Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


04:42 PM
Connect Directly

Five Steps To Help Repel The 'Lulz'

Targeted attacks are a reality today, especially with the likes of hacktivist groups such as Anonymous

1. Go Google-hack yourself.

Turns out one of the first tools used by the LulzSec attackers was Google hacking, or Googling for vulnerabilities, such as SQL injection and remote-file include flaws on Web pages. Francis Brown, managing partner for Stach and Liu, has researched LulzSec's use of Google hacking, and says querying Google for vulnerabilities on websites was the first step in the group's recon efforts.

Most organizations don't bother to take that simple but often-revealing step. "We recommend you Google-hack yourself," Brown says. "Once you do that and find vulnerabilities, like some Cisco VPN configuration file, you have a flag in the sand going forward."

The Stach & Liu researchers offer free Google hacking tools, and Brown says he and fellow researcher Rob Ragan plan to release more Google-hacking tools for defensive purposes at the upcoming Black Hat USA conference in Las Vegas next month. "One of our largest Fortune 100 companies plugs them in, and using Google alerts and Bing RSS feeds, from now on, if Google ever indexes matches with these vulns, [the tools] send you real-time updates," Brown says. "It's an IDS, if you will, for Google hacking."

Among the new tools they will release are versions for the Android and iPhones. So if one of the so-called "Diggity Hacking" tools sees a SQL file with 300,000 of your organization's passwords indexed on Google, it sends you an alert, he says.

"You could have a whole host of traditional vulnerabilities. You don't want other people to find them so easily via Google because Google is kind enough to index all of your vulnerabilities for you," he says. Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

2 of 6
Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Take me to your BISO 
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-05-10
JPA Server in HAPI FHIR before 5.4.0 allows a user to deny service (e.g., disable access to the database after the attack stops) via history requests. This occurs because of a SELECT COUNT statement that requires a full index scan, with an accompanying large amount of server resources if there are m...
PUBLISHED: 2021-05-10
Cross Site Scripting (XSS) in Hotels_Server v1.0 allows remote attackers to execute arbitrary code by injecting crafted commands the data fields in the component "/controller/publishHotel.php".
PUBLISHED: 2021-05-10
An exploitable SQL injection vulnerability exists in ‘manageServiceStocks.jsp’ page of OpenClinic GA 5.173.3. A specially crafted HTTP request can lead to SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.
PUBLISHED: 2021-05-10
An out-of-bounds write vulnerability exists in the import_stl.cc:import_stl() functionality of Openscad openscad-2020.12-RC2. A specially crafted STL file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.
PUBLISHED: 2021-05-10
OpenAPI Generator allows generation of API client libraries (SDK generation), server stubs, documentation and configuration automatically given an OpenAPI Spec. Using `File.createTempFile` in JDK will result in creating and using insecure temporary files that can leave application and system data vu...