Fun with Google custom searches

118
Fun with Google custom searches: Intelligence, secrets and leaks By: Jamal Bandukwala http://infosecmindstorm.blogspot.com/

Transcript of Fun with Google custom searches

Page 1: Fun with Google custom searches

Fun with Google custom searches: Intelligence, secrets and leaks

By: Jamal Bandukwala

http://infosecmindstorm.blogspot.com/

Page 2: Fun with Google custom searches

infosecmindstorm

• I blog about various information security topics and do my own research, my blog can be found at http://infosecmindstorm.blogspot.com/

• Going to talk about some of my personal research

2 Black Hat Abu Dhabi 2011

Page 3: Fun with Google custom searches

Google Custom Searches

• What are they?

• What exactly am I doing with these searches?

• Why are they useful?

• Will talk about the 3 major searches I have put together, how they differ and what they are useful for.

• Invisible Attacks

3 Black Hat Abu Dhabi 2011

Page 4: Fun with Google custom searches

• Google offers a program that allows developers/ users to create their own custom search engines.

• Allows developers/ users to be up and running in minutes using a wizard interface along with more advanced options as needed.

Black Hat Abu Dhabi 2011 4

Page 5: Fun with Google custom searches

• This allows the search owner to focus on developing their content and search list.

• Advanced options of note:

• fine tune search results by removing items

• promoting search results

Black Hat Abu Dhabi 2011 5

Page 6: Fun with Google custom searches

• on-demand indexing.

• These enable the user to retrieve search results from newly added sources in a shorter time frame.

Black Hat Abu Dhabi 2011 6

Page 7: Fun with Google custom searches

Open Source Intelligence Deep Web Search

7 Black Hat Abu Dhabi 2011

Page 8: Fun with Google custom searches

8 Black Hat Abu Dhabi 2011

Page 9: Fun with Google custom searches

Open Source Intelligence

• Open Source Intelligence (OSINT) is a form of intelligence gathering from open sources.

• Open sources refers to publically available information as opposed to covert information.

• In 2006 the Washington Times had an article discussing how OSINT was becoming increasingly important.

9 Black Hat Abu Dhabi 2011

Page 10: Fun with Google custom searches

• I find that the following lines were really significant:

• “A Defense Department official said Chinese military bloggers have become a valuable source of intelligence on Beijing’s secret military buildup. For example, China built its first Yuan-class attack submarine at an underground factory that was unknown to U.S. intelligence until a photo of the submarine appeared on the Internet in 2004.”

• http://www.washingtontimes.com/news/2006/apr/18/20060418-110124-3694r/

10 Black Hat Abu Dhabi 2011

Page 11: Fun with Google custom searches

11 Black Hat Abu Dhabi 2011

Page 12: Fun with Google custom searches

12 Black Hat Abu Dhabi 2011

Page 13: Fun with Google custom searches

• This includes everything from media like newspapers, TV, web content (blogs, wikis, among others), satellite images, public databases, academic journals/ conference info and other publically available information.

• I have put together a customized Google search that runs against a large list of OSINT sources(which I have compiled and actively maintain). This makes it easier for analysts/ researchers to locate useful information.

13 Black Hat Abu Dhabi 2011

Page 14: Fun with Google custom searches

• A number of these sites can be found on my blog at infosecmindstorm.

• Useful for gathering political, economic and related intelligence.

14 Black Hat Abu Dhabi 2011

Page 15: Fun with Google custom searches

15 Black Hat Abu Dhabi 2011

Page 16: Fun with Google custom searches

16 Black Hat Abu Dhabi 2011

Page 17: Fun with Google custom searches

17 Black Hat Abu Dhabi 2011

Page 18: Fun with Google custom searches

18 Black Hat Abu Dhabi 2011

Page 19: Fun with Google custom searches

19 Black Hat Abu Dhabi 2011

Page 20: Fun with Google custom searches

20 Black Hat Abu Dhabi 2011

Page 21: Fun with Google custom searches

Black Hat Abu Dhabi 2011 21

Page 22: Fun with Google custom searches

22 Black Hat Abu Dhabi 2011

Page 23: Fun with Google custom searches

23 Black Hat Abu Dhabi 2011

Page 24: Fun with Google custom searches

24 Black Hat Abu Dhabi 2011

Page 25: Fun with Google custom searches

25 Black Hat Abu Dhabi 2011

Page 26: Fun with Google custom searches

26 Black Hat Abu Dhabi 2011

Page 27: Fun with Google custom searches

27 Black Hat Abu Dhabi 2011

Page 28: Fun with Google custom searches

28 Black Hat Abu Dhabi 2011

Page 29: Fun with Google custom searches

29 Black Hat Abu Dhabi 2011

Page 30: Fun with Google custom searches

30 Black Hat Abu Dhabi 2011

Page 31: Fun with Google custom searches

31 Black Hat Abu Dhabi 2011

Page 32: Fun with Google custom searches

32 Black Hat Abu Dhabi 2011

Page 33: Fun with Google custom searches

33 Black Hat Abu Dhabi 2011

Page 34: Fun with Google custom searches

34 Black Hat Abu Dhabi 2011

Page 35: Fun with Google custom searches

35 Black Hat Abu Dhabi 2011

Page 36: Fun with Google custom searches

36 Black Hat Abu Dhabi 2011

Page 37: Fun with Google custom searches

37 Black Hat Abu Dhabi 2011

Page 38: Fun with Google custom searches

Pastebin and collaborative tools

intelligence web search

38 Black Hat Abu Dhabi 2011

Page 39: Fun with Google custom searches

• What is a pastebin?

• A site that allows users to post snippets of text for others to view. Different pastebin sites can be targeted towards different audiences.

• Initially used to share source code.

39 Black Hat Abu Dhabi 2011

Page 40: Fun with Google custom searches

• These days a number of pastebin sites are used to post spam and also by various parties (including Anonymous and Lulzsec) to leak/ post information.

• I have built up a list of pastebin sites from the most popular ones, to lesser known sites that are run through in my custom search.

40 Black Hat Abu Dhabi 2011

Page 41: Fun with Google custom searches

• The list of sites is regularly updated; it is not available to the public as it is confidential; examples of the sites being searched can be found on my blog.

• Searches turn up everything from credit card numbers, leaked databases and vulnerable sites among other things.

41 Black Hat Abu Dhabi 2011

Page 42: Fun with Google custom searches

• Some searches that have generated interesting results include the following:

