

The "Google Hack" Honeypot 108
An anonymous reader writes "On the heels of Google Hacking for Penetration Testers, and Johnny Long's talks at Blackhat/Defcon over the weekend, comes the "Google Hack" Honeypot, a honeypot designed to lure in malicious search engine activity. They had a second release of their tools on monday, according to their site."
Comment removed (Score:5, Funny)
Re:Penetration Testers, Johnny Long. (Score:5, Funny)
Because when you read "honey pot" you immediately thought of catching hackers instead of what you should have thought of.
Sad isn't it?
Re:Penetration Testers, Johnny Long. (Score:2, Funny)
I dunno. I had an 8" floppy. Mabel [plainmabel.com] may have been plain, but she never complained.
Then one year it was 5.25" floppy, a few years later it was 3.5" and kinda stiff, and nowadays it's all about these little compact flash thingies.
Must be something Google's putting in the water.
My Explanation (Score:5, Informative)
Re:My Explanation (Score:1, Offtopic)
Use Google to Find Free MP3s, WMAs, OGGs, and Other Music Files [tech-recipes.com]
Your hack, huh? (Score:2, Insightful)
Re:My Explanation (Score:1, Redundant)
Re:Penetration Testers, Johnny Long. (Score:1)
Guh? (Score:1)
Re:Guh? (Score:1, Informative)
and then from this we can learn about what these h4x0r3z are doing and how to stop them
Re:Guh? (Score:5, Informative)
It's the usual hacking cycle brought to the search engine scene. Malicious hackers find ways to penetrate, and this will try to find a way to stop it. When it's stopped, the hackers will just move on to another way. Later, rinse, repeat.
Tools (Score:5, Funny)
Re:Tools (Score:3, Funny)
It isn't nice to get people's expectations up like that
Re:Tools (Score:4, Informative)
Results 1 - 10 of about 5,010 for penetration honeypot tool with Safesearch on. (0.40 seconds)
(and that was the google safe search)
Re:Tools (Score:1, Insightful)
huh? (Score:1)
Re:huh? (Score:5, Informative)
A honeypot is, to quote Lance Spitzner founder of the Honeynet Project:
"An information system resource whose value lies in unauthorized or illicit use of that resource."
Simply put a honeypot is something that appears to be vulnerable, but in reality is recording illicit use by malicious attackers.
GHH allows administrators to track malicious hosts: observe who is perpetrating the attack and how it is being executed via the log. The data generated by this, or any other honeypot can be used to deny future access to attackers, notify service providers of attacks originating from their networks or act as an input for statistical analysis.
Re:huh? (Score:3, Informative)
Why should I implement Google Hack Honeypot on my site?
GHH allows you to safely monitor attempts by malicious attackers to compromise your security. The logging functions that GHH implements allows you, the administrator, to do what you like with the information. You can use the attack database to gather statistics on would-be-attackers, report activities to appropriate authorities and temporarily or permanently deny access to resources.
Re: (Score:2)
Re:huh? (Score:2)
Re:huh? (Score:1)
Basically involved using sex to gain confidential information or to compromise an agent of the other side.
Huh? Not all of these... (Score:5, Interesting)
How is that a problem? Look at their demo page [sourceforge.net]. Whoopdeedoo. Now I can stare at a SquirrelMail login screen. Still haven't gotten access to much of anything that I'm not supposed to. Heck, there are plenty of websites offering e-mail through SquirrelMail. Whatever...
Re:Huh? Not all of these... (Score:5, Insightful)
I assume, that's the reason for the 1.4.4 login screen at their demo page.
Re:Huh? Not all of these... (Score:1, Offtopic)
Re:Huh? Not all of these... (Score:2)
Re:Huh? Not all of these... (Score:5, Insightful)
Re:Huh? Not all of these... (Score:5, Informative)
That's precisely the point of a Honeypot. It's something that looks like it might be a vulnerability, but isn't. SquirrelMail had a bunch of vulnerabilities, including an SQL injection vulnerability. These sites get themselves added to Google, and thus get pulled up when someone searches for a site to exploit, but they can't actually be exploited. However, the Honeypot site now has the remote IP address, browser being used, and whatever info it feels like collecting on the bad guys.
Read the FAQ [sourceforge.net], it explains a lot.
Silly tool (Score:1, Insightful)
You just need to make sure you do not put any items on your webserver you do not want to get viewed.
And if you make invisible links to them. That is just plain stupid.
Also, if Google can find those files so can any other web-crawler.
Wimp_org
Re:At the Risk of Pointing out the Obvious (Score:2)
Re:Silly tool (Score:3, Informative)
Also, if Google can find those files so can any other web-crawler.
Ugh.
