This document provides an overview of offensive open-source intelligence (OSINT) techniques. It defines OSINT and discusses the differences between offensive and defensive OSINT approaches. Offensive OSINT focuses on gathering as much public information as possible to facilitate an attack against a target. The document outlines the OSINT process and details specific techniques for harvesting data from public sources, including scraping websites, using APIs, searching social media, analyzing images and metadata, and researching infrastructure components like IP addresses, domains, and software versions. The goal of offensive OSINT is to discover valuable information like employee emails, usernames, relationships, locations and technical vulnerabilities to enable attacks like phishing, social engineering, and infiltration.
Nmapper theHarvester OSINT Tool explanationWangolo Joel
OSINT for Opensource intelligence is a tool used to examine external threats of and organization. At Nmmapper(https://www.nmmapper.com) We have integrated this OSINT tool online for everyone to test it out at https://www.nmmapper.com/kalitools/theharvester/email-harvester-tool/online/
Empowering red and blue teams with osint c0c0n 2017reconvillage
This talk will discuss Open Source Intelligence (OSINT) gathering tools and techniques that are highly useful and effective for both Blue teams and Red teams.
Open-source intelligence (OSINT) is intelligence collected from publicly available sources. In the intelligence community (IC), the term "open" refers to overt, publicly available sources (as opposed to covert or clandestine sources); it is not related to open-source software or public intelligence.
Maltego is an open source intelligence (OSINT) tool used to gather information from public online sources for reconnaissance purposes. It analyzes entities like people, websites, and email addresses extracted from online data and identifies relationships between them through transforms. Maltego graphs can reveal the complexity of connections within an infrastructure and expose previously unknown links. While useful for security analysis, it handles sensitive data and can cause unintentional harm, so results should be interpreted carefully.
OSINT for Proactive Defense - RootConf 2019RedHunt Labs
A presentation about using Open Source Intelligence for proactive defense delivered at Rootconf 2019 Bangalore, India.
RedHunt Labs
https://redhuntlabs.com/
This document discusses leveraging open source intelligence (OSINT) for penetration testing. It defines OSINT as collecting publicly available information and analyzing it to produce actionable intelligence. The document outlines how OSINT can be used at different stages of a penetration test, including reconnaissance, vulnerability analysis, and social engineering. It provides examples of the types of information that can be obtained from OSINT, such as email addresses, passwords, and personal details. The document also lists specific tools and online resources that can be used to perform OSINT for purposes like passive reconnaissance, searching for vulnerabilities, and profiling individuals.
The document discusses cyber threats facing enterprises and the need for effective cyber intelligence and security. It introduces Cyveillance as offering a suite of online risk modules and intelligence services to help protect businesses, their assets, customers, and partners from a range of online threats. Key services mentioned include continuous internet monitoring, detection of risks like fraud and information leaks, and helping customers address threats faster than other systems. Testimonials from customers highlight how Cyveillance has helped them recapture lost revenues, identify compromised accounts, and detect planned actions by groups targeting their facilities.
This document provides an overview of offensive open-source intelligence (OSINT) techniques. It defines OSINT and discusses the differences between offensive and defensive OSINT approaches. Offensive OSINT focuses on gathering as much public information as possible to facilitate an attack against a target. The document outlines the OSINT process and details specific techniques for harvesting data from public sources, including scraping websites, using APIs, searching social media, analyzing images and metadata, and researching infrastructure components like IP addresses, domains, and software versions. The goal of offensive OSINT is to discover valuable information like employee emails, usernames, relationships, locations and technical vulnerabilities to enable attacks like phishing, social engineering, and infiltration.
Nmapper theHarvester OSINT Tool explanationWangolo Joel
OSINT for Opensource intelligence is a tool used to examine external threats of and organization. At Nmmapper(https://www.nmmapper.com) We have integrated this OSINT tool online for everyone to test it out at https://www.nmmapper.com/kalitools/theharvester/email-harvester-tool/online/
Empowering red and blue teams with osint c0c0n 2017reconvillage
This talk will discuss Open Source Intelligence (OSINT) gathering tools and techniques that are highly useful and effective for both Blue teams and Red teams.
Open-source intelligence (OSINT) is intelligence collected from publicly available sources. In the intelligence community (IC), the term "open" refers to overt, publicly available sources (as opposed to covert or clandestine sources); it is not related to open-source software or public intelligence.
Maltego is an open source intelligence (OSINT) tool used to gather information from public online sources for reconnaissance purposes. It analyzes entities like people, websites, and email addresses extracted from online data and identifies relationships between them through transforms. Maltego graphs can reveal the complexity of connections within an infrastructure and expose previously unknown links. While useful for security analysis, it handles sensitive data and can cause unintentional harm, so results should be interpreted carefully.
OSINT for Proactive Defense - RootConf 2019RedHunt Labs
A presentation about using Open Source Intelligence for proactive defense delivered at Rootconf 2019 Bangalore, India.
RedHunt Labs
https://redhuntlabs.com/
This document discusses leveraging open source intelligence (OSINT) for penetration testing. It defines OSINT as collecting publicly available information and analyzing it to produce actionable intelligence. The document outlines how OSINT can be used at different stages of a penetration test, including reconnaissance, vulnerability analysis, and social engineering. It provides examples of the types of information that can be obtained from OSINT, such as email addresses, passwords, and personal details. The document also lists specific tools and online resources that can be used to perform OSINT for purposes like passive reconnaissance, searching for vulnerabilities, and profiling individuals.
The document discusses cyber threats facing enterprises and the need for effective cyber intelligence and security. It introduces Cyveillance as offering a suite of online risk modules and intelligence services to help protect businesses, their assets, customers, and partners from a range of online threats. Key services mentioned include continuous internet monitoring, detection of risks like fraud and information leaks, and helping customers address threats faster than other systems. Testimonials from customers highlight how Cyveillance has helped them recapture lost revenues, identify compromised accounts, and detect planned actions by groups targeting their facilities.
This document outlines an agenda for a presentation on open-source intelligence (OSINT) gathering techniques. The agenda includes an introduction to OSINT, different types of intelligence gathering, a scenario example, OSINT gathering tactics and tools like Shodan, TheHarvester and Google dorks, applications of OSINT, a demonstration, references for OSINT, and a conclusion. Key OSINT tools that will be demonstrated include Twitter, Shodan, TheHarvester and Google dorks for gathering information from public online sources.
Getting started with using the Dark Web for OSINT investigationsOlakanmi Oluwole
The document discusses how to conduct open-source intelligence (OSINT) investigations using the dark web, providing an overview of the surface web, deep web, and dark web; resources for finding dark web sites like search engines and directories; and tips for investigating cases like finding the location and Wi-Fi network from a photo's metadata. It aims to educate on safely and legally utilizing open-source information on the dark web for investigative purposes.
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...Falgun Rathod
As per Wiki - Open-source intelligence (OSINT) is intelligence collected from publicly available sources. In the intelligence community (IC), the term "open" refers to overt, publicly available sources (as opposed to covert or clandestine sources); it is not related to open-source software or public intelligence.
There are lots of other ways to collect information from Public Source which may not provided in this document, This is just an Introductory Document for whose who are beginners and students.
The document discusses open source intelligence (OSINT), including what it is, how it is used, techniques for gathering it, and tools that can be used. OSINT involves collecting publicly available data for intelligence purposes. It is produced from public sources and addresses specific intelligence needs. Security professionals use OSINT to identify vulnerabilities in organizations from accidental information leaks online or exposed assets. However, threat actors also use OSINT to find targets and vulnerabilities to exploit. The document recommends using OSINT proactively to find and address weaknesses before threats actors do. It provides examples of tools like Excel, OSINT Framework, Github search, and Wappalyzer that can be used to search public data and identify technical details about organizations and vulnerabilities.
This is the slides of the online talk given at @NullBhopal. This introduces people to Open Source INTelligence and their uses in daily life and pentesting.
Practical White Hat Hacker Training - Passive Information Gathering(OSINT)PRISMA CSI
This presentation part of Prisma CSI's Practical White Hat Hacker Training v1
PRISMA CSI • Cyber Security and Intelligence www.prismacsi.com
This document can be shared or used by quoted and used for commercial purposes, but can not be changed. Detailed information is available at https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode.
This document discusses using Twitter and Python for open-source intelligence (OSINT) gathering. It provides an overview of Twitter concepts and the Twitter API. It also demonstrates how to use the Python library Tweepy to access Twitter data and analyze tweets. Specific analyses demonstrated include visualizing hashtags, retweets, replies and interactions over time. The goal is to gather intelligence on individuals, groups, topics and markets from public Twitter data.
This presentation gives you 3 tips to start Market (Open Source) Intelligence in your company:
1. Consider information as the Key of your Business;
2. Do not fight against the Web 2.0, ineluctable Evolution but use it for intelligence;
3. Break outdated paradigms about the Web.
This document discusses various open source intelligence (OSINT) tools for security auditing that can be used with Python. It begins by defining the types of data that can be gathered through OSINT, including technical, social, physical, and logical information. Several Python-based tools are then introduced for gathering server information, geolocation, metadata extraction, footprinting, and social media intelligence including Censys, Shodan, Recon-ng, The Harvester, OSR Framework, SpiderFoot, and Tinfoleak. The document provides an overview of the capabilities and modules for each tool.
