Thứ Ba, 22 tháng 4, 2014

Footprirvting a Target Network .p19

Lab 11


Identifying Vulnerabilities and Information Disclosures in Search Engines using Search Diggity

Search Diggity is the primary attack tool of the Google Hacking Diggity Project It is an MS Win dons GUI application that serves as a front-end to the latest versions of Diggity tools: GoogleDiggity, BingDiggity, Bing L/nkFromDomainDiggity, CodeSearchDiggity, Dl^PDiggity, FlashDiggity, Main areDiggity, Po/tS can Diggity, SHOD.4NDiggity, BingBina/yMalnareSearch, andNotlnMyBackYardDiggity.

Lab Scenario

An easy way to find vulnerabilities 111 websites and applications is to Google them, which is a simple method adopted bv attackers. Using a Google code search, hackers can identify crucial vulnerabilities 111 application code stnngs, providing the entry point they need to break through application security. As an expert ethical hacker, you should use the same method to identity all the vulnerabilities and patch them before an attacker identities them to exploit vulnerabilities.

Lab Objectives

The objective of tins lab is to demonstrate how to identity vulnerabilities and information disclosures 111 search engines using Search Diggity. Students will learn how to:

■ Extract Meta Tag, Email, Phone/Fax from the web pages

Lab Environment

To carry out the lab, you need:
■ Search Diggitvis located at D:\CEH-Tools\CEHv8 Module 02
Footprinting and Reconnaissance\Google Hacking
Tools\SearchDiggity

■ You can also download die latest version of Search Diggity from the link http: / /www.stachliu.com/resources / tools / google-hacking-diggitvproject/ attack-tools

■ If you decide to download the latest version, then sc re ensh ots shown 111 the lab might differ

■ Tins lab will work 111 the CEH lab environment - 011 Windows Server 2012, Windows 8, Windows Server 2008, and Windows 7

Lab Duration

Time: 10 Minutes

Overview of Search Diggity

Search Diggity has a predefined query database diat nuis against the website to scan die related queries.

Lab Tasks
1. To launch the Start menu, hover the mouse cursor 111 the lower-lelt
corner of the desktop

FIGURE 11.1: Windows Server 2012—Desktop view
2. 111 the Start menu, to launch Search Diggity click the Search Diggity icon

FIGURE 11.2: Windows Server 2012 — Start menu
3. The Search Diggity main window appears with Google Diggity as the default

FIGURE 11.3: Search Dimity—Main window

4. Select Sites/Domains/IP Ranges and type the domain name 111 the domain lield. Click Add

FIGURE 11.4: Search Dimity - Selecting Sites/Domains/IP Ranges
5. The added domain name will be listed in the box below the Domain held

FIGURE 11.5: Search Diggity — Domain added
6. Now, select a Query trom left pane you wish to run against the website that you have added 111 the list and click Scan
Note: 111 this lab, we have selected the query SWF Finding Generic. Similarly, you can select other queries to run against the added website

FIGURE 11.6: Seaich Diggity — Selecting query and Scanning
7. The following screenshot shows the scanning process

FIGURE 11.7: Search Diggity— Scanning ill progress
8. All the URLs that contain the SWF extensions will be listed and the output will show the query results

FIGURE 11.8: Search Diggity-Output window

Lab Analysis

Collect die different error messages to determine die vulnerabilities and note die information disclosed about the website.



Questions

Is it possible to export the output result for Google Diggity? If yes,
how?


Không có nhận xét nào:

Đăng nhận xét