Advanced Information 
Gathering 
2004 
Gareth Davies – NSS MSC Sdn Bhd 
gareth.davies@mynetsec.com 
Gareth Davies Advanced Info Gathering Page 1
Outline 
 Information Gathering 
 What you can Harvest 
 The power of modern search engines 
 Using Google fully 
 The Google API & Google based apps 
 Some juicy Google hacks 
 Recommendations 
Gareth Davies Advanced Info Gathering Page 2
Info Gathering (I) 
 Generally the first step of a pen test 
 Very important for profiling a company 
 Leveraging public resources to find 
private information 
 Fully utilized by 'Blackhat' hackers 
 By linking information from different 
sources a complete picture can be built 
Gareth Davies Advanced Info Gathering Page 3
Info Gathering (II) 
 The main thing to note here is 
STEALTH 
 These activities are passive and non-intrusive 
 Utilizing the memory of the net: 
 Google Cache 
 archive.org 
 Newsgroups (used to be Dejanews) 
Gareth Davies Advanced Info Gathering Page 4
Example of DNS leakage 
Gareth Davies Advanced Info Gathering Page 5
Info Gathering (IV) 
 Such information gathering is now even 
easier with tools such as 
 dnsreports.com 
 whois.sc 
 nqt.php 
 network-tools.com 
 netcraft.com 
 ip-plus.net/tools/dns_check_set.en.html 
Gareth Davies Advanced Info Gathering Page 6
Info Gathering (V) 
whois.sc reverse IP lookup 
Gareth Davies Advanced Info Gathering Page 7
What you can harvest (I) 
 Like any kind of hacking, passive 
information gathering is about thinking 
outside the box 
 Utilizing the many links between 
information sources is a key 
 Picking out useful info is the skill, this 
activity is akin to modern age 
dumpster diving 
Gareth Davies Advanced Info Gathering Page 8
What you can harvest (II) 
 Think outside the lines: 
 Check job databases for vacancies 
 Discloses types of technology used 
 Trawl newsgroups for technical postings 
 Sometimes can reveal whole topology 
 Locate company registration details 
 Can give away physical locations 
 Find out personal details about employees 
 May be used in social engineering attacks 
Gareth Davies Advanced Info Gathering Page 9
What you can harvest (III) 
Example usenet posting 
Gareth Davies Advanced Info Gathering Page 10
What you can harvest (IV) 
Example job posting 
Gareth Davies Advanced Info Gathering Page 11
The Power of Search Engines 
 Search engines have evolved hugely 
since the beginning 
 They now have MEMORY 
 Google cache 
 Advanced search operands now exist 
 filetype: 
 inurl: 
 intitle: 
Gareth Davies Advanced Info Gathering Page 12
The Power of SEs (II) 
 Google is the MIGHT 
 Masses of info, often unrelated 
 Teoma is the REFINE 
 Find exactly what you want 
 Fast is the DEPTH 
 Locate some obscure parts of the web 
 Don't be reliant on one engine 
Reference: searchlore.org 
Gareth Davies Advanced Info Gathering Page 13
The Power of SEs (III) 
 Only 3% of people use the advanced 
features of Google.. 
 People tend to get locked in to 1 search 
engine when there are so many 
 Each engine has different strengths, 
learn to utilize them all 
 searchlore.org is a great place to learn 
about the different engines 
Gareth Davies Advanced Info Gathering Page 14
Using Google Fully (I) 
 People often overlook the breadth of 
Google: 
 Google Groups (usenet archive) 
 Google images (searchable images) 
 Google News (aggregated news) 
All of these resources are useful when 
information gathering 
Gareth Davies Advanced Info Gathering Page 15
Using Google Fully (II) 
 The most useful advanced operators: 