OSINT Black Magic: Listen who whispers your name in the dark!!!Nutan Kumar Panda
Open Source Intelligence is the art of collecting information which is scattered on publicly available sources. With evolution of social media and digital marketplaces a huge amount of information is constantly generated on the Internet (sometimes even without our conscious consent). This is of great concern for organizations and businesses as chances of confidential data floating in the public domain may seriously harm their business integrity. All recent hacks are related to internal source code disclosure, API keys leakage, known vulnerability in third party plugin, data dump leaks etc. Based on experience and robust research in this domain, for this talk the speakers have created a tool which will help all kind of organizations to monitor cyberspace effectively without much investment. This tool is simple but an effective solution which is capable of hearing digital whispers which are usually missed or ignored but shouldn’t be.
OSINT mindset to protect your organization - Null monthly meet versionChandrapal Badshah
This presentation covers different sources of information about organization, some breach case studies and how we could have prevented it using OSINT and other techniques.
This document describes how the author conducted an OSINT investigation and subsequent phishing campaign. It begins by explaining what OSINT is and some common tools used for open source intelligence gathering like Maltego, Shodan, and Google dorks. Next, it discusses how to use the information found through OSINT to craft a targeted phishing email. The document walks through setting up a phishing site using tools like Modlishka and GoPhish. It then tells a story of a actual phishing campaign the author conducted, changing details to protect privacy. The document concludes by emphasizing the importance of managing one's online presence and digital footprint.
OSINT Basics for Threat Hunters and PractitionersMegan DeBlois
This presentation was created for the SWIFT Tech Symposium at Calpoly Pomona. Learn the basics of OSINT, but for hunting Internet infrastructure.
-OSINT Basics: Let’ s talk about what it is, why it’s important, how it’s used in the world of Internet infrastructure.
-Understanding Different Use Cases: We’ll take a quick look at examples of how this is valuable for threat hunters, security practitioners, as well as researchers.
-Practice, practice, practice: I’ll end this talk by sharing out some good resources and ideas for how you can sharpen your OSINT skills for security research or for better organization defense.
Utilizing OSINT in Threat Analytics and Incident ResponseChristopher Beiring
Validating potential incidents or indicators of compromise (IOCs) in today’s fast paced environment can be somewhat overwhelming and difficult. Sometimes a team does not believe they have all of the tools and resources to quickly and accurately identify, verify, and rectify a potential indicator in their environment in time. Sometimes these investigations are performed yet may leave out valuable key pieces of data that would benefit the prevention or hardening against future similar attacks. Everyone wants the expensive and shiny tool that vendors offer, but sometimes budgets do not always allow teams access to the latest and greatest, and honestly, not all tools are equal. Relying on one piece of data for IOC validation is a bad idea, even if that resource is the best in the industry. The approach is to use not only the tools you have, but to augment them with existing open source tools that will enrich your investigation, provide accuracy, and supplement your ability to quickly and accurately respond to valid threats in order to increase your security team’s effectiveness. The purpose of this presentation will be to walk users through the value of Open Source Intel and how to use the tools available effectively to help research and identify potential issues during an incident response engagement.
Open Source Intelligence Gathering (OSINT) is growing in popularity among attackers and defenders alike. When an attacker comes knocking on your network's front door, the warning lights go off in multiple systems (IDS, IPS, SIEM, WAF). More sophisticated attackers, however, spend considerable time gathering information using tools and techniques that never touch any of your systems. As a result, these attackers are able to execute their attacks and make off with proprietary data before you even know they are there. This presentation provides an introduction to many OSINT tools and techniques, as well as methods you can use to minimize your exposure.
