LinuxQuestions.org
Review your favorite Linux distribution.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 06-24-2008, 10:31 PM   #1
abefroman
Senior Member
 
Registered: Feb 2004
Location: lost+found
Distribution: CentOS
Posts: 1,430

Rep: Reputation: 55
Does anyone know if there is an IDS that can detect refers from a google hacking data


Does anyone know if there is an IDS (or premade rules for an IDS) that can detect refers from a google hacking database keyword search?

Also, is there an updated google hacking database, this one's last entry was in 2006:
http://johnny.ihackstuff.com/ghdb.ph...summary&cat=19
 
Old 06-25-2008, 05:07 AM   #2
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Not that I know of. Are you going to build rules for that?
As for updating I think you answered that yourself: who updates it and where is it maintained?
 
Old 06-25-2008, 05:47 AM   #3
unixfool
Member
 
Registered: May 2005
Location: Northern VA
Distribution: Slackware, Ubuntu, FreeBSD, OpenBSD, OS X
Posts: 782
Blog Entries: 8

Rep: Reputation: 158Reputation: 158
http://www.emergingthreats.net/... I'm not saying what you're looking for is there, but they do have a TON of sigs there that are contributions world-wide.

Another beauty of Snort rules is that what you don't find, you can create (although you might need some diligence and assistance to meet your requirements).
 
Old 06-25-2008, 07:33 AM   #4
abefroman
Senior Member
 
Registered: Feb 2004
Location: lost+found
Distribution: CentOS
Posts: 1,430

Original Poster
Rep: Reputation: 55
Quote:
Originally Posted by unSpawn View Post
Not that I know of. Are you going to build rules for that?
As for updating I think you answered that yourself: who updates it and where is it maintained?
Yes, I was thinking for writing some rules for snort if I couldn't find any already made.
 
Old 06-25-2008, 09:34 AM   #5
OlRoy
Member
 
Registered: Dec 2002
Posts: 306

Rep: Reputation: 86
What about using httpry with the "-s referer" option to only log the referer and then "tail -f" the log file to continually monitor it, and then pipe that command through "grep -f refererlist" where refererlist contains a list of regular expressions to match the referers you're looking for.

I would think that would be simpler than writing snort rules.

Edit: I just realized you would want to log more than the referer, but you get the idea

Last edited by OlRoy; 06-25-2008 at 10:01 AM.
 
Old 06-26-2008, 08:42 AM   #6
abefroman
Senior Member
 
Registered: Feb 2004
Location: lost+found
Distribution: CentOS
Posts: 1,430

Original Poster
Rep: Reputation: 55
Quote:
Originally Posted by OlRoy View Post
What about using httpry with the "-s referer" option to only log the referer and then "tail -f" the log file to continually monitor it, and then pipe that command through "grep -f refererlist" where refererlist contains a list of regular expressions to match the referers you're looking for.

I would think that would be simpler than writing snort rules.

Edit: I just realized you would want to log more than the referer, but you get the idea
Yep, thanks!
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
easy LiveCD for wireless hacking, data recovery lukeprog Linux - Distributions 4 05-17-2007 09:43 AM
LXer: Using Google As A Hacking Tool LXer Syndicated Linux News 0 01-04-2007 04:54 PM
LXer: Google Hacking: Ten Simple Security Searches That Work LXer Syndicated Linux News 0 02-27-2006 09:17 AM
LXer: The Google Command List: Data Mining using Google LXer Syndicated Linux News 0 01-21-2006 03:31 PM
google hacking perfect_circle Linux - Security 4 03-20-2005 07:42 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 07:46 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration