SlideShare una empresa de Scribd logo
1 de 19
• Have you ever wondered how someone sitting miles
away is able to easily penetrate an organization’s
network?
• How someone who has never had legitimate access to
a network can learn more about that organization than
most of its own employees?
• It’s actually pretty easy, given the right skill set and
a lot of patience.
• I know cyberwarfare isn’t a new thing, but it’s still
impressive to think that someone on the other side of
the globe, a few continents away, is able to wreak so
much havoc.
Why OSINT
Uncovering Discrimination Refining Delivery
Open Source Intelligence is a form of intelligence
collection management that involves finding, selecting
and acquiring information from publicly available
sources and analysing it to produce actionable
intelligence.
 OSINT is not actively used by many
PenTesters
 But, then you get a real Pentest and
you apply everything – Physical
Security, Phishing, OSINT
 And, Sometimes you are not a
PenTester.You are an Investigator.
SoYou Are a
PenTester!!
What DoYou Follow?
Use Cases
Corporate Security
• Finding Breaches
• Leaked Business Information
• Leaked Credentials
• Rogue Employees
• Finding Malware
Individual Intelligence
Competitive Intelligence
CyberThreat Intelligence
Defence Intelligence
Kid Stuff, Right?
• EXIF Data Viewers
• Cyberstalking Tools
• Whois, IP Lookup and
Website Analysis
• Geo-LocationTools
• GHDB
• Recorded Future
• Specialized OSINTTools
• Search Engines
• Social Media
• Image,Video and
Multimedia Search
• LanguageTools
• Online Communities
• People, Phone Number
and Company Finder
• Wikis
OSINT Resources
OSINTTools - Robtex
• Firefox Plugin
• It does not query the domain directly. In fact it looks up all the
public databases for gathering as much information as possible
about the target.
• Passive Recon passively provides whois information, MX records,
DNS information, and other useful data.
• Significantly, due to the passive nature
of Passive Recon, the owner of the
domain you are querying is not alerted.
OSINTTools – PassiveRecon
OSINTTools – People Search
• www.paterva.com
• Maltego provides you with a graphical interface that makes seeing
these relationships instant and accurate – making it possible to
see hidden connections.
• Java client app, can run local/remote
• Great data analysis capabilities
• Good Integration /API /TAS/TDS
• Entity -> Transform -> Entities
OSINTTools - Maltego
GeoStalker
Takes
• Location(Address or Coordinates)
Retrieves Location Data From
• Wigle.net (Wireless DB)
• Instagram
• Twitter
• Foursquare
• Flickr
Provides
• Wireless access-points nearby
• Photos taken at that location
• Social Media accounts of people
who have visited
FBStalker
Takes
• Facebook user profile
Uses Graph Search to Reverse
• Friends
• Likes
• Check-ins
• Comments
Provides
• Social EngineeringTargets
• Associates of those Targets
• Interests, CommonlyVisited
Places
New Developments
Information Brokers Big Data AnalyticsTools
Storm and Kafta
Drill and Dremel
R
Gremlin and Giraph
SAP Hana
D3
BackCheck
Infochimps
LexisNexis
Axciom
Choicepoint
Discreet Data
MasterFiles
Intelius
Future Belongs to Big Data
http://www.indeed.com/q-Osint-Analyst-jobs.html
http://rr.reuser.biz/
http://www.uk-osint.net/favorites.html
https://sites.google.com/site/greynetwork2/home/osint-resources
http://www.yougetsignal.com/
http://law.lexisnexis.com/infopro/zimmermans/disp.aspx?z=1752
http://www.fso-online.com/home_login.cfm?sid=49170561
http://www.social-
engineer.org/framework/Social_Engineers:_Information_Brokers
Additional Sources
Questions/Comments
• OSINT is more than gathering flippin data manually
• Know what attackers know about you
• Use OSINT for Corporate Security and BI
• Data brokers are helpful but not controlled
• Big data gives new avenues to OSINT and some
problems too 
Takeaways
ThankYou
@Rathaur_Kamal

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Getting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigationsGetting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigations
 
Owasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudiniOwasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudini
 
osint - open source Intelligence
osint - open source Intelligenceosint - open source Intelligence
osint - open source Intelligence
 
Bsides Knoxville - OSINT
Bsides Knoxville - OSINTBsides Knoxville - OSINT
Bsides Knoxville - OSINT
 
Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)
 
From OSINT to Phishing presentation
From OSINT to Phishing presentationFrom OSINT to Phishing presentation
From OSINT to Phishing presentation
 
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
 
Open source intelligence
Open source intelligenceOpen source intelligence
Open source intelligence
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and Defense
 
Let’s hunt the target using OSINT
Let’s hunt the target using OSINTLet’s hunt the target using OSINT
Let’s hunt the target using OSINT
 
Osint {open source intelligence }
Osint {open source intelligence }Osint {open source intelligence }
Osint {open source intelligence }
 
