What is GHH? What is a honeypot? “An information system resource whose value lies in unauthorized or illicit use of that resource.” Simply put a honeypot is something that appears to be vulnerable, but in reality is recording illicit use by malicious attackers. GHH allows administrators to track malicious hosts: observe who is perpetrating the attack and how it is being executed via the log. The data generated by this, or any other honeypot can be used to deny future access to attackers, notify service providers of attacks originating from their networks or act as an input for statistical analysis. What are search engine hackers and why should I care? These insecure tools, when combined with the power of a search engine and index which Google provides, results in a convenient attack vector for malicious users. It is in your best interest to be knowledgable of, and protect yourself from this threat. What kind of damage can be done? Search: “# -FrontPage-” inurl:service.pwd This simple search string will return plain text passwords for administrative access via Microsoft's FrontPage. A misconfiguration in the FrontPage software and web server results in this sensitive information to be available to anyone who either constructs the search string, or visits an online database of malicious search strings. There are hundreds of similar search engine hacks. A lack of foresight into security issues in web applications are to blame. Why should I implement Google Hack Honeypot on my site? How does Google Hack Honeypot work?
|
Developers |