Pages

Social Networking

FREE WEB HOSTING

Free Website Hosting
Showing posts with label The Information Microsoft Hides on Your Computer. Show all posts
Showing posts with label The Information Microsoft Hides on Your Computer. Show all posts

The Information Microsoft Hides on Your Computer

Here are folders on your computer that Microsoft has tried hard to keep secret. Within these folders you will find two (major) things: Microsoft Internet Explorer has been logging all of the sites you have ever visited -- even after you've cleared your cache, and Microsoft's Outlook and Outlook Express has been logging ALL of your e-mail correspondence -- even after you've erased them from your trashbin. (This also includes all incoming and outgoing e-mail attachments.) And believe me, that's not even the half of it.
When I say that these files are hidden well, I really mean it. If you don't have any knowledge of DOS, then don't plan on finding these files on your own. I say this because some of these files will only be found in DOS while some of these folders can only be found in Windows Explorer. Additionally, there are some folders that will not be displayed by neither DOS nor Explorer -- but can only be found using a workaround. Basically what I am saying is if you didn't know these files existed then the chances of you running across them is slim to slimmer.
To give you an example of how sneaky this is, there are three hidden folders that may contain your name, address, phone, all the sites you've visited, every single e-mail you've sent/received, every attachment you've ever sent/received, everything you've searched for in a search engine, every filename you've downloaded, names of documents containing "sensitive" information, copies of all your cookies, full readable e-mail from your hotmail account, your PGP keys, and more.
Funny that Microsoft would make no mention of this on microsoft.com.
FORWARD:
I know there are some people out there that are already aware of some of the things I mention. I also know that most people are not. The purpose of this tutorial is teach people what is really going on with Microsoft's products and how to take control of their privacy again.
Thanks for reading.
INDEX
1. DEFINITIONS AND ACRONYMS
2. WHY YOU SHOULD ERASE THESE FILES
3. HOW TO ERASE THE FILES ASAP (Recommended for the non-savvy.)
3.1) If You Own Microsoft Internet Explorer
3.2) Clearing Your Registry
3.3) If You Own Outlook Express
3.4) Slack files
3.5) Keeping Microsoft Internet Explorer (Not recommended at all.)
4. STEP-BY-STEP GUIDE THROUGH YOUR HIDDEN FILES (For the savvy.)
5. A LOOK AT OUTLOOK
6. HOW MICROSOFT DOES IT
7. +S MEANS [S]ECRET NOT [S]YSTEM
8. THE TRUTH ABOUT FIND FAST
8.1) Removing Find Fast
9. HOW HARD MICROSOFT TRIED TO KEEP PEOPLE FROM FINDING ABOUT IT
10. FINAL NOTE AND CONTACT INFORMATION
10.1) Recommended reading
11. SPECIAL THANKS
12. REFERENCES
Coming Very Soon:
mailbox.pst
pstores
Related Windows Tricks.
Reflection of why they use alphanumeric folders (9J3X7QZF4.)
Everything you didn't want to know about Find Fast.
The NSA-Key.
The [Microsoft Update] button.
Why the temp folders aren't intended to be temporary at all.
What's in those .dbx files?

--------------------------------------------------------------------------------
1. DEFINITIONS AND ACRONYMS
Well, the best definition I have been able to come up with is the following:
I) A "really hidden" file/folder is one that cannot be seen in Windows Explorer after enabling it to view all files, cannot be seen in MS-DOS after receiving a directory listing, and cannot be searched through using the "Find" utility.
a) There is at least one workaround to enabling Explorer to see them.
b) There is at least one workaround to enabling MS-DOS to see them.
c) There is at least one workaround to enabling the "Find" utility to search through them.
d) They are hidden intentionally.
II) Distinguishes "really hidden" file/folders from just plain +h[idden] ones, such as your "MSDOS.SYS" or "Sysbckup" folder.
III) Distinguishes from certain "other" intended hidden files, such as a file with a name of "šŸëœx¥."
DOS = Disk Operating System
MSIE = Microsoft Internet Explorer
TIF = Temporary Internet Files (folder)
HD = Hard Drive
OS = Operating System


--------------------------------------------------------------------------------
2. WHY SHOULD I ERASE THESE FILES?
1) Besides the glaring privacy risks.
2) Besides the fact that Microsoft is keeping these logs intentionally. (For reasons I can only imagine.)
3) These files can take up huge amounts of disk space. I've personally inspected a computer with almost 200 megs of this stuff, so you can imagine how much this can slow your computer down. After following these instructions you will probably notice a great improvement in performance.


--------------------------------------------------------------------------------
3. HOW TO ERASE THE FILES ASAP
Step by step information on how to erase these files as soon as possible. This section is recommended for the non-savvy. Further explanation can be found in Section 4.0. Please note that following these next steps will erase all your cache files, all your cookie files, and all of your e-mail correspondence. If you use the offline content feature with MSIE, following these next steps will remove this as well.


--------------------------------------------------------------------------------
3.1. IF YOU OWN A COPY OF MICROSOFT INTERNET EXPLORER
1) Shut your computer down, and turn it back on.
2) While your computer is booting keep pressing the [F8] key until you are given an option screen.
3) Choose "Command Prompt Only" (This will take you to true DOS mode.)
4) When your computer is done booting, you will have a C:> followed by a blinking cursor. Type in this hitting enter after each line.

CDWINDOWSTEMPOR~1
DELTREE/Y CONTENT.IE5
(If that didn't work then type this:)

CDWINDOWSAPPLIC~1TEMPOR~1
DELTREE/Y CONTENT.IE5
(If that didn't work then type this:)

CDWINDOWSLOCALS~1TEMPOR~1
DELTREE/Y CONTENT.IE5
(If this still does not work, and you are sure you are using MSIE5, then please e-mail me. Finding the location of these is a mission, and I'd certainly like to know where else MSIE likes to hide its cache. I believe older versions of MSIE keep them under "c:windowscontent".)
5) This will take a ridiculous amount of time to process. The longer it takes, the more records Microsoft had stored about you. When it gets done erasing that folder, then type this:

CD
DELTREE/Y TEMP
DELTREE/Y WIN386.SWP
CD WINDOWS
DELTREE/Y COOKIES
DELTREE/Y TEMP
DELTRE/Y WIN386.SWP
DELTREE/Y HISTORY


--------------------------------------------------------------------------------
3.2. CLEARING YOUR REGISTRY
Reboot your computer and wait for Windows to load back up.
1) Drop to DOS ("Start" > "Program Files" > "MS-DOS Prompt") and type this at prompt:

regedit
2) Your Registry Editor will pop up. Go to "Edit" > "Find"
3) Type in "TypedURLs" and then hit [Find Next]. You will be taken to all the places you've typed in URLs manually. 4) Erase any URLs that you find. Do not erase the folders. (They will be called "01," "02," "03," etc...) Double click on them to make sure they are URLs. I found mine here:

HKEY_USERS/Default/Software/Microsoft/Internet Explorer/TypedURLs/
HKEY_CURRENT_USER/Software/Microsoft/Internet Explorer/TypedURLs/
5) and while you're in here you might as well go here:

HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/Current
Version/Explorer/RemoteComputer/NameSpace/
{d6277990-4c6a-11cf-8d87-00aa0060f5b5}
6) Delete the {d6277990-4c6a-11cf-8d87-00aa0060f5b5} key. This will make the "Find: Files or Folders" utility perform searches much faster.


