SlideShare a Scribd company logo
1 of 33
@Chapma
n
Search Engine Hacking
Finding Credit Cards, Social Security
Numbers, and Frighteningly More
http://securisearch.cstephen@securisearch.
@Chapma
n
Hi, I’m Stephen!
• Search engine geek
• Founder of SecuriSearch
• Freelance writer
• Musician, gamer, Redditor, and digital DIY guy
• Always looking to meet new people and
network, so come and say “hello!”
• 2600 reader since 1998
http://securisearch.cstephen@securisearch.
@Chapma
n
We have a problem.
http://securisearch.cstephen@securisearch.
@Chapma
n
The same thing that leads to cakes
and pies in Raleigh, NC…
http://securisearch.cstephen@securisearch.
@Chapma
n
…also leads to these…
http://securisearch.cstephen@securisearch.
@Chapma
n
…and these…
http://securisearch.cstephen@securisearch.
@Chapma
n
…and these…
http://securisearch.cstephen@securisearch.
@Chapma
n
…and these...
http://securisearch.cstephen@securisearch.
@Chapma
n
…and so on...
http://securisearch.cstephen@securisearch.
@Chapma
n
…and so forth.
http://securisearch.cstephen@securisearch.
@Chapma
nhttp://securisearch.cstephen@securisearch.
A single identity theft is a tragedy; a
million identity thefts is a statistic.
@Chapma
n
How is this even possible?
The ever-increasing power and number of Web crawlers
+
careless and/or clueless admins
+
end-user ignorance or stupidity
=
a serious problem.
http://securisearch.cstephen@securisearch.
@Chapma
n
Web crawlers and their power
• Google, Bing, Yandex, Baidu, and countless
niche search engines (FTP, document, etc.)
• Custom Web crawlers, like 80legs.com
• Not just indexing data, but also identifying and
understanding data within data
• The more connected everything becomes, the
more there will be to find and index
• Search engine companies don’t care about what
they index, so long as they’re able to index
http://securisearch.cstephen@securisearch.
@Chapma
n
Careless/clueless admins
http://securisearch.cstephen@securisearch.
@Chapma
n
Careless/clueless admins, continued
http://securisearch.cstephen@securisearch.
@Chapma
n
End-user ignorance
http://securisearch.cstephen@securisearch.
@Chapma
n
End-user stupidity
http://securisearch.cstephen@securisearch.
@Chapma
n
Careless/clueless admins (reprise)
http://securisearch.cstephen@securisearch.
@Chapma
n
Let’s go Google-diving!
http://securisearch.cstephen@securisearch.
@Chapma
n
A quick primer
• intitle: (Looks in the title of a page)
• inurl: (Looks in the URL of a page)
• intext: (Looks in the text of a page)
• filetype: or ext: (Searches by file type)
• site: (Limits results to a specified site)
• OR or | (Searches for multiple terms separately)
• “” or . (Forms a specific search phrase)
• * (Wildcard)
• - (Negates specified terms)
• () (Groups multiple terms together)
http://securisearch.cstephen@securisearch.
@Chapma
n
Throw the kitchen sink at it
• Don’t give up if a search query yields no
results, or unintended results
• Start thinking in terms of things that don’t
make sense, then modify queries accordingly
• Operators can be extremely fickle –
especially if used with other operators
• Take time to think queries through, or just do
what I do: jump right in and go to town!
http://securisearch.cstephen@securisearch.
@Chapma
n
What do you want to find?
• Private videos and photographs
• Confidential and proprietary information
• Databases (SQL, MDB, plain-text dumps, etc.)
• Back-ups (Email, drives, etc.)
• Virtual machines
• Custom application files (code, scripts, extensions, plug-ins, etc.)
• Usernames and passwords (VPN credentials, bank accounts, email,
memberships, etc.)
• Apps, games, pr0n, etc.
• Credit/debit cards/numbers (pictures, scans, text files, etc.)
• Social Security cards/numbers (pictures, scans, text files, etc.)
• Passports, licenses, birth certificates, etc. (pictures and scans)
• Tax and financial documents, bills, etc.
http://securisearch.cstephen@securisearch.
@Chapma
n
Virtual Machines
http://securisearch.cstephen@securisearch.
@Chapma
n
Virtual Machines
http://securisearch.cstephen@securisearch.
@Chapma
n
Virtual Machines
http://securisearch.cstephen@securisearch.
@Chapma
n
Virtual Machines
http://securisearch.cstephen@securisearch.
@Chapma
n
Thinking in direct and indirect terms
http://securisearch.cstephen@securisearch.
@Chapma
n
Google as an FTP search engine
http://securisearch.cstephen@securisearch.
@Chapma
n
Google as an FTP search engine
http://securisearch.cstephen@securisearch.
@Chapma
n
Awesome Firefox Add-ons
• Remove Google Redirects: http://
goo.gl/Gqyek
• Unlinker: http://unlinker.com/
• Docs Online Viewer: http://goo.gl/rVuHh
• FireFTP: http://fireftp.net/
• Google Image Search:
http://goo.gl/uU0mO
http://securisearch.cstephen@securisearch.
@Chapma
n
Just the tip of the iceberg
• Google Diggity: http://goo.gl/F6jGJ
• Google Hacking for Pen Testers:
http://goo.gl/jqAys
• YouTube: Stach and Liu, Johnny Long
• Online documents: http://goo.gl/c7Ef2
• /r/opendirectories: http://goo.gl/B2YL8
• Bing Query Language: http://goo.gl/TyO2T
• Other search engines: Bing, Shodan, Docstoc,
Pastebin, etc.
• GHDB: http://goo.gl/0mTLb
http://securisearch.cstephen@securisearch.
@Chapma
n
Questions?
http://securisearch.cstephen@securisearch.
@Chapma
n
Thanks, everyone!
• Twitter: @Chapman
• Email: stephen@securisearch.com
http://securisearch.cstephen@securisearch.