The question isn't is it good but why do it? (Score:3, Insightful)
If you want to see if you can secure data so it doesn't get google hacked - ok.
If you just want to show how nifty you are at using commonly available tools - there never has been any such thing as total privacy and there never will be.
Re:The question isn't is it good but why do it? (Score:2, Informative)
Re:The question isn't is it good but why do it? (Score:2, Insightful)
There we go. This is why I hardly eve
Re:The question isn't is it good but why do it? (Score:3, Funny)
My Explanation (Score:4, Informative)
Here is a FAQ question from their site:
What is a honeypot?
A honeypot is, to quote Lance Spitzner founder of the Honeynet Project:
"An information system resource whose value lies in unauthorized or illicit use of that resource."
Simply put a honeypot is something that appears to be vulnerable, but in reality is recording illicit use by malicious attackers.
GHH allows administrators to track malicious hosts: observe who is perpetrating the attack and how it is being executed via the log. The data generated by this, or any other honeypot can be used to deny future access to attackers, notify service providers of attacks originating from their networks or act as an input for statistical analysis.
Re:My Explanation (Score:2)
Great...So the new goatse link will be some overzealous honeypot. You click the link and your ISP gets an email saying you're an evil hacker.
Wouldn't it be more effective to report the websites with these vunerabilities to their hosting providers?
Re:My Explanation (Score:2)
You have to be doing something deliberately malicious in order to get caught by the honeypot.
The honeypot just pretends to be something vulnerable in hopes of attracting criminals to attack it.
Re:My Explanation (Score:3, Insightful)
So you encode evil input into the URL. Many scripts accept POST and GET.
Uh (Score:2)
HTTP-GET, sure. But care to explain how you make a HTTP-POST request with a <A> hyperlink?
Re:Uh (Score:2)
Re:Uh (Score:2)
If you track evil POSTs, you have to track evil GETs or you leave a simple workaround (just copy/paste your evil string on the URL.) OTOH, if you track and report evil GETs, then any unsuspecting fool who clicks on a bad hyperlink might be wrongfully reported.
OK, I'll admit my density. (Score:3, Interesting)
How do you honeypot Google? I'm fairly sure the nice folks at GoogleCorp aren't going to let you stick your honeypot in the way of the real thing. If the hacks in question are just malicious queries, how do you get the 1334 hax0rs to use your oh-so-attractive honeypot when every schmoe can type "www.google.com" into their attack script?
Where's the flaw in my thinking? If you're not honeypotting the search, what's left?
Re:OK, I'll admit my density. (Score:1, Informative)
Hackers use google to uncover these site's vulnerabilities. Thats all Google has to do with it!
Re:OK, I'll admit my density. (Score:5, Insightful)
Tool creates fake web pages that look like vulnerable Web apps.
Google indexes fake pages.
Bad Guy searches Google for likely victims.
Google returns indexes of pages created by tool.
Bad Guy follows links.
Tool logs Bad Guy's IP and other information.
No Profit for Bad Guy.
Good Guys watch Bad Guy try to |-|@><0r the page, and log everything his does.
Good Guys contact Law Enforcement, present evidence.
Good Guys contact Bad Guy's ISP, present evidence.
(now, there are 2 possible outcomes - the ideal and the real.)
Ideal outcome
Law Enforcement goes after Bad Guy.
Bad Guy's ISP shuts Bad Guy down.
Bad Guy gets caught, convicted, and spends several years playing "Hide The Sausage" with his new friend Benjamin Dover the Serial Sodomist.
Real outcome
Law Enforcement ignores evidence as no money was lost.
Bad Guy's ISP ignores evidence as there is no Law Enforcement involvement, and Good Guys are not ISP's customers.
Bad Guy is distracted for a while and doesn't get to |-|@><0r as many systems.
Re:OK, I'll admit my density. (Score:1)
Re:OK, I'll admit my density. (Score:2, Insightful)
Curiosity isn't a crime. Even if it was, no crime should be punished by what is essentially state sanctioned rape.
'Bad guy' not so bad (Score:1, Interesting)
For example, the following "crack-search" example: 'intitle:index.of "parent directory" *.mp3', this only is useful if you mistakenly have left your http server on, I don't think the 'bad guy' is doing anything bad by using this, it is you who should disable your http server, or Google
Re:OK, I'll admit my density. (Score:1)
Then you can develop counter measures...no?
Your scenario falls under entrapment (in the UK anyhoo)
Re:OK, I'll admit my density. (Score:1)
Only if you are an agent of the state, and it is not strictly a legal defence. See this [freebeagles.org].
-Tez
Re:OK, I'll admit my density. (Score:1)
This is not a Google search engine clone. This tool uses Google and other search engines to index fake vunerabilities in order to entice would-be hackers into trying to exploit a vunderability. This tool then logs the activity and the IP and such can be added to a blacklist database that other site admins can use to block malicious user IP's, report to ISP of IP address...potentially.
