SlideShare a Scribd company logo
1 of 32
Download to read offline
Leveraging OSINT
         in
Penetration Testing


   By: Ashish Mistry
#whoami
●   Ashish Mistry
●   Individual infosec researcher & trainer
●   www.Hcon.in
●   HconSTF open source security framework
●   Hcon Library initiative
●   Contact :
        –   Fb : Root.hcon
        –   Tw : @hconmedia
OSINT – Open Source
            INTelligence

●   It is NOT related to open source software
●   It is NOT related to open source licenses
●   It is NOT related to artificial intelligence
What Is OSINT ?
Wikipedia :
“Open-source intelligence (OSINT) is a
form of intelligence collection management
that involves finding, selecting, and
acquiring information from publicly
available sources and analyzing it to
produce actionable intelligence”
What is OSINT ?
   Publicly available information


 Select / Collecting and storing it


Analysis and relating and filtering it


 More target specific information
             ATTACKS
Why OSINT works ?
Humans are social beings
we love to share information
We share information that we are
     not suppose to share
Sometime it is necessary to give out
      that much information
So what is the problem ??
internet
Why OSINT for pentesting ?
Some things to consider
●   Passive (most of it)
●   Legally provides much larger and wider
    view towards the target company / person
●   Uncovers more attack surface
●   Narrow downs many attack vectors
●   Helps when you don't have 0days
●   More specific social engineering attack
    vector can be crafted
●   Helps in other steps in a pentest
Leveraging OSINT
●   Reconnaissance
●   Vulnerability analysis
●   Privilege escalation
●   Social engineering/ profiling people
Reconnaissance
●   We can have information like
       –   OS
       –   IP
       –   Software / Versions
       –   Geo location
From :
●   Metadata :
        –   Foca , metagoofil , maltego, exiftool
●   Online sites :
        –   Shodanhq, Serversniff, netcraft,centralops
●   Dns/who is info
●   FF extensions
        –   wappalyzer
        –   Passive recon
Vulnerability analysis
●   Path discloser
●   Footholds
●   Web Server Detection
●   Vulnerable Files
●   Vulnerable Servers
●   Error Messages
●   Network or vulnerability data
●   Various Online Devices
●   Advisories and Vulnerabilities
●   XSS / LFI / RFI
from
●   Dorks : sitedigger , search diggity, seat
        –   GHDB
        –   BHDB
        –   FSHDB
        –   Web = sqli / Lfi / Rfi / Wordpress
●   FF extension:
        –   Meta generator version check
●   Metadata
●   http://www.1337day.com/webapps
Privilege escalation
We can have potential
●   User names
●   Passwords
●   Login panels
for more useful & accurate wordlist
generation
From ?
●   Metadata :
        –   Foca , metagoofil , maltego
●   Emails :
        –   Theharvester , esearchy
●   Public profiling information
        –   Social media
                ●   Phone numbers
                ●   Family member names
                ●   Birth dates
From cont..
●   Dorks :
        –   Files containing usernames
        –   Files containing passwords
        –   Files containing juicy info
        –   Pages containing login portals
●   Wordlist generation :
        –   wyd , cupp, crunch
Social engineering
             / profiling people
●   All kind of personal and professional info
        –   Names - dob
        –   Residence address
        –   Phone no.
        –   Emails
        –   Close associates / friends
        –   Interest / hobbies
        –   Pictures
From ?
●   People lookup databases
●   Social networks
●   Local yellow pages
●   Mtnl / bsnl tele. Dir
●   Public mobile info. services
What can we have from OSINT ?
●   Email addresses
●   Phone numbers
●   User names / password
●   OS info
●   IP info
●   Softwares / version
●   Geo location
●   Personal details
●   vulnerabilities
tools
●   Foca , metagoofil, exiftool, wyd
●   Theharvester, esearchy
●   FF extentions
        –   Pasive recon, meta generator,
             wappalyzer, exiftool
●   Sitedigger, seat, search diggity
●   Creepy, fbpwn
●   Maltego , netglub
Online resources
●   Netcraft, centralops, shodanhq, serversniff
●   Ghdb
●   foca online, regex.info/exif.cgi
●   http://tineye.com , http://picfog.com
●   https://twitpic.com/search ,http://www.pixsy.com/
●   Flickr Photo Search
    http://www.flickr.com/search/?
    s=rec&w=all&q=comapny name&m=text
Online resources cont...
●   document search:
        –   Docstoc http://www.docstoc.com/
        –   Scribd http://www.scribd.com/
        –   SlideShare http://www.slideshare.net/
        –   PDF Search Engine http://www.pdf-
             search-engine.com/
        –   Toodoc http://www.toodoc.com/
        –   google filetype:
Online resources cont...
●   Check Usernames:
        –   http://www.checkusernames.com/
        –   http://knowem.com/ ,www.namechk.com
        –   http://webmii.com/
●   People search
        –   123people
        –   Pipl
        –   openbook
Online resources cont...
●   Geo location
       –   Infosnipper
       –   http://twittermap.appspot.com
       –   http://www.geobytes.com/iplocator.htm
Prevention / counter measures
●   Policies for social networks
        –   Hr , pr , marketing
●   Sanitize documents
        –   Remove metadata
                ●   Metadata anonymizing toolkit – MAT
                ●   Oometa extractor , Doc scrubber
                ●   Exiftool
                ●   openDLP , myDLP
●   Websites
        –   Block UA , dir, custom error msg
Thank you

