Ethical Hacker’s Passive Reconnaissance Toolkit

Ahmet Talha Şen
InfoSec Write-ups
Published in
6 min readSep 20, 2023

--

Created by DALL·E

Introduction

In the world of ethical hacking, information is power. The more you know about your target, the more effectively you can devise and execute penetration tests. Passive reconnaissance plays a crucial role in this process, allowing ethical hackers to gather valuable information about a target without engaging in any intrusive activities. In this article, we will delve into the world of passive reconnaissance by exploring three key tools and techniques:

  1. Google Advanced Searches (Dorking)
  2. The Google Hacking Database (GHDB)
  3. The Wayback Machine

Part 1: Google Advanced Searches (Dorking)

Understanding Google Dorking

Google, the world’s most popular search engine, is not just for finding cat videos and recipes; it can also be a powerful tool for ethical hackers. This practice, known as Google Dorking or Google Hacking, involves using advanced search operators to unveil information that was never intended to be publicly accessible.

Note: While the examples in this article are provided using Google, the same fundamental principles apply to other popular search engines as well. What matters is your ability to access information that can be obtained using such queries.

Step 1: Explore Google Dorking

To get started, open the Google search engine and type a string query, such as “ethical hacker” to observe typical search results. However, to narrow down results and find specific information, you can use advanced search operators like allintext:, filetype:, intitle:, inurl:, and site:. These operators enable you to refine your search to specific domains, keywords, or file types.

For instance, by typing “ethical hacker site:pearson.com”, you can limit results to pages from the Pearson website, revealing information related to ethical hacking from that domain.

Step 2: Conduct Searches Using the Google Advanced Search Form

Google offers an Advanced Search form that simplifies the use of these operators. Simply type “advanced search” in the Google search window to access it. This form allows you to perform the same searches as in the previous step but in a more user-friendly interface.

Step 3: Conduct Passive Reconnaissance with Advanced Search Operators

Ethical hackers use advanced search operators to uncover vulnerabilities and information about potential targets. Combining operators can reveal sensitive data. For instance, using “site:examplecompany.com inurl:admin” may expose pages related to administrative access within a specific company’s website.

Experiment with various combinations of operators like “intitle,” “filetype,” and “intext” to discover different types of information. Remember that while passive reconnaissance is legal, using uncovered information for active reconnaissance or exploitation is not.

Part 2: The Google Hacking Database (GHDB)

The GHDB serves as an index of user-created dorks designed to uncover unintentionally exposed information on the internet. It’s a valuable resource for ethical hackers looking to identify vulnerable areas.

Step 1: Explore the Google Hacking Database Main Page

Start by searching for “GHDB” on Google, and you’ll find the Google Hacking Database. This resource offers filters, quick searches, and a wealth of dorks for uncovering sensitive data.

Step 2: Use Quick Search to Find Specific Dorks

Quick Search allows you to select filter categories and view interesting dorks. Each dork provides information like GHDB-ID, author, date published, a brief description, and a clickable link for launching the dork.

Step 3: Select Categories to Find Interesting Dorks

Combine category filters with search terms to further refine results. For example, selecting “Files Containing Passwords” and typing “db_pass” in Quick Search returns dork searches related to database passwords.

By exploring these dorks, ethical hackers can discover potential vulnerabilities and data exposures.

Part 3: The Wayback Machine

Website security has evolved over the years, but archived webpages can reveal valuable historical information about a target.

Step 1: Explore the Wayback Machine Database

The Wayback Machine, accessible at web.archive.org , is an archive of the entire internet. It crawls websites, takes screenshots, and logs data to a database. Users can query this database to access historical webpages.

Step 2: Explore the Calendar Tab

The Calendar tab shows how many times a website has been crawled and provides a calendar showing when snapshots were taken. By selecting a year and date, users can view archived pages, gaining insight into a site’s historical content.

Step 3: Explore the Collections Tab

The Collections tab organizes archives by source and provides insights into who runs them. Users can explore these collections to gather historical data about a target.

Step 4: Explore the Changes Tab

The Changes tab highlights how a webpage has evolved over time. By comparing captures, users can identify significant changes and potential vulnerabilities.

Step 5: Explore the Summary Tab

The Summary tab displays MIME types of hosted content within a date range. This can be valuable for understanding a target’s historical content and technology.

Step 6: Explore the Site Map Tab

The Site Map tab provides an overview of a website’s structure over time. Users can click through different years to see how the complexity of a site has changed.

Step 7: Explore the URLs Tab

The URLs tab lists all URLs containing the domain prefix. Filters can be applied to search for specific file types, potentially revealing interesting files and vulnerabilities.

Reflection Question: The Importance of Passive Reconnaissance

Why is passive reconnaissance so important for effective hacking and penetration testing?

Passive reconnaissance is vital because it allows hackers to gather valuable information about their targets without raising alarms. By uncovering data and vulnerabilities discreetly, ethical hackers can better plan and execute penetration tests, helping organizations strengthen their security defenses.

In conclusion, passive reconnaissance is a critical phase in ethical hacking, providing essential insights into potential weaknesses and target profiles. By mastering tools like advanced Google searches, the Google Hacking Database, and the Wayback Machine, ethical hackers can enhance their effectiveness in identifying and addressing security vulnerabilities.

--

--

Cybersecurity enthusiast sharing Cisco Packet Tracer notes, CTFs, Pentest and insights to help others stay protected. Let's make the internet a safer place!