• Defense Industries

• VISA

• Police

• NASA

• Air Force

• World of Warcraft

• Passport Number

42 Black Hat Abu Dhabi 2011

Page 43: Fun with Google custom searches

Credit Card Numbers and Sellers

43 Black Hat Abu Dhabi 2011

Page 44: Fun with Google custom searches

44 Black Hat Abu Dhabi 2011

Page 45: Fun with Google custom searches

45 Black Hat Abu Dhabi 2011

Page 46: Fun with Google custom searches

Hacked and Vulnerable Sites

46 Black Hat Abu Dhabi 2011

Page 47: Fun with Google custom searches

47 Black Hat Abu Dhabi 2011

Page 48: Fun with Google custom searches

48 Black Hat Abu Dhabi 2011

Page 49: Fun with Google custom searches

49 Black Hat Abu Dhabi 2011

Page 50: Fun with Google custom searches

50 Black Hat Abu Dhabi 2011

Page 51: Fun with Google custom searches

51 Black Hat Abu Dhabi 2011

Page 52: Fun with Google custom searches

52 Black Hat Abu Dhabi 2011

Page 53: Fun with Google custom searches

53 Black Hat Abu Dhabi 2011

Page 54: Fun with Google custom searches

54 Black Hat Abu Dhabi 2011

Page 55: Fun with Google custom searches

55 Black Hat Abu Dhabi 2011

Page 56: Fun with Google custom searches

56 Black Hat Abu Dhabi 2011

Page 57: Fun with Google custom searches

Passport Numbers & related information

57 Black Hat Abu Dhabi 2011

Page 58: Fun with Google custom searches

58 Black Hat Abu Dhabi 2011

Page 59: Fun with Google custom searches

59 Black Hat Abu Dhabi 2011

Page 60: Fun with Google custom searches

60 Black Hat Abu Dhabi 2011

Page 61: Fun with Google custom searches

61 Black Hat Abu Dhabi 2011

Page 62: Fun with Google custom searches

62 Black Hat Abu Dhabi 2011

Page 63: Fun with Google custom searches

63 Black Hat Abu Dhabi 2011

Page 64: Fun with Google custom searches

64 Black Hat Abu Dhabi 2011

Page 65: Fun with Google custom searches

65 Black Hat Abu Dhabi 2011

Page 66: Fun with Google custom searches

66 Black Hat Abu Dhabi 2011

Page 67: Fun with Google custom searches

67 Black Hat Abu Dhabi 2011

Page 68: Fun with Google custom searches

Black Hat Abu Dhabi 2011 68

Page 69: Fun with Google custom searches

Black Hat Abu Dhabi 2011 69

Page 70: Fun with Google custom searches

Black Hat Abu Dhabi 2011 70

Page 71: Fun with Google custom searches

Black Hat Abu Dhabi 2011 71

Page 72: Fun with Google custom searches

Black Hat Abu Dhabi 2011 72

Page 73: Fun with Google custom searches

Databases & other Confidential information

73 Black Hat Abu Dhabi 2011

Page 74: Fun with Google custom searches

74 Black Hat Abu Dhabi 2011

Page 75: Fun with Google custom searches

75 Black Hat Abu Dhabi 2011

Page 76: Fun with Google custom searches

76 Black Hat Abu Dhabi 2011

Page 77: Fun with Google custom searches

77 Black Hat Abu Dhabi 2011

Page 78: Fun with Google custom searches

Black Hat Abu Dhabi 2011 78

Page 79: Fun with Google custom searches

Black Hat Abu Dhabi 2011 79

Page 80: Fun with Google custom searches

Black Hat Abu Dhabi 2011 80

Page 81: Fun with Google custom searches

Black Hat Abu Dhabi 2011 81

Page 82: Fun with Google custom searches

Black Hat Abu Dhabi 2011 82

Page 83: Fun with Google custom searches

Black Hat Abu Dhabi 2011 83

Page 84: Fun with Google custom searches

Social Networking Intel/ Footprint web search

84 Black Hat Abu Dhabi 2011

Page 85: Fun with Google custom searches

• There are currently more than 60 sites in the custom search. Examples include flickr, linkedin, facebook and Hi5.

• The list of sites is regularly updated; it is not available to the public as it is confidential; examples of the sites being searched can be found on my blog.

85 Black Hat Abu Dhabi 2011

Page 86: Fun with Google custom searches

• Searches turn up everything an individual's personal social media page, to events where they were attending or volunteered at.

• I also came across individuals who worked at their organizations or people who knew them personally/ friends.

• Useful for reconnaissance activities- intelligence gathering.

86 Black Hat Abu Dhabi 2011

Page 87: Fun with Google custom searches

• If you are a pen tester useful for finding potential targets.

• Was surprised was actually able to get significant information on individuals even if they did not have a direct social media presence themselves.

• In some cases enough information to potentially get an introduction to a person.

87 Black Hat Abu Dhabi 2011

Page 88: Fun with Google custom searches

88 Black Hat Abu Dhabi 2011

Page 89: Fun with Google custom searches

89 Black Hat Abu Dhabi 2011

Page 90: Fun with Google custom searches

90 Black Hat Abu Dhabi 2011

Page 91: Fun with Google custom searches

91 Black Hat Abu Dhabi 2011

Page 92: Fun with Google custom searches

92 Black Hat Abu Dhabi 2011

Page 93: Fun with Google custom searches

93 Black Hat Abu Dhabi 2011

Page 94: Fun with Google custom searches

94 Black Hat Abu Dhabi 2011

Page 95: Fun with Google custom searches

95 Black Hat Abu Dhabi 2011

Page 96: Fun with Google custom searches

96 Black Hat Abu Dhabi 2011

Page 97: Fun with Google custom searches

97 Black Hat Abu Dhabi 2011

Page 98: Fun with Google custom searches

98 Black Hat Abu Dhabi 2011

Page 99: Fun with Google custom searches

99 Black Hat Abu Dhabi 2011

Page 100: Fun with Google custom searches

100 Black Hat Abu Dhabi 2011

Page 101: Fun with Google custom searches

101 Black Hat Abu Dhabi 2011

Page 102: Fun with Google custom searches

102 Black Hat Abu Dhabi 2011

Page 103: Fun with Google custom searches

103 Black Hat Abu Dhabi 2011

Page 104: Fun with Google custom searches

104 Black Hat Abu Dhabi 2011

Page 105: Fun with Google custom searches

Invisible Attacks • A malicious party could hijack an existing

researcher’s identity and offer a custom search targeted at a very specific audience (ie a select group of senior executives).