 site: (restrict search to a single site) 
 [all]intitle: (looks for words in the title) 
 [all]inurl: (look for words within the url) 
 cache: (view the Google cache) 
 filetype: (locate a certain file type) 
 link: (lists links to a given site) 
 related: (view related sites) 
Gareth Davies Advanced Info Gathering Page 16
Using Google Fully (III) 
 Other operators: 
 [+] Essential words (e.g. +word) 
 [-] Words to exclude (e.g. -exclude) 
 [~] Similar to, will include synonyms 
 [.] Single letter wildcard 
 [“] Put around multiple words to search for 
an exact phrase (e.g +”my phrase”) 
Gareth Davies Advanced Info Gathering Page 17
The Google API and Apps 
 Information about the Google web API 
can be found here: 
http://www.google.com/apis/ 
 Google is offering a BETA service 
utilising WSDL and SOAP which allows 
developers to create applications that 
can call Google information directly 
 Queries are limited to 1000 per day 
Gareth Davies Advanced Info Gathering Page 18
API and Apps (II) 
 Foundstone SiteDigger™: 
 Uses the Google API 
 Requires Google API licence key (free) 
 Suited to targeting a specific domain or 
organisation 
 Over 100 pre-defined queries 
 Uses XML so you can add more queries 
 Has auto-update for definitions 
Gareth Davies Advanced Info Gathering Page 19
API and Apps (III) 
Gareth Davies Advanced Info Gathering Page 20
API and Apps (IV) 
 Buyukada Athena:: 
 Doesn't rely on the Google API 
 Suited to finding general misconfigurations 
 Uses extensible XML format which allows 
support for engines other than Google 
 Developed after SiteDigger was found too 
limited 
Gareth Davies Advanced Info Gathering Page 21
API and Apps (V) 
Gareth Davies Advanced Info Gathering Page 22
Juicy Google Hacks 
 The number one source for Google 
Hacks is Johnny Longs site: 
http://johnny.ihackstuff.com 
 Most of the following info comes from 
his Google Hacks database 
Gareth Davies Advanced Info Gathering Page 23
Juicy Google Hacks (II) 
 Default Server pages 
 Shows sloppy administration 
 intitle:test.page.for.apache “it worked” 
 allintitle:Netscape FastTrack Server Home 
Page 
 intitle: “Welcome to Windows 2000 
Internet Services” 
Gareth Davies Advanced Info Gathering Page 24
Juicy Google Hacks (III) 
Gareth Davies Advanced Info Gathering Page 25
Juicy Google Hacks (IV) 
 Passwords 
 "Index of" htpasswd / passwd 
 allinurl: admin mdb 
 "config.php" 
 auth_user_file.txt 
 filetype:dat "password.dat" 
 filetype:ini ws_ftp pwd 
Gareth Davies Advanced Info Gathering Page 26
Juicy Google Hacks (V) 
Gareth Davies Advanced Info Gathering Page 27
Juicy Google Hacks (VI) 
 There are currently 540 Google Hacks 
in the database 
 Shown were just a few common 
examples to outline the amount of 
information available 
 Play around, be inventive 
This is just the beginning 
Gareth Davies Advanced Info Gathering Page 28
Recommendations 
 Disable Directory Browsing 
 Do not put sensitive information in web 
browseable directories 
 Don't rely on security through obscurity 
 Conduct these tests on your own 
domains and fix any rogue findings 
Gareth Davies Advanced Info Gathering Page 29
Conclusion 
 Information gathering is important and 
is being used 
 There is no way to know people are 
doing this 
 Be aware of what you have available on 
the web 
 Learn and understand the discussed 
techniques and tools 
Gareth Davies Advanced Info Gathering Page 30
Questions? 
www.mynetsec.com 
Gareth Davies Advanced Info Gathering Page 31

