SlideShare una empresa de Scribd logo
1 de 69
Descargar para leer sin conexión
OFFENSIVE OSINT
CHRISTIAN MARTORELLA
OSIRA SUMMIT 2014
LONDON, UK
About me
Chris&an	
  Martorella:	
  
–  I	
  work	
  in	
  Skype	
  (MS),	
  Product	
  Security	
  team	
  
–  Founder	
  of	
  Edge-­‐security.com	
  
–  Developed	
  open	
  source	
  projects	
  like	
  theHarvester,	
  
Metagoofil,	
  Wfuzz	
  and	
  Webslayer	
  
–  Presented	
  in	
  many	
  Security	
  conferences	
  (Blackhat	
  Arsenal,	
  
Hack.lu,	
  WhaNheHack,	
  OWASP,	
  Source)	
  
–  Over	
  12	
  years	
  focusing	
  on	
  offensive	
  security	
  
	
  
Disclaimer
Any views or opinions presented in this presentation
are solely those of the author and do not necessarily
represent those of the employer
OSINT - Intro
Open-­‐source	
  intelligence	
  (OSINT)	
  is	
  intelligence	
  
collected	
  from	
  publicly	
  available	
  sources.	
  
•  “Open"	
  refers	
  to	
  overt,	
  publicly	
  available	
  sources	
  
(as	
  opposed	
  to	
  covert	
  or	
  clandes&ne	
  sources)	
  
•  It	
  is	
  not	
  related	
  to	
  open-­‐source	
  soUware	
  or	
  
public	
  intelligence.	
  
OSINT
	
  
	
  
	
  
What	
  is	
  Threat	
  Intelligence	
  /	
  Cyber	
  
Intelligence	
  ?	
  
OSINT PROCESS
Source Identification
Data harvesting
Data Analysis
Data processing and
Integration
Results Delivery
Source Identification
Data Harvesting
Data processing
Data Analysis
Results Delivery
Offensive OSINT
Offensive vs. Defensive OSINT
From	
  the	
  security	
  perspec&ve	
  we	
  can	
  separate	
  
OSINT:	
  
	
  
Offensive:	
  Gathering	
  informa&on	
  before	
  an	
  
aNack.	
  
	
  
Defensive:	
  Learning	
  about	
  aNacks	
  against	
  the	
  
company	
  
Offensive OSINT
•  Finding	
  as	
  much	
  informa&on	
  as	
  possible	
  that	
  
will	
  facilitate	
  the	
  aNack	
  
•  S&ll	
  now,	
  many	
  Penetra&on	
  Tes&ng	
  
companies	
  skip	
  this	
  phase	
  
•  ANackers	
  usually	
  spend	
  more	
  &me	
  than	
  
testers	
  on	
  this	
  phase	
  
Typical Pentesting Methodology
I.G Scan Enumerate Exploit
Post-
Exploit
Cover
Tracks
Write
report
What everyone focus on:
I.G	
   Scan	
  	
  
Enumera
te	
   Exploit	
  
Post-­‐
Exploit	
  
Cover	
  
Tracks	
  
Write	
  
report	
  
Attacker Methodology
Discover	
  what	
  makes	
  
the	
  company	
  money	
  
Discover	
  what	
  is	
  
valuable	
  to	
  the	
  
aNacker	
  
Do	
  whatever	
  it	
  
takes...	
  
Steal	
  it	
  
Informa&on	
  Gathering	
  
Data	
  Harves:ng	
  
Data Harvesting
A.K.A:	
  
•  Informa:on	
  Gathering:	
  
The	
  act	
  of	
  collec&ng	
  informa&on	
  
	
  
•  Foot	
  prin:ng:	
  	
  
Is	
  the	
  technique	
  of	
  gathering	
  informa&on	
  about	
  
computer	
  systems	
  and	
  the	
  en&&es	
  they	
  belong	
  to.	
  
	
  
•  Web	
  mining:	
  	
  
The	
  act	
  of	
  collec&ng	
  informa&on	
  from	
  the	
  web	
  
	
  
	
  
	
  
Data Harvesting – How?
Techniques:	
  
	
  
•  Scraping	
  (raw)	
  
•  Open	
  APIs	
  
•  Commercial	
  APIS	
  
•  Network	
  Scanning	
  
•  Purchasing	
  data	
  
•  Open	
  source	
  Data	
  sets	
  
•  Databases	
  
•  Logfiles	
  
	
  
Data	
  Harves&ng	
  	
  -­‐	
  Passive	
  vs	
  Ac&ve	
  
•  Passive	
  data	
  harves:ng:	
  Our	
  ac&ons	
  can’t	
  be	
  
detected	
  by	
  the	
  target	
  (Non	
  aNribu&on)	
  
•  Ac:ve	
  data	
  harves:ng:	
  our	
  ac&ons	
  leave	
  
traces	
  that	
  can	
  be	
  detected	
  by	
  the	
  target	
  
Offensive OSINT targets
Offensive OSINT – end goals
•  Phishing	
  	
  
•  Social	
  Engineering	
  
•  Denial	
  of	
  Services	
  
•  Password	
  brute	
  force	
  aNacks	
  
•  Target	
  infiltra&on	
  
	
  
What	
  data is interesting?
Emails
Users / Employees names
-Interests
-People relationships
-Alias
	
  
	
  
	
  
Emails
•  PGP	
  servers	
  
•  Search	
  engines	
  
•  Whois	
  	
  
Employees / Usernames / Alias
linkedin.com	
  
jigsaw.com	
  
people123.com	
  
pipl.com	
  
peekyou.com	
  
Google	
  Finance	
  /	
  Etc.	
  
	
  
Usernamecheck.com	
  
checkusernames.com	
  
	
  
Glassdoor.com	
  
Hoovers.com	
  
Corpwatch.org	
  
intelius.com	
  
Username checks
Social Media
	
  
•  Employees	
  of	
  a	
  company	
  
•  Profile	
  picture	
  
•  Special&es	
  
•  Role	
  
•  Country	
  
•  Emails	
  
Linkedin	
  
Simon	
  LongboNom	
  
Simon.LongboNom@amazon.com	
  
	
  
Product	
  defini&on,	
  proposi&on	
  research,	
  pricing,	
  
product	
  marke&ng,	
  product	
  promo&on,	
  market	
  
research,	
  new	
  product	
  introduc&on	
  
	
  
pictureUrl':	
  'hNp://m.c.lnkd.licdn.com/mpr/mprz/’}	
  
Linkedin	
  
Google+	
  
 
GRAPH	
  SEARCH:	
  
	
  
“People	
  who	
  work	
  at	
  Amazon.com”	
  
	
  
“People	
  who	
  work	
  at	
  Amazon.com	
  and	
  live	
  in	
  
SeaNle	
  Washington”	
  
@google.	
  News	
  and	
  updates	
  from	
  Google.	
  Mountain	
  
@googlenexus.	
  Phones	
  and	
  tablets	
  from	
  Google	
  
@GoogleDoodles	
  
@googlewmc.	
  News	
  and	
  resources	
  from	
  
@googleindia	
  
@GoogleChat.	
  Twee&ng	
  about	
  all	
  things	
  Google	
  
@googleaccess.	
  The	
  official	
  TwiNer	
  
@googleglass.	
  Geing	
  technology	
  out	
  of	
  the	
  way.	
  
@googlenonprofit.	
  News	
  and	
  updates	
  from	
  
@googlewallet.	
  News	
  
@googlereader.	
  News	
  
@googlefiber	
  
@googleio.	
  Google	
  
@googledevs	
  for	
  updates.	
  San	
  Francisco	
  
@GoogleIO	
  for	
  ...	
  If	
  you	
  
@GoogleMsia.	
  Official	
  Google	
  Malaysia	
  on	
  TwiNer.	
  Kuala	
  
@googlejobs.	
  Have	
  you	
  heard	
  we	
  
@googleapps.	
  Google	
  Apps	
  news	
  for	
  ISVs	
  
@GooglePlay.	
  Music	
  
@GoogleAtWork.	
  The	
  official	
  TwiNer	
  home	
  of	
  
Google	
  Enterprise.	
  Mountain	
  View	
  
@FaktaGoogle.	
  Googling	
  Random	
  Facts.	
  Don	
  
@googlemobileads.	
  Official	
  Google	
  Mobile	
  
@googlepoli&cs.	
  Trends	
  
@ericschmidt.	
  Execu&ve	
  Chairman	
  
@GoogleMobile.	
  News	
  
@googledownunder.	
  Google	
  Australia	
  and	
  
@AdSense.	
  News	
  and	
  updates	
  from	
  the	
  Google	
  
AdSense	
  
@googlecalendar.	
  The	
  official	
  TwiNer	
  home	
  of	
  
@googledevs.	
  News	
  about	
  and	
  from	
  
@googlenews.	
  Breaking	
  news	
  
@GoogleB2BTeam.	
  
@GoogleB2BTeam	
  Google	
  
@Jus&nCutroni	
  
Google	
  query:	
  site:twiNer.com	
  in&tle:"on	
  TwiNer"	
  
”Google"	
  
	
  
Domain	
  name	
  
Geo-location
•  People	
  loca&on	
  
•  Servers	
  loca&on	
  
•  Wireless	
  AP	
  loca&on	
  
	
  
	
  
Geo-location
Social	
  media	
  posts	
  
Foursquare	
  
Pictures	
  
TwiNer	
  
Facebook	
  
	
  
Twitter - Creepy
Images
Reverse	
  image	
  search	
  
Face	
  iden&fica&on	
  
Exif	
  Metadata	
  analysis:	
  
	
  Profile	
  pictures	
  
	
  ANachments	
  
	
  
	
  
Images
•  Pic from
Novartis
search on
TwwepSearch
INFRASTRUCTURE
IP
Hostnames
Services
Networks
Geo-location
Software version
CDN
Multitenant Hosting
Infrastructure
Internet	
  Census	
  project	
  
Whois	
  
ServerSniff	
  
Jobsites	
  
Search	
  engines	
  
ShodanHQ	
  
	
  
Infrastructure	
  	
  
•  Once	
  we	
  have	
  iden&fied	
  the	
  Infrastructure	
  
components,	
  what	
  can	
  we	
  do?	
  
ShodanHQ
Bugs databases
INDICATORS OF COMPROMISE
(IOC)
IP addresses
Domains
URLs
Hashes
Stolen Passwords
IOC
Collec&ve	
  Intelligence	
  Framework	
  sources	
  (70)	
  
Abuse.CH	
  
Shadowserver.org	
  
Nothink.org	
  
Virustotal.com	
  
Malwr	
  
Seculert	
  
DATA LEAKS
	
  
Pastebin.com	
  	
  
@pastebindorks	
  
	
  
Pastebin	
  clones	
  
	
  
Infrastructure
•  	
  	
  DNS	
  
o  Bruteforce	
  
o  Zone	
  Transfer	
  
•  SMTP	
  
o  Header	
  analysis	
  
o  Vrfy,	
  expn	
  
•  Web	
  sites	
  
o  Hidden	
  files	
  /	
  directories	
  bruteforce	
  
•  Network	
  scanning	
  
•  Metadata	
  
Metadata
	
  
•  Office	
  documents	
  
•  Openoffice	
  documents	
  
•  PDF	
  documents	
  	
  
•  Images	
  EXIF	
  metadata	
  
•  Others	
  
	
  
Metadata:	
  is	
  data	
  about	
  data.	
  	
  	
  	
  
	
  
	
  
Is	
  used	
  to	
  facilitate	
  the	
  understanding,	
  use	
  and	
  management	
  
of	
  data.	
  
	
  
Cat Schwartz - Tech TV
Washington Post
Botmaster location exposed by the Washington Post
SLUG: mag/hacker!
DATE: 12/19/2005!
PHOTOGRAPHER: Sarah L. Voisin/TWP!
id#: LOCATION: Roland, OK!
CAPTION:!
PICTURED: Canon Canon EOS 20D!
Adobe Photoshop CS2 Macintosh 2006:02:16 15:44:49 Sarah
L. Voisin!
There are only 1.500 males in Roland Oklahoma
Metagoofil - Results
Metagoofil - Results
Metagoofil - results
INFORMATION GATHERING
TOOLS
•  FOCA	
  
•  Spiderfoot	
  
•  Tapir	
  
•  Creepy	
  
•  theHarvester	
  
•  Metagoofil	
  
	
  
This	
  tool	
  is	
  intended	
  to	
  help	
  Penetra&on	
  testers	
  in	
  the	
  early	
  
stages	
  of	
  the	
  penetra&on	
  test	
  in	
  order	
  to	
  understand	
  the	
  
customer	
  footprint	
  on	
  the	
  Internet.	
  	
  
	
  
It	
  is	
  also	
  useful	
  for	
  anyone	
  that	
  wants	
  to	
  know	
  what	
  an	
  aNacker	
  
can	
  see	
  about	
  their	
  organiza&on	
  and	
  reduce	
  exposure	
  of	
  the	
  
company.	
  
	
  
 -­‐	
  Sources	
  
	
   	
   	
  	
  	
  	
  	
  google	
  
	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  googleCSE	
  
	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  bing	
  
	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  bingapi	
  
	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  pgp	
  
	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  linkedin	
  
	
   	
   	
  	
  	
  	
  	
  people123	
  
	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  jigsaw	
  
	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  twiNer	
  
	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  GooglePlus	
  
	
   	
   	
  	
  	
  	
  	
  shodanhq	
  
	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  
•  Open	
  source	
  soUware	
  
•  Command	
  line	
  	
  
•  Extendable	
  
•  python	
  theHarvester.py	
  -­‐d	
  lacaixa.es	
  -­‐b	
  
googleCSE	
  -­‐l	
  500	
  -­‐v	
  -­‐h	
  
- Intelligence
Implement	
  en&&es	
  
Cross	
  reference	
  en&&es	
  
Image	
  reverse	
  search	
  /	
  profile	
  pictures	
  
Geo-­‐loca&on	
  
Iden&fy	
  vulnerable	
  services	
  
Username	
  search	
  in	
  other	
  services	
  
Target	
  priori&za&on	
  	
  
Challenges
•  Source	
  availability	
  	
  (APIs)	
  
•  Changes	
  in	
  Terms	
  of	
  Use	
  
•  Genera&ng	
  valid	
  intelligence	
  
?
TwiNer:	
  @laramies	
  
Email:	
  cmartorellaW@edge-­‐security.com	
  

Más contenido relacionado

La actualidad más candente

Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark WebCase IQ
 
Open source intelligence
Open source intelligenceOpen source intelligence
Open source intelligencebalakumaran779
 