Questions ??

More Related Content

What's hot

Owasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudiniOwasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudiniAdam Nurudini
 
OSINT Black Magic: Listen who whispers your name in the dark!!!
OSINT Black Magic: Listen who whispers your name in the dark!!!OSINT Black Magic: Listen who whispers your name in the dark!!!
OSINT Black Magic: Listen who whispers your name in the dark!!!Nutan Kumar Panda
 
Open source intelligence
Open source intelligenceOpen source intelligence
Open source intelligencebalakumaran779
 
osint - open source Intelligence
osint - open source Intelligenceosint - open source Intelligence
osint - open source IntelligenceOsama Ellahi
 
Nmapper theHarvester OSINT Tool explanation
Nmapper theHarvester OSINT Tool explanationNmapper theHarvester OSINT Tool explanation
Nmapper theHarvester OSINT Tool explanationWangolo Joel
 
OSINT using Twitter & Python
OSINT using Twitter & PythonOSINT using Twitter & Python
OSINT using Twitter & Python37point2
 
Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)phexcom1
 
OSINT mindset to protect your organization - Null monthly meet version
OSINT mindset to protect your organization - Null monthly meet versionOSINT mindset to protect your organization - Null monthly meet version
OSINT mindset to protect your organization - Null monthly meet versionChandrapal Badshah
 
Osint overview 26 mar 2015
Osint overview  26 mar 2015Osint overview  26 mar 2015
Osint overview 26 mar 2015Mats Björe
 
Osint, shoelaces, bubblegum
Osint, shoelaces, bubblegumOsint, shoelaces, bubblegum
Osint, shoelaces, bubblegumJamieMcMurray
 
Practical White Hat Hacker Training - Passive Information Gathering(OSINT)
Practical White Hat Hacker Training -  Passive Information Gathering(OSINT)Practical White Hat Hacker Training -  Passive Information Gathering(OSINT)
Practical White Hat Hacker Training - Passive Information Gathering(OSINT)PRISMA CSI
 
Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)Sudhanshu Chauhan
 
OSINT tools for security auditing [FOSDEM edition]
OSINT tools for security auditing [FOSDEM edition] OSINT tools for security auditing [FOSDEM edition]
OSINT tools for security auditing [FOSDEM edition] Jose Manuel Ortega Candel
 