More Related Content

PPS
Information Gathering With Google
PDF
A fresh new look into Information Gathering - OWASP Spain
PDF
Google Dorks: Analysis, Creation, and new Defenses
PDF
Open Source Information Gathering Brucon Edition
PPTX
Information gathering
PDF
TH3 Professional Developper google hacking
PPTX
Google Dorks and SQL Injection
PPTX
Google Dorks
Information Gathering With Google
A fresh new look into Information Gathering - OWASP Spain
Google Dorks: Analysis, Creation, and new Defenses
Open Source Information Gathering Brucon Edition
Information gathering
TH3 Professional Developper google hacking
Google Dorks and SQL Injection
Google Dorks

What's hot (20)

PDF
OSINT tools for security auditing [FOSDEM edition]
KEY
Tactical Information Gathering
PDF
OSINT tools for security auditing with python
PPTX
Advanced phishing for red team assessments
PDF
OSINT for Attack and Defense
PPT
Deep Web
PPT
Journalists and the Social Web 3
PPTX
Deep web Seminar
PPT
Semantic Web
PPTX
Deep web and dark web
ODP
Web Browser Basics, Tips & Tricks - Draft 20 (Revised 5/18/17)
 
PPTX
The Deep Web
PDF
Osint overview 26 mar 2015
PPTX
BrightonSEO
PPT
Deep Web Presentation April 25
PPT
GNUCITIZEN Pdp Owasp Day September 2007
PPT
Starwest 2008
PDF
Life on Clouds: a forensics overview
PPTX
Angelo Alviar OSINT 101 Presentation - Forensics and Security Technology
PPT
Semantic Web, an introduction for bioscientists
OSINT tools for security auditing [FOSDEM edition]
Tactical Information Gathering
OSINT tools for security auditing with python
Advanced phishing for red team assessments
OSINT for Attack and Defense
Deep Web
Journalists and the Social Web 3
Deep web Seminar
Semantic Web
Deep web and dark web
Web Browser Basics, Tips & Tricks - Draft 20 (Revised 5/18/17)
 
The Deep Web
Osint overview 26 mar 2015
BrightonSEO
Deep Web Presentation April 25
GNUCITIZEN Pdp Owasp Day September 2007
Starwest 2008
Life on Clouds: a forensics overview
Angelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Semantic Web, an introduction for bioscientists

Viewers also liked (19)

PPTX
Web Application Security - DevFest + GDay George Town 2016
PDF
Google Hacking Basic
PDF
8 Simple Ways to Hack Your Joomla
PPTX
Btsn 11 12 a
PPTX
Historieta tic
PPT
I phone 程式設計範例 內建動畫
PPTX
Bugs Bunny’s Contribution to Communication
PPTX
Networking - Empowering Leaders - Bowman, 2016
PDF
Katolu Baznicas vestnesis
PDF
Тренды банков сентябрь 2014 _ коммуникации с клиентами
PDF
How to learn english
PPT
Glass
PDF
la mejor gente
PDF
CRM Debt manager
PPT
historia de Zaragoza
PPT
metodos de estudio
PPTX
Ortiz riofrio
PPTX
PDF
USABILITYLAB: проектирование сайта ВТБ
Web Application Security - DevFest + GDay George Town 2016
Google Hacking Basic
8 Simple Ways to Hack Your Joomla
Btsn 11 12 a
Historieta tic
I phone 程式設計範例 內建動畫
Bugs Bunny’s Contribution to Communication
Networking - Empowering Leaders - Bowman, 2016
Katolu Baznicas vestnesis
Тренды банков сентябрь 2014 _ коммуникации с клиентами
How to learn english
Glass
la mejor gente
CRM Debt manager
historia de Zaragoza
metodos de estudio
Ortiz riofrio
USABILITYLAB: проектирование сайта ВТБ

Similar to Advanced Information Gathering AKA Google Hacking (20)

PDF
Owasp modern information gathering
 
PPTX
hacking techniques and intrusion techniques useful in OSINT.pptx
PDF
Gates Toorcon X New School Information Gathering
PDF
Roelof Temmingh FIRST07 slides
PDF
Offensive OSINT
PPT
"Using Web 2.0 as a Weapon Against Corruption"
PPS
Information Gathering with Google (c0c0n - India)
PDF
Information gatherimg
PDF
Public Domain Software and Databases.pdf
PPTX
Chapter 2 for cyber security examination.pptx
PDF
Google Hacking by Ali Jahangiri
PDF
The Web Application Hackers Toolchain
KEY
Enterprise Open Source Intelligence Gathering
PDF
Search Engine Google
PPT
Internet Essentials
PPTX
Reconnaissance - For pentesting and user awareness
PDF
Keyword Research for Professionals - SMX Stockholm 2012
PDF
PDF
technical-information-gathering-slides.pdf
Owasp modern information gathering
 
hacking techniques and intrusion techniques useful in OSINT.pptx
Gates Toorcon X New School Information Gathering
Roelof Temmingh FIRST07 slides
Offensive OSINT
"Using Web 2.0 as a Weapon Against Corruption"
Information Gathering with Google (c0c0n - India)
Information gatherimg
Public Domain Software and Databases.pdf
Chapter 2 for cyber security examination.pptx
Google Hacking by Ali Jahangiri
The Web Application Hackers Toolchain
Enterprise Open Source Intelligence Gathering
Search Engine Google
Internet Essentials
Reconnaissance - For pentesting and user awareness
Keyword Research for Professionals - SMX Stockholm 2012
technical-information-gathering-slides.pdf

More from Gareth Davies (7)