--------------------------------------------------------------------------------
3.3. IF YOU HAVE OUTLOOK OR OUTLOOK EXPRESS INSTALLED
1) Install another e-mail program like Eudora, or Pegasus Mail. Make sure everything is setup correctly.
2) Backup any e-mail that you wish to save. (Print them out, or forward them to another box.)
3) Uninstall Outlook.
Warning, this conveniently does not erase any e-mail correspondence. To double check drop back to your DOS prompt and type this:

dir *.mbx /s/p
dir *.mbx /s/p/ah
The files you are looking for are:
INBOX.MBX
OUTBOX.MBX
SENTIT~1.MBX
DELETE~1.MBX
DRAFTS.MBX
If these files come up they will be listed in either of these folders:

C:WindowsApplication DataMicrosoftOutlook ExpressMail
C:Program Filesinternet mail and news%USER%mail
(If the .mbx files are located anywhere else then you probably don't want to delete them since they aren't from outlook. If they are from outlook, however, then please e-mail me.)
Now type either of the following (depending on the location of your .mbx files). Remember, this will erase all your e-mail correspondence so backup what you want to keep by printing them out or forwarding them to another box. Hopefully by now you have already set up Eudora or Pegasus Mail.

CDWINDOWSAPPLIC~1MICROS~1OUTLOO~1
DELTREE/Y MAIL
or

CDPROGRA~1INTERN~1%USER%
(replace "%user%" with the proper name.)

DELTREE/Y MAIL

--------------------------------------------------------------------------------
3.4. SLACK FILES
As you may already know, deleting files only deletes the references to them. They are in fact still sitting there on your HD and can be easily recovered by anyone.

BCWipe is a nice program that will clear these files.
For you DOS buffs, there's a program called FileDust that got a 5 star rating on ZDNET, if that matters.
If you are using PGP then there is a "Freespace Wipe" option under PGPtools.
Norton Utilities has a nice filewiping utility.
You might want to check out Evidence Eliminator's 30 day trial. This is probably the best program as far as your privacy goes.

--------------------------------------------------------------------------------
3.5. KEEPING MICROSOFT INTERNET EXPLORER
If you insist on using Microsoft Internet Explorer then I strongly recommend that you check out at least one of these programs:

PurgeIE
Anonymizer Window Washer
Cache and Cookie Washer for IE
I have already tried and tested some other programs and you'd be surprised on how many of them DON'T pass the tests. For example, HistoryKiller 2001 claims it erases all the files, but don't count on it.


--------------------------------------------------------------------------------
4. STEP-BY-STEP GUIDE THROUGH YOUR HIDDEN FILES
This next section is for those of you who are more interested in learning the ins and outs of your computer. This section is intended for the savvy user.
1) First, drop to DOS and type this at prompt (in all lower-case):

c:windowsexplorer /e,c:windowstempor~1content.ie5
You see all those alphanumeric names listed under "content.ie5?" (left-hand side) That's Microsoft's idea of making this project as hard as possible. (Earlier versions of Internet Explorer simply called them "cache#.") These are your alphanumeric folders that MSIE has created to keep your cookies and cache. Write these names down. (They should look something like this: 6YQ2GSWF, QRMTKLWF, U7YHQKI4, 7YMZ516U, WQK6Z9UV, etc...) If you click on any of these folders then nothing will be displayed. Not because there aren't any files here, but because Windows Explorer has lied to you. If you want to view the contents of these alphanumeric folders you will have to do so in DOS. (Actually, there is a workaround that Skywalker taught me, but it's a little bit harder to explain. I promise to cover this tip in the next version.)
2) Restart in MS-DOS mode. (You must restart because windows has "locked" down some of the files.)
3) Type this in at prompt:

CDWINDOWSTEMPOR~1CONTENT.IE5
CD %alphanumeric%
(replace the "%alphanumeric%" with the first name that you just wrote down.)

DIR/P
Note: Not only are you in a folder that DOS claims does not exist, but you are now looking at cache/cookies that Windows Explorer claims do not exist.
These folders are directly responsible for the mysterious erosion of hard drive space you may have been noticing. Just a couple interesting things you can find in here:

Pictures from all those porn sites you've visited.
Other internet cache files completely wasting your disk space.
If you use Hotmail (or any webmail service) you can probably see some of your old messages laying around here. To see them for yourself, copy them into another directory and open them with your browser.
Retrieving your personal information from these cookies is a snap. For example if you've ever shopped at Amazon.com then there's access to your name and e-mail. If you're a user on Hollywood.com then there's your city, state, and zip. MP3.com keeps some goodies as well.
Feel free to check out all your alphanumeric folders, before going on to the next step.
5) Type this in:

CDWINDOWSTEMPOR~1CONTENT.IE5
EDIT /75 INDEX.DAT (or "EDIT /16 index.dat")
You will be brought to a blue screen with a bunch of binary.
6) Press and hold the [Page Down] button until you start seeing lists of URLs. These are all the sites that you've ever visited as well as a brief description of each. You'll notice it records everything you've searched for in a search engine in plain text, in addition to the URL.
7) When you get done searching around you can go to "File" > "Exit."
8) Next you'll probably want to erase these files by typing this:

DELTREE/Y C:WINDOWSTEMPOR~1
(replace "c:windowstempor~1" with the location of your TIF folder if different.)
This will take a seriously long time to process. Then go check out your History.
9) Type this:

CDWINDOWSHISTORYHISTORY.IE5
EDIT /75 INDEX.DAT (or "EDIT /16 index.dat")
You will be brought to a blue screen with more binary.
10) Press and hold the [Page Down] button until you start seeing lists of URLS again.
This is another recording of the sites you've visited. There also may be some other things in here. E-mail me if you find anything interesting. I will share with you a snippet of what I found in my index.dat file.

Client UrlCache
MMF Ver 5.2@
@ 3 yiâ

àOÐ ê:+0
0�
'
}*Á� 5.t
xt
59

MS6C:%

\DAVE'S
HD.TXT
MSIE5.
C:
Did you note the "C:" and "\DAVE'S HDMSIE5.TXT"?
"Dave" is the fictitious name that I use on my computer. "Dave's HD" is the name of my root folder on my LAN. "MSIE5.TXT" is the name of a text file that I've been saving on my computer. It contains research from THIS project that I've been working on. Mostly URLs and notes.
Do you see anything wrong with this picture? It took notice on a file on my HD, folks. MY HARD DRIVE. Not only that, but it is saving it in a folder that cannot be seen by neither DOS nor Windows Explorer. Is it a coincidence that this file was related to the research of this tutorial?
Obviously, my first suspicion was that Microsoft was scanning my HD and logging any "sensitive" information. In this case, my msie5.txt probably had something in it that Microsoft didn't like. To read more about my findings read "THE TRUTH ABOUT FIND FAST" in section 8.0.
1) If you're still with me, type this:
CDWINDOWSHISTORY
2) check out the mmXXX.dat files (and delete them), then type:

CDWINDOWSHISTORYHISTORY.IE5
CD MSHIST~1
EDIT /75 INDEX.DAT (or "EDIT /16 index.dat")
More URLs from your internet history. Note there are probably other mshist~x folders here. 3) You can repeat these steps for every occurrence of the mshistxxxxxxxx file.
4) By now you'll probably want to type in this:

CD WINDOWS
DELTREE/Y HISTORY
This is about it as far as I know. You may also want to take a look at your *.mbx files if you own Outlook. (dir *.mbx/s) More detailed information is covered in the next chapter.


--------------------------------------------------------------------------------
5. A LOOK AT OUTLOOK EXPRESS
Would you think twice about what you said if you knew it was being recorded? E-mail correspondence leaves a permanent record of everything you've said -- even after you've told Outlook to erase it. You are given a false sense of security sense you've erased it twice, so surely it must be gone. The first time Outlook simply moves it to your "Deleted Items" folder. The second time you erase it Outlook simply "pretends" it is gone. The truth is your messages are still being retained in a "really hidden folder."
Furthermore, as if that wasn't disturbing enough, Outlook Express also keeps records of EVERY SINGLE file attachment in an ENCRYPTED database. Can you believe this, folks?
For example, I attached this zip file and sent it to myself.

PK '…Ž*}�™ P AAA­À�€ Öø)-8³PK +…Ž*8øM3 P
BBB­À�€ ×ø%-8³PK .…Ž*ÄÖ.� P CCC­À�€ Øø!-8³PK
2…Ž*² å` P DDD­À�€ Ùø -8³PK '…Ž*}�™ P
AAAPK +…Ž*8øM3 P 1BBBPK
.…Ž*ÄÖ.� P bCCCPK 2…Ž*² å` P
"DDDPK ÄÄ
And it recorded this in both my inbox.mbx file and outbox.mbx file:

UEsDBBQAAAAIACeFjip9jZkaEAAAAFAAAAADAAAAQUFBrcCBAAAAAIAg1vgpljizAFBLAwQUAAAA
CAArhY4qOPhNMxAAAABQAAAAAwAAAEJCQq3AgQAAAACAINf4JZY4swBQSwMEFAAAAAgALoWOKsTW
Lp0QAAAAUAAAAAMAAABDQ0OtwIEAAAAAgCDY+CGWOLMAUEsDBBQAAAAIADKFjiqyEuVgEAAAAFAA
AAADAAAARERErcCBAAAAAIAg2fgdljizAFBLAQIUABQAAAAIACeFjip9jZkaEAAAAFAAAAADAAAA
AAAAAAEAIAAAAAAAAABBQUFQSwECFAAUAAAACAArhY4qOPhNMxAAAABQAAAAAwAAAAAAAAABACAA
AAAxAAAAQkJCUEsBAhQAFAAAAAgALoWOKsTWLp0QAAAAUAAAAAMAAAAAAAAAAQAgAAAAYgAAAEND
Q1BLAQIUABQAAAAIADKFjiqyEuVgEAAAAFAAAAADAAAAAAAAAAEAIAAAAJMAAABERERQSwUGAAAA
AAQABADEAAAAxAAAAAAA
Cheers to the first person to discover the algorithm.
Anyway, by now you are probably wishing you knew where these records were kept. Don't worry they're right here:

c:program filesinternet mail and news%user%mail*.mbx
(replace %user% with the name you use.)
Or, if you're lucky:

c:windowsapplication datamicrosoftoutlookmail*.mbx
I found it odd that the first time I installed outlook, my e-mail data was saved automatically into "internet mail and news." After I uninstalled and reinstalled, it changed its mind and put it into my "application data."
To erase these files simply type: (of course if you do this you will kill all of your e-mail messages, so backup what you want to keep.)

Deltree c:windowsintern~1%user%mail
or

Deltree c:windowsapplic~1micros~1outloo~1mail

--------------------------------------------------------------------------------
6. HOW MICROSOFT DOES IT
Ever wonder how Microsoft makes these folders invisible to both DOS and Windows Explorer? I was completely baffled by how Microsoft was accomplishing this since even using a DOS 6.2 boot disk wouldn't work for me. I was honestly pretty upset that the answer escaped me for so long, but after wondering around in the folders I finally figured it out.
The "desktop.ini" is a standard text file that can be added to any folder to customize certain aspects of the folder's behavior. In these cases, Microsoft utilized the desktop.ini file to make these files invisible. Invisible to Windows Explorer, invisible to DOS, and even invisible to the "Find" Utility (so you wouldn't be able to perform searches in these folders!)
Here are a couple examples:
Found in the c:windowstemporary internet filesdesktop.ini and the c:windowstemporary internet filescontent.ie5desktop.ini contains this text:

[.ShellClassInfo]
UICLSID={7BD29E00-76C1-11CF-9DD0-00A0C9034933}
Found in the c:windowshistorydesktop.ini and the c:windowshistoryhistory.ie5desktop.ini contains this text:

[.ShellClassInfo]
UICLSID={7BD29E00-76C1-11CF-9DD0-00A0C9034933}
CLSID={FF393560-C2A7-11CF-BFF4-444553540000}
The UICLSID line cloaks the folder in both DOS and Explorer. The CLSID line disables the "FIND" utility from searching through the folder. Additionally, it gives a folder the appearance of the "History" folder. (You'll know what I mean if you fiddle with them enough.)
Erasing these desktop.ini files will give DOS and Windows Explorer proper viewing functionality once again. The problem with erasing them is windows will reconstruct them on your next bootup. The workaround is to edit the desktop.ini files and remove everything except for the [.ShellClassInfo]. This will trick windows into thinking they have still covered their tracks, so they won't think to reconstruct them again.
By the way, if you erase these keys from your Registry it will not un-hide these folders. Still, I'm sure somebody could play with this enough to figure out a way to completely disable Microsoft from ever hiding files on your computer again.


--------------------------------------------------------------------------------
7. +S MEANS [S]ECRET NOT [S]YSTEM
Here are three easy true or false questions regarding DOS. Play along like you needed to know the answers to get your A+ certification.
1) True or false: Executing the dir/s command in root will display all the "normal" files and directories on your hard drive.
The correct answer is 'true.'
2) True or false: Executing the dir/s/ah command in root will display all the "hidden" files and directories on your hard drive.
Again, the correct answer is 'true.'
3) True or false: Executing the dir/s/as command in root will display all the "system" files and directores on your hard drive.
The correct answer is 'you wish.'
When DOS tries to get a list of the subdirectories of any +s[ystem] folder it hits a brick wall. Not only does this mean Microsoft has taken extra precautions to keep people from finding these files, but it defeats the whole purpose of the "/s" switch in the first place. Nice one.
In case you didn't understand, here's a small experiment that will show you what I mean.
Since the content.ie5 and history.ie5 subfolders are both located within a +s[ystem] folder, we will run the experinment with them. The proper command to locate them should be this:

CD
DIR *.IE5 /s/as
The problem is that you will receive a "No files found" error message.
This proves that all subfolders/files that are located within a system folder will not be listed. But believe me, it's there.
Now, the really interesting thing is that you (luckily) can get around this brick wall. That is, once you are in the system folder, then the brick wall no longer has an effect on the directory listings. For example:

CDWINDOWSTEMPOR~1
DIR *.IE5 /as
1 folder(s) found.
Oh good, now you can see them. (But only after you knew the exact location.) In other words, if you didn't know the folders existed then finding them would be almost impossible.


--------------------------------------------------------------------------------
8. THE TRUTH ABOUT FIND FAST
Have you ever wondered what that "Find Fast" program was under your control panel? I've spent about an hour on microsoft.com reading help files and I STILL have no clue of what it's good for. Here's the most informative snippet I found on microsoft.com.
"The Find Fast Indexer is a utility that builds indexes to speed finding documents using the Open and Open Office Documents commands in Microsoft Office programs, including Microsoft Outlook."
So what does that mean? Well, if you read it carefully you'll see that Microsoft never mentions that it will speed up your searches. In fact it has nothing to do with the "Find: Files or Programs" utility. I think what Microsoft is really trying to say is that when you go to "File" > "Open" under Microsoft Word, then your list of documents will be displayed quicker.
If that is what they are saying then it is a lie. I hope you don't think I am taking Microsoft's quote out of context here. I'm only trying to show you all the methods that Microsoft went through to make it appear that the Find Fast utility speeds up searches.
For example if you go to "Edit" (under Microsoft Word), you will notice there is a "Fast Find" icon next to it. (Binoculars icon.) This is usally a clear indication that it is related to the Find Fast program. However, if you re-read that quote, it doesn't mention anything about finding words "within" a document, but only the document itself. Here are some more quotes from Microsoft:
"The Find Fast Indexer tool tracks the location on the hard disk of all Microsoft Word for Windows documents by default. When one of these files is moved, the Find Faster Indexer tool updates its index."
"Indexes are used to make file searches faster in Office programs."
"The Find Fast Indexer is installed on your computer when you install Microsoft Office 97. Find Fast builds an index to speed up finding documents from the Open dialog box in Microsoft Office programs."
I wasn't able to find one single shred of evidence that it helped you "search" faster. Yet, Microsoft insisted on calling the program "Find Fast." THEN they decided to add the Find Fast icon next to the [Search Document], as if Find Fast had anything to do with searching the document.
So now do you think you know the truth?
What would you say if I told you that Find Fast was scanning and indexing every single file on your hard drive? Did you know that in Office 95, the Find Fast Indexer had an "exclusion" list comprised of .exe, .swp, .dll and other extensions, but the feature was eliminated? If you were a programmer, would you program Find Fast to index every single file, or just the ones with Office extensions?
Here are some other interesting facts:
Find Fast automatically loads on every boot (because it added to your Startup folder.)
If you have ever had problems with scandisk (restarting due to "disk writes."), it is because Find Fast was indexing your hard drive in the background.
Now here is a good example of the lengths Microsoft has gone through to keep people from finding out Find Fast indexes their hard drives. (Always good to have an alibi.) And I quote:
"When you specify the type of documents to index in the Create Index dialog box, Find Fast includes the document types that are listed in the following table.
Doc Type File Name Extension
Microsoft Office files All the Microsoft Excel, Microsoft Web documents PowerPoint, Microsoft Project, and Microsoft Word document types listed in this table. Microsoft Binder (.odb, .obt) and Microsoft Access (.mdb) files. Note that in .mdb files, only document properties are indexed.
Microsoft Excel workbooks .xl* files
Microsoft PowerPoint files .ppt (presentation), .pot (template), .pps (auto-running presentation) files
Microsoft Project files .mpp, .mpw, .mpt, .mpx, .mpd files
Microsoft Word documents .doc (document), .dot (template), .ht* (Hypertext Markup Language document), .txt (text file), .rtf (Rich Text Format) files
All files *.* files

Did you get that last part? If you were a wealthy man and you decided to buy every single car in the car lot, would you
a) Say, "I'll take the red ones, the blue ones, the silver ones, the white ones, the champagne ones, and all of them," or
b) "I'll take them all sir."
As you can see, they don't want people to realize that Find Fast is keeping an index of your entire hard drive. They walk around the car lot saying "I'll take the red ones, the blue ones, the silver ones,..."
I personally witnessed the Find Fast Indexer "creep" its way back into my Startup folder after I removed it. There's no possible way I could have done this on purpose. In fact the only way I could have done it is if I created a shortcut to Find Fast and then moved the shortcut into Startup manually. There's no option on the Find Fast program to add it to Startup.
Am I making this up? Did I imagine it? Well, even if I am, then that doesn't change the overwhelming amount of inconsistencies. For example:
1) Drop to DOS
2) CD
3) DIR FF*.* /AH (This will bring up a listing of ffast-related files.)
4) edit /75 %ff% (insert %ff% with any of the names that were listed.)
Notice the incredible amount of disk accesses to your "really hidden" "Temporary Internet Files" folder? What is the obsession that Find Fast has with these hidden folders, anyway?


--------------------------------------------------------------------------------
8.1. REMOVING THE FIND FAST PROGRAM
1) Reboot your computer in MS-DOS Mode.
2) Delete the FindFast.CPL file from c:windowssystem
3) Delete the shortcut under c:windowsstart menuprogramsstartup
4) Delete the FindFast.EXE file from c:progra~1micros~1office
Other related files that are safe to erase:
5) FFNT.exe, FFSetup.dll, FFService.dll, FFast_bb.dll, "c:>ff*.*"
Notice you will loose no functionality after erasing these files? Actually, you will gain functionality.


--------------------------------------------------------------------------------
9. HOW HARD MICROSOFT TRIED TO KEEP PEOPLE FROM FINDING ABOUT IT
In case the desktop.ini file wasn't enough proof. ("Whoops, we didn't know the desktop.ini file would turn folders invisible?") And in case you thought disabling DOS's "/s" switch for system folders was just a "bug." And in case you thought Microsoft disabled the Find utility from searching through the folders just to save you time (uh huh) -- then feel free to check out this thread on the Hackers.com BBS.


--------------------------------------------------------------------------------
10. FINAL NOTE AND CONTACT INFO
This tutorial is being updated ALL THE TIME. If you have any input then please e-mail me so I can compile it into future versions. You may have noticed many requests to contact me throughout this tutorial. This is because I am very eager to find out everything there is to know about this. But just so I am not swamped with old updates, please make sure you are reading the most current version.
My e-mail address is located below. Although it may not be done in a timely fasion, I always reply to all of my e-mail. By the way, I deleted my PGP due to security reasons. So if you want to contact me privately, then I'm sure we can work out something else.
Thanks for reading, -- The Riddler



--------------------------------------------------------------------------------
10.1. RECOMMENDED READING
And if you aren't already paranoid enough here's some sites/articles that I definitely reccomend:
http://www.theregister.co.uk/content/4/18002.html
http://www.findarticles.com/m0CGN/3741/55695355/p1/article.jhtml
http://www.mobtown.org/news/archive/msg00492.html
http://194.159.40.109/05069801.htm
http://www.yarbles.demon.co.uk/mssniff.html
http://www.macintouch.com/o98security.html
http://www.theregister.co.uk/content/archive/3079.html
http://www.fsm.nl/ward/
http://slashdot.org/
http://www.peacefire.org/
http://stopcarnivore.org/
http://nomorefakenews.com/
http://grc.com/steve.htm#project-x


--------------------------------------------------------------------------------
11. SPECIAL THANKS
Thank you Skywalker, for being in the right place at the right time. You were the only one who seemed interested in helping me further my research.
Thank you to everybody who has e-mailed me specifically just to thank me. The kind words mean a lot to me and played a big motivator to get this text finished.
And thank you to Hackers.com, for developing a fantatsic site with a great community feel, without which, this tutorial would never have existed.


--------------------------------------------------------------------------------
12. REFERENCES
http://support.microsoft.com/support/kb/articles/Q137/1/13.asp
http://support.microsoft.com/support/kb/articles/Q136/3/86.asp
http://support.microsoft.com/support/kb/articles/Q169/5/31.ASP
http://support.microsoft.com/support/kb/articles/Q141/0/12.asp
http://support.microsoft.com/support/kb/articles/Q205/2/89.ASP
http://support.microsoft.com/support/kb/articles/Q166/3/02.ASP
http://www.insecure.org/sploits/Internet.explorer.web.usage.logs.html
http://www.parascope.com/cgi-bin/psforum.pl/topic=matrix&disc=514&mmark=all
http://www.hackers.com/bulletin/
http://slashdot.org/articles/00/05/11/173257.shtml
http://peacefire.org/

Boost up your site load time

This article by Drunkadmin had hit the front pages of Digg. It gives a good idea on optimizing web pages that will definitely increase a website's loading time.
Host Images And Files Somewhere Else
Many users online at the same time can cause your server to handle a lot of requests. Its best that if you are using images in your site, make sure you upload them to image host sites like ImageShack. This will greatly reduce the bandwidth used by your server and also make your blog faster as image upload sites have a better speed.
Best place to host files of sizes 2-5mb (Any thing you need to provide users for download) is to use Google Pages as your host.
Optimize Your CSS
Nowadays many sites have started to use CSS based formatting. Even if Style Sheets are naturally more efficient than HTML tables you can still optimize the CSS code to make your website cleaner and faster. Having a clean CSS can reduce the time taken by the clients browser to decode your site.
Manual Clean
Try to locate dispersed code and aggregate it together.
For example instead of
margin-top: 20px;
margin-right: 10px;
margin-bottom: 20px;
margin-left: 10px;
Write
margin: 20px 10px 20px 10px;
You can use the tool Clean CSS to optimize your CSS and remove useless property declaration and whitespaces.
Optimize Your Images
Use image formats such as PNG, JPG,/JPEG And GIF. Always use the “Save for web” image quality which is available in most softwares such as Adobe Photoshop.
Use Height/Width Tag In Images
Most people dont add hieght and width tag to images. These tags make sure that the browser knows the dimensions of images before it has completed downloading the image. If the browser does not see those tags it will need to figure the size of the image, then load the image and then load the rest of the page.
When the height and width tags are included the browser will automatically know the size of the image. As a consequence it will be able to hold a place for the image and load the rest of the page simultaneously. Apart from the improvement on the load time of the page this method is also more user friendly since the visitor can start reading the text or other information while the image is being downloaded.
Use Less Javascript!
Some people tend to add a lot of javascript effects to their site. Using excessive javascript animations may cause clients browser to freeze for some time annoying the user.


  • Optimize Links
    Make sure that the outlinks from your blog and link between posts are optimized well. For example if link is www.domain.com/blog make sure you write it as www.domain.com/blog/ to prevent one extra request which would be made to the server if the former link is used.
    The improvement on the loading time of links ending with a slash will not be astronomical, but when it comes to speeding up a website every small bit helps!




  • Reduce HTTP Requests To Server
    When opening a web page every object (images, scripts and the line) will require a round trip to the server. This latency can add several seconds to the load time of your site. Make sure to reduce the number of objects and to combine CSS files and scripts together.


  • Boost HDD Performance:

    Often I hear my friends complaining about slow hard drives. Yesterday one of my classmates asked me how to boost the performance of his new harddrive. I told him about a simple and very easy tweak, that would significantly increase the performance of his hard drive.

    Win9x sets DMA to OFF by default. You have to switch it on. In theory, enabling DMA increases UDMA Hard Disk access to 33.3 MB/sec. In practice, speed will increase substantially from the old standard of 16MB/sec. Furthermore, DMA uses only 25% of CPU resources compared to 40% normally. Nearly all 5400rpm/7200rpm, and some lower speed, drives, support DMA.

    Now I'll tell you about it. Ready ?

    Right-click on "my computer". Now click on "properties". Now search for "devide manager" and click properties of your hard drive. It should have an option called "DMA". By enabling this, your hard drive should show an increase in performance. Also, this method can increase the transfer rate of your CD/DVD-ROM or CD/DVD-Writer, possibly eliminating those under buffer run errors.

    Again, an easy tweak which could improve you hard drive's performance

    Search passwords and Juicy Info : Digg Google

    Introduction

    This is not about finding sensitive data during an assessment as much as
    it is about what the “bad guys” might do to troll for the data.The examples presented
    generally represent the lowest-hanging fruit on the security
    tree. Hackers target this information on a daily basis.To protect against this type
    of attacker, we need to be fairly candid about the worst-case possibilities.We
    won’t be overly candid, however.
    We start by looking at some queries that can be used to uncover usernames,
    the less important half of most authentication systems.The value of a username is
    often overlooked, but, an entire multimilliondollar
    security system can be shattered through skillful crafting of even the
    smallest, most innocuous bit of information.
    Next, we take a look at queries that are designed to uncover passwords. Some
    of the queries we look at reveal encrypted or encoded passwords, which will take
    a bit of work on the part of an attacker to use to his or her advantage.We also
    take a look at queries that can uncover cleartext passwords.These queries are some
    of the most dangerous in the hands of even the most novice attacker. What could
    make an attack easier than handing a username and cleartext password to an
    attacker?
    We wrap up by discussing the very real possibility of uncovering
    highly sensitive data such as credit card information and information used to
    commit identity theft, such as Social Security numbers. Our goal here is to
    explore ways of protecting against this very real threat.To that end, we don’t go
    into details about uncovering financial information and the like. If you’re a “dark
    side” hacker, you’ll need to figure these things out on your own.
    Searching for Usernames
    Most authentication mechanisms use a username and password to protect information.
    To get through the “front door” of this type of protection, you’ll need to
    determine usernames as well as passwords. Usernames also can be used for social
    engineering efforts, as we discussed earlier.
    Many methods can be used to determine usernames. In Chapter 10, we
    explored ways of gathering usernames via database error messages. In Chapter 8
    we explored Web server and application error messages that can reveal various
    information, including usernames.These indirect methods of locating usernames
    are helpful, but an attacker could target a usernames directory
    query like “your username is”. This phrase can locate help pages that describe the
    username creation process,
    information gleaned from other sources, such as Google Groups posts or phone
    listings.The usernames could then be recycled into various other phases of the
    attack, such as a worm-based spam campaign or a social-engineering attempt.An
    attacker can gather usernames from a variety of sources, as shown in the sample
    queries listed
    Sample Queries That Locate Usernames
    Query Description
    inurl:admin inurl:userlist Generic userlist files
    inurl:admin filetype:asp Generic userlist files
    inurl:userlist
    inurl:php inurl:hlstats intext: Half-life statistics file, lists username and
    Server Username other information
    filetype:ctl inurl:haccess. Microsoft FrontPage equivalent of htaccess
    ctl Basic shows Web user credentials
    Query Description
    filetype:reg reg intext: Microsoft Internet Account Manager can
    ”internet account manager” reveal usernames and more
    filetype:wab wab Microsoft Outlook Express Mail address
    books
    filetype:mdb inurl:profiles Microsoft Access databases containing (user)
    profiles.
    index.of perform.ini mIRC IRC ini file can list IRC usernames and
    other information
    inurl:root.asp?acs=anon Outlook Mail Web Access directory can be
    used to discover usernames
    filetype:conf inurl:proftpd. PROFTP FTP server configuration file reveals
    conf –sample username and server information
    filetype:log username putty PUTTY SSH client logs can reveal usernames
    and server information
    filetype:rdp rdp Remote Desktop Connection files reveal user
    credentials
    intitle:index.of .bash_history UNIX bash shell history reveals commands
    typed at a bash command prompt; usernames
    are often typed as argument strings
    intitle:index.of .sh_history UNIX shell history reveals commands typed at
    a shell command prompt; usernames are
    often typed as argument strings
    “index of ” lck Various lock files list the user currently using
    a file
    +intext:webalizer +intext: Webalizer Web statistics page lists Web user-
    Total Usernames +intext: names and statistical information
    ”Usage Statistics for”
    filetype:reg reg HKEY_ Windows Registry exports can reveal
    CURRENT_USER username usernames and other information

    Underground Googling
    Searching for a Known Filename
    Remember that there are several ways to search for a known filename.
    One way relies on locating the file in a directory listing, like intitle:index.of
    install.log. Another, often better, method relies on the filetype operator,
    as in filetype:log inurl:install.log. Directory listings are not all that
    common. Google will crawl a link to a file in a directory listing, meaning
    that the filetype method will find both directory listing entries as well as
    files crawled in other ways.