Datasploit - An Open Source Intelligence Tool
Datasploit - An Open Source Intelligence ToolDatasploit - An Open Source Intelligence Tool
Datasploit - An Open Source Intelligence ToolShubham Mittal
 
OSINT Basics for Threat Hunters and Practitioners
OSINT Basics for Threat Hunters and PractitionersOSINT Basics for Threat Hunters and Practitioners
OSINT Basics for Threat Hunters and PractitionersMegan DeBlois
 
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...Falgun Rathod
 

What's hot (20)

Offensive OSINT
Offensive OSINTOffensive OSINT
Offensive OSINT
 
Owasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudiniOwasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudini
 
OSINT Black Magic: Listen who whispers your name in the dark!!!
OSINT Black Magic: Listen who whispers your name in the dark!!!OSINT Black Magic: Listen who whispers your name in the dark!!!
OSINT Black Magic: Listen who whispers your name in the dark!!!
 
Open source intelligence
Open source intelligenceOpen source intelligence
Open source intelligence
 
Osint
OsintOsint
Osint
 
osint - open source Intelligence
osint - open source Intelligenceosint - open source Intelligence
osint - open source Intelligence
 
From OSINT to Phishing presentation
From OSINT to Phishing presentationFrom OSINT to Phishing presentation
From OSINT to Phishing presentation
 
Nmapper theHarvester OSINT Tool explanation
Nmapper theHarvester OSINT Tool explanationNmapper theHarvester OSINT Tool explanation
Nmapper theHarvester OSINT Tool explanation
 
OSINT using Twitter & Python
OSINT using Twitter & PythonOSINT using Twitter & Python
OSINT using Twitter & Python
 
Osint primer
Osint primerOsint primer
Osint primer
 
Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)
 
OSINT mindset to protect your organization - Null monthly meet version
OSINT mindset to protect your organization - Null monthly meet versionOSINT mindset to protect your organization - Null monthly meet version
OSINT mindset to protect your organization - Null monthly meet version
 
Osint overview 26 mar 2015
Osint overview  26 mar 2015Osint overview  26 mar 2015
Osint overview 26 mar 2015
 
Osint, shoelaces, bubblegum
Osint, shoelaces, bubblegumOsint, shoelaces, bubblegum
Osint, shoelaces, bubblegum
 
Practical White Hat Hacker Training - Passive Information Gathering(OSINT)
Practical White Hat Hacker Training -  Passive Information Gathering(OSINT)Practical White Hat Hacker Training -  Passive Information Gathering(OSINT)
Practical White Hat Hacker Training - Passive Information Gathering(OSINT)
 
Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)
 
OSINT tools for security auditing [FOSDEM edition]
OSINT tools for security auditing [FOSDEM edition] OSINT tools for security auditing [FOSDEM edition]
OSINT tools for security auditing [FOSDEM edition]
 
Datasploit - An Open Source Intelligence Tool
Datasploit - An Open Source Intelligence ToolDatasploit - An Open Source Intelligence Tool
Datasploit - An Open Source Intelligence Tool
 
OSINT Basics for Threat Hunters and Practitioners
OSINT Basics for Threat Hunters and PractitionersOSINT Basics for Threat Hunters and Practitioners
OSINT Basics for Threat Hunters and Practitioners
 
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
 

Viewers also liked

20070317 Osint Presentation
20070317 Osint Presentation20070317 Osint Presentation
20070317 Osint PresentationMats Björe
 
What you need to know about OSINT
What you need to know about OSINTWhat you need to know about OSINT
What you need to know about OSINTJerod Brennen
 
Put Numbers 2Work: Data-driven recruiting (3B)
Put Numbers 2Work: Data-driven recruiting  (3B)Put Numbers 2Work: Data-driven recruiting  (3B)
Put Numbers 2Work: Data-driven recruiting (3B)Jobvite
 
Projeto Venda Brasil e Plano Futuro
Projeto Venda Brasil e Plano FuturoProjeto Venda Brasil e Plano Futuro
Projeto Venda Brasil e Plano Futurosheskrock
 
Resumen prensa Encuentro candidaturas unidad popular
Resumen prensa Encuentro candidaturas unidad popularResumen prensa Encuentro candidaturas unidad popular
Resumen prensa Encuentro candidaturas unidad popularmiciudadreal
 
Angel Day 2013 - Lean Startup: How to get business value earlier with less risks
Angel Day 2013 - Lean Startup: How to get business value earlier with less risksAngel Day 2013 - Lean Startup: How to get business value earlier with less risks
Angel Day 2013 - Lean Startup: How to get business value earlier with less riskspragmatic solutions gmbh
 
Lares from LOW to PWNED
Lares from LOW to PWNEDLares from LOW to PWNED
Lares from LOW to PWNEDChris Gates
 
Markengeschichte im Überblick: von der Industrialisierung zur Digitalisierung
Markengeschichte im Überblick: von der Industrialisierung zur DigitalisierungMarkengeschichte im Überblick: von der Industrialisierung zur Digitalisierung
Markengeschichte im Überblick: von der Industrialisierung zur DigitalisierungTWT
 
World Music by Americo Baptista
World Music by Americo BaptistaWorld Music by Americo Baptista
World Music by Americo BaptistaAmerico Baptista
 
Eurosint Forum Presentation
Eurosint Forum PresentationEurosint Forum Presentation
Eurosint Forum PresentationAxel Dyevre
 
TakeDownCon Rocket City: “White Hat Anonymity”: Current challenges security r...
TakeDownCon Rocket City: “White Hat Anonymity”: Current challenges security r...TakeDownCon Rocket City: “White Hat Anonymity”: Current challenges security r...
TakeDownCon Rocket City: “White Hat Anonymity”: Current challenges security r...EC-Council
 
Boletín de noticias riet n° 6 – noviembre 2015
Boletín de noticias riet n° 6 – noviembre 2015Boletín de noticias riet n° 6 – noviembre 2015
Boletín de noticias riet n° 6 – noviembre 2015RIET_INEW
 
Gates Toorcon X New School Information Gathering
Gates Toorcon X New School Information GatheringGates Toorcon X New School Information Gathering
Gates Toorcon X New School Information GatheringChris Gates
 
Competitive Intelligence Abu Dhabi UAE
Competitive Intelligence Abu Dhabi UAECompetitive Intelligence Abu Dhabi UAE
Competitive Intelligence Abu Dhabi UAEKHALID DALIL
 
Nato osint reader final 11 oct02
Nato osint reader final 11 oct02Nato osint reader final 11 oct02
Nato osint reader final 11 oct02Steph Cliche
 
Deriving Intelligence from Open Source Information
Deriving Intelligence from Open Source InformationDeriving Intelligence from Open Source Information
Deriving Intelligence from Open Source InformationAdrianPBTaylor
 
CiT Seesion 6 gesamt
CiT Seesion 6 gesamtCiT Seesion 6 gesamt
CiT Seesion 6 gesamtbfnd
 

Viewers also liked (20)

20070317 Osint Presentation
20070317 Osint Presentation20070317 Osint Presentation
20070317 Osint Presentation
 
What you need to know about OSINT
What you need to know about OSINTWhat you need to know about OSINT
What you need to know about OSINT
 
Put Numbers 2Work: Data-driven recruiting (3B)
Put Numbers 2Work: Data-driven recruiting  (3B)Put Numbers 2Work: Data-driven recruiting  (3B)
Put Numbers 2Work: Data-driven recruiting (3B)
 
Deportes Urbanos: Skate 1
Deportes Urbanos: Skate 1Deportes Urbanos: Skate 1
Deportes Urbanos: Skate 1
 
Projeto Venda Brasil e Plano Futuro
Projeto Venda Brasil e Plano FuturoProjeto Venda Brasil e Plano Futuro
Projeto Venda Brasil e Plano Futuro
 
LibreOffice Magazine 05
LibreOffice Magazine 05LibreOffice Magazine 05
LibreOffice Magazine 05
 
Resumen prensa Encuentro candidaturas unidad popular
Resumen prensa Encuentro candidaturas unidad popularResumen prensa Encuentro candidaturas unidad popular
Resumen prensa Encuentro candidaturas unidad popular
 
Angel Day 2013 - Lean Startup: How to get business value earlier with less risks
Angel Day 2013 - Lean Startup: How to get business value earlier with less risksAngel Day 2013 - Lean Startup: How to get business value earlier with less risks
Angel Day 2013 - Lean Startup: How to get business value earlier with less risks
 
Lares from LOW to PWNED
Lares from LOW to PWNEDLares from LOW to PWNED
Lares from LOW to PWNED
 
Markengeschichte im Überblick: von der Industrialisierung zur Digitalisierung
Markengeschichte im Überblick: von der Industrialisierung zur DigitalisierungMarkengeschichte im Überblick: von der Industrialisierung zur Digitalisierung
Markengeschichte im Überblick: von der Industrialisierung zur Digitalisierung
 
OtterBox for HTC ONE
OtterBox for HTC ONEOtterBox for HTC ONE
OtterBox for HTC ONE
 
World Music by Americo Baptista
World Music by Americo BaptistaWorld Music by Americo Baptista
World Music by Americo Baptista
 
Eurosint Forum Presentation
Eurosint Forum PresentationEurosint Forum Presentation
Eurosint Forum Presentation
 
TakeDownCon Rocket City: “White Hat Anonymity”: Current challenges security r...
TakeDownCon Rocket City: “White Hat Anonymity”: Current challenges security r...TakeDownCon Rocket City: “White Hat Anonymity”: Current challenges security r...
TakeDownCon Rocket City: “White Hat Anonymity”: Current challenges security r...
 
Boletín de noticias riet n° 6 – noviembre 2015
Boletín de noticias riet n° 6 – noviembre 2015Boletín de noticias riet n° 6 – noviembre 2015
Boletín de noticias riet n° 6 – noviembre 2015
 
Gates Toorcon X New School Information Gathering
Gates Toorcon X New School Information GatheringGates Toorcon X New School Information Gathering
Gates Toorcon X New School Information Gathering
 
Competitive Intelligence Abu Dhabi UAE
Competitive Intelligence Abu Dhabi UAECompetitive Intelligence Abu Dhabi UAE
Competitive Intelligence Abu Dhabi UAE
 
Nato osint reader final 11 oct02
Nato osint reader final 11 oct02Nato osint reader final 11 oct02
Nato osint reader final 11 oct02
 
Deriving Intelligence from Open Source Information
Deriving Intelligence from Open Source InformationDeriving Intelligence from Open Source Information
Deriving Intelligence from Open Source Information
 
CiT Seesion 6 gesamt
CiT Seesion 6 gesamtCiT Seesion 6 gesamt
CiT Seesion 6 gesamt
 

Similar to Osint ashish mistry

hacking techniques and intrusion techniques useful in OSINT.pptx
hacking techniques and intrusion techniques useful in OSINT.pptxhacking techniques and intrusion techniques useful in OSINT.pptx
hacking techniques and intrusion techniques useful in OSINT.pptxsconalbg
 
Passive Intelligence Gathering and Analytics - It's All Just Metadata!
Passive Intelligence Gathering and Analytics - It's All Just Metadata!Passive Intelligence Gathering and Analytics - It's All Just Metadata!
Passive Intelligence Gathering and Analytics - It's All Just Metadata!CTruncer
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityMohammed Adam
 
Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsSloan Carne
 
Enterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringEnterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringTom Eston
 
OSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan BraganzaOSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan BraganzaNSConclave
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and DefenseAndrew McNicol
 
Anonymous internet
Anonymous internetAnonymous internet
Anonymous internetVong Borey
 
Anonymous internet
Anonymous internetAnonymous internet
Anonymous internetVong Borey
 
