Information Gathering Techniques Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is NOT a method used in onsite information gathering?

  • Physical security inspections
  • Employee behavior training inspection
  • Wireless scanning
  • Social engineering (correct)

What is the primary goal of active information gathering?

  • To gather information that can be used to create successful social engineering scenarios
  • To extract information directly from the target organization's systems (correct)
  • To identify the target organization's business partners and suppliers
  • To passively observe the target organization's online activity

What is a common example of active information gathering?

  • Using a web crawler to index the target organization's website
  • Reviewing publicly available company profiles
  • Analyzing social media posts about the target organization
  • Performing a port scan on the target organization's network (correct)

Why is it important to identify the target organization's offsite locations?

<p>To determine the organization's network infrastructure (D)</p> Signup and view all the answers

Which of the following activities can be used to gather information about a target organization's business partners?

<p>Analyzing publicly available corporate web pages (C)</p> Signup and view all the answers

What type of information can be gathered by analyzing the metadata of electronic documents?

<p>The document's creation date and author (B)</p> Signup and view all the answers

Which of the following is a common technique used to gather information about physical security measures at a target organization?

<p>Physical security inspections (C)</p> Signup and view all the answers

How can information about the target organization's business partners be used in social engineering?

<p>To create more convincing social engineering scenarios (B)</p> Signup and view all the answers

What is the primary goal of information gathering in penetration testing?

<p>To gather data for future attack vectors (B)</p> Signup and view all the answers

Which of the following is a form of legal and ethical information gathering?

<p>Competitive Intelligence (C)</p> Signup and view all the answers

What percentage of information required for competitive success is typically available in the public domain?

<p>95% (C)</p> Signup and view all the answers

What is defined as the theft of trade secrets for economic gain?

<p>Corporate Espionage (C)</p> Signup and view all the answers

Which of these activities most closely relates to information warfare?

<p>Espionage and intelligence activities (A)</p> Signup and view all the answers

What kind of losses does corporate espionage create for U.S. industries annually according to estimates?

<p>$70 billion (C)</p> Signup and view all the answers

Which phase of the penetration testing framework comes after information gathering?

<p>Threat Modeling (C)</p> Signup and view all the answers

Which of the following is NOT a method of information gathering?

<p>Product Development (B)</p> Signup and view all the answers

What could be a consequence of companies not considering the information they make public?

<p>It can allow attackers to gather information about them. (B)</p> Signup and view all the answers

Which statement is NOT true about Open-Source Intelligence (OSINT)?

<p>OSINT is always up-to-date and accurate. (A)</p> Signup and view all the answers

What is a characteristic of Passive Information Gathering?

<p>It may use archived or stored information. (B)</p> Signup and view all the answers

What is the primary aim of Semi-passive Information Gathering?

<p>To gather data without appearing suspicious. (B)</p> Signup and view all the answers

Which tool allows users to see the historical changes of websites?

<p>Wayback Machine (C)</p> Signup and view all the answers

During Passive Information Gathering, which of the following methods is typically used?

<p>Conducting Google searches. (D)</p> Signup and view all the answers

What kind of information is typically found in WHOIS records?

<p>Contact information of the domain owner. (C)</p> Signup and view all the answers

What is a primary disadvantage of relying on OSINT?

<p>It can often be manipulated or incorrect. (D)</p> Signup and view all the answers

What is one of the primary reasons for extracting metadata from files?

<p>To create a blueprint of the internal network and users (D)</p> Signup and view all the answers

Which of the following tools is NOT mentioned as a method for extracting metadata?

<p>MailChimp (C)</p> Signup and view all the answers

What type of information can be obtained from network blocks owned by an organization?

<p>Potential usernames associated with email addresses (D)</p> Signup and view all the answers

What is one of the risks associated with having metadata present in documents?

<p>It can expose private user information for targeted attacks. (D)</p> Signup and view all the answers

Which format is NOT typically used for displaying metadata extraction results?

<p>JPEG (B)</p> Signup and view all the answers

What kind of information can be pulled from an organization's past marketing campaigns?

<p>Design components such as colors and graphics (C)</p> Signup and view all the answers

Which one of these could potentially provide a list of valid usernames for an organization?

<p>Email addresses found on the organization’s website (C)</p> Signup and view all the answers

How can information about IP addresses be passively obtained?

<p>By performing whois searches (B)</p> Signup and view all the answers

What is the primary purpose of gathering an external infrastructure profile?

<p>To understand the internal technologies used by a target (B)</p> Signup and view all the answers

Which method is NOT typically used for passive fingerprinting?

<p>Sending probe packets to public facing systems (D)</p> Signup and view all the answers

How can social engineering be effectively employed in an information gathering scenario?

<p>By contacting product vendors for insider information (D)</p> Signup and view all the answers

What type of information can How-To documents reveal?

<p>Procedures for remote access connections (B)</p> Signup and view all the answers

What is the goal of remote access information gathering?

<p>To pinpoint potential access points into the organization (C)</p> Signup and view all the answers

Which of the following is true about active fingerprinting?

<p>It involves the use of probe packets to test security measures. (D)</p> Signup and view all the answers

Which factor can complicate the discovery of an organization's defensive human capability?

<p>High staff turnover rates (C)</p> Signup and view all the answers

What type of information can header information reveal?

<p>The systems in use and their protection mechanisms (B)</p> Signup and view all the answers

What is the purpose of checking for a company-wide CERT/CSIRT/PSRT team?

<p>To evaluate the company's security response capabilities (D)</p> Signup and view all the answers

Why is it important to check if security is listed as a requirement for non-security jobs?

<p>To determine if security awareness is valued company-wide (A)</p> Signup and view all the answers

What does 'footprinting' involve?

<p>Interacting with the target to gather information externally (B)</p> Signup and view all the answers

What can be inferred by mapping an individual's location history?

<p>Evaluating potential security risks based on locations visited (A)</p> Signup and view all the answers

How can email addresses be significant in security profiling?

<p>They can be used to identify usernames publicly associated with individuals (D)</p> Signup and view all the answers

What is a primary goal of using a tool like theHarvester?

<p>To automate the search for potential email addresses associated with a domain (B)</p> Signup and view all the answers

What type of information can be gathered from checking internet presence?

<p>Public email addresses and personal nicknames (D)</p> Signup and view all the answers

What is the benefit of reviewing outsourcing agreements in security assessment?

<p>To determine if the organization's security is solely managed internally or partially outsourced (B)</p> Signup and view all the answers

Flashcards

Information Gathering

The process of collecting data to aid in penetration testing.

Open-Source Intelligence (OSINT)

Gathering publicly available information for intelligence purposes.

Footprinting

The initial stage of gathering information about a target system.

Competitive Intelligence

Legal and ethical data gathering to inform business decisions.

Signup and view all the flashcards

Corporate Espionage

Illegally gathering confidential business information.

Signup and view all the flashcards

Corporate Trade Secret

Economic advantage derived from confidential business information.

Signup and view all the flashcards

Intelligence Gathering

Reconnaissance performed to prepare for a penetration test.

Signup and view all the flashcards

Pentesting

Simulated cyber attacks to test and improve security.

Signup and view all the flashcards

OSINT Accuracy

OSINT may not always be accurate or timely due to manipulations or outdated information.

Signup and view all the flashcards

Wayback Machine

A tool that shows how websites have evolved over time.

Signup and view all the flashcards

Passive Information Gathering

Gathering information without alerting the target; only using archived data.

Signup and view all the flashcards

Google Dorks

Advanced Google search techniques for finding specific information online.

Signup and view all the flashcards

Semi-passive Information Gathering

Profiling a target using normal internet behavior without drawing attention.

Signup and view all the flashcards

WHOIS Database

A record-keeping system for domain registrars providing owner and contact information.

Signup and view all the flashcards

Domain Information

Records maintained by registrars about domain ownership and contact details.

Signup and view all the flashcards

Whodis Command

A command line tool used to query domain registration information.

Signup and view all the flashcards

Active Information Gathering

Detectable reconnaissance aimed at mapping network infrastructure and vulnerabilities.

Signup and view all the flashcards

Covert Gathering

Information gathering conducted secretly to avoid detection.

Signup and view all the flashcards

Onsite Information Gathering

Reconnaissance conducted at specific physical locations over time.

Signup and view all the flashcards

Offsite Information Gathering

Collecting data from locations not directly observed, like remote facilities.

Signup and view all the flashcards

Social Engineering

Manipulating individuals to gain unauthorized access or information.

Signup and view all the flashcards

Organizational Chart

A visual representation identifying key individuals and structures within an organization.

Signup and view all the flashcards

Document Metadata

Information that provides details about a document or data file.

Signup and view all the flashcards

External Infrastructure Profile

Information that reveals technologies used internally by a target based on their external appearance.

Signup and view all the flashcards

OSINT Searches

Open-Source Intelligence searches for publicly available information about target technologies.

Signup and view all the flashcards

Remote Access Ingress

Information about how clients and employees connect remotely to the target organization.

Signup and view all the flashcards

Application Usage

A list of applications used by the target organization gathered from accessible data.

Signup and view all the flashcards

Passive Fingerprinting

Gathering information about defensive technologies by observing public discussions.

Signup and view all the flashcards

Active Fingerprinting

Sending probe packets to identify system defenses through response patterns.

Signup and view all the flashcards

Defense Technologies

Identifiable methods and systems used for protecting an organization's assets.

Signup and view all the flashcards

Human Capability Assessment

Evaluating the defensive skills and knowledge of personnel within a target organization.

Signup and view all the flashcards

Metadata

Data that provides information about other data, such as authorship, resolution, and location.

Signup and view all the flashcards

Importance of Metadata

Metadata helps profile network locations, users, and software details, aiding in security assessments.

Signup and view all the flashcards

Metadata Extraction Tools

Software used to retrieve metadata from documents and images, such as FOCA and exiftool.

Signup and view all the flashcards

FOCA

A GUI-based tool for searching, downloading, and analyzing metadata from documents.

Signup and view all the flashcards

Open-Source Searches

Techniques using public resources to gather data, often revealing network infrastructure details.

Signup and view all the flashcards

Whois Search

A method to obtain information about network ownership and IP addresses.

Signup and view all the flashcards

Email Addresses in Recon

Emails can provide valid usernames and domain structures for gathering intelligence.

Signup and view all the flashcards

Past Marketing Campaigns

Historical marketing data that can guide future projects by revealing usable design elements.

Signup and view all the flashcards

CERT/CSIRT/PSRT

Teams that respond to computer security incidents within organizations.

Signup and view all the flashcards

Security Job Listings

Job postings indicating the frequency of security openings in an organization.

Signup and view all the flashcards

Outsourcing Security

Delegating security responsibilities to external parties or firms.

Signup and view all the flashcards

Social Media Presence

The online profiles and activities of individuals or organizations on social platforms.

Signup and view all the flashcards

Usernames from Emails

Gathering usernames by checking publicly available email addresses.

Signup and view all the flashcards

theHarvester

A tool for automating the search for email addresses across multiple platforms.

Signup and view all the flashcards

Location Awareness

Mapping location history through various information sources for profiling.

Signup and view all the flashcards

Footprinting Process

The initial phase of gathering external information about a target organization.

Signup and view all the flashcards

Study Notes

Ethical Hacking and Penetration Testing - Lecture 2: Information Gathering

  • The lecture is about information gathering in Ethical Hacking and Penetration Testing.
  • Information Gathering or Intelligence Gathering is the reconnaissance process against a target to gather as much information as possible, used to penetrate the target during later stages like target scanning, vulnerability assessment, and exploitation.
  • The more information gathered, the more attack vectors can be identified.
  • Key types of Information Gathering include:
    • Competitive intelligence
    • Corporate Espionage
    • Information Warfare
    • Private Investigations
    • Pentesting

Competitive Intelligence

  • Relies on legal and ethical methods to gather data.
  • Over 95% of the information needed by companies to compete successfully comes from the public domain.
  • Helps organizations understand their competitive environment to make sound business decisions.

Corporate Espionage

  • This involves the illicit collection, collation, and analysis of information to gain economic gain.
  • "Trade Secrets" are valuable pieces of information that give a significant advantage over competitors who don't know them.
  • Yearly losses to US industries due to corporate espionage exceed $70 billion.

How Espionage is Done

  • A majority of illicit activities are internal, such as:
    • Disgruntled employees
    • Bribes from competitors
    • Industrial moles (planted individuals)
    • Companies employing competitors' employees to gain internal knowledge.
    • Applicants interviewing for jobs to get information
    • Spies pretending to be students, journalists, or venture capitalists

Information Warfare

  • State sponsored information and electronically delivered actions designed to gain information superiority in support of national military strategy.
  • Aims to affect enemy information and information systems while protecting one's own.
  • Also involves electronic warfare, surveillance systems, precision strike, and advanced battlefield management.

