+ All Categories
Home > Internet > Offensive OSINT

Offensive OSINT

Date post: 05-Dec-2014
Category:
Upload: christian-martorella
View: 596 times
Download: 8 times
Share this document with a friend
Description:
Offensive OSINT - Presented at OSIRA Summit in London 2014. Overview of OSINT process, and how attackers are using it to prepare their cyber attacks.
69
OFFENSIVE OSINT CHRISTIAN MARTORELLA OSIRA SUMMIT 2014 LONDON, UK
Transcript
Page 1: Offensive OSINT

OFFENSIVE OSINT CHRISTIAN MARTORELLA

OSIRA SUMMIT 2014

LONDON, UK

Page 2: Offensive OSINT

About me

Chris&an  Martorella:  –  I  work  in  Skype  (MS),  Product  Security  team  

–  Founder  of  Edge-­‐security.com  

–  Developed  open  source  projects  like  theHarvester,  Metagoofil,  Wfuzz  and  Webslayer  

–  Presented  in  many  Security  conferences  (Blackhat  Arsenal,  Hack.lu,  WhaNheHack,  OWASP,  Source)  

–  Over  12  years  focusing  on  offensive  security  

 

Page 3: Offensive OSINT

Disclaimer

Any views or opinions presented in this presentation are solely those of the author and do not necessarily represent those of the employer

Page 4: Offensive OSINT

OSINT - Intro Open-­‐source  intelligence  (OSINT)  is  intelligence  collected  from  publicly  available  sources.  

•  “Open"  refers  to  overt,  publicly  available  sources  (as  opposed  to  covert  or  clandes&ne  sources)  

•  It  is  not  related  to  open-­‐source  soUware  or  public  intelligence.  

Page 5: Offensive OSINT

OSINT

     

What  is  Threat  Intelligence  /  Cyber  Intelligence  ?  

Page 6: Offensive OSINT

OSINT PROCESS Source Identification

Data harvesting

Data Analysis

Data processing and Integration

Results Delivery

Page 7: Offensive OSINT

Source Identification

Page 8: Offensive OSINT

Data Harvesting

Page 9: Offensive OSINT

Data processing

Page 10: Offensive OSINT

Data Analysis

Page 11: Offensive OSINT

Results Delivery

Page 12: Offensive OSINT

Offensive OSINT

Page 13: Offensive OSINT

Offensive vs. Defensive OSINT

From  the  security  perspec&ve  we  can  separate  OSINT:    Offensive:  Gathering  informa&on  before  an  aNack.    Defensive:  Learning  about  aNacks  against  the  company  

Page 14: Offensive OSINT

Offensive OSINT

•  Finding  as  much  informa&on  as  possible  that  will  facilitate  the  aNack  

•  S&ll  now,  many  Penetra&on  Tes&ng  companies  skip  this  phase  

•  ANackers  usually  spend  more  &me  than  testers  on  this  phase  

Page 15: Offensive OSINT

Typical Pentesting Methodology

I.G Scan Enumerate Exploit Post-Exploit

Cover Tracks

Write report

Page 16: Offensive OSINT

What everyone focus on:

I.G   Scan     Enumerate   Exploit  

Post-­‐Exploit  

Cover  Tracks  

Write  report  

Page 17: Offensive OSINT

Attacker Methodology

Discover  what  makes  the  company  money  

Discover  what  is  valuable  to  the  aNacker  

Do  whatever  it  takes...   Steal  it  

Informa&on  Gathering  

Page 18: Offensive OSINT

Data  Harves:ng  

Page 19: Offensive OSINT

Data Harvesting A.K.A:  •  Informa:on  Gathering:  

The  act  of  collec&ng  informa&on    •  Foot  prin:ng:    

Is  the  technique  of  gathering  informa&on  about  computer  systems  and  the  en&&es  they  belong  to.    

•  Web  mining:    The  act  of  collec&ng  informa&on  from  the  web    

   

Page 20: Offensive OSINT

Data Harvesting – How? Techniques:    •  Scraping  (raw)  •  Open  APIs  •  Commercial  APIS  •  Network  Scanning  •  Purchasing  data  •  Open  source  Data  sets  •  Databases  •  Logfiles    

Page 21: Offensive OSINT
Page 22: Offensive OSINT

Data  Harves&ng    -­‐  Passive  vs  Ac&ve  

•  Passive  data  harves:ng:  Our  ac&ons  can’t  be  detected  by  the  target  (Non  aNribu&on)  

•  Ac:ve  data  harves:ng:  our  ac&ons  leave  traces  that  can  be  detected  by  the  target  

Page 23: Offensive OSINT

Offensive OSINT targets

Page 24: Offensive OSINT

Offensive OSINT – end goals

•  Phishing    •  Social  Engineering  •  Denial  of  Services  •  Password  brute  force  aNacks  •  Target  infiltra&on    

Page 25: Offensive OSINT

What  data is interesting?

Emails Users / Employees names

-Interests -People relationships -Alias

     

Page 26: Offensive OSINT

Emails

•  PGP  servers  •  Search  engines  •  Whois    

Page 27: Offensive OSINT

Employees / Usernames / Alias

linkedin.com  jigsaw.com  people123.com  pipl.com  peekyou.com  Google  Finance  /  Etc.    Usernamecheck.com  checkusernames.com    

Glassdoor.com  Hoovers.com  Corpwatch.org  intelius.com  

Page 28: Offensive OSINT

Username checks

Page 29: Offensive OSINT

Social Media  

Page 30: Offensive OSINT

•  Employees  of  a  company  •  Profile  picture  •  Special&es  •  Role  •  Country  •  Emails  

Page 31: Offensive OSINT

Linkedin  

Simon  LongboNom  [email protected]    Product  defini&on,  proposi&on  research,  pricing,  product  marke&ng,  product  promo&on,  market  research,  new  product  introduc&on    pictureUrl':  'hNp://m.c.lnkd.licdn.com/mpr/mprz/’}  

Page 32: Offensive OSINT

Linkedin  

Page 33: Offensive OSINT

Google+  

Page 34: Offensive OSINT

 GRAPH  SEARCH:    “People  who  work  at  Amazon.com”    “People  who  work  at  Amazon.com  and  live  in  SeaNle  Washington”  

Page 35: Offensive OSINT

@google.  News  and  updates  from  Google.  Mountain  @googlenexus.  Phones  and  tablets  from  Google  @GoogleDoodles  @googlewmc.  News  and  resources  from  @googleindia  @GoogleChat.  Twee&ng  about  all  things  Google  @googleaccess.  The  official  TwiNer  @googleglass.  Geing  technology  out  of  the  way.  @googlenonprofit.  News  and  updates  from  @googlewallet.  News  @googlereader.  News  @googlefiber  @googleio.  Google  @googledevs  for  updates.  San  Francisco  @GoogleIO  for  ...  If  you  @GoogleMsia.  Official  Google  Malaysia  on  TwiNer.  Kuala  @googlejobs.  Have  you  heard  we  

@googleapps.  Google  Apps  news  for  ISVs  @GooglePlay.  Music  @GoogleAtWork.  The  official  TwiNer  home  of  Google  Enterprise.  Mountain  View  @FaktaGoogle.  Googling  Random  Facts.  Don  @googlemobileads.  Official  Google  Mobile  @googlepoli&cs.  Trends  @ericschmidt.  Execu&ve  Chairman  @GoogleMobile.  News  @googledownunder.  Google  Australia  and  @AdSense.  News  and  updates  from  the  Google  AdSense  @googlecalendar.  The  official  TwiNer  home  of  @googledevs.  News  about  and  from  @googlenews.  Breaking  news  @GoogleB2BTeam.  @GoogleB2BTeam  Google  @Jus&nCutroni  

Google  query:  site:twiNer.com  in&tle:"on  TwiNer"  ”Google"    

Page 36: Offensive OSINT

Domain  name  

Page 37: Offensive OSINT

Geo-location

•  People  loca&on  •  Servers  loca&on  •  Wireless  AP  loca&on      

Page 38: Offensive OSINT

Geo-location

Social  media  posts  Foursquare  Pictures  TwiNer  Facebook    

Page 39: Offensive OSINT

Twitter - Creepy

Page 40: Offensive OSINT

Images

Reverse  image  search  Face  iden&fica&on  Exif  Metadata  analysis:    Profile  pictures    ANachments  

   

Page 41: Offensive OSINT

Images

•  Pic from “Novartis” search on TwwepSearch

Page 42: Offensive OSINT
Page 43: Offensive OSINT

INFRASTRUCTURE IP Hostnames Services Networks Geo-location Software version CDN Multitenant Hosting

Page 44: Offensive OSINT

Infrastructure

Internet  Census  project  Whois  ServerSniff  Jobsites  Search  engines  ShodanHQ    

Page 45: Offensive OSINT

Infrastructure    

•  Once  we  have  iden&fied  the  Infrastructure  components,  what  can  we  do?  

