Podcast
Questions and Answers
Which of the following is NOT a method used in onsite information gathering?
Which of the following is NOT a method used in onsite information gathering?
What is the primary goal of active information gathering?
What is the primary goal of active information gathering?
What is a common example of active information gathering?
What is a common example of active information gathering?
Why is it important to identify the target organization's offsite locations?
Why is it important to identify the target organization's offsite locations?
Signup and view all the answers
Which of the following activities can be used to gather information about a target organization's business partners?
Which of the following activities can be used to gather information about a target organization's business partners?
Signup and view all the answers
What type of information can be gathered by analyzing the metadata of electronic documents?
What type of information can be gathered by analyzing the metadata of electronic documents?
Signup and view all the answers
Which of the following is a common technique used to gather information about physical security measures at a target organization?
Which of the following is a common technique used to gather information about physical security measures at a target organization?
Signup and view all the answers
How can information about the target organization's business partners be used in social engineering?
How can information about the target organization's business partners be used in social engineering?
Signup and view all the answers
What is the primary goal of information gathering in penetration testing?
What is the primary goal of information gathering in penetration testing?
Signup and view all the answers
Which of the following is a form of legal and ethical information gathering?
Which of the following is a form of legal and ethical information gathering?
Signup and view all the answers
What percentage of information required for competitive success is typically available in the public domain?
What percentage of information required for competitive success is typically available in the public domain?
Signup and view all the answers
What is defined as the theft of trade secrets for economic gain?
What is defined as the theft of trade secrets for economic gain?
Signup and view all the answers
Which of these activities most closely relates to information warfare?
Which of these activities most closely relates to information warfare?
Signup and view all the answers
What kind of losses does corporate espionage create for U.S. industries annually according to estimates?
What kind of losses does corporate espionage create for U.S. industries annually according to estimates?
Signup and view all the answers
Which phase of the penetration testing framework comes after information gathering?
Which phase of the penetration testing framework comes after information gathering?
Signup and view all the answers
Which of the following is NOT a method of information gathering?
Which of the following is NOT a method of information gathering?
Signup and view all the answers
What could be a consequence of companies not considering the information they make public?
What could be a consequence of companies not considering the information they make public?
Signup and view all the answers
Which statement is NOT true about Open-Source Intelligence (OSINT)?
Which statement is NOT true about Open-Source Intelligence (OSINT)?
Signup and view all the answers
What is a characteristic of Passive Information Gathering?
What is a characteristic of Passive Information Gathering?
Signup and view all the answers
What is the primary aim of Semi-passive Information Gathering?
What is the primary aim of Semi-passive Information Gathering?
Signup and view all the answers
Which tool allows users to see the historical changes of websites?
Which tool allows users to see the historical changes of websites?
Signup and view all the answers
During Passive Information Gathering, which of the following methods is typically used?
During Passive Information Gathering, which of the following methods is typically used?
Signup and view all the answers
What kind of information is typically found in WHOIS records?
What kind of information is typically found in WHOIS records?
Signup and view all the answers
What is a primary disadvantage of relying on OSINT?
What is a primary disadvantage of relying on OSINT?
Signup and view all the answers
What is one of the primary reasons for extracting metadata from files?
What is one of the primary reasons for extracting metadata from files?
Signup and view all the answers
Which of the following tools is NOT mentioned as a method for extracting metadata?
Which of the following tools is NOT mentioned as a method for extracting metadata?
Signup and view all the answers
What type of information can be obtained from network blocks owned by an organization?
What type of information can be obtained from network blocks owned by an organization?
Signup and view all the answers
What is one of the risks associated with having metadata present in documents?
What is one of the risks associated with having metadata present in documents?
Signup and view all the answers
Which format is NOT typically used for displaying metadata extraction results?
Which format is NOT typically used for displaying metadata extraction results?
Signup and view all the answers
What kind of information can be pulled from an organization's past marketing campaigns?
What kind of information can be pulled from an organization's past marketing campaigns?
Signup and view all the answers
Which one of these could potentially provide a list of valid usernames for an organization?
Which one of these could potentially provide a list of valid usernames for an organization?
Signup and view all the answers
How can information about IP addresses be passively obtained?
How can information about IP addresses be passively obtained?
Signup and view all the answers
What is the primary purpose of gathering an external infrastructure profile?
What is the primary purpose of gathering an external infrastructure profile?
Signup and view all the answers
Which method is NOT typically used for passive fingerprinting?
Which method is NOT typically used for passive fingerprinting?
Signup and view all the answers
How can social engineering be effectively employed in an information gathering scenario?
How can social engineering be effectively employed in an information gathering scenario?
Signup and view all the answers
What type of information can How-To documents reveal?
What type of information can How-To documents reveal?
Signup and view all the answers
What is the goal of remote access information gathering?
What is the goal of remote access information gathering?
Signup and view all the answers
Which of the following is true about active fingerprinting?
Which of the following is true about active fingerprinting?
Signup and view all the answers
Which factor can complicate the discovery of an organization's defensive human capability?
Which factor can complicate the discovery of an organization's defensive human capability?
Signup and view all the answers
What type of information can header information reveal?
What type of information can header information reveal?
Signup and view all the answers
What is the purpose of checking for a company-wide CERT/CSIRT/PSRT team?
What is the purpose of checking for a company-wide CERT/CSIRT/PSRT team?
Signup and view all the answers
Why is it important to check if security is listed as a requirement for non-security jobs?
Why is it important to check if security is listed as a requirement for non-security jobs?
Signup and view all the answers
What does 'footprinting' involve?
What does 'footprinting' involve?
Signup and view all the answers
What can be inferred by mapping an individual's location history?
What can be inferred by mapping an individual's location history?
Signup and view all the answers
How can email addresses be significant in security profiling?
How can email addresses be significant in security profiling?
Signup and view all the answers
What is a primary goal of using a tool like theHarvester?
What is a primary goal of using a tool like theHarvester?
Signup and view all the answers
What type of information can be gathered from checking internet presence?
What type of information can be gathered from checking internet presence?
Signup and view all the answers
What is the benefit of reviewing outsourcing agreements in security assessment?
What is the benefit of reviewing outsourcing agreements in security assessment?
Signup and view all the answers
Flashcards
Information Gathering
Information Gathering
The process of collecting data to aid in penetration testing.
Open-Source Intelligence (OSINT)
Open-Source Intelligence (OSINT)
Gathering publicly available information for intelligence purposes.
Footprinting
Footprinting
The initial stage of gathering information about a target system.
Competitive Intelligence
Competitive Intelligence
Signup and view all the flashcards
Corporate Espionage
Corporate Espionage
Signup and view all the flashcards
Corporate Trade Secret
Corporate Trade Secret
Signup and view all the flashcards
Intelligence Gathering
Intelligence Gathering
Signup and view all the flashcards
Pentesting
Pentesting
Signup and view all the flashcards
OSINT Accuracy
OSINT Accuracy
Signup and view all the flashcards
Wayback Machine
Wayback Machine
Signup and view all the flashcards
Passive Information Gathering
Passive Information Gathering
Signup and view all the flashcards
Google Dorks
Google Dorks
Signup and view all the flashcards
Semi-passive Information Gathering
Semi-passive Information Gathering
Signup and view all the flashcards
WHOIS Database
WHOIS Database
Signup and view all the flashcards
Domain Information
Domain Information
Signup and view all the flashcards
Whodis Command
Whodis Command
Signup and view all the flashcards
Active Information Gathering
Active Information Gathering
Signup and view all the flashcards
Covert Gathering
Covert Gathering
Signup and view all the flashcards
Onsite Information Gathering
Onsite Information Gathering
Signup and view all the flashcards
Offsite Information Gathering
Offsite Information Gathering
Signup and view all the flashcards
Social Engineering
Social Engineering
Signup and view all the flashcards
Organizational Chart
Organizational Chart
Signup and view all the flashcards
Document Metadata
Document Metadata
Signup and view all the flashcards
External Infrastructure Profile
External Infrastructure Profile
Signup and view all the flashcards
OSINT Searches
OSINT Searches
Signup and view all the flashcards
Remote Access Ingress
Remote Access Ingress
Signup and view all the flashcards
Application Usage
Application Usage
Signup and view all the flashcards
Passive Fingerprinting
Passive Fingerprinting
Signup and view all the flashcards
Active Fingerprinting
Active Fingerprinting
Signup and view all the flashcards
Defense Technologies
Defense Technologies
Signup and view all the flashcards
Human Capability Assessment
Human Capability Assessment
Signup and view all the flashcards
Metadata
Metadata
Signup and view all the flashcards
Importance of Metadata
Importance of Metadata
Signup and view all the flashcards
Metadata Extraction Tools
Metadata Extraction Tools
Signup and view all the flashcards
FOCA
FOCA
Signup and view all the flashcards
Open-Source Searches
Open-Source Searches
Signup and view all the flashcards
Whois Search
Whois Search
Signup and view all the flashcards
Email Addresses in Recon
Email Addresses in Recon
Signup and view all the flashcards
Past Marketing Campaigns
Past Marketing Campaigns
Signup and view all the flashcards
CERT/CSIRT/PSRT
CERT/CSIRT/PSRT
Signup and view all the flashcards
Security Job Listings
Security Job Listings
Signup and view all the flashcards
Outsourcing Security
Outsourcing Security
Signup and view all the flashcards
Social Media Presence
Social Media Presence
Signup and view all the flashcards
Usernames from Emails
Usernames from Emails
Signup and view all the flashcards
theHarvester
theHarvester
Signup and view all the flashcards
Location Awareness
Location Awareness
Signup and view all the flashcards
Footprinting Process
Footprinting Process
Signup and view all the flashcards
Study Notes
Ethical Hacking and Penetration Testing - Lecture 2: Information Gathering
- The lecture is about information gathering in Ethical Hacking and Penetration Testing.
- Information Gathering or Intelligence Gathering is the reconnaissance process against a target to gather as much information as possible, used to penetrate the target during later stages like target scanning, vulnerability assessment, and exploitation.
- The more information gathered, the more attack vectors can be identified.
- Key types of Information Gathering include:
- Competitive intelligence
- Corporate Espionage
- Information Warfare
- Private Investigations
- Pentesting
Competitive Intelligence
- Relies on legal and ethical methods to gather data.
- Over 95% of the information needed by companies to compete successfully comes from the public domain.
- Helps organizations understand their competitive environment to make sound business decisions.
Corporate Espionage
- This involves the illicit collection, collation, and analysis of information to gain economic gain.
- "Trade Secrets" are valuable pieces of information that give a significant advantage over competitors who don't know them.
- Yearly losses to US industries due to corporate espionage exceed $70 billion.
How Espionage is Done
- A majority of illicit activities are internal, such as:
- Disgruntled employees
- Bribes from competitors
- Industrial moles (planted individuals)
- Companies employing competitors' employees to gain internal knowledge.
- Applicants interviewing for jobs to get information
- Spies pretending to be students, journalists, or venture capitalists
Information Warfare
- State sponsored information and electronically delivered actions designed to gain information superiority in support of national military strategy.
- Aims to affect enemy information and information systems while protecting one's own.
- Also involves electronic warfare, surveillance systems, precision strike, and advanced battlefield management.
