Ethical Hacking Lecture 2: Information Gathering
48 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is NOT a type of information gathering mentioned in the content?

  • Information Warfare
  • Corporate Espionage
  • Competitive Intelligence
  • Social Engineering (correct)
  • Penetration testing frameworks often include a step for information gathering. What is the primary purpose of this step?

  • To gather information about the target's security posture and potential attack vectors. (correct)
  • To identify and exploit vulnerabilities in the target's system.
  • To test the effectiveness of the target's security controls.
  • To develop a detailed report of the target's security weaknesses.
  • What is a key difference between 'Competitive Intelligence' and 'Corporate Espionage'?

  • Competitive Intelligence aims to understand the target's strengths, while Corporate Espionage focuses on their weaknesses.
  • Competitive Intelligence focuses on gathering information from internal sources only, while Corporate Espionage targets external sources.
  • Competitive Intelligence uses legal and ethical means, while Corporate Espionage employs illegal and unethical tactics. (correct)
  • Competitive Intelligence is used for strategic planning, while Corporate Espionage is used for financial gain.
  • According to the content, what percentage of information required for successful competition is publicly available?

    <p>95% (C)</p> Signup and view all the answers

    What is the intended outcome of the information gathering phase?

    <p>To create a list of potential attack vectors for the target. (D)</p> Signup and view all the answers

    What is the estimated annual loss to US industries due to corporate espionage, according to the content?

    <p>$70 billion (C)</p> Signup and view all the answers

    Which of the following is NOT a benefit of competitive intelligence?

    <p>Gaining an unfair advantage over competitors (D)</p> Signup and view all the answers

    According to the content, what is the definition of 'trade secret'?

    <p>Proprietary information that is not publicly known and provides a competitive advantage. (C)</p> Signup and view all the answers

    What can the target's external infrastructure profile reveal?

    <p>The technologies used internally (B)</p> Signup and view all the answers

    How can social engineering be effectively used during information gathering?

    <p>Interacting with identified information technology organizations (C)</p> Signup and view all the answers

    Which of the following methods can provide information about remote access to a target?

    <p>Information on remote access portals visible on the homepage (D)</p> Signup and view all the answers

    What type of information can be extracted from publicly accessible files?

    <p>A list of known applications used by the organization (C)</p> Signup and view all the answers

    What is a technique used in passive fingerprinting?

    <p>Searching for discussions by technicians about technology issues (D)</p> Signup and view all the answers

    What does active fingerprinting typically entail?

    <p>Sending test packets to public systems for response profiling (A)</p> Signup and view all the answers

    Which aspect is crucial when discovering a target organization's defensive capabilities?

    <p>Understanding the complexity of defensive human capability (C)</p> Signup and view all the answers

    What factor can often complicate information gathering regarding a target's defenses?

    <p>The inherent complexity of human defensive capabilities (B)</p> Signup and view all the answers

    What is a key indicator that a target organization takes security seriously?

    <p>Presence of a CERT/CSIRT/PSRT team (B)</p> Signup and view all the answers

    What can be an indication of security responsibilities in non-security related job postings?

    <p>Listing of security as a requirement (D)</p> Signup and view all the answers

    Which tool can be used to gather email addresses from various search engines?

    <p>theHarvester (B)</p> Signup and view all the answers

    How can footprinting be defined in the context of information gathering?

    <p>A phase of information gathering from an external perspective (C)</p> Signup and view all the answers

    What would be a significant concern if an organization has outsourced its security?

    <p>Lack of internal security management (B)</p> Signup and view all the answers

    Where is it likely to find corporate email addresses publicly listed?

    <p>Parent-teacher association contact info (D)</p> Signup and view all the answers

    What is one method to verify an individual's social media presence?

    <p>Verifying their social media accounts (D)</p> Signup and view all the answers

    What might indicate that employees of a company are engaged in the security community?

    <p>Specific individuals active in security discussions (D)</p> Signup and view all the answers

    Which of the following methods are NOT commonly used in Open-Source Intelligence (OSINT) gathering?

    <p>Physical Security Analysis (A), Social Engineering (D)</p> Signup and view all the answers

    What is the main reason for conducting Open-Source Intelligence (OSINT) gathering?

    <p>To identify potential vulnerabilities and entry points into an organization (C)</p> Signup and view all the answers

    What kind of information would be most helpful for an attacker to gain access to an organization's network?

    <p>A detailed network topology diagram (A)</p> Signup and view all the answers

    Which of the following is NOT considered a useful piece of information for an attacker to gather?

    <p>The company's marketing plan (C)</p> Signup and view all the answers

    Which of these scenarios best exemplifies "Information Warfare" as defined in the provided text?

    <p>A government utilizing cyberattacks to disrupt a foreign country's critical infrastructure (D)</p> Signup and view all the answers

    Which of the following is NOT considered a common method employed by disgruntled employees in illicit activities?

    <p>Using company resources for personal benefit (D)</p> Signup and view all the answers

    What is one way that a company can protect itself from "Inside Jobs" by disgruntled employees?

    <p>Creating a positive and supportive work environment (C)</p> Signup and view all the answers

    How can "False Pretenses" be used to infiltrate a company for intelligence gathering?

    <p>Using social engineering techniques to gain access to confidential information (B)</p> Signup and view all the answers

    Which of the following is NOT a characteristic of Open Source Intelligence (OSINT) as described in the document?

    <p>OSINT is always accurate and up-to-date. (B)</p> Signup and view all the answers

    What is a major limitation of passive information gathering, as described in the document?

    <p>It is unable to gather real-time data, making the information potentially outdated. (A)</p> Signup and view all the answers

    Which of the following is an example of a semi-passive information gathering technique mentioned in the document?

    <p>Querying published name servers for information about the target organization's domain. (C)</p> Signup and view all the answers

    What is the main purpose of the Wayback Machine, as per the document?

    <p>Storing and archiving websites to showcase their historical evolution. (C)</p> Signup and view all the answers

    What kind of information is typically found in a WHOIS lookup?

    <p>Personal contact information of the domain owner. (A)</p> Signup and view all the answers

    According to the document, what is a key consideration for companies and employees when it comes to online information?

    <p>The potential for online information to be used for malicious purposes. (C)</p> Signup and view all the answers

    Which of the following best describes the difference between semi-passive and active information gathering?

    <p>Semi-passive methods aim to appear as normal internet traffic, while active methods involve more intrusive techniques. (C)</p> Signup and view all the answers

    Which of the following is an example of "Google Dorking", as described in the document?

    <p>Using Google Search to find specific files or documents on a website. (B)</p> Signup and view all the answers

    What is the primary purpose of performing onsite information gathering, as described in the provided content?

    <p>To gather information about employees and their activities. (D)</p> Signup and view all the answers

    Which technique is NOT explicitly mentioned in the provided content as a part of onsite information gathering?

    <p>Social engineering (C)</p> Signup and view all the answers

    What is the main purpose of identifying offsite locations and their importance to the organization during information gathering?

    <p>To determine the target's reliance on external resources and create social engineering scenarios. (C)</p> Signup and view all the answers

    According to the content, which type of information can be obtained from mapping affiliate organizations tied to a target business?

    <p>The target's internal organizational hierarchy and key decision-makers. (C)</p> Signup and view all the answers

    What is the primary focus of ‘Active Information Gathering’ as mentioned in the content?

    <p>Using techniques that are likely to be detected by the target. (B)</p> Signup and view all the answers

    What is the main benefit of understanding the ‘External Relationships’ of a target organization?

    <p>Creating targeted social engineering campaigns aimed at specific individuals. (B)</p> Signup and view all the answers

    Which technique would be considered part of ‘Active Information Gathering’ as described in the provided content?

    <p>Using a port scanner to identify open ports on the target's network. (A)</p> Signup and view all the answers

    What is a potential advantage of using the ‘Whois’ command line tool to query information about a domain?

    <p>It can provide details about the domain's owner, registrar, and other relevant information. (B)</p> Signup and view all the answers

    Flashcards

    Open-Source Intelligence (OSINT)

    Data collected from publicly available sources used for intelligence purposes.

    Passive Information Gathering

    Collecting information without alerting the target, using only existing data.

    Semi-passive Information Gathering

    Profiling a target cautiously to appear like normal internet traffic.

    Active Information Gathering

    Engaging directly with the target to gather information, often detectable.

    Signup and view all the flashcards

    Wayback Machine

    A tool that shows historical versions of websites over time.

    Signup and view all the flashcards

    WHOIS Database

    A database that contains information about registered domain names and their owners.

    Signup and view all the flashcards

    Google Dorks

    Advanced Google search techniques used to find hidden data.

    Signup and view all the flashcards

    OSINT Limitations

    OSINT may not be reliable, accurate, or timely due to data manipulation or age.

    Signup and view all the flashcards

    Inside Jobs

    Illicit activities often committed by employees or insiders.

    Signup and view all the flashcards

    False Pretenses

    Deceptive practices to gain information or access, like impersonation.

    Signup and view all the flashcards

    Information Warfare

    State-sponsored actions aimed at gaining information superiority.

    Signup and view all the flashcards

    Useful Information to Attackers

    Types of data that attackers seek to infiltrate organizations.

    Signup and view all the flashcards

    Probing and Target Scanning

    Techniques to identify vulnerabilities in systems or networks.

    Signup and view all the flashcards

    Intelligence Gathering Methods

    Techniques used to collect actionable intelligence on targets.

    Signup and view all the flashcards

    Security Enforcing Functions

    Policies and measures that protect organizational assets.

    Signup and view all the flashcards

    Information Gathering

    The reconnaissance phase to collect data on a target for penetration testing.

    Signup and view all the flashcards

    OSINT

    Open-Source Intelligence; publicly available data used for intelligence gathering.

    Signup and view all the flashcards

    Competitive Intelligence

    Gathering data legally to understand competitors and inform decision-making.

    Signup and view all the flashcards

    Corporate Espionage

    The illegal collection of proprietary information for economic advantage.

    Signup and view all the flashcards

    Footprinting

    The process of creating a detailed map of a target's systems and networks.

    Signup and view all the flashcards

    Trade Secret

    Information that provides a business advantage over competitors.

    Signup and view all the flashcards

    Pentesting

    Security testing to identify vulnerabilities by simulating cyberattacks.

    Signup and view all the flashcards

    Reconnaissance

    Initial stage of penetration testing involving mapping out network infrastructure and services.

    Signup and view all the flashcards

    Vulnerability Scanning

    Scanning for weaknesses in systems or services during active information gathering.

    Signup and view all the flashcards

    Social Engineering

    Manipulating individuals to divulge confidential information by exploiting human psychology.

    Signup and view all the flashcards

    Onsite Information Gathering

    Physical reconnaissance focusing on the target environment over time to detect patterns.

    Signup and view all the flashcards

    Offsite Information Gathering

    Collecting information from important locations that relate to the organization.

    Signup and view all the flashcards

    Organizational Chart

    Visual representation of the structure of an organization showing relationships and roles.

    Signup and view all the flashcards

    Document Metadata

    Information that provides details about a data/document such as author, date created, etc.

    Signup and view all the flashcards

    External Infrastructure Profile

    Information about a target's technologies and systems that can aid in attack scenarios.

    Signup and view all the flashcards

    OSINT Searches

    Using public forums and resources to gather intel on target technologies.

    Signup and view all the flashcards

    Remote Access Information

    Details on how users connect to a target, revealing potential entry points.

    Signup and view all the flashcards

    Application Usage List

    A collection of applications used by the target, often extractable from metadata.

    Signup and view all the flashcards

    Passive Fingerprinting

    Collecting tech information through public discussions without alerting the target.

    Signup and view all the flashcards

    Active Fingerprinting

    Directly testing target systems with specific probes to reveal technology.

    Signup and view all the flashcards

    Defense Technologies Fingerprinting

    Identifying security measures employed by the target organization through various methods.

    Signup and view all the flashcards

    Human Defensive Capability

    Understanding a target's defensive human resources and their effectiveness is challenging.

    Signup and view all the flashcards

    CERT/CSIRT/PSRT

    Teams responsible for responding to computer security incidents.

    Signup and view all the flashcards

    Job Listings for Security Positions

    Analyzing job ads that require security expertise to assess security focus.

    Signup and view all the flashcards

    Outsourcing Security

    Determining if an organization's security is managed externally.

    Signup and view all the flashcards

    Profile Mapping

    Mapping an individual's location history for potential security insights.

    Signup and view all the flashcards

    Internet Presence

    Observing an individual’s online activities and identifiable information.

    Signup and view all the flashcards

    theHarvester Tool

    A Python tool to automate finding email addresses from search engines.

    Signup and view all the flashcards

    Email Address Discovery

    Finding corporate email addresses through various online sources.

    Signup and view all the flashcards

    Study Notes

    Ethical Hacking and Penetration Testing - Lecture 2: Information Gathering

    • This lecture covers information gathering, a crucial phase in penetration testing
    • Information gathering, also known as intelligence gathering, involves reconnaissance to collect as much information as possible about a target
    • This gathered information is used to inform further phases (target scanning, vulnerability assessment, exploitation)
    • The more information collected, the more attack vectors are identified
    • Information gathering methods include:
      • Competitive Intelligence: Relies on ethical methods, collecting publicly available data to gain business insights
      • Corporate Espionage: Illicitly accessing trade secrets for economic gain (illegal)
      • Information Warfare: State-sponsored actions to achieve information superiority (illegal)
      • Private Investigation and Other Methods
      • Pentesting: Legal and ethical testing of security systems
    • Information Gathering can be completed actively or passively
    • Active information gathering can include:
      • Network Infrastructure mapping
      • Organization Structure and Charts
      • Location details
      • Employee information
      • External Relationships
      • Physical Infrastructure
      • Electronic Security
      • Communication Channels
    • Some examples tools for Active Information gathering include:
      • Ping, Traceroute, Nmap
    • Passive information gathering focuses on information publicly available without directly interacting with the target
    • Examples of passive information gathering include:
      • Whois lookups
      • Google searches
      • Network Block identification
    • Tools used for passive information gathering include:
      • Wayback Machine, Google Dorks
    • There are three forms of OSINT (Open Source Intelligence):
      • Passive: gathering information without interacting with the target
      • Semi-passive: gathering information that appears as normal website traffic
      • Active: gathering information that may be detected
    • Active form of foot printing involves sending packets to systems to identify vulnerabilities
    • Passive form involves collecting information from publicly available sources

    Information Gathering - Covert Gathering

    • Includes onsite techniques for information gathering, often over several days
    • Includes:
      • Physical inspection
      • Wireless Scanning
      • Employee behavior inspection
      • Accessible/adjacent areas
      • Dumpster diving
      • Equipment identification

    External Relationships

    • Includes off-site collection from publicly available information
    • Includes:
      • Analyzing webpages
      • Business partners and vendors
      • Data centers

    Organizational Chart

    • Includes techniques for identification of key people, departments, and their relationships
    • Includes historical information about the target, such as transactions and promotions

    Electronic Metadata

    • Metadata provides information about data such as author, date, location etc.

    Week's Lab

    • Completion of Week 2 labs using various tools, including Whois, theHarvester, Google Dorks, and Wayback Machine

    Reading List

    • Providing links to various resources on information gathering

    Next Week

    • Target scanning and enumeration is to be covered in the next session

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    This lecture focuses on the essential phase of information gathering in penetration testing. Learn about crucial techniques and methods used to collect intelligence on a target, including ethical and illicit approaches. Understanding information gathering is vital for identifying potential attack vectors in cybersecurity.

    More Like This

    Use Quizgecko on...
    Browser
    Browser