Just a brief introduction to some of the extremely easy types of reconnaissance techniques used by hackers, keep in mind all of this information is used to further your own knowledge so you may better protect yourself. Absolutely do not attempt to publish or use any of this information with malicious intent. I will not be liable for your stupidity.
Google Fu - Search engine recon performed by utilizing well-crafted queries and query tools to discover information about a target
Maltego - Open source web-scouring software used to aggregate and link personally identifiable information
Spokeo - A web-based white pages type tool that also works to gather as much public information about a target as possible
Google-Fu
Google-Fu is a coined term used in "googling" a particular subject or person. There is tons of information openly available and billions of webpages out there to meet your return on results for vague or generic queries. Many hackers now and days will use a search engine as a hacking tool making sure to ask the right questions. Here are some useful search directives and operators below.
site:[domain]
Limits the results to those within the provided [domain]. This can be generic, such as “.edu”, or specific, like www.cnn.com
link:[web page]
Shows all sites that link to the given web page, which is useful for determining business relationships
Literal matches (“ ”)
Preserves the order of the words in the query, which helps in finding titles or specific files
Not ( - )
Filters out web pages that contain the given term
Try Googling some of these and see where they lead you:
- filetype:.mysql_history username [this is a query that will show SQL server history with the word "username" in the results, of course you can look up username and password also, but I will let your imagination do that]
- intitle:"active webcam page" site:edu [self explanatory, active webcam pages in schools]
- filetype:sql "MySQL dump" (pass|password|passwd|pwd) [sql dump with variations of the word password in the results]
- intitle:"hp laserjet" inurl:info_configuration.htm [configuration information about a particular printer, sometimes if you look hard enough and get access you may be able to send/print messages to the admin]
Maltego
Maltego is used to determine the relationships and real-world links between people, companies, networks, and websites. Through these relationships, you can strive to provide a clear “threat picture” of the environment in which an organization resides. I will demonstrate this tool on an individual, but think about how it would be even more effective against your organization.
Positives
- Social Engineering attacks
- Enable physically locating a target in some cases (enabling attacker to befriend or threaten)
- Improved Dictionary attack
- Most people include something about themselves in their passwords
- Connect unrelated data
- No one search would have returned all of this assorted information, let alone graphed it for you
Negatives
- Overabundance of information makes locating pertinent pieces difficult
- High risk of false positives
- “Zipperer” is not a common last name in the US, but it found six incorrect phone numbers searching on me
- Free version does not contain full functionality\
- It’s much more effective when used against an organization than an individual!
Spokeo
I have got to say this website is awesome. It is a social network and open source aggrigator which queries 40 sites to compile information about a particular user. What is even more surprising is the fact that it only uses publically available information and information available via credentials you input. You would be extremely surprised just how much you can dig up on someone using this. The paid version of Spokeo will pull email contacts and profile them!
Imagine if a hacker had used a bunch of company emails. You would be able to quickly profile an entire company to identify easy social engineering targets and provide access to social engineering attack vectors via “common interests” like Pandora playlists, web site postings, Picasa pictures, names, addresses, phone numbers you get the idea.
Securing yourself
After reading all this you may say how do I stop it all? Well keep in mind everything you put on the internet will leave a footprint and will be stored by someone somewhere. There are however, a few mitigations you can use to help combat this.
- Avoid storing personal or employee information online, even if it’s in a hidden location or file on your server.
- Be exceedingly wary of any information posted to social sites – assume that anything there is public knowledge!
- Remember that just because a web page has been deleted doesn’t mean it’s gone… Google caches everything (but you may request that they delete it)
Be careful out there!