What is Open Source Intelligence (OSINT)
What is Open Source Intelligence (OSINT)What is Open Source Intelligence (OSINT)
What is Open Source Intelligence (OSINT)Molfar
 
osint - open source Intelligence
osint - open source Intelligenceosint - open source Intelligence
osint - open source IntelligenceOsama Ellahi
 
Osint {open source intelligence }
Osint {open source intelligence }Osint {open source intelligence }
Osint {open source intelligence }AkshayJha40
 
Threat hunting - Every day is hunting season
Threat hunting - Every day is hunting seasonThreat hunting - Every day is hunting season
Threat hunting - Every day is hunting seasonBen Boyd
 
OSINT with Practical: Real Life Examples
OSINT with Practical: Real Life ExamplesOSINT with Practical: Real Life Examples
OSINT with Practical: Real Life ExamplesSyedAmoz
 
How to Use Open Source Intelligence (OSINT) in Investigations
How to Use Open Source Intelligence (OSINT) in InvestigationsHow to Use Open Source Intelligence (OSINT) in Investigations
How to Use Open Source Intelligence (OSINT) in InvestigationsCase IQ
 
Threat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-onThreat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-onSplunk
 
OSINT 2.0 - Past, present and future
OSINT 2.0  - Past, present and futureOSINT 2.0  - Past, present and future
OSINT 2.0 - Past, present and futureChristian Martorella
 
Threat Hunting
Threat HuntingThreat Hunting
Threat HuntingSplunk
 
Threat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep SinghThreat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep SinghOWASP Delhi
 
Effective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat IntelligenceEffective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat IntelligenceDhruv Majumdar
 
OSINT for Proactive Defense - RootConf 2019
OSINT for Proactive Defense - RootConf 2019OSINT for Proactive Defense - RootConf 2019
OSINT for Proactive Defense - RootConf 2019RedHunt Labs
 
Getting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigationsGetting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigationsOlakanmi Oluwole
 

La actualidad más candente (20)

OpenSourceIntelligence-OSINT.pptx
OpenSourceIntelligence-OSINT.pptxOpenSourceIntelligence-OSINT.pptx
OpenSourceIntelligence-OSINT.pptx
 
Osint
OsintOsint
Osint
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark Web
 
OSINT - Open Source Intelligence
OSINT - Open Source IntelligenceOSINT - Open Source Intelligence
OSINT - Open Source Intelligence
 
Open source intelligence
Open source intelligenceOpen source intelligence
Open source intelligence
 
What is Open Source Intelligence (OSINT)
What is Open Source Intelligence (OSINT)What is Open Source Intelligence (OSINT)
What is Open Source Intelligence (OSINT)
 
osint - open source Intelligence
osint - open source Intelligenceosint - open source Intelligence
osint - open source Intelligence
 
OSINT
OSINTOSINT
OSINT
 
Osint {open source intelligence }
Osint {open source intelligence }Osint {open source intelligence }
Osint {open source intelligence }
 
Threat hunting - Every day is hunting season
Threat hunting - Every day is hunting seasonThreat hunting - Every day is hunting season
Threat hunting - Every day is hunting season
 
From OSINT to Phishing presentation
From OSINT to Phishing presentationFrom OSINT to Phishing presentation
From OSINT to Phishing presentation
 
OSINT with Practical: Real Life Examples
OSINT with Practical: Real Life ExamplesOSINT with Practical: Real Life Examples
OSINT with Practical: Real Life Examples
 
How to Use Open Source Intelligence (OSINT) in Investigations
How to Use Open Source Intelligence (OSINT) in InvestigationsHow to Use Open Source Intelligence (OSINT) in Investigations
How to Use Open Source Intelligence (OSINT) in Investigations
 
Threat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-onThreat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-on
 
OSINT 2.0 - Past, present and future
OSINT 2.0  - Past, present and futureOSINT 2.0  - Past, present and future
OSINT 2.0 - Past, present and future
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
 
Threat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep SinghThreat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep Singh
 
Effective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat IntelligenceEffective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat Intelligence
 
OSINT for Proactive Defense - RootConf 2019
OSINT for Proactive Defense - RootConf 2019OSINT for Proactive Defense - RootConf 2019
OSINT for Proactive Defense - RootConf 2019
 
Getting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigationsGetting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigations
 

Similar a Discover Valuable Employee Data and Infrastructure for Offensive OSINT

Empowering red and blue teams with osint c0c0n 2017
Empowering red and blue teams with osint   c0c0n 2017Empowering red and blue teams with osint   c0c0n 2017
Empowering red and blue teams with osint c0c0n 2017reconvillage
 
How Can Analytics Improve Business?
How Can Analytics Improve Business?How Can Analytics Improve Business?
How Can Analytics Improve Business?Inside Analysis
 
RDBMS to Graph Webinar
RDBMS to Graph WebinarRDBMS to Graph Webinar
RDBMS to Graph WebinarNeo4j
 
Public private-cloud
Public private-cloudPublic private-cloud
Public private-cloudJamie Taylor
 
