Podcast
Questions and Answers
Which of the following is NOT a type of information gathering mentioned in the content?
Which of the following is NOT a type of information gathering mentioned in the content?
Penetration testing frameworks often include a step for information gathering. What is the primary purpose of this step?
Penetration testing frameworks often include a step for information gathering. What is the primary purpose of this step?
What is a key difference between 'Competitive Intelligence' and 'Corporate Espionage'?
What is a key difference between 'Competitive Intelligence' and 'Corporate Espionage'?
According to the content, what percentage of information required for successful competition is publicly available?
According to the content, what percentage of information required for successful competition is publicly available?
Signup and view all the answers
What is the intended outcome of the information gathering phase?
What is the intended outcome of the information gathering phase?
Signup and view all the answers
What is the estimated annual loss to US industries due to corporate espionage, according to the content?
What is the estimated annual loss to US industries due to corporate espionage, according to the content?
Signup and view all the answers
Which of the following is NOT a benefit of competitive intelligence?
Which of the following is NOT a benefit of competitive intelligence?
Signup and view all the answers
According to the content, what is the definition of 'trade secret'?
According to the content, what is the definition of 'trade secret'?
Signup and view all the answers
What can the target's external infrastructure profile reveal?
What can the target's external infrastructure profile reveal?
Signup and view all the answers
How can social engineering be effectively used during information gathering?
How can social engineering be effectively used during information gathering?
Signup and view all the answers
Which of the following methods can provide information about remote access to a target?
Which of the following methods can provide information about remote access to a target?
Signup and view all the answers
What type of information can be extracted from publicly accessible files?
What type of information can be extracted from publicly accessible files?
Signup and view all the answers
What is a technique used in passive fingerprinting?
What is a technique used in passive fingerprinting?
Signup and view all the answers
What does active fingerprinting typically entail?
What does active fingerprinting typically entail?
Signup and view all the answers
Which aspect is crucial when discovering a target organization's defensive capabilities?
Which aspect is crucial when discovering a target organization's defensive capabilities?
Signup and view all the answers
What factor can often complicate information gathering regarding a target's defenses?
What factor can often complicate information gathering regarding a target's defenses?
Signup and view all the answers
What is a key indicator that a target organization takes security seriously?
What is a key indicator that a target organization takes security seriously?
Signup and view all the answers
What can be an indication of security responsibilities in non-security related job postings?
What can be an indication of security responsibilities in non-security related job postings?
Signup and view all the answers
Which tool can be used to gather email addresses from various search engines?
Which tool can be used to gather email addresses from various search engines?
Signup and view all the answers
How can footprinting be defined in the context of information gathering?
How can footprinting be defined in the context of information gathering?
Signup and view all the answers
What would be a significant concern if an organization has outsourced its security?
What would be a significant concern if an organization has outsourced its security?
Signup and view all the answers
Where is it likely to find corporate email addresses publicly listed?
Where is it likely to find corporate email addresses publicly listed?
Signup and view all the answers
What is one method to verify an individual's social media presence?
What is one method to verify an individual's social media presence?
Signup and view all the answers
What might indicate that employees of a company are engaged in the security community?
What might indicate that employees of a company are engaged in the security community?
Signup and view all the answers
Which of the following methods are NOT commonly used in Open-Source Intelligence (OSINT) gathering?
Which of the following methods are NOT commonly used in Open-Source Intelligence (OSINT) gathering?
Signup and view all the answers
What is the main reason for conducting Open-Source Intelligence (OSINT) gathering?
What is the main reason for conducting Open-Source Intelligence (OSINT) gathering?
Signup and view all the answers
What kind of information would be most helpful for an attacker to gain access to an organization's network?
What kind of information would be most helpful for an attacker to gain access to an organization's network?
Signup and view all the answers
Which of the following is NOT considered a useful piece of information for an attacker to gather?
Which of the following is NOT considered a useful piece of information for an attacker to gather?
Signup and view all the answers
Which of these scenarios best exemplifies "Information Warfare" as defined in the provided text?
Which of these scenarios best exemplifies "Information Warfare" as defined in the provided text?
Signup and view all the answers
Which of the following is NOT considered a common method employed by disgruntled employees in illicit activities?
Which of the following is NOT considered a common method employed by disgruntled employees in illicit activities?
Signup and view all the answers
What is one way that a company can protect itself from "Inside Jobs" by disgruntled employees?
What is one way that a company can protect itself from "Inside Jobs" by disgruntled employees?
Signup and view all the answers
How can "False Pretenses" be used to infiltrate a company for intelligence gathering?
How can "False Pretenses" be used to infiltrate a company for intelligence gathering?
Signup and view all the answers
Which of the following is NOT a characteristic of Open Source Intelligence (OSINT) as described in the document?
Which of the following is NOT a characteristic of Open Source Intelligence (OSINT) as described in the document?
Signup and view all the answers
What is a major limitation of passive information gathering, as described in the document?
What is a major limitation of passive information gathering, as described in the document?
Signup and view all the answers
Which of the following is an example of a semi-passive information gathering technique mentioned in the document?
Which of the following is an example of a semi-passive information gathering technique mentioned in the document?
Signup and view all the answers
What is the main purpose of the Wayback Machine, as per the document?
What is the main purpose of the Wayback Machine, as per the document?
Signup and view all the answers
What kind of information is typically found in a WHOIS lookup?
What kind of information is typically found in a WHOIS lookup?
Signup and view all the answers
According to the document, what is a key consideration for companies and employees when it comes to online information?
According to the document, what is a key consideration for companies and employees when it comes to online information?
Signup and view all the answers
Which of the following best describes the difference between semi-passive and active information gathering?
Which of the following best describes the difference between semi-passive and active information gathering?
Signup and view all the answers
Which of the following is an example of "Google Dorking", as described in the document?
Which of the following is an example of "Google Dorking", as described in the document?
Signup and view all the answers
What is the primary purpose of performing onsite information gathering, as described in the provided content?
What is the primary purpose of performing onsite information gathering, as described in the provided content?
Signup and view all the answers
Which technique is NOT explicitly mentioned in the provided content as a part of onsite information gathering?
Which technique is NOT explicitly mentioned in the provided content as a part of onsite information gathering?
Signup and view all the answers
What is the main purpose of identifying offsite locations and their importance to the organization during information gathering?
What is the main purpose of identifying offsite locations and their importance to the organization during information gathering?
Signup and view all the answers
According to the content, which type of information can be obtained from mapping affiliate organizations tied to a target business?
According to the content, which type of information can be obtained from mapping affiliate organizations tied to a target business?
Signup and view all the answers
What is the primary focus of ‘Active Information Gathering’ as mentioned in the content?
What is the primary focus of ‘Active Information Gathering’ as mentioned in the content?
Signup and view all the answers
What is the main benefit of understanding the ‘External Relationships’ of a target organization?
What is the main benefit of understanding the ‘External Relationships’ of a target organization?
Signup and view all the answers
Which technique would be considered part of ‘Active Information Gathering’ as described in the provided content?
Which technique would be considered part of ‘Active Information Gathering’ as described in the provided content?
Signup and view all the answers
What is a potential advantage of using the ‘Whois’ command line tool to query information about a domain?
What is a potential advantage of using the ‘Whois’ command line tool to query information about a domain?
Signup and view all the answers
Flashcards
Open-Source Intelligence (OSINT)
Open-Source Intelligence (OSINT)
Data collected from publicly available sources used for intelligence purposes.
Passive Information Gathering
Passive Information Gathering
Collecting information without alerting the target, using only existing data.
Semi-passive Information Gathering
Semi-passive Information Gathering
Profiling a target cautiously to appear like normal internet traffic.
Active Information Gathering
Active Information Gathering
Signup and view all the flashcards
Wayback Machine
Wayback Machine
Signup and view all the flashcards
WHOIS Database
WHOIS Database
Signup and view all the flashcards
Google Dorks
Google Dorks
Signup and view all the flashcards
OSINT Limitations
OSINT Limitations
Signup and view all the flashcards
Inside Jobs
Inside Jobs
Signup and view all the flashcards
False Pretenses
False Pretenses
Signup and view all the flashcards
Information Warfare
Information Warfare
Signup and view all the flashcards
Useful Information to Attackers
Useful Information to Attackers
Signup and view all the flashcards
Probing and Target Scanning
Probing and Target Scanning
Signup and view all the flashcards
Intelligence Gathering Methods
Intelligence Gathering Methods
Signup and view all the flashcards
Security Enforcing Functions
Security Enforcing Functions
Signup and view all the flashcards
Information Gathering
Information Gathering
Signup and view all the flashcards
OSINT
OSINT
Signup and view all the flashcards
Competitive Intelligence
Competitive Intelligence
Signup and view all the flashcards
Corporate Espionage
Corporate Espionage
Signup and view all the flashcards
Footprinting
Footprinting
Signup and view all the flashcards
Trade Secret
Trade Secret
Signup and view all the flashcards
Pentesting
Pentesting
Signup and view all the flashcards
Reconnaissance
Reconnaissance
Signup and view all the flashcards
Vulnerability Scanning
Vulnerability Scanning
Signup and view all the flashcards
Social Engineering
Social Engineering
Signup and view all the flashcards
Onsite Information Gathering
Onsite Information Gathering
Signup and view all the flashcards
Offsite Information Gathering
Offsite Information Gathering
Signup and view all the flashcards
Organizational Chart
Organizational Chart
Signup and view all the flashcards
Document Metadata
Document Metadata
Signup and view all the flashcards
External Infrastructure Profile
External Infrastructure Profile
Signup and view all the flashcards
OSINT Searches
OSINT Searches
Signup and view all the flashcards
Remote Access Information
Remote Access Information
Signup and view all the flashcards
Application Usage List
Application Usage List
Signup and view all the flashcards
Passive Fingerprinting
Passive Fingerprinting
Signup and view all the flashcards
Active Fingerprinting
Active Fingerprinting
Signup and view all the flashcards
Defense Technologies Fingerprinting
Defense Technologies Fingerprinting
Signup and view all the flashcards
Human Defensive Capability
Human Defensive Capability
Signup and view all the flashcards
CERT/CSIRT/PSRT
CERT/CSIRT/PSRT
Signup and view all the flashcards
Job Listings for Security Positions
Job Listings for Security Positions
Signup and view all the flashcards
Outsourcing Security
Outsourcing Security
Signup and view all the flashcards
Profile Mapping
Profile Mapping
Signup and view all the flashcards
Internet Presence
Internet Presence
Signup and view all the flashcards
theHarvester Tool
theHarvester Tool
Signup and view all the flashcards
Email Address Discovery
Email Address Discovery
Signup and view all the flashcards
Study Notes
Ethical Hacking and Penetration Testing - Lecture 2: Information Gathering
- This lecture covers information gathering, a crucial phase in penetration testing
- Information gathering, also known as intelligence gathering, involves reconnaissance to collect as much information as possible about a target
- This gathered information is used to inform further phases (target scanning, vulnerability assessment, exploitation)
- The more information collected, the more attack vectors are identified
- Information gathering methods include:
- Competitive Intelligence: Relies on ethical methods, collecting publicly available data to gain business insights
- Corporate Espionage: Illicitly accessing trade secrets for economic gain (illegal)
- Information Warfare: State-sponsored actions to achieve information superiority (illegal)
- Private Investigation and Other Methods
- Pentesting: Legal and ethical testing of security systems
- Information Gathering can be completed actively or passively
- Active information gathering can include:
- Network Infrastructure mapping
- Organization Structure and Charts
- Location details
- Employee information
- External Relationships
- Physical Infrastructure
- Electronic Security
- Communication Channels
- Some examples tools for Active Information gathering include:
- Ping, Traceroute, Nmap
- Passive information gathering focuses on information publicly available without directly interacting with the target
- Examples of passive information gathering include:
- Whois lookups
- Google searches
- Network Block identification
- Tools used for passive information gathering include:
- Wayback Machine, Google Dorks
- There are three forms of OSINT (Open Source Intelligence):
- Passive: gathering information without interacting with the target
- Semi-passive: gathering information that appears as normal website traffic
- Active: gathering information that may be detected
- Active form of foot printing involves sending packets to systems to identify vulnerabilities
- Passive form involves collecting information from publicly available sources
Information Gathering - Covert Gathering
- Includes onsite techniques for information gathering, often over several days
- Includes:
- Physical inspection
- Wireless Scanning
- Employee behavior inspection
- Accessible/adjacent areas
- Dumpster diving
- Equipment identification
External Relationships
- Includes off-site collection from publicly available information
- Includes:
- Analyzing webpages
- Business partners and vendors
- Data centers
Organizational Chart
- Includes techniques for identification of key people, departments, and their relationships
- Includes historical information about the target, such as transactions and promotions
Electronic Metadata
- Metadata provides information about data such as author, date, location etc.
Week's Lab
- Completion of Week 2 labs using various tools, including Whois, theHarvester, Google Dorks, and Wayback Machine
Reading List
- Providing links to various resources on information gathering
Next Week
- Target scanning and enumeration is to be covered in the next session
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
This lecture focuses on the essential phase of information gathering in penetration testing. Learn about crucial techniques and methods used to collect intelligence on a target, including ethical and illicit approaches. Understanding information gathering is vital for identifying potential attack vectors in cybersecurity.