This document discusses using open source intelligence (OSINT) tools and techniques to gather target information for targeted attacks without detection. It describes tools like Shodan, Maltego, Pipl, Google dorking, and LinkedIn that can uncover usernames, passwords, emails, subdomains and personal details on targets. The goal is to passively collect enough information during the OSINT phase to enable further active reconnaissance or targeted attacks without directly interacting with the target's network.
c0c0n, previously known as Cyber Safe, is an annual event conducted as part of the International Information Security Day. The Information Security Research Association along with Matriux Security Community is organizing a 2 day International Security and Hacking Conference titled c0c0n 2010, as part of Information Security Day 2010. The event is supported by the Kochi City Police. Various technical, non-technical, legal and community events are organized as part of the program. c0c0n 2010 is scheduled on 05, 06 Aug 2010 The number of digital security incidents and cyber crimes are increasing daily on a proportionate rate. The industry is demanding more and more security professionals and controls to curb this never ending threat to information systems. c0c0n is aimed at providing a platform to discuss, showcase, educate, understand and spread awareness on the latest trends in information, cyber and hi-tech crimes. It also aims to provide a hand-shaking platform for various corporate, government organizations including the various investigation agencies, academia, research organizations and other industry leaders and players for better co-ordination in making the cyber world a better and safe place to be.
After the Data Breach: Stolen CredentialsSBWebinars
Credentials don’t start out on the dark web - they end there.
When usernames and passwords are compromised in a data breach, the consequences extend far beyond the victim organization due to rampant password reuse. For this reason, NIST recently recommended that organizations check users’ credentials against a set of known compromised passwords. However, by patroning dark web forums and paying for spilled credentials, enterprises indirectly support the criminal ecosystem. Furthermore, attackers often don’t publicly post stolen data until months or years after the breach, if at all. Is there a better way to follow NIST guidelines and protect users from account takeover?
Join Justin Richer, co-author of NIST Digital Identity Guidelines 800-63B, and Gautam Agarwal, Blackfish Product Manager, for a lively discussion on NIST’s password recommendations and how best to prevent account takeover fraud at your organization.
Agenda:
The Threat of Stolen Credentials
Reasoning Behind NIST’s Password Recommendations
Ways to Manage a Password “Breach Corpus”
How Blackfish Helps Organizations Follow NIST Guidelines
Slides of my Null puliya session at Bangalore. This presentation is intended to students and anyone interested to start in InfoSec.
https://null.co.in/events/586-bangalore-null-bangalore-puliya-04-may-2019-how-to-get-started-in-infosec
PENETRATION TESTING FROM A HOT TUB TIME MACHINEChris Gates
This presentation discusses penetration testing techniques from an unconventional perspective. It advocates for intelligence gathering and footprinting before scanning or exploitation to have a more effective assessment. Specific techniques discussed include using open source intelligence gathering on internal and external systems to develop profiles and target lists. Footprinting activities within the network focus on enumeration of users, shares, services and other details to identify vulnerable systems rather than broad scanning. The presentation provides examples of exploiting old vulnerabilities in applications like Citrix and weaknesses in administration interfaces. It emphasizes continuing post-exploitation activities like privilege escalation and lateral movement within compromised systems to fully evaluate security.
This document provides an overview of how open-source intelligence (OSINT) techniques can be used both offensively and defensively. It discusses tools like Shodan, Maltego, Google searches, and malware sandboxes that can be leveraged to gather technical information about targets, infrastructure, and indicators of compromise. The document also emphasizes the importance of automation and privacy when conducting OSINT research to enhance attacks or strengthen defenses.
This document outlines an agenda for a presentation on open-source intelligence (OSINT) gathering techniques. The agenda includes an introduction to OSINT, different types of intelligence gathering, a scenario example, OSINT gathering tactics and tools like Shodan, TheHarvester and Google dorks, applications of OSINT, a demonstration, references for OSINT, and a conclusion. Key OSINT tools that will be demonstrated include Twitter, Shodan, TheHarvester and Google dorks for gathering information from public online sources.
Getting started with using the Dark Web for OSINT investigationsOlakanmi Oluwole
The document discusses how to conduct open-source intelligence (OSINT) investigations using the dark web, providing an overview of the surface web, deep web, and dark web; resources for finding dark web sites like search engines and directories; and tips for investigating cases like finding the location and Wi-Fi network from a photo's metadata. It aims to educate on safely and legally utilizing open-source information on the dark web for investigative purposes.
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...Falgun Rathod
As per Wiki - Open-source intelligence (OSINT) is intelligence collected from publicly available sources. In the intelligence community (IC), the term "open" refers to overt, publicly available sources (as opposed to covert or clandestine sources); it is not related to open-source software or public intelligence.
There are lots of other ways to collect information from Public Source which may not provided in this document, This is just an Introductory Document for whose who are beginners and students.
The document discusses open source intelligence (OSINT), including what it is, how it is used, techniques for gathering it, and tools that can be used. OSINT involves collecting publicly available data for intelligence purposes. It is produced from public sources and addresses specific intelligence needs. Security professionals use OSINT to identify vulnerabilities in organizations from accidental information leaks online or exposed assets. However, threat actors also use OSINT to find targets and vulnerabilities to exploit. The document recommends using OSINT proactively to find and address weaknesses before threats actors do. It provides examples of tools like Excel, OSINT Framework, Github search, and Wappalyzer that can be used to search public data and identify technical details about organizations and vulnerabilities.
This is the slides of the online talk given at @NullBhopal. This introduces people to Open Source INTelligence and their uses in daily life and pentesting.
Practical White Hat Hacker Training - Passive Information Gathering(OSINT)PRISMA CSI
This presentation part of Prisma CSI's Practical White Hat Hacker Training v1
PRISMA CSI • Cyber Security and Intelligence www.prismacsi.com
This document can be shared or used by quoted and used for commercial purposes, but can not be changed. Detailed information is available at https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode.
This document discusses using Twitter and Python for open-source intelligence (OSINT) gathering. It provides an overview of Twitter concepts and the Twitter API. It also demonstrates how to use the Python library Tweepy to access Twitter data and analyze tweets. Specific analyses demonstrated include visualizing hashtags, retweets, replies and interactions over time. The goal is to gather intelligence on individuals, groups, topics and markets from public Twitter data.
This presentation gives you 3 tips to start Market (Open Source) Intelligence in your company:
1. Consider information as the Key of your Business;
2. Do not fight against the Web 2.0, ineluctable Evolution but use it for intelligence;
3. Break outdated paradigms about the Web.
This document discusses various open source intelligence (OSINT) tools for security auditing that can be used with Python. It begins by defining the types of data that can be gathered through OSINT, including technical, social, physical, and logical information. Several Python-based tools are then introduced for gathering server information, geolocation, metadata extraction, footprinting, and social media intelligence including Censys, Shodan, Recon-ng, The Harvester, OSR Framework, SpiderFoot, and Tinfoleak. The document provides an overview of the capabilities and modules for each tool.
OSINT Black Magic: Listen who whispers your name in the dark!!!Nutan Kumar Panda
Open Source Intelligence is the art of collecting information which is scattered on publicly available sources. With evolution of social media and digital marketplaces a huge amount of information is constantly generated on the Internet (sometimes even without our conscious consent). This is of great concern for organizations and businesses as chances of confidential data floating in the public domain may seriously harm their business integrity. All recent hacks are related to internal source code disclosure, API keys leakage, known vulnerability in third party plugin, data dump leaks etc. Based on experience and robust research in this domain, for this talk the speakers have created a tool which will help all kind of organizations to monitor cyberspace effectively without much investment. This tool is simple but an effective solution which is capable of hearing digital whispers which are usually missed or ignored but shouldn’t be.
OSINT mindset to protect your organization - Null monthly meet versionChandrapal Badshah
This presentation covers different sources of information about organization, some breach case studies and how we could have prevented it using OSINT and other techniques.
This document describes how the author conducted an OSINT investigation and subsequent phishing campaign. It begins by explaining what OSINT is and some common tools used for open source intelligence gathering like Maltego, Shodan, and Google dorks. Next, it discusses how to use the information found through OSINT to craft a targeted phishing email. The document walks through setting up a phishing site using tools like Modlishka and GoPhish. It then tells a story of a actual phishing campaign the author conducted, changing details to protect privacy. The document concludes by emphasizing the importance of managing one's online presence and digital footprint.
OSINT Basics for Threat Hunters and PractitionersMegan DeBlois
This presentation was created for the SWIFT Tech Symposium at Calpoly Pomona. Learn the basics of OSINT, but for hunting Internet infrastructure.
-OSINT Basics: Let’ s talk about what it is, why it’s important, how it’s used in the world of Internet infrastructure.
-Understanding Different Use Cases: We’ll take a quick look at examples of how this is valuable for threat hunters, security practitioners, as well as researchers.
-Practice, practice, practice: I’ll end this talk by sharing out some good resources and ideas for how you can sharpen your OSINT skills for security research or for better organization defense.
Utilizing OSINT in Threat Analytics and Incident ResponseChristopher Beiring
Validating potential incidents or indicators of compromise (IOCs) in today’s fast paced environment can be somewhat overwhelming and difficult. Sometimes a team does not believe they have all of the tools and resources to quickly and accurately identify, verify, and rectify a potential indicator in their environment in time. Sometimes these investigations are performed yet may leave out valuable key pieces of data that would benefit the prevention or hardening against future similar attacks. Everyone wants the expensive and shiny tool that vendors offer, but sometimes budgets do not always allow teams access to the latest and greatest, and honestly, not all tools are equal. Relying on one piece of data for IOC validation is a bad idea, even if that resource is the best in the industry. The approach is to use not only the tools you have, but to augment them with existing open source tools that will enrich your investigation, provide accuracy, and supplement your ability to quickly and accurately respond to valid threats in order to increase your security team’s effectiveness. The purpose of this presentation will be to walk users through the value of Open Source Intel and how to use the tools available effectively to help research and identify potential issues during an incident response engagement.
