SlideShare a Scribd company logo
1 of 15
MALTEGO
ONE OF THE BEST “OSINT” TOOL
WHAT IS MALTEGO?
• Open Source Intelligence (OSINT) gathering tools
• Used fot reconnaissance (Information gathering) and data-mining
• Maltego is a unique platform developed to deliver a clear threat picture to the
environment that an organization owns and operates.
• Maltego’s unique advantage is to demonstrate the complexity of single points of
failure as well as trust relationships that exist currently within the scope of your
infrastructure.
• Reconnaissance on any person, by scraping up data from all publicly available
areas of the Internets.
TERMS: ENTITIES
• The type of entity (e.g. Website) defines what transforms can be run against
• Any Building block of graphs
• Eg:
• Website
• Phrase
• E-mail address
• Social Network
TERMS: TRANSFORMS
• Take starting entities and run code on it
• It result the data in other entity
• In other word the transforms means the processing on the data according to the
our requirement.
• Two type:
• Local Transforms
• Remote Transforms
TERMS: MACHINE
• Set of transforms and action to be
performed on the entities
• Machine and run the predefined task
on the entity and fetch the result in
graphical form
• We can create our own machine by
using some programming language
such as python
DISCLAIMER
• Crawl “Damage”: Unclear what “damage” may occur from transforms (but
some crawls may be working correctly)
• Sample of a Disclaimer: “Please note this transform is being run on the
Paterva Transform Distribution Server and has been written by the user
'Andrew MacPherson'. This transform will be run on * and Paterva cannot be
held responsible for any damage caused by this transform, you run this AT
YOUR OWN RISK. For more information on this transform feel free to
contact…”
WHY USE MALTEGO?
• People’s online relationships can identify an unknown node based on the
connections, power relationships, intercommunications, and the external
identities
• People have used their realworld identities in their virtual world
• Used for the analysis of the footprint
• All online actions can be linked to geographical locations, and those locations
may be revealing
• Results are well represented in a variety of easy to understand views
• Maltego identifies key relationships between data sets and identifies previously
unknown relationships between them
BASIC FEATURES OF MALTEGO
• Shows links between people; groups of people (social networks); companies;
organizations; web sites; internet infrastructure (domain, DNS names, netblocks,
IP addresses); phrases; affiliations; documents and files
• Based on open-source (publicly available) information or “open-source intelligence”
(OSINT)
• Does not involve the breaking of network controls to access information
• Assumes benign information in isolation may be turned malicious in combination and
/ or relationship to other data (as in “big data” analytics)
• Is a “dual use” technology with a range of applied “data harvesting” / structure-
mining / datamining and analytical uses
TYPE OF MACHINE ON MALTEGO
• Company Stalker: Email addresses at a company’s domain(s)
• Footprint L1: “Fast” and limited footprint of a domain
• Footprint L2: “Mild” and semi-limited footprint of a domain
• Footprint L3: “Intense” and fairly in-depth and internal footprint of a domain
• Person- Email Address: Identifies a person’s email addresses (but needs a
disambiguated or fairly uncommon name…or the data is noisy)
• Prune Leaf Entities: Prunes all leaves (entities with no outgoing links and just
one incoming link—aka pendant nodes) to clear the screen for re-crawls (and to
de-noise the data
TYPE OF MACHINE
• Twitter Digger: Phrase as a Twitter search
• Twitter Geo(graphical) Location: Finding a person’s location based on multiple
information streams
• Twitter Monitor: Monitors Twitter for hashtags (#) and named entities
mentioned (@)
• URL to Network and Domain Information: From URL to network and domain
information
NODE LEVEL TRANSFORM
• Devices
• A phone, mobile device, or other
used by the individual or
connected to various accounts or
a network
• Infrastructure
• AS – Autonomous System
Number (as assigned by IANA to
RIRs)
• DNS Name – Domain Name
System (identification string)
• Domain – Internet Domain
• IPv4 Address – IP version 4
address
• MX Record – DNS mail exchanger
record (indicator of mail server
accepting email messages and how
email should be routed through
SMTP)
• NS Record – A DNS name server
record (with indicators of
subdomains)
• Netblock – An internet autonomous
system
• URL – An internet Uniform Resource
Locator (web address as a character
sting)
• Website – An internet website
(related web pages served from a
single domain)
NODE LEVEL TRANSFORM
• Locations
• A location on Earth (to find
domains and other such
information)
• Penetration (“Pen”) Testing
• Company
• Social Network
• Facebook Object
• Twit entity
• Affiliation – Facebook
• Affiliation – Twitter
• Personal
• Alias
• Document
• Email Address
• Image (EXIF or “Exchangeable Image
File” data extraction: geotagged
data, GPS, and general image
conditions information like digital
camera settings)
• Person
• Phone Number
• Phrase
DEMO
THANK YOU

More Related Content

What's hot

Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)Sudhanshu Chauhan
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence pptKumar Gaurav
 
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky
 
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...Sam Bowne
 
Open source intelligence
Open source intelligenceOpen source intelligence
Open source intelligencebalakumaran779
 
Managing & Showing Value during Red Team Engagements & Purple Team Exercises ...
Managing & Showing Value during Red Team Engagements & Purple Team Exercises ...Managing & Showing Value during Red Team Engagements & Purple Team Exercises ...
Managing & Showing Value during Red Team Engagements & Purple Team Exercises ...Jorge Orchilles
 
Building a Cyber Threat Intelligence Knowledge Management System (Paris Augus...
Building a Cyber Threat Intelligence Knowledge Management System (Paris Augus...Building a Cyber Threat Intelligence Knowledge Management System (Paris Augus...
Building a Cyber Threat Intelligence Knowledge Management System (Paris Augus...Vaticle
 
Network Forensics Intro
Network Forensics IntroNetwork Forensics Intro
Network Forensics IntroJake K.
 
Bsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat HuntingBsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat HuntingDhruv Majumdar
 
How to Normalize Threat Intelligence Data from Multiple Sources - Tech Talk T...
How to Normalize Threat Intelligence Data from Multiple Sources - Tech Talk T...How to Normalize Threat Intelligence Data from Multiple Sources - Tech Talk T...
How to Normalize Threat Intelligence Data from Multiple Sources - Tech Talk T...AlienVault
 
Ethical hacking - Footprinting.pptx
Ethical hacking - Footprinting.pptxEthical hacking - Footprinting.pptx
Ethical hacking - Footprinting.pptxNargis Parveen
 
osint - open source Intelligence
osint - open source Intelligenceosint - open source Intelligence
osint - open source IntelligenceOsama Ellahi
 
8.8 Las Vegas - Adversary Emulation con C2 Matrix
8.8 Las Vegas - Adversary Emulation con C2 Matrix8.8 Las Vegas - Adversary Emulation con C2 Matrix
8.8 Las Vegas - Adversary Emulation con C2 MatrixJorge Orchilles
 
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITREMITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITREMITRE - ATT&CKcon
 
Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic pptSuchita Rawat
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKINGSHERALI445
 
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...MITRE - ATT&CKcon
 

What's hot (20)

Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence ppt
 
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
 
Dark Web Forensics
Dark Web Forensics Dark Web Forensics
Dark Web Forensics
 
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
 
Open source intelligence
Open source intelligenceOpen source intelligence
Open source intelligence
 
Managing & Showing Value during Red Team Engagements & Purple Team Exercises ...
Managing & Showing Value during Red Team Engagements & Purple Team Exercises ...Managing & Showing Value during Red Team Engagements & Purple Team Exercises ...
Managing & Showing Value during Red Team Engagements & Purple Team Exercises ...
 
Building a Cyber Threat Intelligence Knowledge Management System (Paris Augus...
Building a Cyber Threat Intelligence Knowledge Management System (Paris Augus...Building a Cyber Threat Intelligence Knowledge Management System (Paris Augus...
Building a Cyber Threat Intelligence Knowledge Management System (Paris Augus...
 
Network Forensics Intro
Network Forensics IntroNetwork Forensics Intro
Network Forensics Intro
 
Bsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat HuntingBsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat Hunting
 
How to Normalize Threat Intelligence Data from Multiple Sources - Tech Talk T...
How to Normalize Threat Intelligence Data from Multiple Sources - Tech Talk T...How to Normalize Threat Intelligence Data from Multiple Sources - Tech Talk T...
How to Normalize Threat Intelligence Data from Multiple Sources - Tech Talk T...
 
Ethical hacking - Footprinting.pptx
Ethical hacking - Footprinting.pptxEthical hacking - Footprinting.pptx
Ethical hacking - Footprinting.pptx
 
osint - open source Intelligence
osint - open source Intelligenceosint - open source Intelligence
osint - open source Intelligence
 
8.8 Las Vegas - Adversary Emulation con C2 Matrix
8.8 Las Vegas - Adversary Emulation con C2 Matrix8.8 Las Vegas - Adversary Emulation con C2 Matrix
8.8 Las Vegas - Adversary Emulation con C2 Matrix
 
Offensive OSINT
Offensive OSINTOffensive OSINT
Offensive OSINT
 
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITREMITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic ppt
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
 

Similar to Basics of Maltego

Network Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptxNetwork Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptxtalkaton
 
Network Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdfNetwork Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdftalkaton
 
Big Data Analytics Tokyo
Big Data Analytics TokyoBig Data Analytics Tokyo
Big Data Analytics TokyoAdam Gibson
 
Cyber Security Project Presentation : Essential Reconnaissance Tools and Tech...
Cyber Security Project Presentation : Essential Reconnaissance Tools and Tech...Cyber Security Project Presentation : Essential Reconnaissance Tools and Tech...
Cyber Security Project Presentation : Essential Reconnaissance Tools and Tech...Boston Institute of Analytics
 
Network traffic analysis with cyber security
Network traffic analysis with cyber securityNetwork traffic analysis with cyber security
Network traffic analysis with cyber securityKAMALI PRIYA P
 
Maltego Radium Mapping Network Ties and Identities across the Internet
Maltego Radium Mapping Network Ties and Identities across the InternetMaltego Radium Mapping Network Ties and Identities across the Internet
Maltego Radium Mapping Network Ties and Identities across the InternetShalin Hai-Jew
 
E-Commerce: Challenges and Issues
E-Commerce: Challenges and IssuesE-Commerce: Challenges and Issues
E-Commerce: Challenges and IssuesDr. Prashant Vats
 
Tor network seminar by 13504
Tor network seminar  by 13504 Tor network seminar  by 13504
Tor network seminar by 13504 Prashant Rana
 
Barsamian alexander-identifying-network-users
Barsamian alexander-identifying-network-usersBarsamian alexander-identifying-network-users
Barsamian alexander-identifying-network-usersProQSys
 
Network security monitoring elastic webinar - 16 june 2021
Network security monitoring   elastic webinar - 16 june 2021Network security monitoring   elastic webinar - 16 june 2021
Network security monitoring elastic webinar - 16 june 2021Mouaz Alnouri
 
Linux tools for data recovery and reporting
Linux tools for data recovery and reportingLinux tools for data recovery and reporting
Linux tools for data recovery and reportingsaddamhusain hadimani
 
BlueHat v17 || Dyre to Trickbot: An Inside Look at TLS-Encrypted Command-And-...
BlueHat v17 || Dyre to Trickbot: An Inside Look at TLS-Encrypted Command-And-...BlueHat v17 || Dyre to Trickbot: An Inside Look at TLS-Encrypted Command-And-...
BlueHat v17 || Dyre to Trickbot: An Inside Look at TLS-Encrypted Command-And-...BlueHat Security Conference
 
Security Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxSecurity Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxAmardeepKumar621436
 
Onion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and AnonymityOnion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and Anonymityanurag singh
 
RESPOND TO THIS DISCUSSION POST BASED ON THE TOPIC Compare and co.docx
RESPOND TO THIS DISCUSSION POST BASED ON THE TOPIC Compare and co.docxRESPOND TO THIS DISCUSSION POST BASED ON THE TOPIC Compare and co.docx
RESPOND TO THIS DISCUSSION POST BASED ON THE TOPIC Compare and co.docxinfantkimber
 
Internet and Information Technology (IT)
Internet and Information Technology (IT)Internet and Information Technology (IT)
Internet and Information Technology (IT)Amber Bhaumik
 

Similar to Basics of Maltego (20)

Maltego
MaltegoMaltego
Maltego
 
Forensic tools
Forensic toolsForensic tools
Forensic tools
 
Network Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptxNetwork Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptx
 
Network Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdfNetwork Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdf
 
Big Data Analytics Tokyo
Big Data Analytics TokyoBig Data Analytics Tokyo
Big Data Analytics Tokyo
 
Cyber Security Project Presentation : Essential Reconnaissance Tools and Tech...
Cyber Security Project Presentation : Essential Reconnaissance Tools and Tech...Cyber Security Project Presentation : Essential Reconnaissance Tools and Tech...
Cyber Security Project Presentation : Essential Reconnaissance Tools and Tech...
 
Network traffic analysis with cyber security
Network traffic analysis with cyber securityNetwork traffic analysis with cyber security
Network traffic analysis with cyber security
 
Osint
OsintOsint
Osint
 
Maltego Radium Mapping Network Ties and Identities across the Internet
Maltego Radium Mapping Network Ties and Identities across the InternetMaltego Radium Mapping Network Ties and Identities across the Internet
Maltego Radium Mapping Network Ties and Identities across the Internet
 
E-Commerce: Challenges and Issues
E-Commerce: Challenges and IssuesE-Commerce: Challenges and Issues
E-Commerce: Challenges and Issues
 
TOR NETWORK
TOR NETWORKTOR NETWORK
TOR NETWORK
 
Tor network seminar by 13504
Tor network seminar  by 13504 Tor network seminar  by 13504
Tor network seminar by 13504
 
Barsamian alexander-identifying-network-users
Barsamian alexander-identifying-network-usersBarsamian alexander-identifying-network-users
Barsamian alexander-identifying-network-users
 
Network security monitoring elastic webinar - 16 june 2021
Network security monitoring   elastic webinar - 16 june 2021Network security monitoring   elastic webinar - 16 june 2021
Network security monitoring elastic webinar - 16 june 2021
 
Linux tools for data recovery and reporting
Linux tools for data recovery and reportingLinux tools for data recovery and reporting
Linux tools for data recovery and reporting
 
BlueHat v17 || Dyre to Trickbot: An Inside Look at TLS-Encrypted Command-And-...
BlueHat v17 || Dyre to Trickbot: An Inside Look at TLS-Encrypted Command-And-...BlueHat v17 || Dyre to Trickbot: An Inside Look at TLS-Encrypted Command-And-...
BlueHat v17 || Dyre to Trickbot: An Inside Look at TLS-Encrypted Command-And-...
 
Security Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxSecurity Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptx
 
Onion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and AnonymityOnion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and Anonymity
 
RESPOND TO THIS DISCUSSION POST BASED ON THE TOPIC Compare and co.docx
RESPOND TO THIS DISCUSSION POST BASED ON THE TOPIC Compare and co.docxRESPOND TO THIS DISCUSSION POST BASED ON THE TOPIC Compare and co.docx
RESPOND TO THIS DISCUSSION POST BASED ON THE TOPIC Compare and co.docx
 
Internet and Information Technology (IT)
Internet and Information Technology (IT)Internet and Information Technology (IT)
Internet and Information Technology (IT)
 

