SlideShare une entreprise Scribd logo
1  sur  22
Information Gathering
Prepared By : Mr. Abhijeet A. More
OWNER OF PERFECT TRAINING CENTER
Information Gathering
Information Gathering
 Information gathering refers to gathering information

about the issue you‟re facing and the ways other
organizations and communities have addressed it

 You can gather information using both existing sources

and natural examples
Information Gathering
 Synthesis here refers to analyzing what you‟ve learned

from your information gathering, and constructing a
coherent program or approach by taking ideas from a
number of sources and putting them together to create
something that meets the needs of the community and
population you‟re working with
 Synthesis involves extracting the functional elements of
both the analysis of the issue and approaches to it
 Functional elements are those that are indispensable either
to understanding the issue, or to implementing a particular
program
Why gather information?
 It will help you avoid reinventing the wheel.
 It will help you to gain a deep understanding of the issue






so that you can address it properly.
You need all the tools possible to create the best program
you can.
It‟s likely that most solutions aren‟t one size fits all.
It can help you ensure your program is culturally sensitive.
Knowing what‟s been done in a variety of other
circumstances and understanding the issue from a number
of different viewpoints may give you new insights and new
ideas for your program.
Information Gathering Tools
Maltego
www.paterva.com
Maltego is an intelligence and forensics application. It
allows for the mining and gathering of information as well
as the representation of this information in a meaningful
way.
What is Maltego?
 Maltego is a unique platform developed to deliver a clear

threat picture to the environment that an organization
owns and operates

 Maltego‟s unique advantage is to demonstrate the

complexity and severity of single points of failure as well as
trust relationships that exist currently within the scope of
your infrastructure
About Maltego
 Maltego is an intelligence and forensics application. It

allows for the mining and gathering of information as well
as the representation of this information in a meaningful
way.
 Coupled with its graphing libraries Maltego allows us to
identify previously unknown relationships between
information, persons and information about persons.
 As such, it is a useful tool in the IT security field to map an
organization's people and relationships. A valuable aid in
exploring the social-engineering attack vector in pentesting investigations.
Tools
 Nmap (Network Mapper) is a security scanner originally

written by Gordon Lyonused to discover hosts and services on
a computer network, thus creating a "map" of the network. To
accomplish its goal, Nmap sends specially crafted packets to
the target host and then analyzes the responses, etc.
NMAP
NMAP Objective
 Find open TCP and/or UDP listeners on a single or range of

TCP/IP Addresses

 Find out software versions
 Find out operating system type
 Don‟t get caught doing it
 Learn what you have on your network
Is Nmap the best tool?
 Yes it is
 Long history of development and support

 Active user base, used in many products
 Continuous development and improvements
 “Industry Standard” port scanner
 It‟s free, open and well documented.
 Stay current! (4.00 as of this doc)
History of Nmap
 First released September 1, 1997 in Phrack 51 “The Art of









Portscanning”
http://www.insecure.org/nmap/p51-11.txt
Many updates since then:
OS Detection (Phrack 54)
Idle scanning
Version scanning
ARP Scanning
Host Discovery
 TCP SYN Probe (-PS<portlist>)
 TCP ACK Probe (-PA<portlist>)

 UDP Probe (-PU<portlist>)
 ICMP Echo Request/Ping (-PE)
 ICMP Timestamp Requset (-PP)
 ICMP Netmask Request (-PM)
 ARP Probes (-PR)
Most valuable TCP „ping‟ Ports?

 80 (HTTP)
 25 (SMTP)
 22 (SSH)
 443 (HTTPS)
 21 (FTP)
 113 (AUTH)
 23 (TELNET)
 53 (DNS)

 554 (RTSP)
 1723 (PPTP)
TCP SYN or ACK Probes?
 Send both!

 Purpose is to find hosts that are up
 We do not care whether the port is active yet
Most valuable UDP “Ping” Port
 Pick a high numbered one

 Anything that responds with ICMP is up
 Most things respond with ICMP
Most Valuable ICMP “Ping” Types
 Echo Request (-PE)


…plus either Timestamp (-PP)



…or Netmask (-PM)
ARP Ping Probing
 Useful only on same subnet

 VERY reliable and much faster
 Sends raw ethernet ARP requests
 Automatically used if host/network is on the local subnet
 Unless --send-ip option specified
Intense Discovery!
 # nmap –sP –PE –PP –PS21,22,23,25,80,113,21339




–PA80,113,443,10042 –source-port 53 –n
–T4 –iR 10000

 [ … lots of IPs … ]
 Host a.b.c.d appears to be up.
 Host w.x.y.z appears to be up.
 Nmap finished: 10000 IP addresses (699 hosts up) scanned

in 2016.564 seconds
Tools
 Whois Lookup

 www.dnsstuff.com
 www.centralops.net
Thank you!!