Open Source Intelligence Gathering (OSINT) is growing in popularity among attackers and defenders alike. When an attacker comes knocking on your network's front door, the warning lights go off in multiple systems (IDS, IPS, SIEM, WAF). More sophisticated attackers, however, spend considerable time gathering information using tools and techniques that never touch any of your systems. As a result, these attackers are able to execute their attacks and make off with proprietary data before you even know they are there. This presentation provides an introduction to many OSINT tools and techniques, as well as methods you can use to minimize your exposure.
This document discusses using open source intelligence (OSINT) tools and techniques to gather target information for targeted attacks without detection. It describes tools like Shodan, Maltego, Pipl, Google dorking, and LinkedIn that can uncover usernames, passwords, emails, subdomains and personal details on targets. The goal is to passively collect enough information during the OSINT phase to enable further active reconnaissance or targeted attacks without directly interacting with the target's network.
c0c0n, previously known as Cyber Safe, is an annual event conducted as part of the International Information Security Day. The Information Security Research Association along with Matriux Security Community is organizing a 2 day International Security and Hacking Conference titled c0c0n 2010, as part of Information Security Day 2010. The event is supported by the Kochi City Police. Various technical, non-technical, legal and community events are organized as part of the program. c0c0n 2010 is scheduled on 05, 06 Aug 2010 The number of digital security incidents and cyber crimes are increasing daily on a proportionate rate. The industry is demanding more and more security professionals and controls to curb this never ending threat to information systems. c0c0n is aimed at providing a platform to discuss, showcase, educate, understand and spread awareness on the latest trends in information, cyber and hi-tech crimes. It also aims to provide a hand-shaking platform for various corporate, government organizations including the various investigation agencies, academia, research organizations and other industry leaders and players for better co-ordination in making the cyber world a better and safe place to be.
After the Data Breach: Stolen CredentialsSBWebinars
Credentials don’t start out on the dark web - they end there.
When usernames and passwords are compromised in a data breach, the consequences extend far beyond the victim organization due to rampant password reuse. For this reason, NIST recently recommended that organizations check users’ credentials against a set of known compromised passwords. However, by patroning dark web forums and paying for spilled credentials, enterprises indirectly support the criminal ecosystem. Furthermore, attackers often don’t publicly post stolen data until months or years after the breach, if at all. Is there a better way to follow NIST guidelines and protect users from account takeover?
Join Justin Richer, co-author of NIST Digital Identity Guidelines 800-63B, and Gautam Agarwal, Blackfish Product Manager, for a lively discussion on NIST’s password recommendations and how best to prevent account takeover fraud at your organization.
Agenda:
The Threat of Stolen Credentials
Reasoning Behind NIST’s Password Recommendations
Ways to Manage a Password “Breach Corpus”
How Blackfish Helps Organizations Follow NIST Guidelines
Slides of my Null puliya session at Bangalore. This presentation is intended to students and anyone interested to start in InfoSec.
https://null.co.in/events/586-bangalore-null-bangalore-puliya-04-may-2019-how-to-get-started-in-infosec
PENETRATION TESTING FROM A HOT TUB TIME MACHINEChris Gates
This presentation discusses penetration testing techniques from an unconventional perspective. It advocates for intelligence gathering and footprinting before scanning or exploitation to have a more effective assessment. Specific techniques discussed include using open source intelligence gathering on internal and external systems to develop profiles and target lists. Footprinting activities within the network focus on enumeration of users, shares, services and other details to identify vulnerable systems rather than broad scanning. The presentation provides examples of exploiting old vulnerabilities in applications like Citrix and weaknesses in administration interfaces. It emphasizes continuing post-exploitation activities like privilege escalation and lateral movement within compromised systems to fully evaluate security.
This document provides an overview of how open-source intelligence (OSINT) techniques can be used both offensively and defensively. It discusses tools like Shodan, Maltego, Google searches, and malware sandboxes that can be leveraged to gather technical information about targets, infrastructure, and indicators of compromise. The document also emphasizes the importance of automation and privacy when conducting OSINT research to enhance attacks or strengthen defenses.
