WEBINAR ON
ETHICAL HACKING &
CYBERSECURITY
WHO AM I ?
Mohammed Adam
Senior Security Consultant at Crossbow Labs
Foss Activist in VGLUG (Villupuram Gnu/Linux Users
group)
Acknowledged by Top 50+ Companies like US Dept
of defense, AT & T, OPPO, Nokia, Honeywell,
Mcafee, Virus total, Mastercard, Bitdefender, Dell
Technologies, Asus, Intel, Carbon black etc in Bug
bounties.
Youtuber – youtube.com/technux0
LITTLE WARMUP BEFORE STARTING THE SESSION
• Are you a hacker ?
• Do you hack your friends Facebook or WhatsApp accounts ?
• Hacking – is it legal or illegal ?
• What type of hacker you are: Black or grey or white ?
• Have you hacked something in your entire life ?
• Is there a career for hacking ?
5 - STAGES OF ETHICAL HACKING
• Reconnaissance - Information gathering
• Scanning & Enumeration
• Exploitation - Gaining Access
• Post Exploitation - Maintaining Access
• Clearing tracks
WILL START WITH RECON !
• What is Intelligence ?
Wikipedia defines Intelligence as:
One's capacity for logic, understanding, self-awareness, learning, emotional
knowledge, planning, creativity, and problem solving
• In other words:
It is the ability to understand and draw a logical conclusion from the available
information
TYPES OF INTELLIGENCE
● Human Intelligence (HUMINT)
● Geospatial Intelligence (GEOINT)
● Signals Intelligence (SIGINT)
● Open-Source Intelligence (OSINT)
OPEN SOURCE INTELLIGENCE (OSINT)
● Art of collecting information which is scattered on publicly available sources
● Open here refers to overt, publicly available sources
● Not completely legal, as it is against the privacy of a person
● Gathering bits to form the big picture
● Depends on sources. Continuously evolving.
● Information sources could be anything not limited to metadata, social media and
blogs
TRADITIONAL METHODS
● Using search engines Eg: Google, Bing etc
● News sites Eg: CNN, BBC, etc
● Corporate Websites
● Government Websites
● Blogs
● Modern Resources - Advanced Search Engines, Social Media sites,
Deepweb/Darkweb, Automated tool
OSINT IN REAL LIFE
We use OSINT in everyday life
● Finding download links for Game of Thrones series
● Finding the best-looking person
● Knowing about the company before applying for a position
● Knowing your ex’s latest crush :P
WHY OSINT HAS BECOME SO IMPORTANT ?
● Humans by nature try to get others attention
● So many post (personal) information on online platforms thinking that only
intended members will look.
● New smartphones have geo-tagging feature enabled by default
● Metadata of those images can give a glimpse of your daily life
WHAT CAN YOU
FIGURE OUT
FROM THIS ?
CAR LICENSE
BANK AND BANK ACCOUNT
CREDIT
CARD AND
DOB
MOBILE NO, PHONE MODEL, MUCH MORE
TINFOLEAK
DEMO -
TWITTER
IMAGES OR PHOTOS HAS
METADATA INFORMATION
OSINT IN PENTEST
●Webapp
Wappalyzer
RetireJS
● Domain-IP lookup
Whois lookup
Reverse IP Lookup
● Find if emails were previously pwned
HaveIBeenPwned lookup
OSINT IN PENTEST
Advanced Search engine searches: site:*.example.org ext:php | ext:txt | ext:log
● Checking robots.txt
● Advanced search: Wolfram Alpha
● Subdomain enumeration
○ Certificate transparency
○ Shodan
○ Censys
EXAMPLES
REFERENCES:
● https://github.com/jivoi/awesome-osint
● https://blog.appsecco.com/open-source-intelligence-gathering-
101d2861d4429e3
● http://www.osintframework.com/
● http://www.automatingosint.com/blog/
● https://intrigue.io
@iam_amdadam
mohammedadam24
THANKS
Any Questions ?

OSINT - Open Soure Intelligence - Webinar on CyberSecurity

  • 1.
  • 2.
    WHO AM I? Mohammed Adam Senior Security Consultant at Crossbow Labs Foss Activist in VGLUG (Villupuram Gnu/Linux Users group) Acknowledged by Top 50+ Companies like US Dept of defense, AT & T, OPPO, Nokia, Honeywell, Mcafee, Virus total, Mastercard, Bitdefender, Dell Technologies, Asus, Intel, Carbon black etc in Bug bounties. Youtuber – youtube.com/technux0
  • 3.
    LITTLE WARMUP BEFORESTARTING THE SESSION • Are you a hacker ? • Do you hack your friends Facebook or WhatsApp accounts ? • Hacking – is it legal or illegal ? • What type of hacker you are: Black or grey or white ? • Have you hacked something in your entire life ? • Is there a career for hacking ?
  • 4.
    5 - STAGESOF ETHICAL HACKING • Reconnaissance - Information gathering • Scanning & Enumeration • Exploitation - Gaining Access • Post Exploitation - Maintaining Access • Clearing tracks
  • 5.
    WILL START WITHRECON ! • What is Intelligence ? Wikipedia defines Intelligence as: One's capacity for logic, understanding, self-awareness, learning, emotional knowledge, planning, creativity, and problem solving • In other words: It is the ability to understand and draw a logical conclusion from the available information
  • 6.
    TYPES OF INTELLIGENCE ●Human Intelligence (HUMINT) ● Geospatial Intelligence (GEOINT) ● Signals Intelligence (SIGINT) ● Open-Source Intelligence (OSINT)
  • 7.
    OPEN SOURCE INTELLIGENCE(OSINT) ● Art of collecting information which is scattered on publicly available sources ● Open here refers to overt, publicly available sources ● Not completely legal, as it is against the privacy of a person ● Gathering bits to form the big picture ● Depends on sources. Continuously evolving. ● Information sources could be anything not limited to metadata, social media and blogs
  • 8.
    TRADITIONAL METHODS ● Usingsearch engines Eg: Google, Bing etc ● News sites Eg: CNN, BBC, etc ● Corporate Websites ● Government Websites ● Blogs ● Modern Resources - Advanced Search Engines, Social Media sites, Deepweb/Darkweb, Automated tool
  • 10.
    OSINT IN REALLIFE We use OSINT in everyday life ● Finding download links for Game of Thrones series ● Finding the best-looking person ● Knowing about the company before applying for a position ● Knowing your ex’s latest crush :P
  • 11.
    WHY OSINT HASBECOME SO IMPORTANT ? ● Humans by nature try to get others attention ● So many post (personal) information on online platforms thinking that only intended members will look. ● New smartphones have geo-tagging feature enabled by default ● Metadata of those images can give a glimpse of your daily life
  • 12.
    WHAT CAN YOU FIGUREOUT FROM THIS ?
  • 13.
  • 14.
  • 15.
  • 16.
    MOBILE NO, PHONEMODEL, MUCH MORE
  • 17.
  • 18.
    IMAGES OR PHOTOSHAS METADATA INFORMATION
  • 19.
    OSINT IN PENTEST ●Webapp Wappalyzer RetireJS ●Domain-IP lookup Whois lookup Reverse IP Lookup ● Find if emails were previously pwned HaveIBeenPwned lookup
  • 20.
    OSINT IN PENTEST AdvancedSearch engine searches: site:*.example.org ext:php | ext:txt | ext:log ● Checking robots.txt ● Advanced search: Wolfram Alpha ● Subdomain enumeration ○ Certificate transparency ○ Shodan ○ Censys
  • 21.
  • 23.
    REFERENCES: ● https://github.com/jivoi/awesome-osint ● https://blog.appsecco.com/open-source-intelligence-gathering- 101d2861d4429e3 ●http://www.osintframework.com/ ● http://www.automatingosint.com/blog/ ● https://intrigue.io
  • 24.