Useful Information for Attackers
-
Structure: Organization charts, departmental diagrams
-
Infrastructure: Phone systems, network diagrams, IT support groups, and utility providers
-
People: Phone directories, email address books, employee information
-
Geography: Locations of the IT department, servers, and other crucial elements
-
Security Enforcing Functions: Access control, password policies, hardware reuse, firewall and IDS use, and other policies
-
Networks: Detailed network topologies, firewalls, routers, and proxy positions
-
Software/Hardware: Machine specifications, operating systems, software versions, and administration policies
Open-Source Intelligence (OSINT)
- A method for compiling intelligence from publicly available sources.
- Involves finding, selecting, and acquiring information from publicly available sources and analyzing it to produce actionable intelligence.
- This type of information gathering is used to identify entry points into an organization (physical, electronic, and human).
- Many companies fail to recognize how public information can be used against them by attackers.
- Employees also often do not consider the risks of putting personal information online.
OSINT Forms
- Passive: Gather information from archived or stored sources. Can be outdated or incomplete. Useful if you don't want to be detected. (e.g., Google searches).
- Semi-passive: Profile the target using methods that appear as normal internet traffic. Look for metadata, but don't try to actively scan for hidden data. (e.g., WHOIS database).
- Active: Methods that are likely to be noticed by the target. (e.g., sending probe packets to test system vulnerabilities). Should be carefully planned.
Tools Related to OSINT
- Wayback Machine: Website archive
- Google Dorks: Specialized search queries for specific information
Covert Gathering
- On-site: Includes gathering information over several days, observing patterns, and reviewing physical security/employee behavior.
- Off-site: Gathering information about the target's external relationships and their importance to the organization. Analyze openly shared information from websites, corporate webpages, and partner/supplier information.
Organizational Chart
- Position Identification: Identifying important individuals
- Transactions: Mapping changes in an organization (promotions, etc.)
- Affiliates: Understanding connections to affiliate organizations
Electronic Metadata
- Contains information about data or documents, such as author, creation time, location, standards used, etc.
- The provided file, network, and folder paths are also considered electronic metadata.
- Image metadata may contain camera information and coordinates/location.
- Various tools are used to extract metadata (e.g., FOCA, metagoofil, exiftool).
Electronic Communications
- Historical and current marketing materials can often reveal useful information about projects, specific technologies, and contacts. This includes colors, fonts, design components, and company contact details.
Infrastructure Assets
- External Profile: Understanding the target's external infrastructure profile.
- Tools: OSINT searches through forums, mailing lists, and other resources.
- Social Engineering: Use of social engineering against IT organizations and product vendors to gather information.
- Network Blocks: This is information that is passively available via whois searches. DNSStuff is a tool that offers this information.
- Email Addresses: Useful for gathering usernames and domain structure. Sources include the company website and shared email groups like groups.google.com.
Remote Access
- Methods used by employees and clients to connect.
- Application, procedures, and user documentation can reveal details.
Active/Passive Fingerprinting
- Passive: Using publicly available information to understand a target.
- Active: Sending network requests to systems to test blocking patterns, analyze headers, and understand protection mechanisms in place. (e.g., using "ping", "trace route, Nmap, or Banner Grabbing.").
Human Capabilities
- Presence of a company-wide CERT/CSIRT/PSRT team.
- Advertisments for security jobs and developers
- Contract details related to security outsourcing
Individuals - Employees
- Internet Presence: Identifying a target's employees online. Includes email addresses, handles, nicknames, registered domains and static IPs.
- Footprinting: Obtaining information about a target from an external perspective.
- Social Media Presence: Verifying the presence on social media.
Lab and Reading Material
- The lab tasks include gathering insights from tools like Whois, theHarvester, Google Dorks, and the Wayback Machine.
- Reading materials include links to cheat sheets for Google Dorking and information on passive reconnaissance, OSINT, and social engineering.
Next Week
- The following week's material will cover target scanning and enumeration.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on onsite information gathering methods and their importance in cybersecurity. This quiz covers various techniques, goals, and information types related to active information gathering, as well as the significance of understanding a target organization’s security measures. Perfect for students and professionals in the field of information security.