This document discusses techniques for hunting bad guys on networks, including identifying client-side attacks, malware command and control channels, post-exploitation activities, and hunting artifacts. It provides examples of using DNS logs, firewall logs, HTTP logs, registry keys, installed software inventories, and the AMCache registry hive to look for anomalous behaviors that could indicate security compromises. The goal is to actively hunt for threats rather than just detecting known bad behaviors.
The Indianapolis Splunk User Group meeting from December 1, 2022 included presentations on Risk Based Alerting from Kinney Group's Michael Simko, Outpost Security's Stuart McIntosh, and Horizon3.ai's Snehal Antani.
This document discusses hunting for threats on networks and hosts using free and open source tools. It begins with an overview of threat hunting and the hunt cycle. It then provides recommendations for hunting on the cheap using passive DNS, looking for fast flux domains, domain generation algorithms (DGA), and periodicity in DNS queries to identify anomalies on the network. For hunting on hosts, it recommends using Sysinternals Autoruns to identify abnormal startup programs and persistence mechanisms by comparing autorun items across systems. Yara rules and VirusTotal are also suggested for scanning for known malware indicators. The document emphasizes establishing a baseline of normal activity and investigating outliers.
For organizations and individuals with limited security budgets, successfully hunting for cyber adversaries can be a daunting challenge. Threat Intelligence can be expensive and sometimes
nothing more than IoCs or blacklists. In this talk, Endgame’s threat research team will present a series of techniques that can enable organizations to leverage free or almost-free sources of
data and open-source tools to “hunt on the cheap.” They’ll explain how to: retrieve attackers’ tools from globally distributed honeynets that look like your organization or a juicy launching
point to attackers; enrich the data past basic file/tool hashes to identify malicious command and control IPs/domains through automated binary analysis using open-source sandboxes and tools; and use passive DNS data to identify active infections and enrich existing data sets. Attendees will learn how to apply these three techniques to hunt for adversaries within their own
networks. They will also learn about the various open-source solutions available, such as graph databases, that make these techniques inexpensive and within the scope of many organizations.
Anjum Ahuja, Senior Threat Researcher, Endgame
Jamie Butler, Chief Scientist, Endgame
Andrew Morris, Threat Researcher, Endgame
Enterprise Data Governance and Compliance at Scale with Sri Eshasubbiah and S...Databricks
Twilio is a cloud communication platform supporting 40,000+customers, 1+ Million Developers, handling millions of messages per minute across the globe from various different sectors. There are many regulated industries and parts of the world where data needs to be moved, stored and accessed securely. Twilio provides firm foundation for that and is focused towards providing customers a secure and scalable telecommunication cloud platform.
Handling this massive amount of data in secured way is possible because of Kafka and Spark. Twilio’s Data platform team is building a compliance layer on top of Data Pipeline, Data Lake and Bulk Data Transformer to handle different compliance requirements such as GDPR, HIPAA, PCI etc. Secured Data Pipeline is a streaming channel for Data Lake, BI Data Warehouse and Elastic Search whereas Bulk Data Transformer is a ETL channel to transfer and transform bulk data from RDMS. Kafka Connect, Spark SQL and Data frames powers streaming channel and makes data wrangling and de-duping efficient.
The Data Compliance layer has various components such as Data Anonymization, Authentication, Authorization, Auditing, Custom Retention and Data Deletion to handle the requirements of Processor and Controller. Anonymization as a service provides redaction, encryption and data obfuscation and is based on the varying needs of compliance and customers. Role based Access Control is applied on Kafka layers and S3 Layers to make sure only valid systems and users can access the critical data and rest of them will access to have only redacted data. Auditing service tracks all the access to various resources both from processor and controller perspective. Distributed Spark executor model makes the petabytes of data deletion efficient after the custom retention period. Thus scalable, fault-tolerant, distributed, secured, audited data governance pipeline is possible through Kafka, Kafka connect and Spark.
Geek Sync | Taking Control of Your Organization’s SQL Server SprawlIDERA Software
You can watch the replay for this Geek Sync webcast in the IDERA Resource Center: http://ow.ly/PsuV50A5bSh
You have SQL Server sprawl throughout your organization. There are SQL Servers installed on servers in all of your environments, some of which you may not even be aware of. IT personnel and developers also have SQL Servers installed; even if they are approved, there’s no guarantee of a minimal configuration. How do you get your arms around this situation?
Join IDERA and K. Brian Kelley on Wednesday, July 26 at 11 AM CT as he looks at the various ways to detect SQL Server in your environment. He will take the next step to document what he finds, noting what’s approved and what’s not. Brian will also explore the various means to disable and uninstall unapproved SQL Servers. Finally, he will look at how you can configure existing, approved SQL Servers to a minimum standard. At each step of the way Brian will explain how to automate these tasks to reduce the amount of manual work required. This is a Geek Sync you will not want to miss!
