Podcast
Questions and Answers
What is the primary characteristic of passive information gathering?
What is the primary characteristic of passive information gathering?
- It aims to avoid detection by the target. (correct)
- It typically uses automated tools to gather data.
- It relies solely on publicly available information.
- It involves direct interaction with the target's systems.
Which of the following is a drawback of using Open-Source Intelligence (OSINT)?
Which of the following is a drawback of using Open-Source Intelligence (OSINT)?
- The information might be inaccurate or outdated. (correct)
- It can be difficult to obtain information on specific organizations.
- It requires specialized technical expertise to use effectively.
- It can be time-consuming to gather information.
What is a key characteristic of semi-passive information gathering?
What is a key characteristic of semi-passive information gathering?
- It aims to appear like normal internet traffic. (correct)
- It involves using social engineering techniques.
- It focuses on gathering information from confidential sources.
- It requires advanced technical skills to implement.
Which of the following is an example of using a passive information gathering technique?
Which of the following is an example of using a passive information gathering technique?
What is the primary purpose of the WHOIS database?
What is the primary purpose of the WHOIS database?
Which of the following actions is generally considered to be semi-passive information gathering?
Which of the following actions is generally considered to be semi-passive information gathering?
Why is it crucial for companies to understand their online presence and how it can be exploited?
Why is it crucial for companies to understand their online presence and how it can be exploited?
What is a key difference between passive and semi-passive information gathering?
What is a key difference between passive and semi-passive information gathering?
What is a key reason for performing Open-Source Intelligence (OSINT) gathering?
What is a key reason for performing Open-Source Intelligence (OSINT) gathering?
Which of the following is NOT an example of a common element that an attacker might consider useful during an attack?
Which of the following is NOT an example of a common element that an attacker might consider useful during an attack?
In the context of Information Warfare, which of these actions is meant to achieve information superiority?
In the context of Information Warfare, which of these actions is meant to achieve information superiority?
Which of the following is categorized as an Open-Source Intelligence (OSINT) gathering tool?
Which of the following is categorized as an Open-Source Intelligence (OSINT) gathering tool?
How is "Information Warfare" defined as a strategy?
How is "Information Warfare" defined as a strategy?
What is a common example of a false pretenses approach in intelligence gathering?
What is a common example of a false pretenses approach in intelligence gathering?
What is a potential outcome of extracting metadata from a document?
What is a potential outcome of extracting metadata from a document?
Which tool is described as a GUI-based program for extracting metadata from various file types?
Which tool is described as a GUI-based program for extracting metadata from various file types?
What kind of information can be obtained from analyzing past marketing campaigns?
What kind of information can be obtained from analyzing past marketing campaigns?
What kind of information can be extracted from email addresses obtained from an organization's website?
What kind of information can be extracted from email addresses obtained from an organization's website?
What type of information can be obtained through an open-source search for IP addresses?
What type of information can be obtained through an open-source search for IP addresses?
What is a primary source for obtaining information about network blocks owned by an organization?
What is a primary source for obtaining information about network blocks owned by an organization?
What is the significance of extracting metadata from a document?
What is the significance of extracting metadata from a document?
What type of information does metadata on an image typically include?
What type of information does metadata on an image typically include?
What is a characteristic of active information gathering?
What is a characteristic of active information gathering?
Which method is NOT typically associated with active information gathering?
Which method is NOT typically associated with active information gathering?
Which of the following is an example of covert gathering?
Which of the following is an example of covert gathering?
What type of information might be sought during onsite intelligence gathering?
What type of information might be sought during onsite intelligence gathering?
Offsite information gathering includes identifying which of the following?
Offsite information gathering includes identifying which of the following?
Which element is NOT involved in social engineering during information gathering?
Which element is NOT involved in social engineering during information gathering?
What does document metadata provide?
What does document metadata provide?
Which activity would be least effective for covert onsite information gathering?
Which activity would be least effective for covert onsite information gathering?
What is one way to assess if a company prioritizes security?
What is one way to assess if a company prioritizes security?
What should be checked to verify how security responsibilities are managed within the organization?
What should be checked to verify how security responsibilities are managed within the organization?
What does footprinting involve in the context of information gathering?
What does footprinting involve in the context of information gathering?
Which tool is mentioned for automating the search for email addresses?
Which tool is mentioned for automating the search for email addresses?
How can one gather usernames associated with a company?
How can one gather usernames associated with a company?
Which aspect of social media can provide insight into an employee’s influence in security?
Which aspect of social media can provide insight into an employee’s influence in security?
What might indicate that security is an important requirement for non-security roles within a company?
What might indicate that security is an important requirement for non-security roles within a company?
What should be monitored for employees to understand their exposure and possible information leakage?
What should be monitored for employees to understand their exposure and possible information leakage?
What is the primary purpose of information gathering in Ethical Hacking and Penetration Testing?
What is the primary purpose of information gathering in Ethical Hacking and Penetration Testing?
Which of the following is NOT a type of information gathering activity?
Which of the following is NOT a type of information gathering activity?
What percentage of information required for successful competition is estimated to be available in the public domain?
What percentage of information required for successful competition is estimated to be available in the public domain?
What is the term used for the theft of trade secrets for economic gain?
What is the term used for the theft of trade secrets for economic gain?
What is the estimated annual loss to U.S. industries due to corporate espionage?
What is the estimated annual loss to U.S. industries due to corporate espionage?
Which of the following is NOT a phase of the penetration testing framework mentioned in the content?
Which of the following is NOT a phase of the penetration testing framework mentioned in the content?
What is the primary goal of intelligence gathering in penetration testing?
What is the primary goal of intelligence gathering in penetration testing?
What is the role of intelligence gathering in the penetration testing framework?
What is the role of intelligence gathering in the penetration testing framework?
Flashcards
Information Gathering
Information Gathering
The process of gathering data to understand a target for penetration testing.
Open-Source Intelligence (OSINT)
Open-Source Intelligence (OSINT)
Gathering publicly available data to derive intelligence about a target.
Footprinting
Footprinting
The technique of collecting information about a target's network and systems.
Competitive Intelligence
Competitive Intelligence
Signup and view all the flashcards
Corporate Espionage
Corporate Espionage
Signup and view all the flashcards
Trade Secret
Trade Secret
Signup and view all the flashcards
Information Warfare
Information Warfare
Signup and view all the flashcards
Pentesting
Pentesting
Signup and view all the flashcards
Inside Jobs
Inside Jobs
Signup and view all the flashcards
False Pretenses
False Pretenses
Signup and view all the flashcards
Useful Information for Attackers
Useful Information for Attackers
Signup and view all the flashcards
Security Enforcing Functions
Security Enforcing Functions
Signup and view all the flashcards
Social Engineering
Social Engineering
Signup and view all the flashcards
Intelligence Gathering Methods
Intelligence Gathering Methods
Signup and view all the flashcards
Types of OSINT
Types of OSINT
Signup and view all the flashcards
Passive Information Gathering
Passive Information Gathering
Signup and view all the flashcards
Semi-passive Information Gathering
Semi-passive Information Gathering
Signup and view all the flashcards
Google Dorks / Dorking
Google Dorks / Dorking
Signup and view all the flashcards
WHOIS Database
WHOIS Database
Signup and view all the flashcards
Wayback Machine
Wayback Machine
Signup and view all the flashcards
Information Validity in OSINT
Information Validity in OSINT
Signup and view all the flashcards
Whois Command
Whois Command
Signup and view all the flashcards
Active Information Gathering
Active Information Gathering
Signup and view all the flashcards
Reconnaissance
Reconnaissance
Signup and view all the flashcards
Onsite Information Gathering
Onsite Information Gathering
Signup and view all the flashcards
Offsite Information Gathering
Offsite Information Gathering
Signup and view all the flashcards
Organizational Chart
Organizational Chart
Signup and view all the flashcards
Document Metadata
Document Metadata
Signup and view all the flashcards
Metadata
Metadata
Signup and view all the flashcards
Importance of Metadata
Importance of Metadata
Signup and view all the flashcards
Metadata Extraction Tools
Metadata Extraction Tools
Signup and view all the flashcards
Fingerprinting Organizations with Collected Archives (FOCA)
Fingerprinting Organizations with Collected Archives (FOCA)
Signup and view all the flashcards
Past Marketing Campaign Analysis
Past Marketing Campaign Analysis
Signup and view all the flashcards
Infrastructure Assets
Infrastructure Assets
Signup and view all the flashcards
Email Address Collection
Email Address Collection
Signup and view all the flashcards
Open-Source Searches
Open-Source Searches
Signup and view all the flashcards
CERT/CSIRT/PSRT
CERT/CSIRT/PSRT
Signup and view all the flashcards
Security Job Listings
Security Job Listings
Signup and view all the flashcards
Outsourcing Security
Outsourcing Security
Signup and view all the flashcards
Social Media Verification
Social Media Verification
Signup and view all the flashcards
Internet Presence
Internet Presence
Signup and view all the flashcards
Email Address Harvesting
Email Address Harvesting
Signup and view all the flashcards
theHarvester Tool
theHarvester Tool
Signup and view all the flashcards
Footprinting Phase
Footprinting Phase
Signup and view all the flashcards
Study Notes
Ethical Hacking and Penetration Testing - Lecture 2: Information Gathering
- The lecture covers information gathering, a crucial pre-engagement phase in penetration testing.
- Information gathering, also known as intelligence gathering, involves reconnaissance to collect as much data as possible about a target.
- This data is used to plan further phases, such as target scanning, vulnerability assessment, and exploitation.
- More information gathered during this phase leads to more potential attack vectors.
- Different types of information gathering include: competitive intelligence, corporate espionage, information warfare, private investigation, and penetration testing.
Competitive Intelligence
- Uses legal and ethical methods to gather data.
- Over 95% of needed information is publicly available.
- Helps understand the competitive environment and improve business decisions.
Corporate Espionage
- Involves collecting, collating, and analysing illicitly gained information.
- Often includes theft of trade secrets for economic gain.
- International Trade Commission estimates annual losses to U.S. industries from corporate espionage are over $70 billion.
- Methods often include disgruntled/bribed employees, industrial moles, and false pretenses (e.g., pretending to be a student).
Information Warfare
- State-sponsored electronically delivered actions to achieve information superiority in support of national military strategy.
- Aims to affect enemy information systems whilst protecting own systems.
- Includes electronic warfare, surveillance systems, precision strikes, and advanced battlefield management.
What's Useful to an Attacker
- Organizational structure, departmental diagrams, contact details, IT infrastructure diagrams, support groups.
- Contact information such as phone directories, email addresses, 'who's who' directories.
- Geographic information and location of IT departments, servers, etc.
- Security policies, hardware re-use, firewall / IDS use, e-mail policies, phone-use policies.
- Network topologies, firewalls, routers, proxies, and their positions.
- Server software, host software, database software, web server software, and administration policies.
Open Source Intelligence (OSINT)
- A form of intelligence gathering using publicly available sources.
- Involves finding, selecting and analysing information for actionable intelligence.
- OSINT aims to determine entry points into an organization (physical, electronic, and/or human).
- Many companies fail to consider how publicly available data can be exploited.
- OSINT forms: Passive (no target detection), Semi-passive (normal traffic), and Active (suspicious behavior).
Open Source Intelligence (OSINT) - What it's not
- OSINT data may not be accurate or up-to-date.
- Information sources may be manipulated to misrepresent data.
- Data can be incomplete or obsolete with time.
Tools
- TheHarvester (Python tool) to search for email addresses.
- Wayback Machine (web.archive.org) to see how websites evolved over time.
- Google Dorks (specific search operators for Google).
- WHOIS Database to find domain information.
Information Gathering – Covert Gathering (On-site)
- Select locations for on-site reconnaissance for 2-3 days to identify patterns.
- Conduct physical security inspections.
- Employ wireless and radio frequency scanning.
- Review employee behavior training and examine adjacent facilities.
- Conduct dumpster diving and identify equipment in use.
External Relationships (Off-site)
- Identify offsite locations and their importance to the organization (e.g., data centers, network providers, business partners).
- Analyse publicly available information such as corporate websites, rental company listings, etc.
- Use this data to understand business projects and create social engineering scenarios.
Organizational Chart
- Identify important people and individuals.
- Track transactions and mapping of organizational changes.
- Identify affiliate organizations tied to the business.
Electronic – Document Metadata
- Metadata gives details about the data or document (name, creator, time, date, standards, location).
- Image metadata might contain resolution, camera details, and coordinates.
Electronic - Marketing Communications
- Past marketing campaigns may provide information on retired products or services.
- Current materials may reveal internal information and external contact details.
Infrastructure Assets
- Network blocks are passively gathered, often by utilizing whois search engines (e.g., DNSStuff).
- Open-source search queries for IP addresses give details about the organization's infrastructure.
- Email addresses can reveal usernames and domain structures.
Information Gathering – Continued
- Remote access details (how employees connect remotely) might reveal an entry point.
- Application usage patterns can be identified from documents and public files.
- Defensive technologies (e.g. firewalls, antivirus software) can be tracked.
Information Gathering – Continued
- Passive fingerprinting involves searching forums for information on the target's systems/technology.
- Active fingerprinting uses probe packets to analyze systems' responses, and test for vulnerabilities.
- (Example applications or systems: Email gateways, anti-virus scanners)
Human Capability
- Analyze if a company has an incident response team (CERT/CSIRT/PSRT).
- Check advertisements for security-related positions.
- Check if security is a requirement for non-security roles.
- Determine if agreements or security duties are outsourced.
Individuals - Employees
- Analyze location history, social media presence, email addresses, personal domain names.
- Information to find usernames on the internet, using tools like theHarvester (Python).
Summary
- Summarizes introduced topics covering information gathering, a practical phase of ethical hacking.
- Offers tools and methodology that an ethical hacker can adopt.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.