SlideShare a Scribd company logo
Tenacious Diggity
Skinny Dippin' in a Sea of Bing
29 July 2012 – DEF CON 20 – Las Vegas, NV




                                            Presented by:
                                            Francis Brown & Rob Ragan
                                            Stach & Liu, LLC
                                            www.stachliu.com
2	
  
Agenda
     OVERVIEW


•  Introduction/Background

•  Advanced Attacks
    •  NEW Diggity Attack Tools

•  Advanced Defenses
    •  NEW AlertDiggity Cloud Database

•  Future Directions


                                         3	
  
Introduction/Background
   GETTING UP TO SPEED



                          4	
  
Diggity Tools
   PROJECT OVERVIEW




                      5	
  
Diggity Tools
            ATTACK TOOLS


 Tool	
                      Descrip,on	
  
 GoogleDiggity	
             Tradi,onal	
  Google	
  hacking	
  tool	
  
 BingDiggity	
               Bing	
  equivalent	
  of	
  tradi,onal	
  Google	
  hacking	
  tool	
  
 FlashDiggity	
              Adobe	
  Flash	
  security	
  scanning	
  tool	
  
 DLPDiggity	
                Data	
  loss	
  preven,on	
  scanning	
  tool	
  
 LinkFromDomain	
            Bing	
  footprin,ng	
  tool	
  based	
  on	
  off-­‐site	
  links	
  
 CodeSearch	
  Diggity	
   Open-­‐source	
  code	
  vulnerability	
  scanning	
  tool	
  
 MalwareDiggity	
            Malware	
  link	
  detec,on	
  tool	
  for	
  off-­‐site	
  links	
  



                                                                                                       6	
  
Diggity Tools
            NEW ATTACK TOOLS


 Tool	
                         Descrip,on	
  
 PortScan	
  Diggity	
          Passive	
  port	
  scanning	
  via	
  Google	
  
 NotInMyBackYard	
              Easily	
  find	
  your	
  info	
  in	
  3rd	
  party	
  sites	
  
 BHDB	
  2.0	
                  New	
  Bing	
  Hacking	
  DB	
  now	
  as	
  affec,ve	
  as	
  Google	
  
 Bing	
  BinaryMalware	
   Find	
  malware	
  via	
  Bing’s	
  indexing	
  of	
  executables	
  
 CodeSearch	
  REBORN	
   Brought	
  back	
  from	
  the	
  dead	
  
 SHODAN	
  Diggity	
            Easy	
  interface	
  to	
  SHODAN	
  search	
  engine	
  