    In some cases, usernames can be gathered from Web-based statistical programs
    that check Web activity.The Webalizer program shows all sorts of information
    about a Web server’s usage. Output files for the Webalizer program can be
    located with a query such as intext:webalizer intext:”Total Usernames” intext:”Usage
    Statistics for”. Among the information displayed is the username that was used to
    connect to the Web server, as shown in Figure 9.2. In some cases, however, the
    usernames displayed are not valid or current, but the “Visits” column lists the
    number of times a user account was used during the capture period.This enables
    an attacker to easily determine which accounts are more likely to be valid.


    The Windows registry holds all sorts of authentication information, including
    usernames and passwords.Though it is unlikely (and fairly uncommon) to locate
    live, exported Windows registry files on the Web, at the time of this writing
    there are nearly 100 hits on the query filetype:reg HKEY_CURRENT_USER
    username, which locates Windows registry files that contain the word username
    and in some cases passwords,



    As any talented attacker or security person will tell you, it’s rare to get information
    served to you on a silver platter. Most decent finds take a bit of persistence,
    creativity, intelligence, and just a bit of good luck. For example, consider
    the Microsoft Outlook Web Access portal, which can be located with a query
    like inurl:root.asp?acs=anon. At the time of this writing, fewer than 50 sites are
    returned by this query, even though there a certainly more than 50 sites running
    the Microsoft Web-based mail portal. Regardless of how you might locate a site
    running this e-mail gateway, it’s not uncommon for the site to host a public
    directory (denoted “Find Names,” by default)


    The public directory allows access to a search page that can be used to find
    users by name. In most cases, wildcard searching is not allowed, meaning that a
    search for * will not return a list of all users, as might be expected. Entering a
    search for a space is an interesting idea, since most user descriptions contain a
    space, but most large directories will return the error message “This query would
    return too many addresses!” Applying a bit of creativity, an attacker could begin
    searching for individual common letters, such as the “Wheel of Fortune letters”
    R, S,T, L, N, and E. Eventually one of these searches will most likely reveal a list
    of user information like


    Once a list of user information is returned, the attacker can then recycle the
    search with words contained in the user list, searching for the words Voyager,
    Freshmen, or Campus, for example.Those results can then be recycled, eventually
    resulting in a nearly complete list of user information.
    Searching for Passwords
    Password data, one of the “Holy Grails” during a penetration test, should be protected.
    Unfortunately, many examples of Google queries can be used to locate
    passwords on the Web, as shown in Table 9.2.
    Table 9.2 Queries That Locate Password Information
    Query Description
    inurl:/db/main.mdb ASP-Nuke passwords
    filetype:cfm “cfapplication ColdFusion source with potential passwords
    name” password
    filetype:pass pass intext:userid dbman credentials
    allinurl:auth_user_file.txt DCForum user passwords
    eggdrop filetype:user user Eggdrop IRC user credentials
    filetype:ini inurl:flashFXP.ini FlashFXP FTP credentials
    filetype:url +inurl:”ftp://” FTP bookmarks cleartext passwords
    +inurl:”@”
    inurl:zebra.conf intext: GNU Zebra passwords
    password -sample -test
    -tutorial –download
    filetype:htpasswd htpasswd HTTP htpasswd Web user credentials
    intitle:”Index of” “.htpasswd” HTTP htpasswd Web user credentials
    “htgroup” -intitle:”dist”
    -apache -htpasswd.c
    intitle:”Index of” “.htpasswd” HTTP htpasswd Web user credentials
    htpasswd.bak
    “http://*:*@www” bob:bob HTTP passwords (bob is a sample username)
    “sets mode: +k” IRC channel keys (passwords)
    “Your password is * Remember IRC NickServ registration passwords
    this for later use”
    signin filetype:url JavaScript authentication credentials

    Queries That Locate Password Information
    Query Description
    LeapFTP intitle:”index.of./” LeapFTP client login credentials
    sites.ini modified
    inurl:lilo.conf filetype:conf LILO passwords
    password -tatercounter2000
    -bootpwd –man
    filetype:config config intext: Microsoft .NET application credentials
    appSettings “User ID”
    filetype:pwd service Microsoft FrontPage Service Web passwords
    intitle:index.of Microsoft FrontPage Web credentials
    administrators.pwd
    “# -FrontPage-” inurl:service.pwd Microsoft FrontPage Web passwords
    ext:pwd inurl:_vti_pvt inurl: Microsoft FrontPage Web passwords
    (Service | authors | administrators)
    inurl:perform filetype:ini mIRC nickserv credentials
    intitle:”index of” intext: mySQL database credentials
    connect.inc
    intitle:”index of” intext: mySQL database credentials
    globals.inc
    filetype:conf oekakibbs Oekakibss user passwords
    filetype:dat wand.dat Opera‚ ÄúMagic Wand‚Äù Web credentials
    inurl:ospfd.conf intext: OSPF Daemon Passwords
    password -sample -test
    -tutorial –download
    index.of passlist Passlist user credentials
    inurl:passlist.txt passlist.txt file user credentials
    filetype:dat “password.dat” password.dat files
    inurl:password.log filetype:log password.log file reveals usernames, passwords,
    and hostnames
    filetype:log inurl:”password.log” password.log files cleartext passwords
    inurl:people.lst filetype:lst People.lst generic password file
    intitle:index.of config.php PHP Configuration File database credentials
    inurl:config.php dbuname dbpass PHP Configuration File database credentials
    inurl:nuke filetype:sql PHP-Nuke credentials
    Queries That Locate Password Information
    Query Description
    filetype:conf inurl:psybnc.conf psyBNC IRC user credentials
    “USER.PASS=”
    filetype:ini ServUDaemon servU FTP Daemon credentials
    filetype:conf slapd.conf slapd configuration files root password
    inurl:”slapd.conf” intext: slapd LDAP credentials
    ”credentials” -manpage
    -”Manual Page” -man: -sample
    inurl:”slapd.conf” intext: slapd LDAP root password
    ”rootpw” -manpage
    -”Manual Page” -man: -sample
    filetype:sql “IDENTIFIED BY” –cvs SQL passwords
    filetype:sql password SQL passwords
    filetype:ini wcx_ftp Total Commander FTP passwords
    filetype:netrc password UNIX .netrc user credentials
    index.of.etc UNIX /etc directories contain various credential
    files
    intitle:”Index of..etc” passwd UNIX /etc/passwd user credentials
    intitle:index.of passwd UNIX /etc/passwd user credentials
    passwd.bak
    intitle:”Index of” pwd.db UNIX /etc/pwd.db credentials
    intitle:Index.of etc shadow UNIX /etc/shadow user credentials
    intitle:index.of master.passwd UNIX master.passwd user credentials
    intitle:”Index of” spwd.db UNIX spwd.db credentials
    passwd -pam.conf
    filetype:bak inurl:”htaccess| UNIX various password file backups
    passwd|shadow|htusers
    filetype:inc dbconn Various database credentials
    filetype:inc intext:mysql_ Various database credentials, server names
    connect
    filetype:properties inurl:db Various database credentials, server names
    intext:password
    inurl:vtund.conf intext:pass –cvs Virtual Tunnel Daemon passwords
    inurl:”wvdial.conf” intext: wdial dialup user credentials

