35
Google Hacking and Google Hacking and Google Hacking and Google Hacking and Personal Data Privacy Personal Data Privacy Personal Data Privacy Personal Data Privacy PH CHAN [email protected] Researcher VX Security Research Lab

Google Hacking and Personal Data Privacy

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Google Hacking and Personal Data Privacy

Google Hacking and Google Hacking and Google Hacking and Google Hacking and

Personal Data PrivacyPersonal Data PrivacyPersonal Data PrivacyPersonal Data Privacy

PH CHAN

[email protected]

Researcher

VX Security Research Lab

Page 2: Google Hacking and Personal Data Privacy

PH CHAN

[email protected]

Researcher

VX Research Lab (VXRL)

www.vxrl.org

Page 3: Google Hacking and Personal Data Privacy

VXRL

• Non-profit making group

• Focus on security research and ethical hacking

• Offensive, creative and fun

Page 4: Google Hacking and Personal Data Privacy

Google makes our life easy. Just a single click

time to find any searched information.

However Google not only makes it possible to

reach the public available information, but also

threatens some of the most confidential

Information (e.g. personal privacy) that should

never be revealed.

Page 5: Google Hacking and Personal Data Privacy

Personal Privacies like name, address, phone

numbers, emails, username and password for

login sites, private directories and documents

and online devices (e.g. web cameras) without

any access control.

Page 6: Google Hacking and Personal Data Privacy

"Google Hacking” is the use of Google’s to do

naughty things. It makes use of the advanced

Google syntaxes and operators extensively.

Page 7: Google Hacking and Personal Data Privacy

How Google Works

Page 8: Google Hacking and Personal Data Privacy

How Google Works

• Googlebot

A web spider that finds and go to get web pages.

• The indexer

Stores the fetched results in a Google’s index database

in alphabetic order.

• The query processor

Compares the search query to the index and

recommends the most relevant documents.

Page 9: Google Hacking and Personal Data Privacy

The Basics

• The plus symbol (+) forces inclusion of

something common.

• The minus symbol (-) forces exclusion of a

search term.

• The pipe symbol (|) provides boolean OR

logic that locate either one term or another in

a query

• The symbol (“) uses to quote around the

search phrases

Page 10: Google Hacking and Personal Data Privacy

Advanced search operators

• [all]inurl

Searches for the certain keyword in the URL

• [all]intitle

Searches for the certain keyword in the title

• [all]intext

Searches the keywords in the body of web pages.

• Filetype / ext

Filter out the results based on the file extensions

• Site

Searches within the Domain

Page 11: Google Hacking and Personal Data Privacy

• Let’s take a look at a few of the interesting

Google search result.

Search for Name, Email Address, Phone,:

Page 12: Google Hacking and Personal Data Privacy

Search for Name, Email Address, Phone,:

Page 13: Google Hacking and Personal Data Privacy

Search for Name, Email Address, Phone,:

Page 14: Google Hacking and Personal Data Privacy

• Let’s take a look at a few of the interesting

Google search result.

Web 2.0,:

Page 15: Google Hacking and Personal Data Privacy

Web 2.0,:

Page 16: Google Hacking and Personal Data Privacy

• Let’s take a look at a few of the interesting

Google search result.

Webcam,:

Page 17: Google Hacking and Personal Data Privacy

Webcam,:

Page 18: Google Hacking and Personal Data Privacy
Page 19: Google Hacking and Personal Data Privacy
Page 20: Google Hacking and Personal Data Privacy
Page 21: Google Hacking and Personal Data Privacy
Page 22: Google Hacking and Personal Data Privacy
Page 23: Google Hacking and Personal Data Privacy
Page 24: Google Hacking and Personal Data Privacy

FoxyFoxy is a Chinese P2P software.

Page 25: Google Hacking and Personal Data Privacy

Foxy

Page 26: Google Hacking and Personal Data Privacy

Foxy

Page 27: Google Hacking and Personal Data Privacy

Foxy

Page 28: Google Hacking and Personal Data Privacy

LinkedIn Account

Page 29: Google Hacking and Personal Data Privacy

Email Account

Page 30: Google Hacking and Personal Data Privacy

Email Account

Page 31: Google Hacking and Personal Data Privacy

Email Account

Page 32: Google Hacking and Personal Data Privacy

Facebook

Page 33: Google Hacking and Personal Data Privacy

There are many more.

Combining the advanced operators is the key to

Google Hacking.

http://www.googleguide.com/advanced_operators

_reference.html

Page 34: Google Hacking and Personal Data Privacy

Countermeasures

• Keep sensitive data off the web!!

• http://www.google.com/remove.html

Page 35: Google Hacking and Personal Data Privacy

Thank You