Lab 11
Identifying Vulnerabilities and Information Disclosures in Search Engines using Search Diggity
Search Diggity is the primary attack tool of the Google Hacking Diggity Project It is an MS Win dons GUI application that serves as a front-end to the latest versions of Diggity tools: GoogleDiggity, BingDiggity, Bing L/nkFromDomainDiggity, CodeSearchDiggity, Dl^PDiggity, FlashDiggity, Main areDiggity, Po/tS can Diggity, SHOD.4NDiggity, BingBina/yMalnareSearch, andNotlnMyBackYardDiggity.
Lab Scenario
An easy way to find vulnerabilities 111 websites and applications is to Google them, which is a simple method adopted bv attackers. Using a Google code search, hackers can identify crucial vulnerabilities 111 application code stnngs, providing the entry point they need to break through application security. As an expert ethical hacker, you should use the same method to identity all the vulnerabilities and patch them before an attacker identities them to exploit vulnerabilities.
Lab Objectives
The objective of tins lab is to demonstrate how to identity vulnerabilities and information disclosures 111 search engines using Search Diggity. Students will learn how to:
■ Extract Meta Tag, Email, Phone/Fax from the web pages
Lab Environment
To carry out the lab, you need:
■ Search Diggitvis located at D:\CEH-Tools\CEHv8 Module 02
Footprinting and Reconnaissance\Google Hacking
Tools\SearchDiggity
■ You can also download die latest version of Search Diggity from the link http: / /www.stachliu.com/resources / tools / google-hacking-diggitvproject/ attack-tools
■ If you decide to download the latest version, then sc re ensh ots shown 111 the lab might differ
■ Tins lab will work 111 the CEH lab environment - 011 Windows Server 2012, Windows 8, Windows Server 2008, and Windows 7
Lab Duration
Time: 10 Minutes
Overview of Search Diggity
Search Diggity has a predefined query database diat nuis against the website to scan die related queries.
Lab Tasks
1. To launch the Start menu, hover the mouse cursor 111 the lower-lelt
corner of the desktop
![]() |
| FIGURE 11.1: Windows Server 2012—Desktop view |
![]() |
| FIGURE 11.2: Windows Server 2012 — Start menu |
![]() |
| FIGURE 11.3: Search Dimity—Main window |
4. Select Sites/Domains/IP Ranges and type the domain name 111 the domain lield. Click Add
![]() |
| FIGURE 11.4: Search Dimity - Selecting Sites/Domains/IP Ranges |
![]() |
| FIGURE 11.5: Search Diggity — Domain added |
Note: 111 this lab, we have selected the query SWF Finding Generic. Similarly, you can select other queries to run against the added website
![]() |
| FIGURE 11.6: Seaich Diggity — Selecting query and Scanning |
![]() |
| FIGURE 11.7: Search Diggity— Scanning ill progress |
![]() |
| FIGURE 11.8: Search Diggity-Output window |
Lab Analysis
Collect die different error messages to determine die vulnerabilities and note die information disclosed about the website.
Questions
Is it possible to export the output result for Google Diggity? If yes,
how?










Không có nhận xét nào:
Đăng nhận xét