Technical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvertTechnical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvertISSA LA
 
AI, ML and Graph Algorithms: Real Life Use Cases with Neo4j
AI, ML and Graph Algorithms: Real Life Use Cases with Neo4jAI, ML and Graph Algorithms: Real Life Use Cases with Neo4j
AI, ML and Graph Algorithms: Real Life Use Cases with Neo4jIvan Zoratti
 
Rapid Data Exploration With Hadoop
Rapid Data Exploration With HadoopRapid Data Exploration With Hadoop
Rapid Data Exploration With HadoopPeter Skomoroch
 
Thinkful - Intro to Data Science - Washington DC
Thinkful - Intro to Data Science - Washington DCThinkful - Intro to Data Science - Washington DC
Thinkful - Intro to Data Science - Washington DCTJ Stalcup
 
A fresh new look into Information Gathering - OWASP Spain
A fresh new look into Information Gathering - OWASP SpainA fresh new look into Information Gathering - OWASP Spain
A fresh new look into Information Gathering - OWASP SpainChristian Martorella
 
Data Infused Product Design and Insights at LinkedIn
Data Infused Product Design and Insights at LinkedInData Infused Product Design and Insights at LinkedIn
Data Infused Product Design and Insights at LinkedInYael Garten
 
Thinkful DC - Intro to Data Science
Thinkful DC - Intro to Data Science Thinkful DC - Intro to Data Science
Thinkful DC - Intro to Data Science TJ Stalcup
 
OSINT Basics for Threat Hunters and Practitioners
OSINT Basics for Threat Hunters and PractitionersOSINT Basics for Threat Hunters and Practitioners
OSINT Basics for Threat Hunters and PractitionersMegan DeBlois
 
Agile data science
Agile data scienceAgile data science
Agile data scienceJoel Horwitz
 
2017 06-14-getting started with data science
2017 06-14-getting started with data science2017 06-14-getting started with data science
2017 06-14-getting started with data scienceThinkful
 
Apache Spark GraphX & GraphFrame Synthetic ID Fraud Use Case
Apache Spark GraphX & GraphFrame Synthetic ID Fraud Use CaseApache Spark GraphX & GraphFrame Synthetic ID Fraud Use Case
Apache Spark GraphX & GraphFrame Synthetic ID Fraud Use CaseMo Patel
 
Graph Thinking: Why it Matters
Graph Thinking: Why it MattersGraph Thinking: Why it Matters
Graph Thinking: Why it MattersNeo4j
 
People, process, platform, presented by Adam Singer
People, process, platform, presented by Adam SingerPeople, process, platform, presented by Adam Singer
People, process, platform, presented by Adam SingerSocialMedia.org
 
Patternbuilders Founder Showcase Deck
Patternbuilders Founder Showcase DeckPatternbuilders Founder Showcase Deck
Patternbuilders Founder Showcase DeckMaryLudloff
 
Building Effective Frameworks for Social Media Analysis
Building Effective Frameworks for Social Media AnalysisBuilding Effective Frameworks for Social Media Analysis
Building Effective Frameworks for Social Media Analysisikanow
 

Similar a Discover Valuable Employee Data and Infrastructure for Offensive OSINT (20)

Empowering red and blue teams with osint c0c0n 2017
Empowering red and blue teams with osint   c0c0n 2017Empowering red and blue teams with osint   c0c0n 2017
Empowering red and blue teams with osint c0c0n 2017
 
How Can Analytics Improve Business?
How Can Analytics Improve Business?How Can Analytics Improve Business?
How Can Analytics Improve Business?
 
RDBMS to Graph Webinar
RDBMS to Graph WebinarRDBMS to Graph Webinar
RDBMS to Graph Webinar
 
Public private-cloud
Public private-cloudPublic private-cloud
Public private-cloud
 
Technical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvertTechnical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvert
 
AI, ML and Graph Algorithms: Real Life Use Cases with Neo4j
AI, ML and Graph Algorithms: Real Life Use Cases with Neo4jAI, ML and Graph Algorithms: Real Life Use Cases with Neo4j
AI, ML and Graph Algorithms: Real Life Use Cases with Neo4j
 
Rapid Data Exploration With Hadoop
Rapid Data Exploration With HadoopRapid Data Exploration With Hadoop
Rapid Data Exploration With Hadoop
 
Thinkful - Intro to Data Science - Washington DC
Thinkful - Intro to Data Science - Washington DCThinkful - Intro to Data Science - Washington DC
Thinkful - Intro to Data Science - Washington DC
 
A fresh new look into Information Gathering - OWASP Spain
A fresh new look into Information Gathering - OWASP SpainA fresh new look into Information Gathering - OWASP Spain
A fresh new look into Information Gathering - OWASP Spain
 
Data Infused Product Design and Insights at LinkedIn
Data Infused Product Design and Insights at LinkedInData Infused Product Design and Insights at LinkedIn
Data Infused Product Design and Insights at LinkedIn
 
