Information Gathering Techniques Quiz
48 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is NOT a method used in onsite information gathering?

  • Physical security inspections
  • Employee behavior training inspection
  • Wireless scanning
  • Social engineering (correct)
  • What is the primary goal of active information gathering?

  • To gather information that can be used to create successful social engineering scenarios
  • To extract information directly from the target organization's systems (correct)
  • To identify the target organization's business partners and suppliers
  • To passively observe the target organization's online activity
  • What is a common example of active information gathering?

  • Using a web crawler to index the target organization's website
  • Reviewing publicly available company profiles
  • Analyzing social media posts about the target organization
  • Performing a port scan on the target organization's network (correct)
  • Why is it important to identify the target organization's offsite locations?

    <p>To determine the organization's network infrastructure (D)</p> Signup and view all the answers

    Which of the following activities can be used to gather information about a target organization's business partners?

    <p>Analyzing publicly available corporate web pages (C)</p> Signup and view all the answers

    What type of information can be gathered by analyzing the metadata of electronic documents?

    <p>The document's creation date and author (B)</p> Signup and view all the answers

    Which of the following is a common technique used to gather information about physical security measures at a target organization?

    <p>Physical security inspections (C)</p> Signup and view all the answers

    How can information about the target organization's business partners be used in social engineering?

    <p>To create more convincing social engineering scenarios (B)</p> Signup and view all the answers

    What is the primary goal of information gathering in penetration testing?

    <p>To gather data for future attack vectors (B)</p> Signup and view all the answers

    Which of the following is a form of legal and ethical information gathering?

    <p>Competitive Intelligence (C)</p> Signup and view all the answers

    What percentage of information required for competitive success is typically available in the public domain?

    <p>95% (C)</p> Signup and view all the answers

    What is defined as the theft of trade secrets for economic gain?

    <p>Corporate Espionage (C)</p> Signup and view all the answers

    Which of these activities most closely relates to information warfare?

    <p>Espionage and intelligence activities (A)</p> Signup and view all the answers

    What kind of losses does corporate espionage create for U.S. industries annually according to estimates?

    <p>$70 billion (C)</p> Signup and view all the answers

    Which phase of the penetration testing framework comes after information gathering?

    <p>Threat Modeling (C)</p> Signup and view all the answers

    Which of the following is NOT a method of information gathering?

    <p>Product Development (B)</p> Signup and view all the answers

    What could be a consequence of companies not considering the information they make public?

    <p>It can allow attackers to gather information about them. (B)</p> Signup and view all the answers

    Which statement is NOT true about Open-Source Intelligence (OSINT)?

    <p>OSINT is always up-to-date and accurate. (A)</p> Signup and view all the answers

    What is a characteristic of Passive Information Gathering?

    <p>It may use archived or stored information. (B)</p> Signup and view all the answers

    What is the primary aim of Semi-passive Information Gathering?

    <p>To gather data without appearing suspicious. (B)</p> Signup and view all the answers

    Which tool allows users to see the historical changes of websites?

    <p>Wayback Machine (C)</p> Signup and view all the answers

    During Passive Information Gathering, which of the following methods is typically used?

    <p>Conducting Google searches. (D)</p> Signup and view all the answers

    What kind of information is typically found in WHOIS records?

    <p>Contact information of the domain owner. (C)</p> Signup and view all the answers

    What is a primary disadvantage of relying on OSINT?

    <p>It can often be manipulated or incorrect. (D)</p> Signup and view all the answers

    What is one of the primary reasons for extracting metadata from files?

    <p>To create a blueprint of the internal network and users (D)</p> Signup and view all the answers

    Which of the following tools is NOT mentioned as a method for extracting metadata?

    <p>MailChimp (C)</p> Signup and view all the answers

    What type of information can be obtained from network blocks owned by an organization?

    <p>Potential usernames associated with email addresses (D)</p> Signup and view all the answers

    What is one of the risks associated with having metadata present in documents?

    <p>It can expose private user information for targeted attacks. (D)</p> Signup and view all the answers

    Which format is NOT typically used for displaying metadata extraction results?

    <p>JPEG (B)</p> Signup and view all the answers

    What kind of information can be pulled from an organization's past marketing campaigns?

    <p>Design components such as colors and graphics (C)</p> Signup and view all the answers

    Which one of these could potentially provide a list of valid usernames for an organization?

    <p>Email addresses found on the organization’s website (C)</p> Signup and view all the answers

    How can information about IP addresses be passively obtained?