More Related Content

Similar to Search Engine Hacking - CarolinaCon 9 (Stephen Chapman)

Be Prepared - Internet Safety
Be Prepared - Internet SafetyBe Prepared - Internet Safety
Be Prepared - Internet SafetyMike Mackintosh
 
Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsSloan Carne
 
Protecting Passwords
Protecting PasswordsProtecting Passwords
Protecting Passwordsinaz2
 
Twitter for beginners in 2014
Twitter for beginners in 2014Twitter for beginners in 2014
Twitter for beginners in 2014Website Wings
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupBrian Pichman
 
Corp Web Risks and Concerns
Corp Web Risks and ConcernsCorp Web Risks and Concerns
Corp Web Risks and ConcernsPINT Inc
 
If i wake evil 360
If i wake evil   360If i wake evil   360
If i wake evil 360John Strand
 
Google Analytics Fundamentals: Set Up and Basics for Measurement
Google Analytics Fundamentals: Set Up and Basics for MeasurementGoogle Analytics Fundamentals: Set Up and Basics for Measurement
Google Analytics Fundamentals: Set Up and Basics for MeasurementOrbit Media Studios
 
Datos en tiempos de Cambridge Analytica
Datos en tiempos de Cambridge AnalyticaDatos en tiempos de Cambridge Analytica
Datos en tiempos de Cambridge AnalyticaTelefónica
 
Building Personalized Data Products with Dato
Building Personalized Data Products with DatoBuilding Personalized Data Products with Dato
Building Personalized Data Products with DatoTuri, Inc.
 
Password Cracking
Password Cracking Password Cracking
Password Cracking Sina Manavi
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Justin Denton
 
The State of SEO: 2015 and Beyond!
The State of SEO: 2015 and Beyond!The State of SEO: 2015 and Beyond!
The State of SEO: 2015 and Beyond!DFWSEM
 

Similar to Search Engine Hacking - CarolinaCon 9 (Stephen Chapman) (20)

Passwords
PasswordsPasswords
Passwords
 
Big data, big tourism
Big data, big tourismBig data, big tourism
Big data, big tourism
 
Be Prepared - Internet Safety
Be Prepared - Internet SafetyBe Prepared - Internet Safety
Be Prepared - Internet Safety
 
Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU Investigators
 
Pubcon Las Vegas Technical SEO
Pubcon Las Vegas Technical SEOPubcon Las Vegas Technical SEO
Pubcon Las Vegas Technical SEO
 
Protecting Passwords
Protecting PasswordsProtecting Passwords
Protecting Passwords
 
Twitter for beginners in 2014
Twitter for beginners in 2014Twitter for beginners in 2014
Twitter for beginners in 2014
 
How to be more effective and efficient (via Tools)
How to be more effective and efficient (via Tools)How to be more effective and efficient (via Tools)
How to be more effective and efficient (via Tools)
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
 
Digital Data Tips Tuesday
Digital Data Tips TuesdayDigital Data Tips Tuesday
Digital Data Tips Tuesday
 
Corp Web Risks and Concerns
Corp Web Risks and ConcernsCorp Web Risks and Concerns
Corp Web Risks and Concerns
 
Blasting 10 Big Data Myths with 10 Panel Data Examples
Blasting 10 Big Data Myths with 10 Panel Data ExamplesBlasting 10 Big Data Myths with 10 Panel Data Examples
Blasting 10 Big Data Myths with 10 Panel Data Examples
 
Ungagged UK Talk - Google in a Post Update and Mobile First World.
Ungagged UK Talk - Google in a Post Update and Mobile First World.Ungagged UK Talk - Google in a Post Update and Mobile First World.
Ungagged UK Talk - Google in a Post Update and Mobile First World.
 
If i wake evil 360
If i wake evil   360If i wake evil   360
If i wake evil 360
 
Google Analytics Fundamentals: Set Up and Basics for Measurement
Google Analytics Fundamentals: Set Up and Basics for MeasurementGoogle Analytics Fundamentals: Set Up and Basics for Measurement
Google Analytics Fundamentals: Set Up and Basics for Measurement
 
Datos en tiempos de Cambridge Analytica
Datos en tiempos de Cambridge AnalyticaDatos en tiempos de Cambridge Analytica
Datos en tiempos de Cambridge Analytica
 
Building Personalized Data Products with Dato
Building Personalized Data Products with DatoBuilding Personalized Data Products with Dato
Building Personalized Data Products with Dato
 
Password Cracking
Password Cracking Password Cracking
Password Cracking
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
 
The State of SEO: 2015 and Beyond!
The State of SEO: 2015 and Beyond!The State of SEO: 2015 and Beyond!
The State of SEO: 2015 and Beyond!
 

Search Engine Hacking - CarolinaCon 9 (Stephen Chapman)