Google used to exploit security vulnerabilities
July 30, 2004
Google is a popular search engine, and is one of the handiest tools for many hackers, said a security expert on Thursday. Google's ability to record Internet sites' content can be used to pinpoint those with weak security, Johnny Long, a security researcher and computer scientist for Computer Security Corp. told attendees at the Black Hat Security Briefings here.
Though the technique is not new, well-crafted searches turned up so many sites with vulnerabilities that even jaded researchers laughed during the session.
"It is an old dog with new tricks," Long said. "It never ceases to amaze people, all the vulnerabilities out there."
By searching for default server page titles, for example, an attacker can find easily exploitable servers. Applications left in default modes can also be found by searching for error pages generated by the software. And searching for specific file names can pinpoint vulnerable servers connected to the Internet.
"It is the first step to finding vulnerable targets," Long said. A simple search for the log-in page of Microsoft's Web server software, the Internet Information Server, turned up 11,300 sites on the Internet that exposed the page to the public. Gathering log-in information for poorly configured databases is also easy, he said.
The exploitation of Google's in-depth searching capabilities underscores how software with no malicious motive can be used to help online intruders.
The recent MyDoom.o virus hammered Google and other search engines with searches from infected PCs for additional e-mail addresses to which the program could send itself. Security researchers have also theorized that Google and other search engines could be used as a carrier of malicious code.
"I only use Google to find vulnerable servers," said Tim Mullin, security specialist for accounting-software maker Anchor IS. Mullin said other search engines don't have the advanced search option available on Google and don't cache old versions of Web sites. "Not only can I see what exists now, but I can see what the Web site looked like before."
A Google representative could not immediately comment, citing Securities and Exchange Commission regulations regarding the quiet period before a public offering.
For most, the depth of Google searches is just one more potential threat to worry about.
"It's not revolutionizing anything that people are doing now," Long said. "It is just adding another attack vector."
Source: C-Net News
Become an authorized reseller of Proxy Sentinel™ and Firewall Sentinel™. Do like the rest of our authorized resellers and have your clients benefit the important security features of our products and solutions, while increasing your sales at the same time. Click here for all the details.
You can link to the
Internet Security web site as
much as you like. Read our section on how your company can participate in our
reciprocal link exchange program
and increase your rankings
in the major search engines such as
Site optimized by Pagina+™
Powered by Sun Hosting
Search engine keywords by Rank for Sales
Development platform by My Web Services
Internet Security.ca is listed in
Global Business Listing