    <p>By performing whois searches (B)</p> Signup and view all the answers

    What is the primary purpose of gathering an external infrastructure profile?

    <p>To understand the internal technologies used by a target (B)</p> Signup and view all the answers

    Which method is NOT typically used for passive fingerprinting?

    <p>Sending probe packets to public facing systems (D)</p> Signup and view all the answers

    How can social engineering be effectively employed in an information gathering scenario?

    <p>By contacting product vendors for insider information (D)</p> Signup and view all the answers

    What type of information can How-To documents reveal?

    <p>Procedures for remote access connections (B)</p> Signup and view all the answers

    What is the goal of remote access information gathering?

    <p>To pinpoint potential access points into the organization (C)</p> Signup and view all the answers

    Which of the following is true about active fingerprinting?

    <p>It involves the use of probe packets to test security measures. (D)</p> Signup and view all the answers

    Which factor can complicate the discovery of an organization's defensive human capability?

    <p>High staff turnover rates (C)</p> Signup and view all the answers

    What type of information can header information reveal?

    <p>The systems in use and their protection mechanisms (B)</p> Signup and view all the answers

    What is the purpose of checking for a company-wide CERT/CSIRT/PSRT team?

    <p>To evaluate the company's security response capabilities (D)</p> Signup and view all the answers

    Why is it important to check if security is listed as a requirement for non-security jobs?

    <p>To determine if security awareness is valued company-wide (A)</p> Signup and view all the answers

    What does 'footprinting' involve?

    <p>Interacting with the target to gather information externally (B)</p> Signup and view all the answers

    What can be inferred by mapping an individual's location history?

    <p>Evaluating potential security risks based on locations visited (A)</p> Signup and view all the answers

    How can email addresses be significant in security profiling?

    <p>They can be used to identify usernames publicly associated with individuals (D)</p> Signup and view all the answers

    What is a primary goal of using a tool like theHarvester?

    <p>To automate the search for potential email addresses associated with a domain (B)</p> Signup and view all the answers

    What type of information can be gathered from checking internet presence?

    <p>Public email addresses and personal nicknames (D)</p> Signup and view all the answers

    What is the benefit of reviewing outsourcing agreements in security assessment?

    <p>To determine if the organization's security is solely managed internally or partially outsourced (B)</p> Signup and view all the answers

    Flashcards

    Information Gathering

    The process of collecting data to aid in penetration testing.

    Open-Source Intelligence (OSINT)

    Gathering publicly available information for intelligence purposes.

    Footprinting

    The initial stage of gathering information about a target system.

    Competitive Intelligence

    Legal and ethical data gathering to inform business decisions.

    Signup and view all the flashcards

    Corporate Espionage

    Illegally gathering confidential business information.

    Signup and view all the flashcards

    Corporate Trade Secret

    Economic advantage derived from confidential business information.

    Signup and view all the flashcards

    Intelligence Gathering

    Reconnaissance performed to prepare for a penetration test.

    Signup and view all the flashcards

    Pentesting

    Simulated cyber attacks to test and improve security.

    Signup and view all the flashcards

    OSINT Accuracy

    OSINT may not always be accurate or timely due to manipulations or outdated information.

    Signup and view all the flashcards

    Wayback Machine

    A tool that shows how websites have evolved over time.

    Signup and view all the flashcards

    Passive Information Gathering

    Gathering information without alerting the target; only using archived data.

    Signup and view all the flashcards

    Google Dorks

    Advanced Google search techniques for finding specific information online.

    Signup and view all the flashcards

    Semi-passive Information Gathering

    Profiling a target using normal internet behavior without drawing attention.

    Signup and view all the flashcards

    WHOIS Database

    A record-keeping system for domain registrars providing owner and contact information.

    Signup and view all the flashcards

    Domain Information

    Records maintained by registrars about domain ownership and contact details.

    Signup and view all the flashcards

    Whodis Command

    A command line tool used to query domain registration information.

    Signup and view all the flashcards

    Active Information Gathering

    Detectable reconnaissance aimed at mapping network infrastructure and vulnerabilities.

    Signup and view all the flashcards

    Covert Gathering

    Information gathering conducted secretly to avoid detection.

    Signup and view all the flashcards

    Onsite Information Gathering

    Reconnaissance conducted at specific physical locations over time.

    Signup and view all the flashcards

    Offsite Information Gathering

    Collecting data from locations not directly observed, like remote facilities.

    Signup and view all the flashcards

    Social Engineering

    Manipulating individuals to gain unauthorized access or information.

    Signup and view all the flashcards

    Organizational Chart

    A visual representation identifying key individuals and structures within an organization.