That said, a hacker worth his salt most likely won't be
Is it just me... (Score:2, Funny)
Google hacking and honeypots explained (Score:5, Informative)
Google hacking is the process of reconnaisance with a target, through the use of google.
What this means, is that an attacker has a target, he can use google to find information/vulnerabilities of this target without actually ever touching the target at all, thereby giving no warning.
It's a much "safer" way of reconnaisance than directly going to a page and attempting trial and error attacks... The attacked has no idea there is any reconnaisance taking place, yet the attacker is finding more and more information about exploiting their target.
"HONEYPOTS"
Honeypots are designed to be in a controlled vulnerable state. You set up a server with known vulernabilities and put it in a controlled area of your network. Depending on the software used, there are various levels of interaction the honeypot will allow. Complicated honeypots can replicate a large network, recording all activities of the attacker and keeping their interest for longer. Simple honeypots only allow basic actions, and the attacker will become bored more quickly and you will get less information./P.
Re:Google hacking and honeypots explained (Score:1)
I think... (Score:3, Funny)
Ok, there's my dirty post for the day.
Honeypot Explained (Score:5, Informative)
First, a quick summary of Google hacking: Google obviously has a huge cache of URLs. If a vulnerability is published that can be identified by a URI string, then you can simple Google that URI to identify vulnerable hosts. The GHH main page has a list of the current vulnerability signatures that it tracks.
In order to make a honeypot for this malicious behavior, you simply have to set up a Web server to respond appropriately to each of these linked URLs and have it be indexed by Google (not a trival task, but still quite doable). You can then track referring requests from Google by IP address, etc...
In order to defeat this type of tracking, an attacker could strip off the Referer header using an automated tool or a proxy, then route through an Onion router or some other anonymous proxy, but at least the server would still have some metrics to identify the relative freqency of attackers reaching the site through a "Google Hack."
Check out SiteDigger (Score:1)
This tool will blow your mind.
You have to create an account with Google and acquire a key to use it.
Then point it at a site and let it run the hax0r search queries...
You will be amazed at what is exposed out there.
http://www.foundstone.com/resources/termsofuse.ht
Why aren't Google being responsible? (Score:1, Interesting)
So how come Google don't do anything about the hacks themselves?
With some hacks, like the URL based ones, it seems unlikely that removing them would affect any legitimate search.
The conclusions by courts in the open wireless networks seemed to be that the openess(physically) of a network was irrelevant - if it was private(in the mind of the owner) then you're not alowed in. So Google is not only sniffing out private networks they are also broadcasting them to the world!
Re:Why aren't Google being responsible? (Score:3, Insightful)
Say I have pages up with the same strings that are relevant to a number of Google hacks, like "Admin Panel powered by" etc etc ?
This stupid pre-emptive doctrine that has poisoned everything since 9/11 has to stop. Nothing has been 'settled' in the real world where things actually count.
if it was private
The Downing Street memo and numerous other leak
This 'honey pot' talk has my tumbly all rumbly (Score:1)
Re:This 'honey pot' talk has my tumbly all rumbly (Score:3, Insightful)
Re:This 'honey pot' talk has my tumbly all rumbly (Score:1)
robots.txt? (Score:1)
Re:Ok but say goodbye to your traffic (Score:1, Informative)
what is this about? (Score:2)
what are these insecure tools?
and how does a search engine index aid someone
in hacking my site?
Re:what is this about? (Score:1, Informative)
Let's say you have a website that runs SomeSoftware v1.0.
Now let's say SomeSoftware v1.0 has an exploit that allows anyone to gain administrative priviledges to the software.
If a hacker knows SomeSoftware has this vunlerability, if he wants to have some fun, all he needs to do is Google for "SomeSoftware" to find any website running SomeSoftware! Then he can mess with it.
Now what the honeypot does, is it masquerades as one of these sites. It'll look just like SomeSoftware in a Googl
Re:what is this about? (Score:1)
Google Hack Tool (Score:1)
Re:Google Hack Tool (Score:1)
Google is not doing the hacking. I'll give you a simple step by step example hack:
1) Let's say that you really like to use PHP on your site. Let's also say that PHP has a gaping security hole that will allow all sorts of "hacking" to take place. Lets just say that you don't know about this security hole just yet and so you don't know that it should be patched etc...
With the situation set u
who you calling a tool? (Score:4, Insightful)
how is your crappy site being indexed by google the fault of "insecure tools"? you have stuff to hide? don't put it where google can get it!
the only insecure "tool" is the site designer who exposes his own data...
Re:who you calling a tool? (Score:1)
OMG! (Score:1)