SlideShare a Scribd company logo
Hacker tool talk: Maltego“Security through knowledge”Chris Hammond-Thrasherchris.hammond-thrasher <at> ca.fujitsu.comFujitsu Edmonton Security LabFebruary 20111Fujitsu Edmonton Security Lab
AgendaWhy are we here?About MaltegoInstalling MaltegoMaltego demoWhat’s next?2Fujitsu Edmonton Security Lab
Why are we here?3Fujitsu Edmonton Security Lab
Ethics and motives“Every single scam in human history has worked for one key reason; the victim did not recognize it as a scam.”- R. Paul Wilson4Fujitsu Edmonton Security Lab
OSINT“Open source intelligence (OSINT) is a form of intelligence collection management that involves finding, selecting, and acquiring information from publicly available sources and analyzing it to produce actionable intelligence.”- Wikipedia5Fujitsu Edmonton Security Lab
About Maltego6Fujitsu Edmonton Security Lab
FeaturesMaps relationships between numerous physical or digital objectsDiscovers information from numerous online sourcesExtensible:  Maltego can model relationships between almost anything – add your own “entities”, write your own “transforms” and integrate to other systems with the APIFree Community Version (as in beer and speech) and  a powerful commercial version for ~US$700 for the first year7Fujitsu Edmonton Security Lab
LimitationsDoes not search social media sites due to policy restrictions on those sitesDoes not search commercial data sourcesFujitsu Edmonton Security Lab8
Maltego vs. othersYou can manually gather similar data with search engines, DNS, whois, and social media searchesi123people iPhone app (free)Commercial alternatives to MaltegoCEMaltego (commercial)Visual Analytics VisualLinksI2 Group Analyst’s NotebookOthers9Fujitsu Edmonton Security Lab
Legit uses of MaltegoTracking SPAM posts on websites and mailing listsVerifying IT assetsCompetitive intelligence from public sourcesGathering supporting information for individual background checksOther creative uses are possible – it is a flexible tool10Fujitsu Edmonton Security Lab
h4X0r$Passive reconnaissance in advance of a system attackPassive reconnaissance in advance of a social engineering attack11Fujitsu Edmonton Security Lab
Installing Maltego12Fujitsu Edmonton Security Lab
ChoicesCurrent release of Maltego Community Edition is 3.0Easiest: Get latest Backtrack (BT4R2) live CD or VMhttp://www.backtrack-linux.org/downloads/Windows installer with or without Javahttp://www.paterva.com/Linux rpm and deb binary packages availablehttp://www.paterva.com/MacOS coming soon13Fujitsu Edmonton Security Lab
Getting startedInstall via the usual means for your platformStart MaltegoCEdouble-click the icon in Windows maltego-ce from the Linux command lineFujitsu Edmonton Security Lab14
Register and loginFujitsu Edmonton Security Lab15
Update your transformsFujitsu Edmonton Security Lab16
Install the cool Shodan add-onsStep 1: API keyGet a free Shodan API key (free registration required)http://www.shodanhq.com/api_docFujitsu Edmonton Security Lab17
Install the cool Shodan add-onsStep 2: entitiesDownload the entities at: http://maltego.shodanhq.com/downloads/shodan_entities.mtzIn Maltego, select "Manage Entities" in the "Manage" tab.Select "Import..."Locate the "shodan_entities.mtz" file you just downloaded and click "Next".Make sure all entities are checked, and click "Next".Enter "Shodan" as a category for the new entities. Click "Finish".Fujitsu Edmonton Security Lab18
Install the cool Shodan add-onsStep 3: transformsSelect "Discover Transforms" in the "Manage" tab.In the "Name" field, enter "Shodan"As a URL, use: https://cetas.paterva.com/TDS/runner/showseed/shodanClick "Add"Make sure the "Shodan" seed is selected, then click "Next"Again make sure you see "Shodan" selected, then click "Next"You now see a list of transforms that the "Shodan" seed has. Just click "Next"Click "Finish"Fujitsu Edmonton Security Lab19
Maltego demo20Fujitsu Edmonton Security Lab
Maltego demoStarting it upTour through menus and windowsInvestigating a system targetInvestigating a human target21Fujitsu Edmonton Security Lab
What’s next22Fujitsu Edmonton Security Lab
Learn moreRead the Maltego wikihttp://ctas.paterva.com/view/What_is_MaltegoRead the Social-Engineer.org websitehttp://social-engineer.org/Read my old “How do hackers do it?” presentationhttp://www.picisoc.org/tiki-download_file.php?fileId=51&ei=TMI4TcOHBI2WsgOzrZHfAw&usg=AFQjCNH8Y_JPsbADDoOPvlNvPO7udJlmpQ23Fujitsu Edmonton Security Lab
Act locallyAt homeUse MaltegoCE to manage what information you are exposing about yourself onlineYou can request that Google remove content about youhttp://www.google.com/support/bin/answer.py?answer=164734&hl=enMonitor your children’s adherence to the family acceptable usage policy24Fujitsu Edmonton Security Lab
Act locallyAt workUse Maltego to audit public information about corporate systemsTrack down troublesome website or mailing list users (or bots) using publically available information25Fujitsu Edmonton Security Lab
Thank you!Want more presentations like this?Is there a particular tool or hack that you would like to see demoed?Chris Hammond-ThrasherFujitsu Edmonton Security LabEmail: chris.hammond-thrasher <at> ca.fujitsu.comTwitter: thrashor26Fujitsu Edmonton Security Lab
Fujitsu Edmonton Security Lab27