Contenu connexe

Tendances

Operating system &utility program
Operating system &utility programOperating system &utility program
Operating system &utility programDhani Ahmad
 
Reconnaissance & Scanning
Reconnaissance & ScanningReconnaissance & Scanning
Reconnaissance & Scanningamiable_indian
 
Linux operating system - Overview
Linux operating system - OverviewLinux operating system - Overview
Linux operating system - OverviewAshita Agrawal
 
Steps of-creating-a-database
Steps of-creating-a-databaseSteps of-creating-a-database
Steps of-creating-a-databaseAIMS Education
 
System Analysis and Design
System Analysis and DesignSystem Analysis and Design
System Analysis and DesignAamir Abbas
 
Open Source Software
Open Source Software Open Source Software
Open Source Software Ali Yavari
 
Elements of information system
Elements of information systemElements of information system
Elements of information systemsamina khan
 
Information Management
Information ManagementInformation Management
Information ManagementNadeem Raza
 
Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1MLG College of Learning, Inc
 
Information Management Life Cycle
Information Management Life CycleInformation Management Life Cycle
Information Management Life CycleCollabor8now Ltd
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.muhammad-Sulaiman
 
OSINT with Practical: Real Life Examples
OSINT with Practical: Real Life ExamplesOSINT with Practical: Real Life Examples
OSINT with Practical: Real Life ExamplesSyedAmoz
 
Malicious software
Malicious softwareMalicious software
Malicious softwaremsdeepika
 
Tcpip services and applications
Tcpip services and applicationsTcpip services and applications
Tcpip services and applicationsOnline
 

Tendances (20)

Operating system &utility program
Operating system &utility programOperating system &utility program
Operating system &utility program
 
Reconnaissance & Scanning
Reconnaissance & ScanningReconnaissance & Scanning
Reconnaissance & Scanning
 
Linux operating system - Overview
Linux operating system - OverviewLinux operating system - Overview
Linux operating system - Overview
 
Anti virus
Anti virusAnti virus
Anti virus
 
Steps of-creating-a-database
Steps of-creating-a-databaseSteps of-creating-a-database
Steps of-creating-a-database
 
System Analysis and Design
System Analysis and DesignSystem Analysis and Design
System Analysis and Design
 
Open Source Software
Open Source Software Open Source Software
Open Source Software
 
Malware ppt
Malware pptMalware ppt
Malware ppt
 
Incident response process
Incident response processIncident response process
Incident response process
 
Elements of information system
Elements of information systemElements of information system
Elements of information system
 
Information Management
Information ManagementInformation Management
Information Management
 
Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1
 
Information Management Life Cycle
Information Management Life CycleInformation Management Life Cycle
Information Management Life Cycle
 
Open source software
Open source softwareOpen source software
Open source software
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
 
Types of research
Types of researchTypes of research
Types of research
 
OSINT with Practical: Real Life Examples
OSINT with Practical: Real Life ExamplesOSINT with Practical: Real Life Examples
OSINT with Practical: Real Life Examples
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Tcpip services and applications
Tcpip services and applicationsTcpip services and applications
Tcpip services and applications
 
Field research
Field researchField research
Field research
 

Similaire à Information gathering

Threat Hunting with Splunk
Threat Hunting with Splunk Threat Hunting with Splunk
Threat Hunting with Splunk Splunk
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with SplunkSplunk
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with SplunkSplunk
 
Forensic Analysis - Empower Tech Days 2013
Forensic Analysis - Empower Tech Days 2013Forensic Analysis - Empower Tech Days 2013
Forensic Analysis - Empower Tech Days 2013Islam Azeddine Mennouchi
 
Open Source Information Gathering Brucon Edition
Open Source Information Gathering Brucon EditionOpen Source Information Gathering Brucon Edition
Open Source Information Gathering Brucon EditionChris Gates
 
technical-information-gathering-slides.pdf
technical-information-gathering-slides.pdftechnical-information-gathering-slides.pdf
technical-information-gathering-slides.pdfMarceloCunha571649
 
Infosecurity Europe 2016: Operationalizing Threat Intelligence
Infosecurity Europe 2016: Operationalizing Threat IntelligenceInfosecurity Europe 2016: Operationalizing Threat Intelligence
Infosecurity Europe 2016: Operationalizing Threat IntelligenceSplunk
 
Network Vulnerability and Patching
Network Vulnerability and PatchingNetwork Vulnerability and Patching
Network Vulnerability and PatchingEmmanuel Udeagha B.
 