                                                                                                           7	
  
Diggity Scraping
   NEW ACROSS ALL ATTACK TOOLS




                                 8	
  
Diggity Scraping
   PROXIES SPECIFICATION




                           9	
  
Diggity Scraping
   MANUAL PROXIES SPECIFICATION




                                  10	
  
Advanced Attacks
   WH AT YOU SHOULD KNOW



                           11	
  
NEW GOOGLE HACKING TOOLS


PortScan Diggity

                           12	
  
PortScanning
    TARGETING HTTP ADMIN CONSOLES

Searching for web admin interfaces on non-standard HTTP ports




                                                                13	
  
PortScanning
    TARGETING PORT RANGES

Searching for specific port ranges




                                    14	
  
PortScanning
    TARGETING VULNERABILITY

Targeting specific HTTP ports example




                                       15	
  
PortScan Diggity
  TARGETING HTTP ADMIN CONSOLES




                                  16	
  
NEW GOOGLE HACKING TOOLS


NotInMyBackYard

                           17	
  
Data Leaks on                3rd    Party Sites
     SENSITIVE INFO EVERYWHERE

Verizon - 2012 Data Breach Investigation Report




                                                  18	
  
PasteBin Leaks
     PASSWORDS IN PASTEBIN.COM POSTS

 •  Twitter feed tracking passwords leaked via PasteBin




                                                          19	
  
Cloud Docs Exposures
     PUBLIC CLOUD SEARCHING

Public cloud storage document exposures




                                          20	
  
Cloud Docs Exposures
     ROBOTS.TXT IS DEAD

Personal photo galleries exposed




                                   21	
  
Data Loss In The News
      MAJOR DATA LEAKS

•  Yale Alumni 43,000 SSNs Exposed in Excel Spreadsheet




                                                          22	
  
NotInMyBackYard
      L O C A T I O N, L O C A T I O N, L O C A T I O N

Cloud storage:                     Public presentations sharing sites:
•  Google Docs/Drive, DropBox,     •  slideshare.net, prezi.com,
   Microsoft SkyDrive, Amazon S3      present.me

Social networking sites:           Public charts and graphs sharing sites:
•  Facebook, Twitter, LinkedIn     •  ratemynetworkdiagram.com,
                                      gliffy.com
Public document sharing sites:
•  scribd.com, 4shared.com,        Video sharing sites:
   issuu.com, docstoc.com,         •  vimeo.com, dailymotion.com,
                                      metacafe.com, youtube.com
PasteBin and text sharing sites:
•  pastebin.com, pastie.org, …


                                                                         23	
  
NotInMyBackYard
  PASTEBIN EXAMPLE




                     24	
  
NotInMyBackYard
  XLS IN CLOUD EXAMPLE




                         25	
  
Cloud Docs Exposures
     PUBLIC CLOUD SEARCHING

Public cloud storage document exposures




                                          26	
  
NEW GOOGLE HACKING TOOLS


Bing Hacking Database v2.0

                             27	
  
Bing Hacking Database v2.0
                 STACH & LIU TOOLS


BHDB v2.0 – Updates
•  Bing hacking database
•  Bing hacking limitations
     •  Disabled inurl:, link: and linkdomain:
        directives in March 2007
     •  No support for ext:, allintitle:, allinurl:
     •  Limited filetype: functionality
            •    Only 12 extensions supported

•  UPDATES (2012)
     •  ext: functionality now added
     •  inurl: work around by using
        instreamset:url:
•  New BHDB 2.0
     •  Several thousand more Bing dorks!

                                                      28	
  
NEW GOOGLE HACKING TOOLS


BingBinaryMalwareSearch (BBMS)


                                 29	
  
Bing Malware Search
   TARGETING MALWARE

Targeting known malware signatures




                                     30	
  
Google vs Bing Size
  MORE BANG FOR YOUR SEARCH




                              31	
  
NEW GOOGLE HACKING TOOLS


CodeSearch Diggity

                           32	
  
Google Code Search
       VULNS IN OPEN SOURCE CODE

 •  Regex search for vulnerabilities in indexed
    public code, including popular open source
    code repositories:

 •  Example: SQL Injection in ASP querystring
      •  select.*from.*request.QUERYSTRING




                                                  33	
  
CodeSearch Diggity
  AMAZON CLOUD SECRET KEYS




                             34	
  
Cloud Security
   N O P R O M I S E S . . .N O N E

 Amazon AWS Customer Agreement
   •  http://aws.amazon.com/agreement/#10




                                            35	
  
Cloud Crawling
  CREATE YOUR OWN SEARCH ENGINES




                                   36	
  
NEW GOOGLE HACKING TOOLS


SHODAN Diggity


                           37	
  
SHODAN
     HACKER SEARCH ENGINE

•  Indexed service banners for whole Internet for HTTP (Port 80), as well
   as some FTP (23), SSH (22) and Telnet (21) services




                                                                            38	
  
SHODAN
 FINDING SCADA SYSTEMS




                         39	
  
SHODAN
 FINDING SCADA SYSTEMS




                         40	
  
SHODAN Diggity
  FINDING SCADA SYSTEMS




                          41	
  
Advanced Defenses
   PRO TECT YO NECK



                      42	
  
Diggity Alert DB
   DATA MINING VULNS   Diggity Alerts
                        Database




