Temple University

Ruslan Yakush

Week 3 Reading Summary

Google Hacking

It is really interesting post related to background information processing or in other words, behind the scene actions that allow to tweak search field and get various results. It is done using special keywords and commands in search field that would narrow down search to specific query. It is great tool for mapping out internet-connected networks. For example, using certain operators it is possible to perform DNS query for domain enumeration, get hints for application information and other useful info of targeted network corresponding to reconnaissance technique.

Also, note that when doing search with certain commands/operators, you may get an alert as shown below;

///// – Google Search Alert

About this page

Our systems have detected unusual traffic from your computer network. This page checks to see if it’s really you sending the requests, and not a robot.  Why did this happen?

IP address: (Your IP Address)
Time: 2015-09-09T22:39:18Z
URL: https://www.google.com/search?sclient=psy-ab&biw=1440&bih=768&q=nbme.org+&oq=nbme.org+&gs_l=serp.3..35i39j0i20j0i30.1253.3253.7.3515.16.16.0.0.0.0.210.943.15j0j1.16.0….0…1c.1.64.psy-ab..8.8.449.jk_rxLaFJVM&pbx=1&bav=on.2,or.r_cp.&bvm=bv.102022582,d.dmo&ech=1&psi=SLTwVfaCI8XrefjEuqAI.1441838153668.13&ei=1rTwVaalKcvOeKuFnOAC&emsg=NCSR&noj=1

 

For Reconnaissance, there are many Linux commands that are easy and useful to perform enumeration and fingerprinting. One of tools is Nmap is really great for scanning applications, ports, IP Addresses and DNS info. Also, TelePort is great tool for sniffing web site content in codes that would reveal web server versions and web site script content.

Ref. Resource: http://resources.infosecinstitute.com/nmap-cheat-sheet/