PPTX
Continuous Integration and Quality Development
PPTX
Building Scalable Web Apps - LVL.UP KL
PPTX
Introduction to Information Security
PPT
Blogging WTF?
PPT
High Availabiltity & Replica Sets with mongoDB
PPT
The History Of The Future
PPT
High Performance Wordpress
Continuous Integration and Quality Development
Building Scalable Web Apps - LVL.UP KL
Introduction to Information Security
Blogging WTF?
High Availabiltity & Replica Sets with mongoDB
The History Of The Future
High Performance Wordpress

Recently uploaded (20)

PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PPT
What is a Computer? Input Devices /output devices
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
Benefits of Physical activity for teenagers.pptx
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPTX
Configure Apache Mutual Authentication
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
UiPath Agentic Automation session 1: RPA to Agents
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPT
Geologic Time for studying geology for geologist
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
STKI Israel Market Study 2025 version august
PPTX
Chapter 5: Probability Theory and Statistics
Taming the Chaos: How to Turn Unstructured Data into Decisions
What is a Computer? Input Devices /output devices
Developing a website for English-speaking practice to English as a foreign la...
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Benefits of Physical activity for teenagers.pptx
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
Credit Without Borders: AI and Financial Inclusion in Bangladesh
NewMind AI Weekly Chronicles – August ’25 Week III
Configure Apache Mutual Authentication
Convolutional neural network based encoder-decoder for efficient real-time ob...
Enhancing emotion recognition model for a student engagement use case through...
UiPath Agentic Automation session 1: RPA to Agents
A comparative study of natural language inference in Swahili using monolingua...
Geologic Time for studying geology for geologist
Module 1.ppt Iot fundamentals and Architecture
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Zenith AI: Advanced Artificial Intelligence
STKI Israel Market Study 2025 version august
Chapter 5: Probability Theory and Statistics