How to Use Open Source Intelligence (OSINT) in Investigations
How to Use Open Source Intelligence (OSINT) in InvestigationsHow to Use Open Source Intelligence (OSINT) in Investigations
How to Use Open Source Intelligence (OSINT) in Investigations
 
OSINT for Proactive Defense - RootConf 2019
OSINT for Proactive Defense - RootConf 2019OSINT for Proactive Defense - RootConf 2019
OSINT for Proactive Defense - RootConf 2019
 
OSINT 2.0 - Past, present and future
OSINT 2.0  - Past, present and futureOSINT 2.0  - Past, present and future
OSINT 2.0 - Past, present and future
 
Enterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringEnterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence Gathering
 
Osint skills
Osint skillsOsint skills
Osint skills
 
Jesús Alcalde & Daniel Gonzalez- - OSINT: La verdad está ahí fuera [rooted2018]
Jesús Alcalde & Daniel Gonzalez- - OSINT: La verdad está ahí fuera [rooted2018]Jesús Alcalde & Daniel Gonzalez- - OSINT: La verdad está ahí fuera [rooted2018]
Jesús Alcalde & Daniel Gonzalez- - OSINT: La verdad está ahí fuera [rooted2018]
 
OSINT Social Media Techniques - Macau social mediat lc
OSINT Social Media Techniques - Macau social mediat lc OSINT Social Media Techniques - Macau social mediat lc
OSINT Social Media Techniques - Macau social mediat lc
 
OpenSourceIntelligence-OSINT.pptx
OpenSourceIntelligence-OSINT.pptxOpenSourceIntelligence-OSINT.pptx
OpenSourceIntelligence-OSINT.pptx
 
OSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan BraganzaOSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan Braganza
 

Destacado

Destacado (6)

Stop pulling the plug
Stop pulling the plugStop pulling the plug
Stop pulling the plug
 
Go with the flow
Go with the flowGo with the flow
Go with the flow
 
Information gathering
Information gatheringInformation gathering
Information gathering
 
What Exactly Is The "Internet of Things"?
What Exactly Is The "Internet of Things"?What Exactly Is The "Internet of Things"?
What Exactly Is The "Internet of Things"?
 
5 questions about the IoT (Internet of Things)
5 questions about the IoT (Internet of Things) 5 questions about the IoT (Internet of Things)
5 questions about the IoT (Internet of Things)
 
Sample slides by Garr Reynolds
Sample slides by Garr ReynoldsSample slides by Garr Reynolds
Sample slides by Garr Reynolds
 

Similar a Osint

TakeDownCon Rocket City: “White Hat Anonymity”: Current challenges security r...
TakeDownCon Rocket City: “White Hat Anonymity”: Current challenges security r...TakeDownCon Rocket City: “White Hat Anonymity”: Current challenges security r...
TakeDownCon Rocket City: “White Hat Anonymity”: Current challenges security r...
EC-Council
 
Blitzing with your defense bea con
Blitzing with your defense bea conBlitzing with your defense bea con
Blitzing with your defense bea con
Innismir
 

Similar a Osint (20)

Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU Investigators
 
TakeDownCon Rocket City: “White Hat Anonymity”: Current challenges security r...
TakeDownCon Rocket City: “White Hat Anonymity”: Current challenges security r...TakeDownCon Rocket City: “White Hat Anonymity”: Current challenges security r...
TakeDownCon Rocket City: “White Hat Anonymity”: Current challenges security r...
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Maltego
MaltegoMaltego
Maltego
 
Applying Machine Learning to Network Security Monitoring - BayThreat 2013
Applying Machine Learning to Network Security Monitoring - BayThreat 2013Applying Machine Learning to Network Security Monitoring - BayThreat 2013
Applying Machine Learning to Network Security Monitoring - BayThreat 2013
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptx
 
Corporate Intelligence: Bridging the security and intelligence community
Corporate Intelligence: Bridging the security and intelligence communityCorporate Intelligence: Bridging the security and intelligence community
Corporate Intelligence: Bridging the security and intelligence community
 
The art of deceiving humans a.k.a social engineering
The art of deceiving humans a.k.a social engineeringThe art of deceiving humans a.k.a social engineering
The art of deceiving humans a.k.a social engineering
 
Blitzing with your defense bea con
Blitzing with your defense bea conBlitzing with your defense bea con
Blitzing with your defense bea con
 
Fun with Application Security
Fun with Application SecurityFun with Application Security
Fun with Application Security
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using Tor
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
 
SECURITY AWARENESS.pptx
SECURITY AWARENESS.pptxSECURITY AWARENESS.pptx
SECURITY AWARENESS.pptx
 
DECEPTICONv2
DECEPTICONv2DECEPTICONv2
DECEPTICONv2
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Threat Hunting, Detection, and Incident Response in the Cloud
Threat Hunting, Detection, and Incident Response in the CloudThreat Hunting, Detection, and Incident Response in the Cloud
Threat Hunting, Detection, and Incident Response in the Cloud
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSEC
 