Thinkful DC - Intro to Data Science
Thinkful DC - Intro to Data Science Thinkful DC - Intro to Data Science
Thinkful DC - Intro to Data Science
 
OSINT Basics for Threat Hunters and Practitioners
OSINT Basics for Threat Hunters and PractitionersOSINT Basics for Threat Hunters and Practitioners
OSINT Basics for Threat Hunters and Practitioners
 
A6 big data_in_the_cloud
A6 big data_in_the_cloudA6 big data_in_the_cloud
A6 big data_in_the_cloud
 
Agile data science
Agile data scienceAgile data science
Agile data science
 
2017 06-14-getting started with data science
2017 06-14-getting started with data science2017 06-14-getting started with data science
2017 06-14-getting started with data science
 
Apache Spark GraphX & GraphFrame Synthetic ID Fraud Use Case
Apache Spark GraphX & GraphFrame Synthetic ID Fraud Use CaseApache Spark GraphX & GraphFrame Synthetic ID Fraud Use Case
Apache Spark GraphX & GraphFrame Synthetic ID Fraud Use Case
 
Graph Thinking: Why it Matters
Graph Thinking: Why it MattersGraph Thinking: Why it Matters
Graph Thinking: Why it Matters
 
People, process, platform, presented by Adam Singer
People, process, platform, presented by Adam SingerPeople, process, platform, presented by Adam Singer
People, process, platform, presented by Adam Singer
 
Patternbuilders Founder Showcase Deck
Patternbuilders Founder Showcase DeckPatternbuilders Founder Showcase Deck
Patternbuilders Founder Showcase Deck
 
Building Effective Frameworks for Social Media Analysis
Building Effective Frameworks for Social Media AnalysisBuilding Effective Frameworks for Social Media Analysis
Building Effective Frameworks for Social Media Analysis
 

Más de Christian Martorella

A journey into Application Security
A journey into Application SecurityA journey into Application Security
A journey into Application SecurityChristian Martorella
 
Playing in a Satellite environment
Playing in a Satellite environmentPlaying in a Satellite environment
Playing in a Satellite environmentChristian Martorella
 
2011 and still bruteforcing - OWASP Spain
2011 and still bruteforcing - OWASP Spain2011 and still bruteforcing - OWASP Spain
2011 and still bruteforcing - OWASP SpainChristian Martorella
 
All your data are belong to us - FIST Conference 2007
All your data are belong to us - FIST Conference 2007All your data are belong to us - FIST Conference 2007
All your data are belong to us - FIST Conference 2007Christian Martorella
 
Principales vulnerabilidades en Aplicaciones Web - Rediris 2008
Principales vulnerabilidades en Aplicaciones Web - Rediris 2008Principales vulnerabilidades en Aplicaciones Web - Rediris 2008
Principales vulnerabilidades en Aplicaciones Web - Rediris 2008Christian Martorella
 

Más de Christian Martorella (8)

A journey into Application Security
A journey into Application SecurityA journey into Application Security
A journey into Application Security
 
Python for Penetration testers
Python for Penetration testersPython for Penetration testers
Python for Penetration testers
 
Playing in a Satellite environment
Playing in a Satellite environmentPlaying in a Satellite environment
Playing in a Satellite environment
 
Wfuzz for Penetration Testers
Wfuzz for Penetration TestersWfuzz for Penetration Testers
Wfuzz for Penetration Testers
 
2011 and still bruteforcing - OWASP Spain
2011 and still bruteforcing - OWASP Spain2011 and still bruteforcing - OWASP Spain
2011 and still bruteforcing - OWASP Spain
 
All your data are belong to us - FIST Conference 2007
All your data are belong to us - FIST Conference 2007All your data are belong to us - FIST Conference 2007
All your data are belong to us - FIST Conference 2007
 
Principales vulnerabilidades en Aplicaciones Web - Rediris 2008
Principales vulnerabilidades en Aplicaciones Web - Rediris 2008Principales vulnerabilidades en Aplicaciones Web - Rediris 2008
Principales vulnerabilidades en Aplicaciones Web - Rediris 2008
 
Tactical Information Gathering
Tactical Information GatheringTactical Information Gathering
Tactical Information Gathering
 

Último

Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
SEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization SpecialistSEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization SpecialistKHM Anwar
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...sonatiwari757
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Standkumarajju5765
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445ruhi
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
horny (9316020077 ) Goa Call Girls Service by VIP Call Girls in Goa
horny (9316020077 ) Goa  Call Girls Service by VIP Call Girls in Goahorny (9316020077 ) Goa  Call Girls Service by VIP Call Girls in Goa
horny (9316020077 ) Goa Call Girls Service by VIP Call Girls in Goasexy call girls service in goa
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 

Último (20)

Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
SEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization SpecialistSEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization Specialist
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Call Girls In Noida 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In Noida 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In Noida 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In Noida 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
horny (9316020077 ) Goa Call Girls Service by VIP Call Girls in Goa
horny (9316020077 ) Goa  Call Girls Service by VIP Call Girls in Goahorny (9316020077 ) Goa  Call Girls Service by VIP Call Girls in Goa
horny (9316020077 ) Goa Call Girls Service by VIP Call Girls in Goa
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 

Discover Valuable Employee Data and Infrastructure for Offensive OSINT

  • 2. About me Chris&an  Martorella:   –  I  work  in  Skype  (MS),  Product  Security  team   –  Founder  of  Edge-­‐security.com   –  Developed  open  source  projects  like  theHarvester,   Metagoofil,  Wfuzz  and  Webslayer   –  Presented  in  many  Security  conferences  (Blackhat  Arsenal,   Hack.lu,  WhaNheHack,  OWASP,  Source)   –  Over  12  years  focusing  on  offensive  security    
  • 3. Disclaimer Any views or opinions presented in this presentation are solely those of the author and do not necessarily represent those of the employer
  • 4. OSINT - Intro Open-­‐source  intelligence  (OSINT)  is  intelligence   collected  from  publicly  available  sources.   •  “Open"  refers  to  overt,  publicly  available  sources   (as  opposed  to  covert  or  clandes&ne  sources)   •  It  is  not  related  to  open-­‐source  soUware  or   public  intelligence.  
  • 5. OSINT       What  is  Threat  Intelligence  /  Cyber   Intelligence  ?  
  • 6. OSINT PROCESS Source Identification Data harvesting Data Analysis Data processing and Integration Results Delivery
  • 13. Offensive vs. Defensive OSINT From  the  security  perspec&ve  we  can  separate   OSINT:     Offensive:  Gathering  informa&on  before  an   aNack.     Defensive:  Learning  about  aNacks  against  the   company  
  • 14. Offensive OSINT •  Finding  as  much  informa&on  as  possible  that   will  facilitate  the  aNack   •  S&ll  now,  many  Penetra&on  Tes&ng   companies  skip  this  phase   •  ANackers  usually  spend  more  &me  than   testers  on  this  phase  
  • 15. Typical Pentesting Methodology I.G Scan Enumerate Exploit Post- Exploit Cover Tracks Write report
  • 16. What everyone focus on: I.G   Scan     Enumera te   Exploit   Post-­‐ Exploit   Cover   Tracks   Write   report  
  • 17. Attacker Methodology Discover  what  makes   the  company  money   Discover  what  is   valuable  to  the   aNacker   Do  whatever  it   takes...   Steal  it   Informa&on  Gathering  
  • 19. Data Harvesting A.K.A:   •  Informa:on  Gathering:   The  act  of  collec&ng  informa&on     •  Foot  prin:ng:     Is  the  technique  of  gathering  informa&on  about   computer  systems  and  the  en&&es  they  belong  to.     •  Web  mining:     The  act  of  collec&ng  informa&on  from  the  web        
  • 20. Data Harvesting – How? Techniques:     •  Scraping  (raw)   •  Open  APIs   •  Commercial  APIS   •  Network  Scanning   •  Purchasing  data   •  Open  source  Data  sets   •  Databases   •  Logfiles    
  • 21.
  • 22. Data  Harves&ng    -­‐  Passive  vs  Ac&ve   •  Passive  data  harves:ng:  Our  ac&ons  can’t  be   detected  by  the  target  (Non  aNribu&on)   •  Ac:ve  data  harves:ng:  our  ac&ons  leave   traces  that  can  be  detected  by  the  target  
  • 24. Offensive OSINT – end goals •  Phishing     •  Social  Engineering   •  Denial  of  Services   •  Password  brute  force  aNacks   •  Target  infiltra&on    
  • 25. What  data is interesting? Emails Users / Employees names -Interests -People relationships -Alias      
  • 26. Emails •  PGP  servers   •  Search  engines   •  Whois    
  • 27. Employees / Usernames / Alias linkedin.com   jigsaw.com   people123.com   pipl.com   peekyou.com   Google  Finance  /  Etc.     Usernamecheck.com   checkusernames.com     Glassdoor.com   Hoovers.com   Corpwatch.org   intelius.com  
  • 30. •  Employees  of  a  company   •  Profile  picture   •  Special&es   •  Role   •  Country   •  Emails  
  • 31. Linkedin   Simon  LongboNom   Simon.LongboNom@amazon.com     Product  defini&on,  proposi&on  research,  pricing,   product  marke&ng,  product  promo&on,  market   research,  new  product  introduc&on     pictureUrl':  'hNp://m.c.lnkd.licdn.com/mpr/mprz/’}  
  • 34.   GRAPH  SEARCH:     “People  who  work  at  Amazon.com”     “People  who  work  at  Amazon.com  and  live  in   SeaNle  Washington”  