Apache Solr is a highly scalable, open source search technology that makes it easy for organizations to deliver core search, recommendations or business intelligence applications. In Solr today, if you have to store and provide search against confidential data, you are on your own on trying to figure out how to protect that data from being encrypted at rest, during transport or to prevent a rogue employee or third party having access to that sensitive data. In this talk, you will learn about how you can keep the search index secure and provide key based encryption that ensures that your sensitive data is protected at all levels and your Solr application meets compliance requirements.
Shmoocon XV - Analyzing Shodan Images with Optical Character RecognitionMichaelPortera2
This document discusses using optical character recognition (OCR) to analyze screenshots from Shodan. The author describes running Shodan API scripts to collect images and then using Amazon Rekognition to perform OCR on the images. Sample outputs are shown labeling lines of text and objects detected. Potential applications discussed include reconnaissance, identifying unmanaged cloud instances, and threat intelligence gathering by analyzing screenshots for sensitive information like passwords or malware domains.
War stories from building the Global Patent Search Network, and why Data folks need to think more about UX and Discovery, and UX folks need to think more about Data.
Analytics in Search
Many companies including Lucidworks have embraced the Kibana open source code to add visualization and analytics to enhance search management. Ravi Krishnamurthy , VP of Professional Services at Lucidworks, will show Silk, Lucid's implementation of Kibana, which provides all the capabilities of the open source code but adds enterprise-critical capabilities like authentication and security to protect restricted content.
Dirty Little Secrets They Didn't Teach You In Pentest Class v2Chris Gates
This talk (hopefully) provides some new pentesters tools and tricks. Basically a continuation of last year’s Dirty Little Secrets they didn’t teach you in Pentest class. Topics include; OSINT and APIs, certificate stealing, F**king with Incident Response Teams, 10 ways to psexec, and more. Yes, mostly using metasploit.
Dirty Little Secrets They Didn't Teach You In Pentest Class v2Rob Fuller
This talk (hopefully) provides some new pentesters tools and tricks. Basically a continuation of last year’s Dirty Little Secrets they didn’t teach you in Pentest class. Topics include; OSINT and APIs, certificate stealing, F**king with Incident Response Teams, 10 ways to psexec, and more. Yes, mostly using metasploit.
The SOC analyst training program is meticulously designed by the subject matter experts at Infosec Train. The training program offers a deep insight into the SOC operations and workflows. It is an excellent opportunity for aspiring and current SOC analysts (L1/L2/L3) to level up their skills to mitigate business risks by effectively handling and responding to security threats.
https://www.infosectrain.com/courses/soc-analyst-expert-training/
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
1. OSInt,
Shoe Laces and Bubble Gum
How to use OSInt with limited time and budget to better understand how attackers
see your organization
2. • Jamie McMurray
• Security Operations Manger
@ Kobalt Security
• Providing proactive security
monitoring to the mid-market
• Background in software
development
• Combined experiences as
implementor and defender
About Me
9. Public Record
• What to look for:
• SPF Records
• Service Providers, Netblocks
• Misconfiguration
• Internal Addresses
• Hosting
• AWS, GCP, Digital Ocean, Azure
• Email Providers
• Office365, Google, Self-Hosted
12. Devil in the Details
• “Hidden”
• What to look for:
• Dev Practices
• Public Facing Staging and Development Sites
• New Projects
• Customer Names
• mypotential-customer.domain.com
• Services
• poc-poorly-configured-service.domain.com
15. Dialing Wand Required
• A well known problem
• Mis-typed domains (Internal & External)
• Targeted Phishing Attacks
• What to look for:
• Registered Domains
• MX Records
• SSDeep
18. Weakest Link
• Domain Take-over
• What to look for:
• Single Factor Authentication
• Transfer Domain to a provider that support MFA
• Exposed admin email accounts
21. My Voice is My Passport
• What to look for:
• Customer Experience
• Self-Signed
• Expired
• Reveal Services
• Alt Names & Subject
• Reveal other Domains via Organization Name Search
40. All Your Bases
• DNS Information
• Subdomain
• Phishing Domains
• Whois
• Certificates
• Ports and Services
• Web Capture
• User Email Discovery
• Code Repositories
• Public Storage
41. Summary
• Focus on tools with easily consumable output either
visually on the command line or in json format
• Start from domain enumeration and work out
• Look to identify security risk that crosses over into
customer/end-user risk