Basics of Maltego
Basics of MaltegoBasics of Maltego
Basics of Maltego
 

Último

在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
 
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
nirzagarg
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Chandigarh Call girls 9053900678 Call girls in Chandigarh
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
nilamkumrai
 

Último (20)

Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts ServiceReal Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
 
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
 

Osint

  • 1.
  • 2. • Have you ever wondered how someone sitting miles away is able to easily penetrate an organization’s network? • How someone who has never had legitimate access to a network can learn more about that organization than most of its own employees? • It’s actually pretty easy, given the right skill set and a lot of patience. • I know cyberwarfare isn’t a new thing, but it’s still impressive to think that someone on the other side of the globe, a few continents away, is able to wreak so much havoc. Why OSINT
  • 3. Uncovering Discrimination Refining Delivery Open Source Intelligence is a form of intelligence collection management that involves finding, selecting and acquiring information from publicly available sources and analysing it to produce actionable intelligence.
  • 4.  OSINT is not actively used by many PenTesters  But, then you get a real Pentest and you apply everything – Physical Security, Phishing, OSINT  And, Sometimes you are not a PenTester.You are an Investigator. SoYou Are a PenTester!!
  • 6. Use Cases Corporate Security • Finding Breaches • Leaked Business Information • Leaked Credentials • Rogue Employees • Finding Malware Individual Intelligence Competitive Intelligence CyberThreat Intelligence Defence Intelligence
  • 8.
  • 9. • EXIF Data Viewers • Cyberstalking Tools • Whois, IP Lookup and Website Analysis • Geo-LocationTools • GHDB • Recorded Future • Specialized OSINTTools • Search Engines • Social Media • Image,Video and Multimedia Search • LanguageTools • Online Communities • People, Phone Number and Company Finder • Wikis OSINT Resources
  • 11. • Firefox Plugin • It does not query the domain directly. In fact it looks up all the public databases for gathering as much information as possible about the target. • Passive Recon passively provides whois information, MX records, DNS information, and other useful data. • Significantly, due to the passive nature of Passive Recon, the owner of the domain you are querying is not alerted. OSINTTools – PassiveRecon
  • 13. • www.paterva.com • Maltego provides you with a graphical interface that makes seeing these relationships instant and accurate – making it possible to see hidden connections. • Java client app, can run local/remote • Great data analysis capabilities • Good Integration /API /TAS/TDS • Entity -> Transform -> Entities OSINTTools - Maltego
  • 14. GeoStalker Takes • Location(Address or Coordinates) Retrieves Location Data From • Wigle.net (Wireless DB) • Instagram • Twitter • Foursquare • Flickr Provides • Wireless access-points nearby • Photos taken at that location • Social Media accounts of people who have visited FBStalker Takes • Facebook user profile Uses Graph Search to Reverse • Friends • Likes • Check-ins • Comments Provides • Social EngineeringTargets • Associates of those Targets • Interests, CommonlyVisited Places New Developments
  • 15. Information Brokers Big Data AnalyticsTools Storm and Kafta Drill and Dremel R Gremlin and Giraph SAP Hana D3 BackCheck Infochimps LexisNexis Axciom Choicepoint Discreet Data MasterFiles Intelius Future Belongs to Big Data
  • 18. • OSINT is more than gathering flippin data manually • Know what attackers know about you • Use OSINT for Corporate Security and BI • Data brokers are helpful but not controlled • Big data gives new avenues to OSINT and some problems too  Takeaways

Notas del editor

  1. Swiss army knife internet tool, because of it’s verstality.
  2. Maltego can be used for the information gathering phase of all security related work. It will save you time and will allow you to work more accurately and smarter. Maltego aids you in your thinking process by visually demonstrating interconnected links between searched items. Maltego provide you with a much more powerful search, giving you smarter results. If access to "hidden" information determines your success, Maltego can help you discover it.
  3. Storm is a “distributed real-time computation system”. Storm does for real-time processing what Hadoop did for batch processing. Kafka for its part is a messaging system developed at LinkedIn to serve as the foundation for their activity stream and the data processing pipeline behind it. When paired together, you get the stream, you get it in-real time, and you get it at linear scale. With Storm and Kafka, you can conduct stream processing at linear scale, assured that every message gets processed in real-time, reliably. In tandem, Storm and Kafka can handle data velocities of tens of thousands of messages every second. Drill is the open source version of what Google is doing with Dremel. make large-scale, ad-hoc querying of data possible, with radically lower latencies that are especially apt for data exploration. They make it possible to scan over petabytes of data in seconds, to answer ad hoc queries. It’s all about the speed! R is an open source statistical programming language. It is incredibly powerful. Also, R works very well with Hadoop, making it an ideal part of an integrated Big Data approach. Graphs do a great job of modeling computer networks, and social networks, too — anything that links data together. Another common use is mapping, and geographic pathways — calculating shortest routes for example, from place A to place B (or to return to the social case, tracing the proximity of stated relationships from person A to person B). D3 is a javascript document visualization library that revolutionizes how powerfully and creatively we can visualize information, and make data truly interactive.