Useful Information for Attackers

  • Structure: Organization charts, departmental diagrams

  • Infrastructure: Phone systems, network diagrams, IT support groups, and utility providers

  • People: Phone directories, email address books, employee information

  • Geography: Locations of the IT department, servers, and other crucial elements

  • Security Enforcing Functions: Access control, password policies, hardware reuse, firewall and IDS use, and other policies

  • Networks: Detailed network topologies, firewalls, routers, and proxy positions

  • Software/Hardware: Machine specifications, operating systems, software versions, and administration policies

Open-Source Intelligence (OSINT)

  • A method for compiling intelligence from publicly available sources.
  • Involves finding, selecting, and acquiring information from publicly available sources and analyzing it to produce actionable intelligence.
  • This type of information gathering is used to identify entry points into an organization (physical, electronic, and human).
  • Many companies fail to recognize how public information can be used against them by attackers.
    • Employees also often do not consider the risks of putting personal information online.

OSINT Forms

  • Passive: Gather information from archived or stored sources. Can be outdated or incomplete. Useful if you don't want to be detected. (e.g., Google searches).
  • Semi-passive: Profile the target using methods that appear as normal internet traffic. Look for metadata, but don't try to actively scan for hidden data. (e.g., WHOIS database).
  • Active: Methods that are likely to be noticed by the target. (e.g., sending probe packets to test system vulnerabilities). Should be carefully planned.
  • Wayback Machine: Website archive
  • Google Dorks: Specialized search queries for specific information

Covert Gathering

  • On-site: Includes gathering information over several days, observing patterns, and reviewing physical security/employee behavior.
  • Off-site: Gathering information about the target's external relationships and their importance to the organization. Analyze openly shared information from websites, corporate webpages, and partner/supplier information.

Organizational Chart

  • Position Identification: Identifying important individuals
  • Transactions: Mapping changes in an organization (promotions, etc.)
  • Affiliates: Understanding connections to affiliate organizations

Electronic Metadata

  • Contains information about data or documents, such as author, creation time, location, standards used, etc.
  • The provided file, network, and folder paths are also considered electronic metadata.
  • Image metadata may contain camera information and coordinates/location.
  • Various tools are used to extract metadata (e.g., FOCA, metagoofil, exiftool).

Electronic Communications

  • Historical and current marketing materials can often reveal useful information about projects, specific technologies, and contacts. This includes colors, fonts, design components, and company contact details.

Infrastructure Assets

  • External Profile: Understanding the target's external infrastructure profile.
  • Tools: OSINT searches through forums, mailing lists, and other resources.
  • Social Engineering: Use of social engineering against IT organizations and product vendors to gather information.
  • Network Blocks: This is information that is passively available via whois searches. DNSStuff is a tool that offers this information.
  • Email Addresses: Useful for gathering usernames and domain structure. Sources include the company website and shared email groups like groups.google.com.

Remote Access

  • Methods used by employees and clients to connect.
  • Application, procedures, and user documentation can reveal details.

Active/Passive Fingerprinting

  • Passive: Using publicly available information to understand a target.
  • Active: Sending network requests to systems to test blocking patterns, analyze headers, and understand protection mechanisms in place. (e.g., using "ping", "trace route, Nmap, or Banner Grabbing.").

Human Capabilities

  • Presence of a company-wide CERT/CSIRT/PSRT team.
  • Advertisments for security jobs and developers
  • Contract details related to security outsourcing

Individuals - Employees

  • Internet Presence: Identifying a target's employees online. Includes email addresses, handles, nicknames, registered domains and static IPs.
  • Footprinting: Obtaining information about a target from an external perspective.
  • Social Media Presence: Verifying the presence on social media.

Lab and Reading Material

  • The lab tasks include gathering insights from tools like Whois, theHarvester, Google Dorks, and the Wayback Machine.
  • Reading materials include links to cheat sheets for Google Dorking and information on passive reconnaissance, OSINT, and social engineering.

Next Week

  • The following week's material will cover target scanning and enumeration.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Use Quizgecko on...
Browser
Browser