                                        43	
  
Future Directions
    WH AT W ILL HAPPEN



                         44	
  
Diggity Dashboards
   COMING SOON
                 Google	
  Charts	
  




                 Mobile	
  BI	
  Apps	
  




                                            45	
  
DLP Reporting
   PRACTICAL EXAMPLES




                        46	
  
Questions?
Ask us something
We’ll try to answer it.
                   For more info:
                   Fran Brown
                   Rob Ragan (@sweepthatleg)
                   Email: contact@stachliu.com
                   Project: diggity@stachliu.com
                   Stach & Liu, LLC
                   www.stachliu.com
Thank You




Stach & Liu Google Hacking Diggity Project info:
http://www.stachliu.com/index.php/resources/tools/google-hacking-diggity-project/


                                                                                    48	
  

More Related Content

PDF
Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki...
PDF
Lord of the Bing - Black Hat USA 2010
PDF
CloudBots - Harvesting Crypto Currency Like a Botnet Farmer
PDF
Hack attack pulp google
PDF
Lord of the bing b-sides atl
PDF
InfoSec World 2013 – W4 – Using Google to Find Vulnerabilities in Your IT Env...
PDF
DEFCON 20 (2012) – Tenacious Diggity – 29July2012 – Slides.PDF
PDF
OSINT tools for security auditing with python
Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki...
Lord of the Bing - Black Hat USA 2010
CloudBots - Harvesting Crypto Currency Like a Botnet Farmer
Hack attack pulp google
Lord of the bing b-sides atl
InfoSec World 2013 – W4 – Using Google to Find Vulnerabilities in Your IT Env...
DEFCON 20 (2012) – Tenacious Diggity – 29July2012 – Slides.PDF
OSINT tools for security auditing with python

What's hot (20)

PDF
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
PDF
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
PDF
RAR and GNAP for VC HTTP API
PDF
OWASP – Internet of Things (IoT) – Top 10 Vulnerabilities List
PDF
POC 2018 - whatever talk_ Let's go OSINT using DeepWeb
PDF
Thotcon 0x5 - Retroactive Wiretapping VPN over DNS
PDF
Hunting for the secrets in a cloud forest
PPTX
Incident Response for the Work-from-home Workforce
PPTX
Blackhat 2018 - The New Pentest? Rise of the Compromise Assessment
PDF
THOTCON 0x6: Going Kinetic on Electronic Crime Networks
PDF
Lazarus talk tlp white
PPTX
The Boring Security Talk - Azure Global Bootcamp Melbourne 2019
PDF
Hunting for the secrets in a cloud forest
PPTX
OSINT Tool - Reconnaissance with Maltego
PDF
天下武功唯快不破:利用串流資料實做出即時分類器和即時推薦系統
PDF
Identifying and Correlating Internet-wide Scan Traffic to Newsworthy Security...
PDF
Four years of breaking HTTPS with BGP hijacking
PDF
Microblogging: A Semantic Web and Distributed Approach
PDF
CSW2017 Kyle ehmke lots of squats- ap-ts never miss leg day
PPT
Advanced Information Gathering AKA Google Hacking
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
RAR and GNAP for VC HTTP API
OWASP – Internet of Things (IoT) – Top 10 Vulnerabilities List
POC 2018 - whatever talk_ Let's go OSINT using DeepWeb
Thotcon 0x5 - Retroactive Wiretapping VPN over DNS
Hunting for the secrets in a cloud forest
Incident Response for the Work-from-home Workforce
Blackhat 2018 - The New Pentest? Rise of the Compromise Assessment
THOTCON 0x6: Going Kinetic on Electronic Crime Networks
Lazarus talk tlp white
The Boring Security Talk - Azure Global Bootcamp Melbourne 2019
Hunting for the secrets in a cloud forest
OSINT Tool - Reconnaissance with Maltego
天下武功唯快不破:利用串流資料實做出即時分類器和即時推薦系統
Identifying and Correlating Internet-wide Scan Traffic to Newsworthy Security...
Four years of breaking HTTPS with BGP hijacking
Microblogging: A Semantic Web and Distributed Approach
CSW2017 Kyle ehmke lots of squats- ap-ts never miss leg day
Advanced Information Gathering AKA Google Hacking
Ad