Building Effective Frameworks for Social Media Analysis
Building Effective Frameworks for Social Media AnalysisBuilding Effective Frameworks for Social Media Analysis
Building Effective Frameworks for Social Media Analysisikanow
 
OpenFest 2012 : Leveraging the public internet
OpenFest 2012 : Leveraging the public internetOpenFest 2012 : Leveraging the public internet
OpenFest 2012 : Leveraging the public internettkisason
 
Introduction to the open rights group censorship monitoring project
Introduction to the open rights group censorship monitoring projectIntroduction to the open rights group censorship monitoring project
Introduction to the open rights group censorship monitoring projectRichard King
 
Big Data Analytics - Introduction
Big Data Analytics - IntroductionBig Data Analytics - Introduction
Big Data Analytics - IntroductionAlex Meadows
 
OWASP_OSINT_Presentation.pdf
OWASP_OSINT_Presentation.pdfOWASP_OSINT_Presentation.pdf
OWASP_OSINT_Presentation.pdfnetisBin
 
The Hacking Game - Think Like a Hacker Meetup 12072023.pptx
The Hacking Game - Think Like a Hacker Meetup 12072023.pptxThe Hacking Game - Think Like a Hacker Meetup 12072023.pptx
The Hacking Game - Think Like a Hacker Meetup 12072023.pptxlior mazor
 
Luiz eduardo. introduction to mobile snitch
Luiz eduardo. introduction to mobile snitchLuiz eduardo. introduction to mobile snitch
Luiz eduardo. introduction to mobile snitchYury Chemerkin
 
Building Effective Frameworks for Social Media Analysis
Building Effective Frameworks for Social Media AnalysisBuilding Effective Frameworks for Social Media Analysis
Building Effective Frameworks for Social Media AnalysisOpen Analytics
 

Similar to Osint ashish mistry (20)

hacking techniques and intrusion techniques useful in OSINT.pptx
hacking techniques and intrusion techniques useful in OSINT.pptxhacking techniques and intrusion techniques useful in OSINT.pptx
hacking techniques and intrusion techniques useful in OSINT.pptx
 
DECEPTICONv2
DECEPTICONv2DECEPTICONv2
DECEPTICONv2
 
Passive Intelligence Gathering and Analytics - It's All Just Metadata!
Passive Intelligence Gathering and Analytics - It's All Just Metadata!Passive Intelligence Gathering and Analytics - It's All Just Metadata!
Passive Intelligence Gathering and Analytics - It's All Just Metadata!
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
 
Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU Investigators
 
Enterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringEnterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence Gathering
 
OSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan BraganzaOSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan Braganza
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and Defense
 
Anonymous internet
Anonymous internetAnonymous internet
Anonymous internet
 
Anonymous internet
Anonymous internetAnonymous internet
Anonymous internet
 
Building Effective Frameworks for Social Media Analysis
Building Effective Frameworks for Social Media AnalysisBuilding Effective Frameworks for Social Media Analysis
Building Effective Frameworks for Social Media Analysis
 
OpenFest 2012 : Leveraging the public internet
OpenFest 2012 : Leveraging the public internetOpenFest 2012 : Leveraging the public internet
OpenFest 2012 : Leveraging the public internet
 
Introduction to the open rights group censorship monitoring project
Introduction to the open rights group censorship monitoring projectIntroduction to the open rights group censorship monitoring project
Introduction to the open rights group censorship monitoring project
 
Big Data Analytics - Introduction
Big Data Analytics - IntroductionBig Data Analytics - Introduction
Big Data Analytics - Introduction
 
OpenSourceIntelligence-OSINT.pptx
OpenSourceIntelligence-OSINT.pptxOpenSourceIntelligence-OSINT.pptx
OpenSourceIntelligence-OSINT.pptx
 
OWASP_OSINT_Presentation.pdf
OWASP_OSINT_Presentation.pdfOWASP_OSINT_Presentation.pdf
OWASP_OSINT_Presentation.pdf
 