Advanced Information Gathering AKA Google Hacking

  • 1. Advanced Information Gathering 2004 Gareth Davies – NSS MSC Sdn Bhd gareth.davies@mynetsec.com Gareth Davies Advanced Info Gathering Page 1
  • 2. Outline  Information Gathering  What you can Harvest  The power of modern search engines  Using Google fully  The Google API & Google based apps  Some juicy Google hacks  Recommendations Gareth Davies Advanced Info Gathering Page 2
  • 3. Info Gathering (I)  Generally the first step of a pen test  Very important for profiling a company  Leveraging public resources to find private information  Fully utilized by 'Blackhat' hackers  By linking information from different sources a complete picture can be built Gareth Davies Advanced Info Gathering Page 3
  • 4. Info Gathering (II)  The main thing to note here is STEALTH  These activities are passive and non-intrusive  Utilizing the memory of the net:  Google Cache  archive.org  Newsgroups (used to be Dejanews) Gareth Davies Advanced Info Gathering Page 4
  • 5. Example of DNS leakage Gareth Davies Advanced Info Gathering Page 5
  • 6. Info Gathering (IV)  Such information gathering is now even easier with tools such as  dnsreports.com  whois.sc  nqt.php  network-tools.com  netcraft.com  ip-plus.net/tools/dns_check_set.en.html Gareth Davies Advanced Info Gathering Page 6
  • 7. Info Gathering (V) whois.sc reverse IP lookup Gareth Davies Advanced Info Gathering Page 7
  • 8. What you can harvest (I)  Like any kind of hacking, passive information gathering is about thinking outside the box  Utilizing the many links between information sources is a key  Picking out useful info is the skill, this activity is akin to modern age dumpster diving Gareth Davies Advanced Info Gathering Page 8
  • 9. What you can harvest (II)  Think outside the lines:  Check job databases for vacancies  Discloses types of technology used  Trawl newsgroups for technical postings  Sometimes can reveal whole topology  Locate company registration details  Can give away physical locations  Find out personal details about employees  May be used in social engineering attacks Gareth Davies Advanced Info Gathering Page 9
  • 10. What you can harvest (III) Example usenet posting Gareth Davies Advanced Info Gathering Page 10
  • 11. What you can harvest (IV) Example job posting Gareth Davies Advanced Info Gathering Page 11
  • 12. The Power of Search Engines  Search engines have evolved hugely since the beginning  They now have MEMORY  Google cache  Advanced search operands now exist  filetype:  inurl:  intitle: Gareth Davies Advanced Info Gathering Page 12
  • 13. The Power of SEs (II)  Google is the MIGHT  Masses of info, often unrelated  Teoma is the REFINE  Find exactly what you want  Fast is the DEPTH  Locate some obscure parts of the web  Don't be reliant on one engine Reference: searchlore.org Gareth Davies Advanced Info Gathering Page 13
  • 14. The Power of SEs (III)  Only 3% of people use the advanced features of Google..  People tend to get locked in to 1 search engine when there are so many  Each engine has different strengths, learn to utilize them all  searchlore.org is a great place to learn about the different engines Gareth Davies Advanced Info Gathering Page 14
  • 15. Using Google Fully (I)  People often overlook the breadth of Google:  Google Groups (usenet archive)  Google images (searchable images)  Google News (aggregated news) All of these resources are useful when information gathering Gareth Davies Advanced Info Gathering Page 15
  • 16. Using Google Fully (II)  The most useful advanced operators:  site: (restrict search to a single site)  [all]intitle: (looks for words in the title)  [all]inurl: (look for words within the url)  cache: (view the Google cache)  filetype: (locate a certain file type)  link: (lists links to a given site)  related: (view related sites) Gareth Davies Advanced Info Gathering Page 16
  • 17. Using Google Fully (III)  Other operators:  [+] Essential words (e.g. +word)  [-] Words to exclude (e.g. -exclude)  [~] Similar to, will include synonyms  [.] Single letter wildcard  [“] Put around multiple words to search for an exact phrase (e.g +”my phrase”) Gareth Davies Advanced Info Gathering Page 17
  • 18. The Google API and Apps  Information about the Google web API can be found here: http://www.google.com/apis/  Google is offering a BETA service utilising WSDL and SOAP which allows developers to create applications that can call Google information directly  Queries are limited to 1000 per day Gareth Davies Advanced Info Gathering Page 18
  • 19. API and Apps (II)  Foundstone SiteDigger™:  Uses the Google API  Requires Google API licence key (free)  Suited to targeting a specific domain or organisation  Over 100 pre-defined queries  Uses XML so you can add more queries  Has auto-update for definitions Gareth Davies Advanced Info Gathering Page 19
  • 20. API and Apps (III) Gareth Davies Advanced Info Gathering Page 20
  • 21. API and Apps (IV)  Buyukada Athena::  Doesn't rely on the Google API  Suited to finding general misconfigurations  Uses extensible XML format which allows support for engines other than Google  Developed after SiteDigger was found too limited Gareth Davies Advanced Info Gathering Page 21
  • 22. API and Apps (V) Gareth Davies Advanced Info Gathering Page 22
  • 23. Juicy Google Hacks  The number one source for Google Hacks is Johnny Longs site: http://johnny.ihackstuff.com  Most of the following info comes from his Google Hacks database Gareth Davies Advanced Info Gathering Page 23
  • 24. Juicy Google Hacks (II)  Default Server pages  Shows sloppy administration  intitle:test.page.for.apache “it worked”  allintitle:Netscape FastTrack Server Home Page  intitle: “Welcome to Windows 2000 Internet Services” Gareth Davies Advanced Info Gathering Page 24
  • 25. Juicy Google Hacks (III) Gareth Davies Advanced Info Gathering Page 25
  • 26. Juicy Google Hacks (IV)  Passwords  "Index of" htpasswd / passwd  allinurl: admin mdb  "config.php"  auth_user_file.txt  filetype:dat "password.dat"  filetype:ini ws_ftp pwd Gareth Davies Advanced Info Gathering Page 26
  • 27. Juicy Google Hacks (V) Gareth Davies Advanced Info Gathering Page 27
  • 28. Juicy Google Hacks (VI)  There are currently 540 Google Hacks in the database  Shown were just a few common examples to outline the amount of information available  Play around, be inventive This is just the beginning Gareth Davies Advanced Info Gathering Page 28
  • 29. Recommendations  Disable Directory Browsing  Do not put sensitive information in web browseable directories  Don't rely on security through obscurity  Conduct these tests on your own domains and fix any rogue findings Gareth Davies Advanced Info Gathering Page 29
  • 30. Conclusion  Information gathering is important and is being used  There is no way to know people are doing this  Be aware of what you have available on the web  Learn and understand the discussed techniques and tools Gareth Davies Advanced Info Gathering Page 30
  • 31. Questions? www.mynetsec.com Gareth Davies Advanced Info Gathering Page 31