    Queries That Locate Password Information
    Query Description
    filetype:mdb wwforum Web Wiz Forums Web credentials
    “AutoCreate=TRUE password=*”Website Access Analyzer user passwords
    filetype:pwl pwl Windows Password List user credentials
    filetype:reg reg +intext: Windows Registry Keys containing user
    ”defaultusername” intext: credentials
    ”defaultpassword”
    filetype:reg reg +intext: Windows Registry Keys containing user
    ”internet account manager” credentials
    “index of/” “ws_ftp.ini” WS_FTP FTP credentials
    “parent directory”
    filetype:ini ws_ftp pwd WS_FTP FTP user credentials
    inurl:/wwwboard wwwboard user credentials
    In most cases, passwords discovered on the Web are either encrypted or
    encoded in some way. In most cases, these passwords can be fed into a password
    cracker such as John the Ripper from www.openwall.com/john to produce
    plaintext passwords that can be used in an attack. Figure 9.6 shows the results of
    the search ext:pwd inurl:_vti_pvt inurl:(Service | authors | administrators), which
    combines a search for some common

    Exported Windows registry files often contain encrypted or encoded passwords
    as well. If a user exports the Windows registry to a file and Google subsequently
    crawls that file, a query like filetype:reg intext:”internet account manager”
    could reveal interesting keys containing password data

    ress. Note that live, exported Windows registry files are not very common, but it’s
    not uncommon for an attacker to target a site simply because of one exceptionally
    insecure file. It’s also possible for a Google query to uncover cleartext passwords.
    These passwords can be used as is without having to employ a
    password-cracking utility. In these extreme cases, the only challenge is determining
    the username as well as the host on which the password can be used. As
    shown in Figure 9.8, certain queries will locate all the following information:
    usernames, cleartext passwords, and the host that uses that authentication!


    There is no magic query for locating passwords, but during an assessment,
    remember that the simplest queries directed at a site can have amazing results, as
    we discussed in , Chapter 7, Ten Simple Searches. For example, a query like “Your
    password” forgot would locate pages that provide a forgotten password recovery
    mechanism.The information from this type of query can be used to formulate
    any of a number of attacks against a password. As always, effective social engineering
    is a terrific nontechnical solution to “forgotten” passwords.
    Another generic search for password information, intext:(password | passcode |
    pass) intext:(username | userid | user), combines common words for passwords and
    user IDs into one query.This query returns a lot of results, but the vast majority
    of the top hits refer to pages that list forgotten password information, including
    either links or contact information. Using Google’s translate feature, found at
    http://translate.google.com/translate_t, we could also create multilingual password
    searches.Table 9.3 lists common translations for the word password
    English Translations of the Word Password
    Language Word Translation
    German password Kennwort
    Spanish password contraseña
    French password mot de passe
    Italian password parola d’accesso
    Portuguese password senha
    Dutch password Paswoord
    NOTE
    The terms username and userid in most languages translate to username
    and userid, respectively.
    Searching for Credit Card Numbers,
    Social Security Numbers, and More
    Most people have heard news stories about Web hackers making off with customer
    credit card information.With so many fly-by night retailers popping up
    on the Internet, it’s no wonder that credit card fraud is so prolific.These momand-
    pop retailers are not the only ones successfully compromised by hackers.
    Corporate giants by the hundreds have had financial database compromises over
    the years, victims of sometimes very technical, highly focused attackers. What
    might surprise you is that it doesn’t take a rocket scientist to uncover live credit
    card numbers on the Internet, thanks to search engines like Google. Everything
    from credit information to banking data or supersensitive classified government
    documents can be found on the Web. Consider the (highly edited) Web page

    This document, found using Google, lists hundreds and hundreds of credit
    card numbers (including expiration date and card validation numbers) as well as
    the owners’ names, addresses, and phone numbers.This particular document also
    included phone card (calling card) numbers. Notice the scroll bar on the righthand
    side of Figure 9.9, an indicator that the displayed page is only a small part
    of this huge document—like many other documents of its kind. In most cases,
    pages that contain these numbers are not “leaked” from online retailers or ecommerce
    sites but rather are most likely the fruits of a scam known as phishing,
    in which users are solicited via telephone or e-mail for personal information.
    Several Web sites, including MillerSmiles.co.uk, document these scams and
    hoaxes. Figure 9.10 shows a screen shot of a popular eBay phishing scam that
    encourages users to update their eBay profile information.