Page 46: Offensive OSINT

ShodanHQ

Page 47: Offensive OSINT
Page 48: Offensive OSINT

Bugs databases

Page 49: Offensive OSINT

INDICATORS OF COMPROMISE (IOC)

IP addresses Domains URLs Hashes Stolen Passwords

Page 50: Offensive OSINT

IOC

Collec&ve  Intelligence  Framework  sources  (70)  Abuse.CH  Shadowserver.org  Nothink.org  Virustotal.com  Malwr  Seculert  

Page 51: Offensive OSINT

DATA LEAKS  Pastebin.com    @pastebindorks    Pastebin  clones    

Page 52: Offensive OSINT
Page 53: Offensive OSINT

Infrastructure •     DNS  

o  Bruteforce  o  Zone  Transfer  

•  SMTP  o  Header  analysis  o  Vrfy,  expn  

•  Web  sites  o  Hidden  files  /  directories  bruteforce  

•  Network  scanning  •  Metadata  

Page 54: Offensive OSINT

Metadata

 

•  Office  documents  •  Openoffice  documents  •  PDF  documents    •  Images  EXIF  metadata  •  Others    

Metadata:  is  data  about  data.            Is  used  to  facilitate  the  understanding,  use  and  management  of  data.    

Page 55: Offensive OSINT

Cat Schwartz - Tech TV

Page 56: Offensive OSINT

Washington Post Botmaster location exposed by the Washington Post

SLUG: mag/hacker!DATE: 12/19/2005!PHOTOGRAPHER: Sarah L. Voisin/TWP!id#: LOCATION: Roland, OK!CAPTION:!PICTURED: Canon Canon EOS 20D!Adobe Photoshop CS2 Macintosh 2006:02:16 15:44:49 Sarah L. Voisin!

There are only 1.500 males in Roland Oklahoma

Page 57: Offensive OSINT

Metagoofil - Results

Page 58: Offensive OSINT

Metagoofil - Results

Page 59: Offensive OSINT

Metagoofil - results

Page 60: Offensive OSINT
Page 61: Offensive OSINT

INFORMATION GATHERING TOOLS

•  FOCA  •  Spiderfoot  •  Tapir  •  Creepy  •  theHarvester  •  Metagoofil    

Page 62: Offensive OSINT

This  tool  is  intended  to  help  Penetra&on  testers  in  the  early  stages  of  the  penetra&on  test  in  order  to  understand  the  customer  footprint  on  the  Internet.      It  is  also  useful  for  anyone  that  wants  to  know  what  an  aNacker  can  see  about  their  organiza&on  and  reduce  exposure  of  the  company.    

Page 63: Offensive OSINT

 -­‐  Sources  

             google                                                  googleCSE                                                  bing                                                  bingapi                                                  pgp                                                  linkedin  

             people123                                                  jigsaw                                                  twiNer                                                  GooglePlus  

             shodanhq                                                    

•  Open  source  soUware  •  Command  line    •  Extendable  

Page 64: Offensive OSINT
Page 65: Offensive OSINT
Page 66: Offensive OSINT

•  python  theHarvester.py  -­‐d  lacaixa.es  -­‐b  googleCSE  -­‐l  500  -­‐v  -­‐h  

Page 67: Offensive OSINT

- Intelligence

Implement  en&&es  Cross  reference  en&&es  Image  reverse  search  /  profile  pictures  Geo-­‐loca&on  Iden&fy  vulnerable  services  Username  search  in  other  services  Target  priori&za&on    

Page 68: Offensive OSINT

Challenges

•  Source  availability    (APIs)  •  Changes  in  Terms  of  Use  •  Genera&ng  valid  intelligence  

Page 69: Offensive OSINT

? TwiNer:  @laramies  Email:  cmartorellaW@edge-­‐security.com  


Recommended