Google Hacking Database Tool Updated - InformationWeek
IoT
IoT
Software // Enterprise Applications
News
3/5/2008
02:40 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Google Hacking Database Tool Updated

The Google Hacking Database Tool is an online application that automates Google searches for files and other data associated with Web site vulnerabilities.

GnuCitizen, a computer security consultancy, today released an updated version of its Google Hacking Database Tool (GHDB), an online application that automates Google searches for files and other data associated with Web site vulnerabilities.

GHDB is essentially a Web-based version of Goolag Scanner, a penetration testing and hacking tool released two weeks ago by Cult of the Dead Cow (cDc). It was assembled with the help of Johnny Long, the author of Google Hacking for Penetration Testers.

GnuCitizen founder Petko D. Petkov acknowledges that the concept is similar to Goolag Scanner, but says GHDB incorporates a different design and programming approach. "The GHDB tool was first released long before cDc's Goolag, back in March 2007, I believe," he said in an e-mail. "It is built on the top of Ajax technologies and some cutting-edge JavaScript programming techniques. The application is entirely online-based, and it is a good example of how to implement a true cloud computing type of infrastructure. Because of its nature, it is always updated with the latest Google dorks/hacks, with no admin overhead on our side, unlike the Goolag tool, which is a compiled binary. And it runs inside the browser, which makes it cross-platform."

SiteDigger 2.0 is a similar application offered by Foundstone. It requires a Google Web services API license key. Other examples of this type of tool include Gooscan and Wikto. Blogger Alessandro Tanasi offers a more complete list of penetration testing software on his Web site.

While Google hasn't actively fought the use of such tools, it will block automated search queries after a detecting a high volume of them. Google didn't immediately respond to a request for comment.

Automated vulnerability scanning tools should be thought of as a necessity in today's security environment. Those disinclined to scan their sites for vulnerabilities should be aware that unethical hackers are doing so.

"I believe that penetration testing and hacking tools like this one will become more and more popular among the community, although not all types of tools are suitable to be made available online," said Petkov.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
[Interop ITX 2017] State Of DevOps Report
[Interop ITX 2017] State Of DevOps Report
The DevOps movement brings application development and infrastructure operations together to increase efficiency and deploy applications more quickly. But embracing DevOps means making significant cultural, organizational, and technological changes. This research report will examine how and why IT organizations are adopting DevOps methodologies, the effects on their staff and processes, and the tools they are utilizing for the best results.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of IT Report
In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll