Podcast
Questions and Answers
Which of the following is NOT a type of information gathering mentioned in the content?
Which of the following is NOT a type of information gathering mentioned in the content?
- Information Warfare
- Corporate Espionage
- Competitive Intelligence
- Social Engineering (correct)
Penetration testing frameworks often include a step for information gathering. What is the primary purpose of this step?
Penetration testing frameworks often include a step for information gathering. What is the primary purpose of this step?
- To gather information about the target's security posture and potential attack vectors. (correct)
- To identify and exploit vulnerabilities in the target's system.
- To test the effectiveness of the target's security controls.
- To develop a detailed report of the target's security weaknesses.
What is a key difference between 'Competitive Intelligence' and 'Corporate Espionage'?
What is a key difference between 'Competitive Intelligence' and 'Corporate Espionage'?
- Competitive Intelligence aims to understand the target's strengths, while Corporate Espionage focuses on their weaknesses.
- Competitive Intelligence focuses on gathering information from internal sources only, while Corporate Espionage targets external sources.
- Competitive Intelligence uses legal and ethical means, while Corporate Espionage employs illegal and unethical tactics. (correct)
- Competitive Intelligence is used for strategic planning, while Corporate Espionage is used for financial gain.
According to the content, what percentage of information required for successful competition is publicly available?
According to the content, what percentage of information required for successful competition is publicly available?
What is the intended outcome of the information gathering phase?
What is the intended outcome of the information gathering phase?
What is the estimated annual loss to US industries due to corporate espionage, according to the content?
What is the estimated annual loss to US industries due to corporate espionage, according to the content?
Which of the following is NOT a benefit of competitive intelligence?
Which of the following is NOT a benefit of competitive intelligence?
According to the content, what is the definition of 'trade secret'?
According to the content, what is the definition of 'trade secret'?
What can the target's external infrastructure profile reveal?
What can the target's external infrastructure profile reveal?
How can social engineering be effectively used during information gathering?
How can social engineering be effectively used during information gathering?
Which of the following methods can provide information about remote access to a target?
Which of the following methods can provide information about remote access to a target?
What type of information can be extracted from publicly accessible files?
What type of information can be extracted from publicly accessible files?
What is a technique used in passive fingerprinting?
What is a technique used in passive fingerprinting?
What does active fingerprinting typically entail?
What does active fingerprinting typically entail?
Which aspect is crucial when discovering a target organization's defensive capabilities?
Which aspect is crucial when discovering a target organization's defensive capabilities?
What factor can often complicate information gathering regarding a target's defenses?
What factor can often complicate information gathering regarding a target's defenses?
What is a key indicator that a target organization takes security seriously?
What is a key indicator that a target organization takes security seriously?
What can be an indication of security responsibilities in non-security related job postings?
What can be an indication of security responsibilities in non-security related job postings?
Which tool can be used to gather email addresses from various search engines?
Which tool can be used to gather email addresses from various search engines?
How can footprinting be defined in the context of information gathering?
How can footprinting be defined in the context of information gathering?
What would be a significant concern if an organization has outsourced its security?
What would be a significant concern if an organization has outsourced its security?
Where is it likely to find corporate email addresses publicly listed?
Where is it likely to find corporate email addresses publicly listed?
What is one method to verify an individual's social media presence?
What is one method to verify an individual's social media presence?
What might indicate that employees of a company are engaged in the security community?
What might indicate that employees of a company are engaged in the security community?
Which of the following methods are NOT commonly used in Open-Source Intelligence (OSINT) gathering?
Which of the following methods are NOT commonly used in Open-Source Intelligence (OSINT) gathering?
What is the main reason for conducting Open-Source Intelligence (OSINT) gathering?
What is the main reason for conducting Open-Source Intelligence (OSINT) gathering?
What kind of information would be most helpful for an attacker to gain access to an organization's network?
What kind of information would be most helpful for an attacker to gain access to an organization's network?
Which of the following is NOT considered a useful piece of information for an attacker to gather?
Which of the following is NOT considered a useful piece of information for an attacker to gather?
Which of these scenarios best exemplifies "Information Warfare" as defined in the provided text?
Which of these scenarios best exemplifies "Information Warfare" as defined in the provided text?
Which of the following is NOT considered a common method employed by disgruntled employees in illicit activities?
Which of the following is NOT considered a common method employed by disgruntled employees in illicit activities?
What is one way that a company can protect itself from "Inside Jobs" by disgruntled employees?
What is one way that a company can protect itself from "Inside Jobs" by disgruntled employees?
How can "False Pretenses" be used to infiltrate a company for intelligence gathering?
How can "False Pretenses" be used to infiltrate a company for intelligence gathering?
Which of the following is NOT a characteristic of Open Source Intelligence (OSINT) as described in the document?
Which of the following is NOT a characteristic of Open Source Intelligence (OSINT) as described in the document?
What is a major limitation of passive information gathering, as described in the document?
What is a major limitation of passive information gathering, as described in the document?
Which of the following is an example of a semi-passive information gathering technique mentioned in the document?
Which of the following is an example of a semi-passive information gathering technique mentioned in the document?
What is the main purpose of the Wayback Machine, as per the document?
What is the main purpose of the Wayback Machine, as per the document?
What kind of information is typically found in a WHOIS lookup?
What kind of information is typically found in a WHOIS lookup?
According to the document, what is a key consideration for companies and employees when it comes to online information?
According to the document, what is a key consideration for companies and employees when it comes to online information?
Which of the following best describes the difference between semi-passive and active information gathering?
Which of the following best describes the difference between semi-passive and active information gathering?
Which of the following is an example of "Google Dorking", as described in the document?
Which of the following is an example of "Google Dorking", as described in the document?
What is the primary purpose of performing onsite information gathering, as described in the provided content?
What is the primary purpose of performing onsite information gathering, as described in the provided content?
Which technique is NOT explicitly mentioned in the provided content as a part of onsite information gathering?
Which technique is NOT explicitly mentioned in the provided content as a part of onsite information gathering?
What is the main purpose of identifying offsite locations and their importance to the organization during information gathering?
What is the main purpose of identifying offsite locations and their importance to the organization during information gathering?
According to the content, which type of information can be obtained from mapping affiliate organizations tied to a target business?
According to the content, which type of information can be obtained from mapping affiliate organizations tied to a target business?
What is the primary focus of ‘Active Information Gathering’ as mentioned in the content?
What is the primary focus of ‘Active Information Gathering’ as mentioned in the content?
What is the main benefit of understanding the ‘External Relationships’ of a target organization?
What is the main benefit of understanding the ‘External Relationships’ of a target organization?
Which technique would be considered part of ‘Active Information Gathering’ as described in the provided content?
Which technique would be considered part of ‘Active Information Gathering’ as described in the provided content?
What is a potential advantage of using the ‘Whois’ command line tool to query information about a domain?
What is a potential advantage of using the ‘Whois’ command line tool to query information about a domain?
Flashcards
Open-Source Intelligence (OSINT)
Open-Source Intelligence (OSINT)
Data collected from publicly available sources used for intelligence purposes.
Passive Information Gathering
Passive Information Gathering
Collecting information without alerting the target, using only existing data.
Semi-passive Information Gathering
Semi-passive Information Gathering
Profiling a target cautiously to appear like normal internet traffic.
