lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 26 Aug 2004 09:02:27 -0400 (EDT)
From: Justin Wheeler <bugtraq@...ademons.com>
To: bugtraq@...urityfocus.com
Subject: Re: New google's top query?

It's also worth noting that the vast majority of the cards supplied via 
this method, even when it isn't riddled with "hey look what google can 
do!" messages, are test card numbers that are used only for testing online 
payment software, and won't work on live sites.

Also, most of the cards I found when I tested it came with no expiry, and 
9 times out of 10, online merchants also require the 3 digit verification 
code on the back of cards aswell.

Lastly, I'd like to point out, there's a good chance that if the card has 
made it into the public domain, someone else has probably already 
exploited it, and any attempt to use it yourself would be nothing more 
than blatant stupidity, as the card is likely already been cancelled, and 
being monitored for more fradulent activity.

Google is doing nothing, and doesn't need to change anything.  If they do, 
what would be next, they have to locate people's names and scratch them 
off because they might be under the witness protection program?

Regards,
Justin Wheeler

--
I hit the CTRL key but I'm still not in control!

On Mon, 23 Aug 2004, Alex Keller wrote:

> Re: New google's top query?
>
> this "hack" (really a numrange search) was covered at DEFCON12 
> (http://www.defcon.org/html/defcon-12/dc-12-index.html) and widely known 
> before it was publicized by Johnny Long (http://johnny.ihackstuff.com/) 
> during his talk at the conference (to his credit, he did NOT release the 
> exact syntax BTW). following that search now will yield little sensitive 
> info, as most of the affected sites have removed the pages that demonstrated 
> this security breach. Google is well aware of the malicious activity that can 
> be aided with their search engine....but they are in a bit of a predicament 
> between notions of security and freedom; a common juxtaposition in politics, 
> social order, and network security.
>
> this forum at Johnny's site has plenty more search "hacks":
> http://johnny.ihackstuff.com/index.php?module=prodreviews
>
> for further investigation and vulnerability testing, check out Foundstone's 
> SiteDigger: 
> http://www.foundstone.com/index.htm?subnav=resources/navigation.htm&subcontent=/resources/s3i_tools.htm
>
> Athena is another powerful Google digging tool that can expose search 
> vulnerabilities; although i can't seem to find a working download site right 
> now. you can grab the entire DEFCON12 iso (457MB) at:
> http://130.212.20.4/admin/defcon/defcon12.iso
> Athena can be found in the directory "Long".
>
> happy Google hunting...oh yeah, don't be an idiot and use this info for evil.
>
> -alex
>
>
> other
> Jérôme ATHIAS wrote:
>
>> 
>> Hi,
>> 
>> 
>> 
>> i don't remember to have seen this info here...
>> 
>> 
>> 
>> If information is knowledge and knowledge is power, then Google must be all 
>> powerful. I say this because of the thing you can find on Google if you 
>> know how to look for them. A new Google hack has come to my attention that 
>> brings back some information that is a bit troubling. I must say that it is 
>> also good for the more you know about something the better you are to act 
>> upon it. The hack is this:
>> 
>> 
>> 
>> http://www.google.com/search?q=visa+4356000000000000..4356999999999999
>> 
>> 
>> 
>> When this query is put into the Google search, an idea of the brut strength 
>> of Google becomes apparent. You can find things like this, which may worry 
>> you if you found your name on it.
>> 
>> 
>> 
>> I.m not really sure if Google knows what it can do, but they take an 
>> interesting stance toward their provision of data.
>> 
>> 
>> 
>> Regards,
>> 
>> Jérôme
>> 
>> 
>
>
>
>
>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