    Once a user fills out this form, all the information is sent via e-mail to the
    attacker, who can use it for just about anything.
    Tools and Traps
    Catching Online Scammers
    In some cases, you might be able to use Google to help nab the bad guys.
    Phishing scams are effective because the fake page looks like an official
    page. To create an official-looking page, the bad guys must have examples
    to work from, meaning that they must have visited a few legitimate companies’
    Web sites. If the fishing scam was created using text from several
    companies’ existing pages, you can key in on specific phrases from the fake
    page, creating Google queries designed to round up the servers that hosted
    some of the original content. Once you’ve located the servers that contained
    the pilfered text, you can work with the companies involved to
    extract correlating connection data from their log files. If the scammer visited
    each company’s Web page, collecting bits of realistic text, his IP should
    appear in each of the log files. Auditors at SensePost (www.sensepost.com)
    have successfully used this technique to nab online scam artists.
    Unfortunately, if the scammer uses an exact copy of a page from only one
    company, this task becomes much more difficult to accomplish.
    Social Security Numbers
    Social Security numbers (SSNs) and other sensitive data can be easily located
    with Google as well as via the same techniques used to locate credit card numbers.
    For a variety of reasons, SSNs might appear online—for example, educational
    facilities are notorious for using an SSN as a student ID, then posting
    grades to a public Web site with the “student ID” displayed next to the grade.A
    creative attacker can do quite a bit with just an SSN, but in many cases it helps
    to also have a name associated with that SSN. Again, educational facilities have
    been found exposing this information via Excel spreadsheets listing student’s
    names, grades, and SSNs, despite the fact that the student ID number is often
    used to help protect the privacy of the student! Although we don’t feel it’s right
    to go into the details of how this data is located, several media outlets have irresponsibly
    posted the details online. Although the blame lies with the sites that are
    leaking this information, in our opinion it’s still not right to draw attention to
    how exactly the information can be located.
    Personal Financial Data
    In some cases, phishing scams are responsible for publicizing personal information;
    in other cases, hackers attacking online retails are to blame for this breach of
    privacy. Sadly, there are many instances where an individual is personally responsible
    for his own lack of privacy. Such is the case with personal financial information.
    With the explosion of personal computers in today’s society, users have
    literally hundreds of personal finance programs to choose from. Many of these
    programs create data files with specific file extensions that can be searched with
    Google. It’s hard to imagine why anyone would post personal financial information
    to a public Web site (which subsequently gets crawled by Google), but it
    must happen quite a bit, judging by the number of hits for program files generated
    by Quicken and Microsoft Money, for example. Although it would be
    somewhat irresponsible to provide queries here that would unearth personal
    financial data, it’s important to understand the types of data that could potentially
    be uncovered by an attacker.To that end,Table 9.4 shows file extensions for various
    financial, accounting, and tax return programs. Ensure that these filetypes
    aren’t listed on a webserver you’re charged with protecting.
    File Extension Description
    afm Abassis Finance Manager
    ab4 Accounting and Business File
    mmw AceMoney File
    Iqd AmeriCalc Mutual Fund Tax Report
    et2 Electronic Tax Return Security File (Australia)
    tax Intuit TurboTax Tax Return
    t98-t04 Kiplinger Tax Cut File (extension based on two-digit return
    year)
    mny Microsoft Money 2004 Money Data Files
    mbf Microsoft Money Backup Files
    inv MSN Money Investor File
    ptdb Peachtree Accounting Database
    qbb QuickBooks Backup Files reveal financial data
    qdf Quicken personal finance data
    soa Sage MAS 90 accounting software
    sdb Simply Accounting
    stx Simply Tax Form
    tmd Time and Expense Tracking
    tls Timeless Time & Expense
    fec U.S. Federal Campaign Expense Submission
    wow Wings Accounting File
    Searching for Other Juicy Info
    As we’ve seen, Google can be used to locate all sorts of sensitive information. In
    this section we take a look at some of the data that Google can find that’s harder
    to categorize. From address books to chat log files and network vulnerability
    reports, there’s no shortage of sensitive data online.Table 9.5 shows some queries
    that can be used to uncover various types of sensitive data.
    Query Description
    intext:”Session Start AIM and IRC log files
    * * * *:*:* *” filetype:log
    filetype:blt blt +intext: AIM buddy lists
    screenname
    buddylist.blt AIM buddy lists
    intitle:index.of cgiirc.config CGIIRC (Web-based IRC client) config file,
    shows IRC servers and user credentials
    inurl:cgiirc.config CGIIRC (Web-based IRC client) config file,
    shows IRC servers and user credentials
    “Index of” / “chat/logs” Chat logs
    intitle:”Index Of” cookies.txt cookies.txt file reveals user information
    “size”
    “phone * * *” “address *” Curriculum vitae (resumes) reveal names
    “e-mail” intitle:”curriculum vitae” and address information
    ext:ini intext:env.ini Generic environment data
    intitle:index.of inbox Generic mailbox files
    “Running in Child mode” Gnutella client data and statistics
    “:8080” “:3128” “:80” HTTP Proxy lists
    filetype:txt
    intitle:”Index of” ICQ chat logs
    dbconvert.exe chats
    “sets mode: +p” IRC private channel information
    “sets mode: +s” IRC secret channel information
    “Host Vulnerability Summary ISS vulnerability scanner reports, reveal
    Report” potential vulnerabilities on hosts and
    networks
    “Network Vulnerability ISS vulnerability scanner reports, reveal
    Assessment Report” potential vulnerabilities on hosts and networks
    filetype:pot inurl:john.pot John the Ripper password cracker results
    intitle:”Index Of” -inurl:maillog Maillog files reveals e-mail traffic
    maillog size information
    ext:mdb inurl:*.mdb inurl: Microsoft FrontPage database folders
    Query Description
    filetype:xls inurl:contact Microsoft Excel sheets containing contact
    information.
    intitle:index.of haccess.ctl Microsoft FrontPage equivalent(?)of htaccess
    shows Web authentication info
    ext:log “Software: Microsoft Microsoft Internet Information Services
    Internet Information Services *.*” (IIS) log files
    filetype:pst inurl:”outlook.pst” Microsoft Outlook e-mail and calendar
    backup files
    intitle:index.of mt-db-pass.cgi Movable Type default file
    filetype:ctt ctt messenger MSN Messenger contact lists
    “This file was generated Nessus vulnerability scanner reports, reveal
    by Nessus” potential vulnerabilities on hosts and networks
    inurl:”newsletter/admin/” Newsletter administration information
    inurl:”newsletter/admin/” Newsletter administration information
    intitle:”newsletter admin”
    filetype:eml eml intext: Outlook Express e-mail files
    ”Subject” +From
    intitle:index.of inbox dbx Outlook Express Mailbox files
    intitle:index.of inbox dbx Outlook Express Mailbox files
    filetype:mbx mbx intext:Subject Outlook v1–v4 or Eudora mailbox files
    inurl:/public/?Cmd=contents Outlook Web Access public folders or
    appointments
    filetype:pdb pdb backup (Pilot Palm Pilot Hotsync database files
    | Pluckerdb)
    “This is a Shareaza Node” Shareaza client data and statistics
    inurl:/_layouts/settings Sharepoint configuration information
    inurl:ssl.conf filetype:conf SSL configuration files, reveal various configuration
    information
    site:edu admin grades Student grades
    intitle:index.of mystuff.xml Trillian user Web links
    inurl:forward filetype: UNIX mail forward files reveal e-mail
    forward –cvs addresses
    intitle:index.of dead.letter UNIX unfinished e-mails

    Summary
    Make no mistake—there’s sensitive data on the Web, and Google can find it.
    There’s hardly any limit to the scope of information that can be located, if only
    you can figure out the right query. From usernames to passwords, credit card and
    Social Security numbers, and personal financial information, it’s all out there. As a
    purveyor of the “dark arts,” you can relish in the stupidity of others, but as a professional
    tasked with securing a customer’s site from this dangerous form of
    information leakage, you could be overwhelmed by the sheer scale of your
    defensive duties.
    As droll as it might sound, a solid, enforced security policy is a great way to
    keep sensitive data from leaking to the Web. If users understand the risks associated
    with information leakage and understand the penalties that come with violating
    policy, they will be more willing to cooperate in what should be a security
    partnership.
    In the meantime, it certainly doesn’t hurt to understand the tactics an adversary
    might employ in attacking a Web server. One thing that should become
    clear as you read this book is that any attacker has an overwhelming number of
    files to go after. One way to prevent dangerous Web information leakage is by
    denying requests for unknown file types. Whether your Web server normally
    serves up CFM,ASP, PHP, or HTML, it’s infinitely easier to manage what should
    be served by the Web server instead of focusing on what should not be served.
    Adjust your servers or your border protection devices to allow only specific content
    or file types.
    Solutions Fast Track
    Searching for Usernames
    _ Usernames can be found in a variety of locations.
    _ In some cases, digging through documents or e-mail directories might
    be required.
    _ A simple query such as “your username is” can be very effective in
    locating usernames.

    Searching for Passwords
    _ Passwords can also be found in a variety locations.
    _ A query such as “Your password” forgot can locate pages that provide a
    forgotten-password recovery mechanism.
    _ intext:(password | passcode | pass) intext:(username | userid | user) is
    another generic search for locating password information.
    Searching for Credit Cards
    Numbers, Social Security Numbers, and More
    _ Documents containing credit card and Social Security number
    information do exist and are relatively prolific.
    _ Some irresponsible news outlets have revealed functional queries that
    locate this information.
    _ There are relatively few examples of personal financial data online, but
    there is a great deal of variety.
    _ In most cases, specific file extensions can be searched for.
    Searching for Other Juicy Info
    _ From address books and chat log files to network vulnerability reports,
    there’s no shortage of sensitive data online.

    Search This Blog

     
    Home | Gallery | Tutorials | Freebies | About Us | Contact Us

    Copyright © 2009 Koushik Hacking Tricks |Designed by Templatemo |Converted to blogger by BloggerThemes.Net

    Usage Rights

    DesignBlog BloggerTheme comes under a Creative Commons License.This template is free of charge to create a personal blog.You can make changes to the templates to suit your needs.But You must keep the footer links Intact.