  • 35. @google.  News  and  updates  from  Google.  Mountain   @googlenexus.  Phones  and  tablets  from  Google   @GoogleDoodles   @googlewmc.  News  and  resources  from   @googleindia   @GoogleChat.  Twee&ng  about  all  things  Google   @googleaccess.  The  official  TwiNer   @googleglass.  Geing  technology  out  of  the  way.   @googlenonprofit.  News  and  updates  from   @googlewallet.  News   @googlereader.  News   @googlefiber   @googleio.  Google   @googledevs  for  updates.  San  Francisco   @GoogleIO  for  ...  If  you   @GoogleMsia.  Official  Google  Malaysia  on  TwiNer.  Kuala   @googlejobs.  Have  you  heard  we   @googleapps.  Google  Apps  news  for  ISVs   @GooglePlay.  Music   @GoogleAtWork.  The  official  TwiNer  home  of   Google  Enterprise.  Mountain  View   @FaktaGoogle.  Googling  Random  Facts.  Don   @googlemobileads.  Official  Google  Mobile   @googlepoli&cs.  Trends   @ericschmidt.  Execu&ve  Chairman   @GoogleMobile.  News   @googledownunder.  Google  Australia  and   @AdSense.  News  and  updates  from  the  Google   AdSense   @googlecalendar.  The  official  TwiNer  home  of   @googledevs.  News  about  and  from   @googlenews.  Breaking  news   @GoogleB2BTeam.   @GoogleB2BTeam  Google   @Jus&nCutroni   Google  query:  site:twiNer.com  in&tle:"on  TwiNer"   ”Google"    
  • 37. Geo-location •  People  loca&on   •  Servers  loca&on   •  Wireless  AP  loca&on      
  • 38. Geo-location Social  media  posts   Foursquare   Pictures   TwiNer   Facebook    
  • 40. Images Reverse  image  search   Face  iden&fica&on   Exif  Metadata  analysis:    Profile  pictures    ANachments      
  • 42.
  • 44. Infrastructure Internet  Census  project   Whois   ServerSniff   Jobsites   Search  engines   ShodanHQ    
  • 45. Infrastructure     •  Once  we  have  iden&fied  the  Infrastructure   components,  what  can  we  do?  
  • 47.
  • 49. INDICATORS OF COMPROMISE (IOC) IP addresses Domains URLs Hashes Stolen Passwords
  • 50. IOC Collec&ve  Intelligence  Framework  sources  (70)   Abuse.CH   Shadowserver.org   Nothink.org   Virustotal.com   Malwr   Seculert  
  • 51. DATA LEAKS   Pastebin.com     @pastebindorks     Pastebin  clones    
  • 52.
  • 53. Infrastructure •     DNS   o  Bruteforce   o  Zone  Transfer   •  SMTP   o  Header  analysis   o  Vrfy,  expn   •  Web  sites   o  Hidden  files  /  directories  bruteforce   •  Network  scanning   •  Metadata  
  • 54. Metadata   •  Office  documents   •  Openoffice  documents   •  PDF  documents     •  Images  EXIF  metadata   •  Others     Metadata:  is  data  about  data.             Is  used  to  facilitate  the  understanding,  use  and  management   of  data.    
  • 55. Cat Schwartz - Tech TV
  • 56. Washington Post Botmaster location exposed by the Washington Post SLUG: mag/hacker! DATE: 12/19/2005! PHOTOGRAPHER: Sarah L. Voisin/TWP! id#: LOCATION: Roland, OK! CAPTION:! PICTURED: Canon Canon EOS 20D! Adobe Photoshop CS2 Macintosh 2006:02:16 15:44:49 Sarah L. Voisin! There are only 1.500 males in Roland Oklahoma
  • 60.
  • 61. INFORMATION GATHERING TOOLS •  FOCA   •  Spiderfoot   •  Tapir   •  Creepy   •  theHarvester   •  Metagoofil    
  • 62. This  tool  is  intended  to  help  Penetra&on  testers  in  the  early   stages  of  the  penetra&on  test  in  order  to  understand  the   customer  footprint  on  the  Internet.       It  is  also  useful  for  anyone  that  wants  to  know  what  an  aNacker   can  see  about  their  organiza&on  and  reduce  exposure  of  the   company.    
  • 63.  -­‐  Sources                google                                                  googleCSE                                                  bing                                                  bingapi                                                  pgp                                                  linkedin                people123                                                  jigsaw                                                  twiNer                                                  GooglePlus                shodanhq                                                     •  Open  source  soUware   •  Command  line     •  Extendable  
  • 64.
  • 65.
  • 66. •  python  theHarvester.py  -­‐d  lacaixa.es  -­‐b   googleCSE  -­‐l  500  -­‐v  -­‐h  
  • 67. - Intelligence Implement  en&&es   Cross  reference  en&&es   Image  reverse  search  /  profile  pictures   Geo-­‐loca&on   Iden&fy  vulnerable  services   Username  search  in  other  services   Target  priori&za&on    
  • 68. Challenges •  Source  availability    (APIs)   •  Changes  in  Terms  of  Use   •  Genera&ng  valid  intelligence  
  • 69. ? TwiNer:  @laramies   Email:  cmartorellaW@edge-­‐security.com