Hackers use Google to find targets
requests for files I know don't exists, but all things that are default
pages for server set up, etc. Hopefully if sharp sys admins
hadn't caught these, they do now. And all those people who set up
the small office servers themselves and didn't change default
settings…might be time to check your logs and security settings.
ability to record Internet sites' content can be used to pinpoint those
with weak security, Johnny Long, a security researcher and computer
scientist for Computer Security Corp. told attendees at the Black Hat
Security Briefings here. Though the technique is not new, well-crafted
searches turned up so many sites with vulnerabilities that even jaded
researchers laughed during the session.
Powered by Quickdraft