Similar to Tenacious Diggity - Skinny Dippin in a Sea of Bing (20)

PDF
Pulp Google Hacking
PDF
Lord of the Bing: Taking Back Search Engine Hacking From Google and Bing
PDF
Android Hacking
PDF
Luiz eduardo. introduction to mobile snitch
PDF
Defcon17 - dradis Framework: sharing information will get you root
 
PDF
Hacking the Public Presentation
PPTX
SecTor '09 - When Web 2.0 Attacks!
PDF
The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...
PPTX
PittsburgJUG_Cloud-Native Dev Tools: Bringing the cloud back to earth
PDF
Apache Druid Vision and Roadmap
KEY
Google, Developer Experience and Discovery
KEY
Guardian devexp and_discovery
PDF
[Public] 7 archetipi della tecnologia moderna [italy]
PPTX
AI: Your Personal Intern
PDF
Honeypots, Deception, and Frankenstein
PDF
H2O at Poznan R Meetup
PDF
[KubeCon NA 2018] Effective Kubernetes Develop: Turbocharge Your Dev Loop - P...
PDF
Open Social Technical Update for Java developers - Presented at sv-gtug.org m...
PDF
Android : How Do I Code Thee?
PPTX
Abusing Adobe Reader’s JavaScript APIs by Abdul-Aziz Hariri & Brian Gorenc - ...
Pulp Google Hacking
Lord of the Bing: Taking Back Search Engine Hacking From Google and Bing
Android Hacking
Luiz eduardo. introduction to mobile snitch
Defcon17 - dradis Framework: sharing information will get you root
 
Hacking the Public Presentation
SecTor '09 - When Web 2.0 Attacks!
The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...
PittsburgJUG_Cloud-Native Dev Tools: Bringing the cloud back to earth
Apache Druid Vision and Roadmap
Google, Developer Experience and Discovery
Guardian devexp and_discovery
[Public] 7 archetipi della tecnologia moderna [italy]
AI: Your Personal Intern
Honeypots, Deception, and Frankenstein
H2O at Poznan R Meetup
[KubeCon NA 2018] Effective Kubernetes Develop: Turbocharge Your Dev Loop - P...
Open Social Technical Update for Java developers - Presented at sv-gtug.org m...
Android : How Do I Code Thee?
Abusing Adobe Reader’s JavaScript APIs by Abdul-Aziz Hariri & Brian Gorenc - ...
Ad

More from Rob Ragan (10)

PPTX
Nbt hacker fight
PDF
Expose Yourself Without Insecurity: Cloud Breach Patterns
PPTX
DeadDropSF - Better Red Than Dead
PDF
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
PDF
Social Engineering: the Bad, Better, and Best Incident Response Plans
PDF
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
PDF
Attack Chaining: Advanced Maneuvers for Hack Fu
PPT
Filter Evasion: Houdini on the Wire
PPT
Static Analysis: The Art of Fighting without Fighting
PPT
Intro to Web Application Security
Nbt hacker fight
Expose Yourself Without Insecurity: Cloud Breach Patterns
DeadDropSF - Better Red Than Dead
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
Social Engineering: the Bad, Better, and Best Incident Response Plans
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
Attack Chaining: Advanced Maneuvers for Hack Fu
Filter Evasion: Houdini on the Wire
Static Analysis: The Art of Fighting without Fighting
Intro to Web Application Security

Recently uploaded (20)

PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Review of recent advances in non-invasive hemoglobin estimation
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
Big Data Technologies - Introduction.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Cloud computing and distributed systems.
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Network Security Unit 5.pdf for BCA BBA.
Review of recent advances in non-invasive hemoglobin estimation
The AUB Centre for AI in Media Proposal.docx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Big Data Technologies - Introduction.pptx
Spectral efficient network and resource selection model in 5G networks
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Chapter 3 Spatial Domain Image Processing.pdf
Cloud computing and distributed systems.
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
NewMind AI Weekly Chronicles - August'25 Week I
20250228 LYD VKU AI Blended-Learning.pptx
cuic standard and advanced reporting.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
MYSQL Presentation for SQL database connectivity
Empathic Computing: Creating Shared Understanding
Understanding_Digital_Forensics_Presentation.pptx
Bridging biosciences and deep learning for revolutionary discoveries: a compr...