Recently uploaded

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 

Recently uploaded (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 

Basics of Maltego

  • 1. MALTEGO ONE OF THE BEST “OSINT” TOOL
  • 2. WHAT IS MALTEGO? • Open Source Intelligence (OSINT) gathering tools • Used fot reconnaissance (Information gathering) and data-mining • Maltego is a unique platform developed to deliver a clear threat picture to the environment that an organization owns and operates. • Maltego’s unique advantage is to demonstrate the complexity of single points of failure as well as trust relationships that exist currently within the scope of your infrastructure. • Reconnaissance on any person, by scraping up data from all publicly available areas of the Internets.
  • 3. TERMS: ENTITIES • The type of entity (e.g. Website) defines what transforms can be run against • Any Building block of graphs • Eg: • Website • Phrase • E-mail address • Social Network
  • 4. TERMS: TRANSFORMS • Take starting entities and run code on it • It result the data in other entity • In other word the transforms means the processing on the data according to the our requirement. • Two type: • Local Transforms • Remote Transforms
  • 5. TERMS: MACHINE • Set of transforms and action to be performed on the entities • Machine and run the predefined task on the entity and fetch the result in graphical form • We can create our own machine by using some programming language such as python
  • 6. DISCLAIMER • Crawl “Damage”: Unclear what “damage” may occur from transforms (but some crawls may be working correctly) • Sample of a Disclaimer: “Please note this transform is being run on the Paterva Transform Distribution Server and has been written by the user 'Andrew MacPherson'. This transform will be run on * and Paterva cannot be held responsible for any damage caused by this transform, you run this AT YOUR OWN RISK. For more information on this transform feel free to contact…”
  • 7. WHY USE MALTEGO? • People’s online relationships can identify an unknown node based on the connections, power relationships, intercommunications, and the external identities • People have used their realworld identities in their virtual world • Used for the analysis of the footprint • All online actions can be linked to geographical locations, and those locations may be revealing • Results are well represented in a variety of easy to understand views • Maltego identifies key relationships between data sets and identifies previously unknown relationships between them
  • 8. BASIC FEATURES OF MALTEGO • Shows links between people; groups of people (social networks); companies; organizations; web sites; internet infrastructure (domain, DNS names, netblocks, IP addresses); phrases; affiliations; documents and files • Based on open-source (publicly available) information or “open-source intelligence” (OSINT) • Does not involve the breaking of network controls to access information • Assumes benign information in isolation may be turned malicious in combination and / or relationship to other data (as in “big data” analytics) • Is a “dual use” technology with a range of applied “data harvesting” / structure- mining / datamining and analytical uses
  • 9.
  • 10. TYPE OF MACHINE ON MALTEGO • Company Stalker: Email addresses at a company’s domain(s) • Footprint L1: “Fast” and limited footprint of a domain • Footprint L2: “Mild” and semi-limited footprint of a domain • Footprint L3: “Intense” and fairly in-depth and internal footprint of a domain • Person- Email Address: Identifies a person’s email addresses (but needs a disambiguated or fairly uncommon name…or the data is noisy) • Prune Leaf Entities: Prunes all leaves (entities with no outgoing links and just one incoming link—aka pendant nodes) to clear the screen for re-crawls (and to de-noise the data
  • 11. TYPE OF MACHINE • Twitter Digger: Phrase as a Twitter search • Twitter Geo(graphical) Location: Finding a person’s location based on multiple information streams • Twitter Monitor: Monitors Twitter for hashtags (#) and named entities mentioned (@) • URL to Network and Domain Information: From URL to network and domain information
  • 12. NODE LEVEL TRANSFORM • Devices • A phone, mobile device, or other used by the individual or connected to various accounts or a network • Infrastructure • AS – Autonomous System Number (as assigned by IANA to RIRs) • DNS Name – Domain Name System (identification string) • Domain – Internet Domain • IPv4 Address – IP version 4 address • MX Record – DNS mail exchanger record (indicator of mail server accepting email messages and how email should be routed through SMTP) • NS Record – A DNS name server record (with indicators of subdomains) • Netblock – An internet autonomous system • URL – An internet Uniform Resource Locator (web address as a character sting) • Website – An internet website (related web pages served from a single domain)
  • 13. NODE LEVEL TRANSFORM • Locations • A location on Earth (to find domains and other such information) • Penetration (“Pen”) Testing • Company • Social Network • Facebook Object • Twit entity • Affiliation – Facebook • Affiliation – Twitter • Personal • Alias • Document • Email Address • Image (EXIF or “Exchangeable Image File” data extraction: geotagged data, GPS, and general image conditions information like digital camera settings) • Person • Phone Number • Phrase
  • 14. DEMO