Podcast
Questions and Answers
What type of information about victim hosts can adversaries gather using asset scanners?
What type of information about victim hosts can adversaries gather using asset scanners?
How do adversaries create custom, target-specific wordlists for attacks?
How do adversaries create custom, target-specific wordlists for attacks?
What is a common use of an asset scanner by APTs?
What is a common use of an asset scanner by APTs?
What could be indicative of added defensive protections on victim hosts?
What could be indicative of added defensive protections on victim hosts?
Signup and view all the answers
In the context of reconnaissance, what does OSINT stand for?
In the context of reconnaissance, what does OSINT stand for?
Signup and view all the answers
What kind of details regarding victim hosts may adversaries gather using asset scanners?
What kind of details regarding victim hosts may adversaries gather using asset scanners?
Signup and view all the answers
What type of information about installed software may be indicative of added defensive protections?
What type of information about installed software may be indicative of added defensive protections?
Signup and view all the answers
How can information about host firmware be used during targeting by adversaries?
How can information about host firmware be used during targeting by adversaries?
Signup and view all the answers
Which of the following is NOT a detail that adversaries might gather about client configurations?
Which of the following is NOT a detail that adversaries might gather about client configurations?
Signup and view all the answers
What type of information about a victim's identity can adversaries potentially use during targeting?
What type of information about a victim's identity can adversaries potentially use during targeting?
Signup and view all the answers
How might knowledge of specific host firmware versions help adversaries in reconnaissance activities?
How might knowledge of specific host firmware versions help adversaries in reconnaissance activities?
Signup and view all the answers
In the context of reconnaissance techniques, what role does information about installed software play?
In the context of reconnaissance techniques, what role does information about installed software play?
Signup and view all the answers
What does the JA3 value help in identifying?
What does the JA3 value help in identifying?
Signup and view all the answers
Which network security aspect do JARM and JA3S fingerprinting techniques help in enhancing?
Which network security aspect do JARM and JA3S fingerprinting techniques help in enhancing?
Signup and view all the answers
What is the focus of zoomeye.org as mentioned in the text?
What is the focus of zoomeye.org as mentioned in the text?
Signup and view all the answers
How do filters on zoomeye.org help users in their search?
How do filters on zoomeye.org help users in their search?
Signup and view all the answers
What type of information does www.spyse.com provide details on?
What type of information does www.spyse.com provide details on?
Signup and view all the answers
Which purpose can Spiderfoot serve according to the text?
Which purpose can Spiderfoot serve according to the text?
Signup and view all the answers
Study Notes
Adversarial Reconnaissance Techniques
- Adversaries create custom wordlists using gathered data to target victims
- Techniques include:
- Gathering victim org information
- Searching victim-owned websites
Host Information Gathering
- Adversaries gather information about victim hosts, including:
- Administrative data (name, assigned IP, functionality, etc.)
- Configuration details (operating system, language, etc.)
- Gathering information about hardware infrastructure, including:
- Types and versions of hardware components
- Presence of additional components (card/biometric readers, dedicated encryption hardware, etc.)
- Gathering information about installed software, including:
- Types and versions on specific hosts
- Presence of additional components (antivirus, SIEMs, Microsoft securities, etc.)
- Gathering information about firmware, including:
- Type and versions on specific hosts
- Inferred information about hosts in the environment (configuration, purpose, age/patch level, etc.)
Client Configurations and Identity Information
- Adversaries gather information about client configurations, including:
- Operating system and version
- Virtualization and architecture
- Language and time zone
- Gathering information about victim identities, including:
- Personal data (employee names, email addresses, etc.)
- Sensitive details such as credentials
TLS Fingerprinting
- JA3 value analysis can identify TLS client software, library, or specific version used
- JARM and JA3S fingerprinting techniques provide insights into TLS connections, helping to:
- Identify anomalies
- Detect potential malicious activity
- Enhance network security and threat intelligence
OSINT Tools
- Zoomeye.org: a search engine and scanning tool for identifying and indexing Internet-connected devices and services
- Offers filters for narrowing search results (country, device type, port, service running, IP, etc.)
- Spyse.com: provides details on domains, IP addresses, technologies used, open ports, and SSL/TLS info
- Censys.io: provides details on certificates, protocols, and other relevant information
- Spiderfoot: an OSINT tool for gathering information (used for both offensive and defensive security)
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Explore the details about installed software types, versions, and additional components like antivirus or SIEMs, as well as information about host firmware that can be exploited during cyber attacks.