• The attacker could use the search to provide legitimate results most of the time and by doing so build a level of trust into the search engine.

Black Hat Abu Dhabi 2011 105

Page 106: Fun with Google custom searches

• Attacker could enter a temporary site into the engine and then with the custom search in built capabilities promote the results from the newly entered malicious site to the top of the list.

• The actor would promote the malicious url for a short period of time and then remove the url from the custom search altogether.

Black Hat Abu Dhabi 2011 106

Page 107: Fun with Google custom searches

• Makes it difficult for investigators/ analysts to:

• capture samples.

• identify source of infection(due to trust factor) and short time to live.

• Depending on the malware determine whether the malicious code is in the environment at all.

Black Hat Abu Dhabi 2011 107

Page 108: Fun with Google custom searches

Currently use my research

• My Google Custom Searches are currently used by individuals at various private and government intelligence agencies, organizations and departments including:

• Lascar Intelligence

• Bund Deutscher Kriminalbeamter (German Police)

108 Black Hat Abu Dhabi 2011

Page 109: Fun with Google custom searches

• British Department of Defense

• US Army

• iSIGHT Risk Management

109 Black Hat Abu Dhabi 2011

Page 110: Fun with Google custom searches

Final Thoughts

• Is All Hope lost? Should we all panic?

• That great philosopher Chicken Little said- The Sky is Falling down. In this case he was wrong.

• We can find a lot of information on the internet including things like credit card numbers, and passport information.

110 Black Hat Abu Dhabi 2011

Page 111: Fun with Google custom searches

• Even if you do not have your own social media/ web 2.0 presence, others in your network can put information about you on the web.

• With the information available out there it may be possible to engineer/ create opportunities for meetings with various individuals including political and business power brokers.

111 Black Hat Abu Dhabi 2011

Page 112: Fun with Google custom searches

• Running the appropriate searches generates useful political, social, economic and related intelligence.

• Useful for generating information on competing actors, entities and organizations.

• Can be used to possibly obtain information on upcoming threats (both internet based and others) and take the appropriate actions to combat these.

112 Black Hat Abu Dhabi 2011

Page 113: Fun with Google custom searches

• Can even use these customized searches with a honeytrap if you suspect an individual in your organization is leaking/ stealing information. You set up the trap and then use the searches to see if the ‘fake’ information becomes available here.

• Yes it’s not a good thing that so much information is out there, but you can take actions to counter this and protect your organization.

113 Black Hat Abu Dhabi 2011

Page 114: Fun with Google custom searches

• These same searches can also be used to gather intelligence, anticipate and counter possible threats to an organization.

• The custom search engine owner/ creator and the individual using the searches are both only limited by the content in the search engine and their imagination. The possibilities of what you can find are endless.

114 Black Hat Abu Dhabi 2011

Page 115: Fun with Google custom searches

Bibliography

• Bandukwala, Jamal. http://infosecmindstorm.blogspot.com/ (Last visited, Nov 16 2011)

• Google. Google Custom Search APIs and Tools Developer’s Guide. http://code.google.com/apis/customsearch/docs/dev_guide.html (Last visited, Nov 16 2011)

• Jiang, Rui, Google. Improved On-Demand Indexing. Google Custom Search Blog. http://googlecustomsearch.blogspot.com/2011/06/improved-on-demand-indexing.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+blogspot%2FSyga+%28Google+Custom+Search%29 (Last visited, Nov 16 2011)

Black Hat Abu Dhabi 2011 115

Page 116: Fun with Google custom searches

Black Hat Abu Dhabi 2011 116

• Shiv Nadar. Wikipedia.com http://en.wikipedia.org/wiki/Shiv_Nadar (Last visited, Nov 16 2011)

• Pastebin. Wikipedia.com http://en.wikipedia.org/wiki/Pastebin (Last visited, Nov 16 2011)

• Washington Times. CIA mines ‘rich’ content from blogs. http://www.washingtontimes.com/news/2006/apr/18/20060418-110124-3694r/ (Last visited, Nov 16 2011)

• Zelster, Lenny. Pastebin used for sharing stolen data. http://blog.zeltser.com/post/7033873645/pastebin-used-for-sharing-stolen-data) (Last visited, Nov 16 2011)

Page 117: Fun with Google custom searches

Thank You!

Black Hat Abu Dhabi 2011 117

Page 118: Fun with Google custom searches

Please turn in your completed

feedback form at the

registration desk.