Tenacious Diggity - Skinny Dippin in a Sea of Bing

  • 1. Tenacious Diggity Skinny Dippin' in a Sea of Bing 29 July 2012 – DEF CON 20 – Las Vegas, NV Presented by: Francis Brown & Rob Ragan Stach & Liu, LLC www.stachliu.com
  • 3. Agenda OVERVIEW •  Introduction/Background •  Advanced Attacks •  NEW Diggity Attack Tools •  Advanced Defenses •  NEW AlertDiggity Cloud Database •  Future Directions 3  
  • 4. Introduction/Background GETTING UP TO SPEED 4  
  • 5. Diggity Tools PROJECT OVERVIEW 5  
  • 6. Diggity Tools ATTACK TOOLS Tool   Descrip,on   GoogleDiggity   Tradi,onal  Google  hacking  tool   BingDiggity   Bing  equivalent  of  tradi,onal  Google  hacking  tool   FlashDiggity   Adobe  Flash  security  scanning  tool   DLPDiggity   Data  loss  preven,on  scanning  tool   LinkFromDomain   Bing  footprin,ng  tool  based  on  off-­‐site  links   CodeSearch  Diggity   Open-­‐source  code  vulnerability  scanning  tool   MalwareDiggity   Malware  link  detec,on  tool  for  off-­‐site  links   6  
  • 7. Diggity Tools NEW ATTACK TOOLS Tool   Descrip,on   PortScan  Diggity   Passive  port  scanning  via  Google   NotInMyBackYard   Easily  find  your  info  in  3rd  party  sites   BHDB  2.0   New  Bing  Hacking  DB  now  as  affec,ve  as  Google   Bing  BinaryMalware   Find  malware  via  Bing’s  indexing  of  executables   CodeSearch  REBORN   Brought  back  from  the  dead   SHODAN  Diggity   Easy  interface  to  SHODAN  search  engine   7  
  • 8. Diggity Scraping NEW ACROSS ALL ATTACK TOOLS 8  
  • 9. Diggity Scraping PROXIES SPECIFICATION 9  
  • 10. Diggity Scraping MANUAL PROXIES SPECIFICATION 10  
  • 11. Advanced Attacks WH AT YOU SHOULD KNOW 11  
  • 12. NEW GOOGLE HACKING TOOLS PortScan Diggity 12  
  • 13. PortScanning TARGETING HTTP ADMIN CONSOLES Searching for web admin interfaces on non-standard HTTP ports 13  
  • 14. PortScanning TARGETING PORT RANGES Searching for specific port ranges 14  
  • 15. PortScanning TARGETING VULNERABILITY Targeting specific HTTP ports example 15  
  • 16. PortScan Diggity TARGETING HTTP ADMIN CONSOLES 16  
  • 17. NEW GOOGLE HACKING TOOLS NotInMyBackYard 17  
  • 18. Data Leaks on 3rd Party Sites SENSITIVE INFO EVERYWHERE Verizon - 2012 Data Breach Investigation Report 18  
  • 19. PasteBin Leaks PASSWORDS IN PASTEBIN.COM POSTS •  Twitter feed tracking passwords leaked via PasteBin 19  
  • 20. Cloud Docs Exposures PUBLIC CLOUD SEARCHING Public cloud storage document exposures 20  
  • 21. Cloud Docs Exposures ROBOTS.TXT IS DEAD Personal photo galleries exposed 21  
  • 22. Data Loss In The News MAJOR DATA LEAKS •  Yale Alumni 43,000 SSNs Exposed in Excel Spreadsheet 22  
