en proves
Contingut
1 de desembre del 2001
El motor d'atac de Google
Some clever empiricist appears to have been abusing Google to attack Web servers, switches and routers in a novel way, by crafting search terms to include known exploits. Such a search will occasionally yield active Web pages used by administrators. On top of that, a number of them have already been cached. It's reasonable to surmise that a hacker has been using Google not merely to search for vulnerabilities, but as a proxy to hide behind while executing attacks.
Vota:
  • Actualment 3 sobre 5
  • 1
  • 2
  • 3
  • 4
  • 5
(..) while searching Google for a vulnerability in Cisco IOS Web Server, Russell followed a link and found himself in a switch belonging to a US .gov site.

The malicious use of search engines is nothing new (..); but this does bring it to new levels of finesse. The significant thing here is that the cache can be used to cover one's tracks, assuming there are no graphics to be fetched.

So how did all this stuff get indexed in the first place? Did Google's mighty spiders do it all automatically, or did someone deliberately add the URLs?

(..)

"The simplest explanation is that they just went to Google's submit URL page, and typed it in."

(..)
Comentaris
Digues la teva *
Informació Relacionada
Per temes
Des del punt de vista de la tecnologia
Internet
Seguretat
Buscador
Hacker