Filar seymour oreilly_bot_story_
Filar seymour oreilly_bot_story_Filar seymour oreilly_bot_story_
Filar seymour oreilly_bot_story_EndgameInc
 
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?festival ICT 2016
 
Classification with R
Classification with RClassification with R
Classification with RNajima Begum
 
Network Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain EssayNetwork Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain EssayKaren Oliver
 
Building a Security Information and Event Management platform at Travis Per...
 	Building a Security Information and Event Management platform at Travis Per... 	Building a Security Information and Event Management platform at Travis Per...
Building a Security Information and Event Management platform at Travis Per...Splunk
 
Ethical hacking at warp speed
Ethical hacking at warp speedEthical hacking at warp speed
Ethical hacking at warp speedSreejith.D. Menon
 
Final project.ppt
Final project.pptFinal project.ppt
Final project.pptshreyng
 
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxINTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxSuhailShaik16
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleGregory Hanis
 

Similaire à Information gathering (20)

Threat Hunting with Splunk
Threat Hunting with Splunk Threat Hunting with Splunk
Threat Hunting with Splunk
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with Splunk
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with Splunk
 
Forensic Analysis - Empower Tech Days 2013
Forensic Analysis - Empower Tech Days 2013Forensic Analysis - Empower Tech Days 2013
Forensic Analysis - Empower Tech Days 2013
 
Open Source Information Gathering Brucon Edition
Open Source Information Gathering Brucon EditionOpen Source Information Gathering Brucon Edition
Open Source Information Gathering Brucon Edition
 
technical-information-gathering-slides.pdf
technical-information-gathering-slides.pdftechnical-information-gathering-slides.pdf
technical-information-gathering-slides.pdf
 
Infosecurity Europe 2016: Operationalizing Threat Intelligence
Infosecurity Europe 2016: Operationalizing Threat IntelligenceInfosecurity Europe 2016: Operationalizing Threat Intelligence
Infosecurity Europe 2016: Operationalizing Threat Intelligence
 
Network Vulnerability and Patching
Network Vulnerability and PatchingNetwork Vulnerability and Patching
Network Vulnerability and Patching
 
Filar seymour oreilly_bot_story_
Filar seymour oreilly_bot_story_Filar seymour oreilly_bot_story_
Filar seymour oreilly_bot_story_
 
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
 
Ready set hack
Ready set hackReady set hack
Ready set hack
 
Classification with R
Classification with RClassification with R
Classification with R
 
Network Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain EssayNetwork Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain Essay
 
Building a Security Information and Event Management platform at Travis Per...
 	Building a Security Information and Event Management platform at Travis Per... 	Building a Security Information and Event Management platform at Travis Per...
Building a Security Information and Event Management platform at Travis Per...
 
Ethical hacking at warp speed
Ethical hacking at warp speedEthical hacking at warp speed
Ethical hacking at warp speed
 
Final project.ppt
Final project.pptFinal project.ppt
Final project.ppt
 
Security Handbook
 Security Handbook Security Handbook
Security Handbook
 
OS Fingerprinting
OS FingerprintingOS Fingerprinting
OS Fingerprinting
 
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxINTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security Simple
 

Plus de Perfect Training Center (8)

Basics of networking and routing
Basics of networking and routingBasics of networking and routing
Basics of networking and routing
 
Network security
Network securityNetwork security
Network security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cryptography make easy
Cryptography make easyCryptography make easy
Cryptography make easy
 
Basic cryptography
Basic cryptographyBasic cryptography
Basic cryptography
 
Career option for BCA Student
Career option for BCA StudentCareer option for BCA Student
Career option for BCA Student
 
Basics of network
Basics of networkBasics of network
Basics of network
 
Stegnography
StegnographyStegnography
Stegnography
 

Dernier

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 

Dernier (20)

Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 

Information gathering

  • 1. Information Gathering Prepared By : Mr. Abhijeet A. More OWNER OF PERFECT TRAINING CENTER
  • 3. Information Gathering  Information gathering refers to gathering information about the issue you‟re facing and the ways other organizations and communities have addressed it  You can gather information using both existing sources and natural examples
  • 4. Information Gathering  Synthesis here refers to analyzing what you‟ve learned from your information gathering, and constructing a coherent program or approach by taking ideas from a number of sources and putting them together to create something that meets the needs of the community and population you‟re working with  Synthesis involves extracting the functional elements of both the analysis of the issue and approaches to it  Functional elements are those that are indispensable either to understanding the issue, or to implementing a particular program
  • 5. Why gather information?  It will help you avoid reinventing the wheel.  It will help you to gain a deep understanding of the issue     so that you can address it properly. You need all the tools possible to create the best program you can. It‟s likely that most solutions aren‟t one size fits all. It can help you ensure your program is culturally sensitive. Knowing what‟s been done in a variety of other circumstances and understanding the issue from a number of different viewpoints may give you new insights and new ideas for your program.
  • 6. Information Gathering Tools Maltego www.paterva.com Maltego is an intelligence and forensics application. It allows for the mining and gathering of information as well as the representation of this information in a meaningful way.
  • 7. What is Maltego?  Maltego is a unique platform developed to deliver a clear threat picture to the environment that an organization owns and operates  Maltego‟s unique advantage is to demonstrate the complexity and severity of single points of failure as well as trust relationships that exist currently within the scope of your infrastructure
  • 8. About Maltego  Maltego is an intelligence and forensics application. It allows for the mining and gathering of information as well as the representation of this information in a meaningful way.  Coupled with its graphing libraries Maltego allows us to identify previously unknown relationships between information, persons and information about persons.  As such, it is a useful tool in the IT security field to map an organization's people and relationships. A valuable aid in exploring the social-engineering attack vector in pentesting investigations.
  • 9. Tools  Nmap (Network Mapper) is a security scanner originally written by Gordon Lyonused to discover hosts and services on a computer network, thus creating a "map" of the network. To accomplish its goal, Nmap sends specially crafted packets to the target host and then analyzes the responses, etc.
  • 10. NMAP
  • 11. NMAP Objective  Find open TCP and/or UDP listeners on a single or range of TCP/IP Addresses  Find out software versions  Find out operating system type  Don‟t get caught doing it  Learn what you have on your network
  • 12. Is Nmap the best tool?  Yes it is  Long history of development and support  Active user base, used in many products  Continuous development and improvements  “Industry Standard” port scanner  It‟s free, open and well documented.  Stay current! (4.00 as of this doc)
  • 13. History of Nmap  First released September 1, 1997 in Phrack 51 “The Art of       Portscanning” http://www.insecure.org/nmap/p51-11.txt Many updates since then: OS Detection (Phrack 54) Idle scanning Version scanning ARP Scanning
  • 14. Host Discovery  TCP SYN Probe (-PS<portlist>)  TCP ACK Probe (-PA<portlist>)  UDP Probe (-PU<portlist>)  ICMP Echo Request/Ping (-PE)  ICMP Timestamp Requset (-PP)  ICMP Netmask Request (-PM)  ARP Probes (-PR)
  • 15. Most valuable TCP „ping‟ Ports?  80 (HTTP)  25 (SMTP)  22 (SSH)  443 (HTTPS)  21 (FTP)  113 (AUTH)  23 (TELNET)  53 (DNS)  554 (RTSP)  1723 (PPTP)
  • 16. TCP SYN or ACK Probes?  Send both!  Purpose is to find hosts that are up  We do not care whether the port is active yet
  • 17. Most valuable UDP “Ping” Port  Pick a high numbered one  Anything that responds with ICMP is up  Most things respond with ICMP
  • 18. Most Valuable ICMP “Ping” Types  Echo Request (-PE)  …plus either Timestamp (-PP)  …or Netmask (-PM)
  • 19. ARP Ping Probing  Useful only on same subnet  VERY reliable and much faster  Sends raw ethernet ARP requests  Automatically used if host/network is on the local subnet  Unless --send-ip option specified
  • 20. Intense Discovery!  # nmap –sP –PE –PP –PS21,22,23,25,80,113,21339   –PA80,113,443,10042 –source-port 53 –n –T4 –iR 10000  [ … lots of IPs … ]  Host a.b.c.d appears to be up.  Host w.x.y.z appears to be up.  Nmap finished: 10000 IP addresses (699 hosts up) scanned in 2016.564 seconds
  • 21. Tools  Whois Lookup  www.dnsstuff.com  www.centralops.net