    Signup and view all the flashcards

    Document Metadata

    Information that provides details about a document or data file.

    Signup and view all the flashcards

    External Infrastructure Profile

    Information that reveals technologies used internally by a target based on their external appearance.

    Signup and view all the flashcards

    OSINT Searches

    Open-Source Intelligence searches for publicly available information about target technologies.

    Signup and view all the flashcards

    Remote Access Ingress

    Information about how clients and employees connect remotely to the target organization.

    Signup and view all the flashcards

    Application Usage

    A list of applications used by the target organization gathered from accessible data.

    Signup and view all the flashcards

    Passive Fingerprinting

    Gathering information about defensive technologies by observing public discussions.

    Signup and view all the flashcards

    Active Fingerprinting

    Sending probe packets to identify system defenses through response patterns.

    Signup and view all the flashcards

    Defense Technologies

    Identifiable methods and systems used for protecting an organization's assets.

    Signup and view all the flashcards

    Human Capability Assessment

    Evaluating the defensive skills and knowledge of personnel within a target organization.

    Signup and view all the flashcards

    Metadata

    Data that provides information about other data, such as authorship, resolution, and location.

    Signup and view all the flashcards

    Importance of Metadata

    Metadata helps profile network locations, users, and software details, aiding in security assessments.

    Signup and view all the flashcards

    Metadata Extraction Tools

    Software used to retrieve metadata from documents and images, such as FOCA and exiftool.

    Signup and view all the flashcards

    FOCA

    A GUI-based tool for searching, downloading, and analyzing metadata from documents.

    Signup and view all the flashcards

    Open-Source Searches

    Techniques using public resources to gather data, often revealing network infrastructure details.

    Signup and view all the flashcards

    Whois Search

    A method to obtain information about network ownership and IP addresses.

    Signup and view all the flashcards

    Email Addresses in Recon

    Emails can provide valid usernames and domain structures for gathering intelligence.

    Signup and view all the flashcards

    Past Marketing Campaigns

    Historical marketing data that can guide future projects by revealing usable design elements.

    Signup and view all the flashcards

    CERT/CSIRT/PSRT

    Teams that respond to computer security incidents within organizations.

    Signup and view all the flashcards

    Security Job Listings

    Job postings indicating the frequency of security openings in an organization.

    Signup and view all the flashcards

    Outsourcing Security

    Delegating security responsibilities to external parties or firms.

    Signup and view all the flashcards

    Social Media Presence

    The online profiles and activities of individuals or organizations on social platforms.

    Signup and view all the flashcards

    Usernames from Emails

    Gathering usernames by checking publicly available email addresses.

    Signup and view all the flashcards

    theHarvester

    A tool for automating the search for email addresses across multiple platforms.

    Signup and view all the flashcards

    Location Awareness

    Mapping location history through various information sources for profiling.

    Signup and view all the flashcards

    Footprinting Process

    The initial phase of gathering external information about a target organization.

    Signup and view all the flashcards

    Study Notes

    Ethical Hacking and Penetration Testing - Lecture 2: Information Gathering

    • The lecture is about information gathering in Ethical Hacking and Penetration Testing.
    • Information Gathering or Intelligence Gathering is the reconnaissance process against a target to gather as much information as possible, used to penetrate the target during later stages like target scanning, vulnerability assessment, and exploitation.
    • The more information gathered, the more attack vectors can be identified.
    • Key types of Information Gathering include:
      • Competitive intelligence
      • Corporate Espionage
      • Information Warfare
      • Private Investigations
      • Pentesting

    Competitive Intelligence

    • Relies on legal and ethical methods to gather data.
    • Over 95% of the information needed by companies to compete successfully comes from the public domain.
    • Helps organizations understand their competitive environment to make sound business decisions.

    Corporate Espionage

    • This involves the illicit collection, collation, and analysis of information to gain economic gain.
    • "Trade Secrets" are valuable pieces of information that give a significant advantage over competitors who don't know them.
    • Yearly losses to US industries due to corporate espionage exceed $70 billion.

    How Espionage is Done

    • A majority of illicit activities are internal, such as:
      • Disgruntled employees
      • Bribes from competitors
      • Industrial moles (planted individuals)
      • Companies employing competitors' employees to gain internal knowledge.
      • Applicants interviewing for jobs to get information
      • Spies pretending to be students, journalists, or venture capitalists

    Information Warfare

    • State sponsored information and electronically delivered actions designed to gain information superiority in support of national military strategy.
    • Aims to affect enemy information and information systems while protecting one's own.
    • Also involves electronic warfare, surveillance systems, precision strike, and advanced battlefield management.