Fun & profit with bug bounties
Fun & profit with bug bountiesFun & profit with bug bounties
Fun & profit with bug bounties
 
The Hacking Game - Think Like a Hacker Meetup 12072023.pptx
The Hacking Game - Think Like a Hacker Meetup 12072023.pptxThe Hacking Game - Think Like a Hacker Meetup 12072023.pptx
The Hacking Game - Think Like a Hacker Meetup 12072023.pptx
 
Luiz eduardo. introduction to mobile snitch
Luiz eduardo. introduction to mobile snitchLuiz eduardo. introduction to mobile snitch
Luiz eduardo. introduction to mobile snitch
 
Building Effective Frameworks for Social Media Analysis
Building Effective Frameworks for Social Media AnalysisBuilding Effective Frameworks for Social Media Analysis
Building Effective Frameworks for Social Media Analysis
 

More from n|u - The Open Security Community

Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...n|u - The Open Security Community
 

More from n|u - The Open Security Community (20)

Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)
 
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Metasploit primary
Metasploit primaryMetasploit primary
Metasploit primary
 
Api security-testing
Api security-testingApi security-testing
Api security-testing
 
Introduction to TLS 1.3
Introduction to TLS 1.3Introduction to TLS 1.3
Introduction to TLS 1.3
 
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
 
Talking About SSRF,CRLF
Talking About SSRF,CRLFTalking About SSRF,CRLF
Talking About SSRF,CRLF
 
Building active directory lab for red teaming
Building active directory lab for red teamingBuilding active directory lab for red teaming
Building active directory lab for red teaming
 
Owning a company through their logs
Owning a company through their logsOwning a company through their logs
Owning a company through their logs
 
Introduction to shodan
Introduction to shodanIntroduction to shodan
Introduction to shodan
 
Cloud security
Cloud security Cloud security
Cloud security
 
Detecting persistence in windows
Detecting persistence in windowsDetecting persistence in windows
Detecting persistence in windows
 
Frida - Objection Tool Usage
Frida - Objection Tool UsageFrida - Objection Tool Usage
Frida - Objection Tool Usage
 
OSQuery - Monitoring System Process
OSQuery - Monitoring System ProcessOSQuery - Monitoring System Process
OSQuery - Monitoring System Process
 
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -SecurityDevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
 
Extensible markup language attacks
Extensible markup language attacksExtensible markup language attacks
Extensible markup language attacks
 
Linux for hackers
Linux for hackersLinux for hackers
Linux for hackers
 
Android Pentesting
Android PentestingAndroid Pentesting
Android Pentesting
 
News bytes null 200314121904
News bytes null 200314121904News bytes null 200314121904
News bytes null 200314121904
 

Recently uploaded

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 

Recently uploaded (20)

INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 

Osint ashish mistry

  • 1. Leveraging OSINT in Penetration Testing By: Ashish Mistry
  • 2. #whoami ● Ashish Mistry ● Individual infosec researcher & trainer ● www.Hcon.in ● HconSTF open source security framework ● Hcon Library initiative ● Contact : – Fb : Root.hcon – Tw : @hconmedia
  • 3. OSINT – Open Source INTelligence ● It is NOT related to open source software ● It is NOT related to open source licenses ● It is NOT related to artificial intelligence
  • 4. What Is OSINT ? Wikipedia : “Open-source intelligence (OSINT) is a form of intelligence collection management that involves finding, selecting, and acquiring information from publicly available sources and analyzing it to produce actionable intelligence”
  • 5. What is OSINT ? Publicly available information Select / Collecting and storing it Analysis and relating and filtering it More target specific information ATTACKS
  • 7. Humans are social beings we love to share information
  • 8. We share information that we are not suppose to share
  • 9. Sometime it is necessary to give out that much information
  • 10. So what is the problem ??
  • 12. Why OSINT for pentesting ?
  • 13. Some things to consider ● Passive (most of it) ● Legally provides much larger and wider view towards the target company / person ● Uncovers more attack surface ● Narrow downs many attack vectors ● Helps when you don't have 0days ● More specific social engineering attack vector can be crafted ● Helps in other steps in a pentest
  • 14. Leveraging OSINT ● Reconnaissance ● Vulnerability analysis ● Privilege escalation ● Social engineering/ profiling people
  • 15. Reconnaissance ● We can have information like – OS – IP – Software / Versions – Geo location
  • 16. From : ● Metadata : – Foca , metagoofil , maltego, exiftool ● Online sites : – Shodanhq, Serversniff, netcraft,centralops ● Dns/who is info ● FF extensions – wappalyzer – Passive recon
  • 17. Vulnerability analysis ● Path discloser ● Footholds ● Web Server Detection ● Vulnerable Files ● Vulnerable Servers ● Error Messages ● Network or vulnerability data ● Various Online Devices ● Advisories and Vulnerabilities ● XSS / LFI / RFI
  • 18. from ● Dorks : sitedigger , search diggity, seat – GHDB – BHDB – FSHDB – Web = sqli / Lfi / Rfi / Wordpress ● FF extension: – Meta generator version check ● Metadata ● http://www.1337day.com/webapps
  • 19. Privilege escalation We can have potential ● User names ● Passwords ● Login panels for more useful & accurate wordlist generation
  • 20. From ? ● Metadata : – Foca , metagoofil , maltego ● Emails : – Theharvester , esearchy ● Public profiling information – Social media ● Phone numbers ● Family member names ● Birth dates
  • 21. From cont.. ● Dorks : – Files containing usernames – Files containing passwords – Files containing juicy info – Pages containing login portals ● Wordlist generation : – wyd , cupp, crunch
  • 22. Social engineering / profiling people ● All kind of personal and professional info – Names - dob – Residence address – Phone no. – Emails – Close associates / friends – Interest / hobbies – Pictures
  • 23. From ? ● People lookup databases ● Social networks ● Local yellow pages ● Mtnl / bsnl tele. Dir ● Public mobile info. services
  • 24. What can we have from OSINT ?
  • 25. Email addresses ● Phone numbers ● User names / password ● OS info ● IP info ● Softwares / version ● Geo location ● Personal details ● vulnerabilities
  • 26. tools ● Foca , metagoofil, exiftool, wyd ● Theharvester, esearchy ● FF extentions – Pasive recon, meta generator, wappalyzer, exiftool ● Sitedigger, seat, search diggity ● Creepy, fbpwn ● Maltego , netglub
  • 27. Online resources ● Netcraft, centralops, shodanhq, serversniff ● Ghdb ● foca online, regex.info/exif.cgi ● http://tineye.com , http://picfog.com ● https://twitpic.com/search ,http://www.pixsy.com/ ● Flickr Photo Search http://www.flickr.com/search/? s=rec&w=all&q=comapny name&m=text
  • 28. Online resources cont... ● document search: – Docstoc http://www.docstoc.com/ – Scribd http://www.scribd.com/ – SlideShare http://www.slideshare.net/ – PDF Search Engine http://www.pdf- search-engine.com/ – Toodoc http://www.toodoc.com/ – google filetype:
  • 29. Online resources cont... ● Check Usernames: – http://www.checkusernames.com/ – http://knowem.com/ ,www.namechk.com – http://webmii.com/ ● People search – 123people – Pipl – openbook
  • 30. Online resources cont... ● Geo location – Infosnipper – http://twittermap.appspot.com – http://www.geobytes.com/iplocator.htm
  • 31. Prevention / counter measures ● Policies for social networks – Hr , pr , marketing ● Sanitize documents – Remove metadata ● Metadata anonymizing toolkit – MAT ● Oometa extractor , Doc scrubber ● Exiftool ● openDLP , myDLP ● Websites – Block UA , dir, custom error msg