Featured
- Get link
- X
- Other Apps
Aware of what your data is on the internet?
WHAT THE INTERNET KNOWS ABOUT ME: PART III
Part 3 of the series What does the Internet know about me ?,
Contributed by José Arroyo, to inform you about various ways to discover what
your data could be publicly available on the Internet without your knowledge.
here. In the first part, we talk about information leaks (especially your
personal data). Continuing in this spirit, we share a hands-on lab that shows
you more methods so you can make sure your information is not online.
Can you find out what kind of downloads I'm doing?
Downloads made through the BitTorrent protocol can be
publicly available on the Internet, this protocol uses the p2p system to
exchange files, so your computer also becomes the source of the download file
to serve other users. The entire organization and connections are monitored by
a server known as a tracker.
By logging all connections to the tracker, if you are not
using a private tracker, anyone can find out what is downloading from the IP
address.
On this website, you can check torrent downloads made from
an IP address.
If you enter your IP address and click SEARCH IP Address,
you will see a list of downloads, the name of the downloaded file, the start
and end date of the download, and the file size. You can check your IP address
here
torrent
This website also has a feature that allows us to share the
link on social media and see which torrents have been downloaded from the IP
addresses of the people who opened the link. We can find it at this link.
What does it mean that someone can see the files we upload?
They can profile us based on our tastes and try to trap us
through "social engineering."
You can find out if an employee is downloading at the
company.
If illegal things are downloaded from the IP address
There is no limit to the imagination ...
Obtain your personal data through the hacienda website -
hacienda we all
To request an appointment on the website of the tax agency,
we only need to access our ID and first surname.
The access data requested by the tax agency to request an
appointment, if we know the person, are relatively easy to obtain. If we do not
know, we can achieve a Google search (the parameters used in other browsers
than Google may differ) using a little search engine trick in case this data is
publicly available on the web. An example request could be the following:
file type: xls intext: site dni: *. it i
filetype: xml With this parameter, we ask Google to only
search for documents with this extension.
intext: dni We ask Google to search xml documents for the
word dni, which can also appear in their content.
site: *. en We ask Google to only search for domains ending
in .es on Spanish pages.
Thus, we obtain lists of people, which indicate their name
and surname, as well as their ID.
What can we do with this data?
Well, for example, knowing the headquarters of the tax
service, which is the closest to your home, our full name, we are preparing a
social engineering attack ...
LABORATORY !!
Show me your picture and I'll tell you where you are!
Everyone knows that when you publish an image, you need to
remove the metadata it contains, which can show us, among other things, the
coordinates from where the image was created.
But even if we remove the metadata from the image using an
image service like Google Image, we can compare the images and try to determine
where it was made.
Thanks to Google's image identification function, we can
find out if the image is used on the website, similar images, modifications to
the image itself, etc.
Let's do a test. Uploading the image to Google. Below is a
picture of the withdrawal source that we found on the internet.
Upload the image and find the "source".
This section shows pages that match the search word, in
which case Google added the original word to the search because the image was
already published.
Google shows us in this section different images from the
same source or from other very similar ones.
The exact match of where the photo was taken is shown here.
The image shows the Fountain of the Artichoke in Madrid Retiro, which matches
the fountain in our photo. Several articles related to this source appear.
I saw you through a leak ...
In the second part of this series, we saw how the Hacked
Mail service looked for if our email address appeared in the list of hacked
accounts, and therefore our recommendation was and still is to change the
password of the s
- Get link
- X
- Other Apps
Popular Posts
Badly designed contracts fate public IT projects to failure
- Get link
- X
- Other Apps