    Useful Information for Attackers

    • Structure: Organization charts, departmental diagrams

    • Infrastructure: Phone systems, network diagrams, IT support groups, and utility providers

    • People: Phone directories, email address books, employee information

    • Geography: Locations of the IT department, servers, and other crucial elements

    • Security Enforcing Functions: Access control, password policies, hardware reuse, firewall and IDS use, and other policies

    • Networks: Detailed network topologies, firewalls, routers, and proxy positions

    • Software/Hardware: Machine specifications, operating systems, software versions, and administration policies

    Open-Source Intelligence (OSINT)

    • A method for compiling intelligence from publicly available sources.
    • Involves finding, selecting, and acquiring information from publicly available sources and analyzing it to produce actionable intelligence.
    • This type of information gathering is used to identify entry points into an organization (physical, electronic, and human).
    • Many companies fail to recognize how public information can be used against them by attackers.
      • Employees also often do not consider the risks of putting personal information online.

    OSINT Forms

    • Passive: Gather information from archived or stored sources. Can be outdated or incomplete. Useful if you don't want to be detected. (e.g., Google searches).
    • Semi-passive: Profile the target using methods that appear as normal internet traffic. Look for metadata, but don't try to actively scan for hidden data. (e.g., WHOIS database).
    • Active: Methods that are likely to be noticed by the target. (e.g., sending probe packets to test system vulnerabilities). Should be carefully planned.
    • Wayback Machine: Website archive
    • Google Dorks: Specialized search queries for specific information

    Covert Gathering

    • On-site: Includes gathering information over several days, observing patterns, and reviewing physical security/employee behavior.
    • Off-site: Gathering information about the target's external relationships and their importance to the organization. Analyze openly shared information from websites, corporate webpages, and partner/supplier information.

    Organizational Chart

    • Position Identification: Identifying important individuals
    • Transactions: Mapping changes in an organization (promotions, etc.)
    • Affiliates: Understanding connections to affiliate organizations

    Electronic Metadata

    • Contains information about data or documents, such as author, creation time, location, standards used, etc.
    • The provided file, network, and folder paths are also considered electronic metadata.
    • Image metadata may contain camera information and coordinates/location.
    • Various tools are used to extract metadata (e.g., FOCA, metagoofil, exiftool).

    Electronic Communications

    • Historical and current marketing materials can often reveal useful information about projects, specific technologies, and contacts. This includes colors, fonts, design components, and company contact details.

    Infrastructure Assets

    • External Profile: Understanding the target's external infrastructure profile.
    • Tools: OSINT searches through forums, mailing lists, and other resources.
    • Social Engineering: Use of social engineering against IT organizations and product vendors to gather information.
    • Network Blocks: This is information that is passively available via whois searches. DNSStuff is a tool that offers this information.
    • Email Addresses: Useful for gathering usernames and domain structure. Sources include the company website and shared email groups like groups.google.com.

    Remote Access

    • Methods used by employees and clients to connect.
    • Application, procedures, and user documentation can reveal details.

    Active/Passive Fingerprinting

    • Passive: Using publicly available information to understand a target.
    • Active: Sending network requests to systems to test blocking patterns, analyze headers, and understand protection mechanisms in place. (e.g., using "ping", "trace route, Nmap, or Banner Grabbing.").

    Human Capabilities

    • Presence of a company-wide CERT/CSIRT/PSRT team.
    • Advertisments for security jobs and developers
    • Contract details related to security outsourcing

    Individuals - Employees

    • Internet Presence: Identifying a target's employees online. Includes email addresses, handles, nicknames, registered domains and static IPs.
    • Footprinting: Obtaining information about a target from an external perspective.
    • Social Media Presence: Verifying the presence on social media.

    Lab and Reading Material

    • The lab tasks include gathering insights from tools like Whois, theHarvester, Google Dorks, and the Wayback Machine.
    • Reading materials include links to cheat sheets for Google Dorking and information on passive reconnaissance, OSINT, and social engineering.

    Next Week

    • The following week's material will cover target scanning and enumeration.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on onsite information gathering methods and their importance in cybersecurity. This quiz covers various techniques, goals, and information types related to active information gathering, as well as the significance of understanding a target organization’s security measures. Perfect for students and professionals in the field of information security.

    More Like This

    Information Security Triad
    10 questions
    Introductory IC-02 Information Security
    23 questions
    Use Quizgecko on...
    Browser
    Browser