Active Information Gathering
Active Information Gathering
Signup and view all the flashcards
Wayback Machine
Wayback Machine
Signup and view all the flashcards
WHOIS Database
WHOIS Database
Signup and view all the flashcards
Google Dorks
Google Dorks
Signup and view all the flashcards
OSINT Limitations
OSINT Limitations
Signup and view all the flashcards
Inside Jobs
Inside Jobs
Signup and view all the flashcards
False Pretenses
False Pretenses
Signup and view all the flashcards
Information Warfare
Information Warfare
Signup and view all the flashcards
Useful Information to Attackers
Useful Information to Attackers
Signup and view all the flashcards
Probing and Target Scanning
Probing and Target Scanning
Signup and view all the flashcards
Intelligence Gathering Methods
Intelligence Gathering Methods
Signup and view all the flashcards
Security Enforcing Functions
Security Enforcing Functions
Signup and view all the flashcards
Information Gathering
Information Gathering
Signup and view all the flashcards
OSINT
OSINT
Signup and view all the flashcards
Competitive Intelligence
Competitive Intelligence
Signup and view all the flashcards
Corporate Espionage
Corporate Espionage
Signup and view all the flashcards
Footprinting
Footprinting
Signup and view all the flashcards
Trade Secret
Trade Secret
Signup and view all the flashcards
Pentesting
Pentesting
Signup and view all the flashcards
Reconnaissance
Reconnaissance
Signup and view all the flashcards
Vulnerability Scanning
Vulnerability Scanning
Signup and view all the flashcards
Social Engineering
Social Engineering
Signup and view all the flashcards
Onsite Information Gathering
Onsite Information Gathering
Signup and view all the flashcards
Offsite Information Gathering
Offsite Information Gathering
Signup and view all the flashcards
Organizational Chart
Organizational Chart
Signup and view all the flashcards
Document Metadata
Document Metadata
Signup and view all the flashcards
External Infrastructure Profile
External Infrastructure Profile
Signup and view all the flashcards
OSINT Searches
OSINT Searches
Signup and view all the flashcards
Remote Access Information
Remote Access Information
Signup and view all the flashcards
Application Usage List
Application Usage List
Signup and view all the flashcards
Passive Fingerprinting
Passive Fingerprinting
Signup and view all the flashcards
Active Fingerprinting
Active Fingerprinting
Signup and view all the flashcards
Defense Technologies Fingerprinting
Defense Technologies Fingerprinting
Signup and view all the flashcards
Human Defensive Capability
Human Defensive Capability
Signup and view all the flashcards
CERT/CSIRT/PSRT
CERT/CSIRT/PSRT
Signup and view all the flashcards
Job Listings for Security Positions
Job Listings for Security Positions
Signup and view all the flashcards
Outsourcing Security
Outsourcing Security
Signup and view all the flashcards
Profile Mapping
Profile Mapping
Signup and view all the flashcards
Internet Presence
Internet Presence
Signup and view all the flashcards
theHarvester Tool
theHarvester Tool
Signup and view all the flashcards
Email Address Discovery
Email Address Discovery
Signup and view all the flashcards
Study Notes
Ethical Hacking and Penetration Testing - Lecture 2: Information Gathering
- This lecture covers information gathering, a crucial phase in penetration testing
- Information gathering, also known as intelligence gathering, involves reconnaissance to collect as much information as possible about a target
- This gathered information is used to inform further phases (target scanning, vulnerability assessment, exploitation)
- The more information collected, the more attack vectors are identified
- Information gathering methods include:
- Competitive Intelligence: Relies on ethical methods, collecting publicly available data to gain business insights
- Corporate Espionage: Illicitly accessing trade secrets for economic gain (illegal)
- Information Warfare: State-sponsored actions to achieve information superiority (illegal)
- Private Investigation and Other Methods
- Pentesting: Legal and ethical testing of security systems
- Information Gathering can be completed actively or passively
- Active information gathering can include:
- Network Infrastructure mapping
- Organization Structure and Charts
- Location details
- Employee information
- External Relationships
- Physical Infrastructure
- Electronic Security
- Communication Channels
- Some examples tools for Active Information gathering include:
- Ping, Traceroute, Nmap
- Passive information gathering focuses on information publicly available without directly interacting with the target
- Examples of passive information gathering include:
- Whois lookups
- Google searches
- Network Block identification
- Tools used for passive information gathering include:
- Wayback Machine, Google Dorks
- There are three forms of OSINT (Open Source Intelligence):
- Passive: gathering information without interacting with the target
- Semi-passive: gathering information that appears as normal website traffic
- Active: gathering information that may be detected
- Active form of foot printing involves sending packets to systems to identify vulnerabilities
- Passive form involves collecting information from publicly available sources
Information Gathering - Covert Gathering
- Includes onsite techniques for information gathering, often over several days
- Includes:
- Physical inspection
- Wireless Scanning
- Employee behavior inspection
- Accessible/adjacent areas
- Dumpster diving
- Equipment identification
External Relationships
- Includes off-site collection from publicly available information
- Includes:
- Analyzing webpages
- Business partners and vendors
- Data centers
Organizational Chart
- Includes techniques for identification of key people, departments, and their relationships
- Includes historical information about the target, such as transactions and promotions
Electronic Metadata
- Metadata provides information about data such as author, date, location etc.
Week's Lab
- Completion of Week 2 labs using various tools, including Whois, theHarvester, Google Dorks, and Wayback Machine
Reading List
- Providing links to various resources on information gathering
Next Week
- Target scanning and enumeration is to be covered in the next session
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.