  • 23. NotInMyBackYard L O C A T I O N, L O C A T I O N, L O C A T I O N Cloud storage: Public presentations sharing sites: •  Google Docs/Drive, DropBox, •  slideshare.net, prezi.com, Microsoft SkyDrive, Amazon S3 present.me Social networking sites: Public charts and graphs sharing sites: •  Facebook, Twitter, LinkedIn •  ratemynetworkdiagram.com, gliffy.com Public document sharing sites: •  scribd.com, 4shared.com, Video sharing sites: issuu.com, docstoc.com, •  vimeo.com, dailymotion.com, metacafe.com, youtube.com PasteBin and text sharing sites: •  pastebin.com, pastie.org, … 23  
  • 24. NotInMyBackYard PASTEBIN EXAMPLE 24  
  • 25. NotInMyBackYard XLS IN CLOUD EXAMPLE 25  
  • 26. Cloud Docs Exposures PUBLIC CLOUD SEARCHING Public cloud storage document exposures 26  
  • 27. NEW GOOGLE HACKING TOOLS Bing Hacking Database v2.0 27  
  • 28. Bing Hacking Database v2.0 STACH & LIU TOOLS BHDB v2.0 – Updates •  Bing hacking database •  Bing hacking limitations •  Disabled inurl:, link: and linkdomain: directives in March 2007 •  No support for ext:, allintitle:, allinurl: •  Limited filetype: functionality •  Only 12 extensions supported •  UPDATES (2012) •  ext: functionality now added •  inurl: work around by using instreamset:url: •  New BHDB 2.0 •  Several thousand more Bing dorks! 28  
  • 29. NEW GOOGLE HACKING TOOLS BingBinaryMalwareSearch (BBMS) 29  
  • 30. Bing Malware Search TARGETING MALWARE Targeting known malware signatures 30  
  • 31. Google vs Bing Size MORE BANG FOR YOUR SEARCH 31  
  • 32. NEW GOOGLE HACKING TOOLS CodeSearch Diggity 32  
  • 33. Google Code Search VULNS IN OPEN SOURCE CODE •  Regex search for vulnerabilities in indexed public code, including popular open source code repositories: •  Example: SQL Injection in ASP querystring •  select.*from.*request.QUERYSTRING 33  
  • 34. CodeSearch Diggity AMAZON CLOUD SECRET KEYS 34  
  • 35. Cloud Security N O P R O M I S E S . . .N O N E Amazon AWS Customer Agreement •  http://aws.amazon.com/agreement/#10 35  
  • 36. Cloud Crawling CREATE YOUR OWN SEARCH ENGINES 36  
  • 37. NEW GOOGLE HACKING TOOLS SHODAN Diggity 37  
  • 38. SHODAN HACKER SEARCH ENGINE •  Indexed service banners for whole Internet for HTTP (Port 80), as well as some FTP (23), SSH (22) and Telnet (21) services 38  
  • 39. SHODAN FINDING SCADA SYSTEMS 39  
  • 40. SHODAN FINDING SCADA SYSTEMS 40  
  • 41. SHODAN Diggity FINDING SCADA SYSTEMS 41  
  • 42. Advanced Defenses PRO TECT YO NECK 42  
  • 43. Diggity Alert DB DATA MINING VULNS Diggity Alerts Database 43  
  • 44. Future Directions WH AT W ILL HAPPEN 44  
  • 45. Diggity Dashboards COMING SOON Google  Charts   Mobile  BI  Apps   45  
  • 46. DLP Reporting PRACTICAL EXAMPLES 46  
  • 47. Questions? Ask us something We’ll try to answer it. For more info: Fran Brown Rob Ragan (@sweepthatleg) Email: [email protected] Project: [email protected] Stach & Liu, LLC www.stachliu.com
  • 48. Thank You Stach & Liu Google Hacking Diggity Project info: http://www.stachliu.com/index.php/resources/tools/google-hacking-diggity-project/ 48