques, with no actual vulnerability identification
difficult to create vuln search regexs for it
linkdomain: and inurl: directives to combat search hacking in March ’07
S T A C H & L I U R E G E X S
G O O G L E / B I N G H A C K I N G D E F E N S E S
(MySpace, YouTube, and LinkedIn support by summer)
S O M A N Y A P P L I C A T I O N S T O A B U S E
S P E A R P H I S H I N G
V U L N S I N O P E N S O U R C E C O D E
G O O G L E C O D E S E A R C H H A C K I N G
H A C K E R S E A R C H E N G I N E
ports and indexes the headers returned in the response
systems
C R I T I C A L I N F R A S T R U C T U R E S E C U R I T Y
C R I T I C A L I N F R A S T R U C T U R E S E C U R I T Y
I N T E L L I G E N C E G A T H E R I N G T O O L
I N T E L L I G E N C E G A T H E R I N G T O O L
relationships and real world links between:
files
S E A R C H E N G I N E O P T I M I Z A T I O N
B L A C K H A T S E O R E C O N
B L A C K H A T S E O D E F E N S E S
D A T A A B O U T D A T A
A U T O M E T A D A T A M I N I N G
M E T A D A T A M I N I N G D E F E N S E S
metadata before they’re released
P R O T E C T Y O N E C K
“H A C K Y O U R S E L F”
Tools exist
N E W H O T S I Z Z L E
A D V A N C E D D E F E N S E T O O L S
A D V A N C E D D E F E N S E S
A D V A N C E D D E F E N S E S
A D V A N C E D D E F E N S E S
feeds
G O O G L E / B I N G A L E R T C L I E N T S
when one of the rss alert entries matches something they are interested in (e.g. “yourcompany.com” in the URL)
“G O O G L E / B I N G H A C K A L E R T S”
Tools exist
A D V A N C E D D E F E N S E S
sites to their own customers
A D V A N C E D D E F E N S E S
links of the domain(s) you wish to securely monitor
MalwareDiggity Alerts
P R E D I C T I O N S
searchable
updates
search interfaces
Google Involvement
tool blocking
Renewed Tool Dev
Source Repositories
…
exploitation
F U T U R E D I R E C T I O N S
S
For more info: Email: contact@stachliu.com Stach & Liu, LLC www.stachliu.com