Perimeter Security, Google Dorking, VirusTotal, and Data Classification
Google Dorking & Open-Source Reconnaissance
Technique Demonstrated: Using Google’s advanced search operators (often called “Google dorks”) to locate publicly exposed files that contain valuable information such as credentials.
- Example query typed in chat:
filetype:xls intext:passwords
•filetype:xls– restricts results to Excel spreadsheets.
•intext:passwords– returns pages/files whose textual contents include the word “passwords”.
• Result: Spreadsheets that store usernames / passwords in plaintext. - Additional query shown live:
filetype:sql intext:password
• Targets SQL database dumps containing password fields (often “password=”, “pwd=”, etc.). - Admin page discovery dork:
intitle:admin inurl:admin
• Returns web pages whose
- Example query typed in chat:
Security Message: These search tricks illustrate how trivially attackers can discover misconfigured or unintentionally public assets. Organizations should:
- Remove sensitive data from publicly reachable locations.
- Use robots.txt or Google Search Console “Remove URL” for accidental exposures.
- Enforce principle of least privilege & strong authentication on any admin endpoint.
File Safety Check with VirusTotal
- After downloading a suspicious spreadsheet, the speaker uploads it to VirusTotal to confirm it is malware-free.
- VirusTotal aggregates > 70 AV engines: ClamAV, Baidu, Google, Fortinet, etc.
- Output in demo: 0/0 detections → “clean” according to vendors.
- Best Practice: Always scan unknown files, macros, or executables before opening, even if sourced from “trusted” search results.
Social Engineering Insight
- “Demanding compliance is possible, but it does not gain trust.”
• Implication: Effective social engineering often relies on rapport, empathy, or authority—not just force.
Perimeter Defenses (Physical Security)
- Definition: Controls placed at the physical boundary of a facility to restrict unauthorized entry and protect digital assets from physical tampering.
Physical Barriers
- Fences, walls, locked doors, turnstiles, bollards (steel posts blocking vehicles).
- Example: Bollards positioned outside data-center front doors to stop car ramming.
Human Guards
- Patrol, badge checks, visitor logs.
- Two-Person Integrity (TPI): Critical areas (e.g., vaults) require two authorized individuals simultaneously.
- Surveillance: CCTV, strategically located to minimize blind spots.
Sensor Technologies
- Infrared sensors: Detect body heat or IR beams crossed.
- Ultrasonic sensors: Emit sound waves, measure reflection; also used in vehicle reverse systems.
- Pressure sensors: Floor mats or under-tile detectors trigger when weight is applied.
Access-Control Architectures
- Man Trap / Security Vestibule
• Small chamber with two interlocking doors—second door opens only after first closes and identity is verified.
• High-security sites (data centers, secure labs). - Reception / Waiting Room
• Medium control environment; staffed, camera-monitored. - Motion-Activated Egress Doors
• Example from class: Attacker used aerosol spray to trip motion sensor from outside, forcing door to open (illustrates placement risk). - Electronic Locks & Badges
• Configurable for time-of-day, role-based entry.
Drones (UAVs)
- Used by defenders for surveillance of large perimeters; conversely, attackers may use them for recon.
Electromagnetic Shielding – Faraday Cage
- Metal enclosure preventing external RF signals (EMI) from interacting with internal electronics.
- Incident-response use case: Place confiscated mobile device/laptop inside cage bag to block remote wiping or GPS/Cell signals.
- Sizes range from phone-size pouches to whole rooms.
Cable Protection & Protected Distribution System (PDS)
- Why Protect Cables? Availability: Cut or tapped power/network cables = downtime or data breach.
- PDS = physically secure cabling pathways for classified or mission-critical traffic.
- Hardened-Carrier PDS: Cables run through rigid, tamper-resistant conduit (electrical metallic tubing).
- Alarmed-Carrier PDS: Fiber or sensors inside conduit detect acoustic vibration; intrusion triggers alarms.
- Cable Locks (laptop lock-slots, rack braces) once common for endpoint theft deterrence.
Data Controls & Classification
- Goal: Ensure each data element receives protection proportional to its value & sensitivity.
Common Classification Labels (organization-dependent)
- Public
- Restricted
- Confidential / Private / Sensitive
- Critical
- “Do Not Store” (e.g., full PAN – Primary Account Number per PCI-DSS, raw biometric templates).
Data Types Mentioned
- Regulated Data – subject to laws/regulations (e.g., GDPR PII, HIPAA PHI).
- Copyrighted / Intellectual Property – creative works under legal protection.
- Trade Secrets – proprietary formulas, algorithms, strategy docs kept undisclosed.
- Legal Information – case files, contracts, privileged communications.
- Financial Information – monetary transactions, ledgers, account balances.
Human-Readable vs. Non-Human-Readable
- Human-Readable: Text, CSV, HTML—directly interpretable.
- Non-Human-Readable / Machine-Readable: Serialized formats (JSON, XML), binary blobs, compiled code; require software for interpretation.
Foundational Concepts & Implications
- Physical Access → Logical Compromise: If an attacker can touch the hardware, they can often bypass logical controls (e.g., cold-boot attacks, drive imaging).
- Electromagnetic Interference (EMI): Data can leak via emanations; shielding (TEMPEST, Faraday) mitigates.
- Data Remanence: Deleted info can be recovered unless media is cryptographically wiped or physically destroyed.
- Availability (CIA Triad) highlighted when discussing cable sabotage.
Practical Takeaways / Study Prompts
- Memorize Google dork syntax for security assessments, but emphasize legal boundaries (only test with authorization).
- When designing a facility, perform Physical Penetration Testing: sensors placement, tailgating resistance, man-trap effectiveness.
- Map data flows → apply correct classification label → enforce storage, transmission, and disposal controls accordingly.
- Incorporate VirusTotal (or similar multi-AV services) into incident-response and SOC triage pipelines.