Activity Stream
227,828 MEMBERS
1778 ONLINE
greengrassforums On YouTube Subscribe to our Newsletter greengrassforums On Twitter greengrassforums On Facebook greengrassforums On Google+
banner1

Results 1 to 2 of 2
  1.     
    #1
    Senior Member

    Automated 'Google Hacking' Software for Unearthing Data on Other Sites Triggers Secur

    Wednesday February 27, 6:26 pm ET
    By Jordan Robertson, AP Technology Writer Automated 'Google Hacking' Software for Unearthing Data on Other Sites Triggers Security Fears

    SAN JOSE, Calif. (AP) -- It's called "Google hacking" -- a slick data-mining technique used by the Internet's cops and crooks alike to unearth sensitive material mistakenly posted to public Web sites.

    And it's just gotten easier, thanks to a program that automates what has typically been painstaking manual labor. The program's authors say they hope it will "screw a large Internet search engine and make the Web a safer place."
    Google hacking doesn't mean anyone's hacking Google's Web site. Rather, it refers to a sophisticated searching technique used to uncover flaws in the way Web sites handle confidential details, such as public files containing password and credit card numbers and clues about the vulnerability of the site's own servers.
    It works by examining the hidden recesses of a Web site, areas that have been indexed by Google but don't pop up in traditional searches. Sometimes Web sites accidentally post revealing information about themselves, either because employees mistakenly put confidential documents online, or the site wasn't properly configured to obscure sensitive areas.
    Security experts say Google hacking wouldn't be an issue if Web sites had proper security safeguards in place.
    By looking through Google for evidence of specific types of files used by a Web site or telling responses from the Web site's servers, hackers can learn a lot about how the site was built -- and thus how to begin crafting their attacks.
    Although Google hacking has been used for several years by good guys and bad guys to monitor security, experts caution that the new program, called Goolag, could tip the balance in favor of criminals.
    "It just makes their job that much easier -- in a very short period of time they can do all these searches for sensitive information," said Ryan Barnett, director of application security at Breach Security Inc. and a SANS Institute faculty member.
    Google hackers have typically had to enter in detailed Google search strings by hand, using specially crafted queries to unearth links buried deep in the list of a site's contents. Google has been able to clamp down on past attempts to automate the process.
    Experts say the new program, on the other hand, appears to work differently, tricking Google into believing a real person is typing the queries -- in other words, someone Google would be unlikely to block. Google declined to comment on Goolag, released by the hacker group Cult of the Dead Cow.

    Huh?
    That doesn't sound real good.
    What implications could that have in our community here at cannabis.com?
    I am sure that someone will figure out how to nullify this type of attack soon, I hope!:jointsmile:
    8182KSKUSH Reviewed by 8182KSKUSH on . Automated 'Google Hacking' Software for Unearthing Data on Other Sites Triggers Secur Wednesday February 27, 6:26 pm ET By Jordan Robertson, AP Technology Writer Automated 'Google Hacking' Software for Unearthing Data on Other Sites Triggers Security Fears SAN JOSE, Calif. (AP) -- It's called "Google hacking" -- a slick data-mining technique used by the Internet's cops and crooks alike to unearth sensitive material mistakenly posted to public Web sites. And it's just gotten easier, thanks to a program that automates what has typically been painstaking manual labor. The Rating: 5

  2.   Advertisements

  3.     
    #2
    Senior Member

    Automated 'Google Hacking' Software for Unearthing Data on Other Sites Triggers Secur

    Ehh, hackers are already able to determine vulnerabilities on a web server anyhow, like it says, as long as proper security measures are in place..There's some web sites that don't implement proper security, but most do because they're not willing to take the chance.

    I took a network security course until I was kicked out of vo-tech in december, it amazed me how easy things are to actually do..just takes the proper knowledge..

Similar Threads

  1. Automated growing systems
    By Meast in forum Indoor Growing
    Replies: 3
    Last Post: 03-15-2012, 05:38 AM
  2. I am ready to kick some automated ass
    By geonagual in forum GreenGrassForums Lounge
    Replies: 7
    Last Post: 11-08-2007, 05:41 AM
  3. Hacking Democracy
    By eg420ne in forum Politics
    Replies: 3
    Last Post: 11-06-2006, 07:19 PM
Amount:

Enter a message for the receiver:
BE SOCIAL
GreenGrassForums On Facebook