2. • Have you ever wondered how someone sitting miles
away is able to easily penetrate an organization’s
network?
• How someone who has never had legitimate access to
a network can learn more about that organization than
most of its own employees?
• It’s actually pretty easy, given the right skill set and
a lot of patience.
• I know cyberwarfare isn’t a new thing, but it’s still
impressive to think that someone on the other side of
the globe, a few continents away, is able to wreak so
much havoc.
Why OSINT
3. Uncovering Discrimination Refining Delivery
Open Source Intelligence is a form of intelligence
collection management that involves finding, selecting
and acquiring information from publicly available
sources and analysing it to produce actionable
intelligence.
4. OSINT is not actively used by many
PenTesters
But, then you get a real Pentest and
you apply everything – Physical
Security, Phishing, OSINT
And, Sometimes you are not a
PenTester.You are an Investigator.
SoYou Are a
PenTester!!
9. • EXIF Data Viewers
• Cyberstalking Tools
• Whois, IP Lookup and
Website Analysis
• Geo-LocationTools
• GHDB
• Recorded Future
• Specialized OSINTTools
• Search Engines
• Social Media
• Image,Video and
Multimedia Search
• LanguageTools
• Online Communities
• People, Phone Number
and Company Finder
• Wikis
OSINT Resources
11. • Firefox Plugin
• It does not query the domain directly. In fact it looks up all the
public databases for gathering as much information as possible
about the target.
• Passive Recon passively provides whois information, MX records,
DNS information, and other useful data.
• Significantly, due to the passive nature
of Passive Recon, the owner of the
domain you are querying is not alerted.
OSINTTools – PassiveRecon
13. • www.paterva.com
• Maltego provides you with a graphical interface that makes seeing
these relationships instant and accurate – making it possible to
see hidden connections.
• Java client app, can run local/remote
• Great data analysis capabilities
• Good Integration /API /TAS/TDS
• Entity -> Transform -> Entities
OSINTTools - Maltego
14. GeoStalker
Takes
• Location(Address or Coordinates)
Retrieves Location Data From
• Wigle.net (Wireless DB)
• Instagram
• Twitter
• Foursquare
• Flickr
Provides
• Wireless access-points nearby
• Photos taken at that location
• Social Media accounts of people
who have visited
FBStalker
Takes
• Facebook user profile
Uses Graph Search to Reverse
• Friends
• Likes
• Check-ins
• Comments
Provides
• Social EngineeringTargets
• Associates of those Targets
• Interests, CommonlyVisited
Places
New Developments
15. Information Brokers Big Data AnalyticsTools
Storm and Kafta
Drill and Dremel
R
Gremlin and Giraph
SAP Hana
D3
BackCheck
Infochimps
LexisNexis
Axciom
Choicepoint
Discreet Data
MasterFiles
Intelius
Future Belongs to Big Data
18. • OSINT is more than gathering flippin data manually
• Know what attackers know about you
• Use OSINT for Corporate Security and BI
• Data brokers are helpful but not controlled
• Big data gives new avenues to OSINT and some
problems too
Takeaways
Swiss army knife internet tool, because of it’s verstality.
Maltego can be used for the information gathering phase of all security related work. It will save you time and will allow you to work more accurately and smarter.
Maltego aids you in your thinking process by visually demonstrating interconnected links between searched items.
Maltego provide you with a much more powerful search, giving you smarter results.
If access to "hidden" information determines your success, Maltego can help you discover it.
Storm is a “distributed real-time computation system”. Storm does for real-time processing what Hadoop did for batch processing. Kafka for its part is a messaging system developed at LinkedIn to serve as the foundation for their activity stream and the data processing pipeline behind it.
When paired together, you get the stream, you get it in-real time, and you get it at linear scale. With Storm and Kafka, you can conduct stream processing at linear scale, assured that every message gets processed in real-time, reliably. In tandem, Storm and Kafka can handle data velocities of tens of thousands of messages every second.
Drill is the open source version of what Google is doing with Dremel. make large-scale, ad-hoc querying of data possible, with radically lower latencies that are especially apt for data exploration. They make it possible to scan over petabytes of data in seconds, to answer ad hoc queries. It’s all about the speed!
R is an open source statistical programming language. It is incredibly powerful. Also, R works very well with Hadoop, making it an ideal part of an integrated Big Data approach.
Graphs do a great job of modeling computer networks, and social networks, too — anything that links data together. Another common use is mapping, and geographic pathways — calculating shortest routes for example, from place A to place B (or to return to the social case, tracing the proximity of stated relationships from person A to person B).
D3 is a javascript document visualization library that revolutionizes how powerfully and creatively we can visualize information, and make data truly interactive.