More Related Content

PPT
Information Gathering With Maltego
PDF
Mise en place d’un système de détection
PPTX
Network scanning
PPTX
Introduction to IDS & IPS - Part 1
PPTX
NMAP - The Network Scanner
PPTX
Introduction To Exploitation & Metasploit
PDF
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
PPT
Hacking tutorial
Information Gathering With Maltego
Mise en place d’un système de détection
Network scanning
Introduction to IDS & IPS - Part 1
NMAP - The Network Scanner
Introduction To Exploitation & Metasploit
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
Hacking tutorial

What's hot (20)

PPTX
Basics of Maltego
PPTX
PPTX
大規模トラフィックにどのように備えて負荷対策を実施しているのか?
PPTX
Basic Malware Analysis
PPTX
Introduction to Malware Detection and Reverse Engineering
PPTX
The Art of Human Hacking : Social Engineering
PPTX
Understanding NMAP
PDF
Nessus Software
PDF
サーバーサイドでの非同期処理で色々やったよ
PDF
Maltego
PPTX
Système de détection d'intrusion (Intrusion Detection System)
PDF
The top 10 windows logs event id's used v1.0
PDF
Cyber attacks
PPTX
CEDEC2019 大規模モバイルゲーム運用におけるマスタデータ管理事例
PDF
Snort implementation
PPTX
Bsides Knoxville - OSINT
PPTX
Wireshark Basic Presentation
PPT
DDOS Attack
PPTX
Malware & Anti-Malware
Basics of Maltego
大規模トラフィックにどのように備えて負荷対策を実施しているのか?
Basic Malware Analysis
Introduction to Malware Detection and Reverse Engineering
The Art of Human Hacking : Social Engineering
Understanding NMAP
Nessus Software
サーバーサイドでの非同期処理で色々やったよ
Maltego
Système de détection d'intrusion (Intrusion Detection System)
The top 10 windows logs event id's used v1.0
Cyber attacks
CEDEC2019 大規模モバイルゲーム運用におけるマスタデータ管理事例
Snort implementation
Bsides Knoxville - OSINT
Wireshark Basic Presentation
DDOS Attack
Malware & Anti-Malware

Viewers also liked (20)

PDF
Real-time Tweet Analysis w/ Maltego Carbon 3.5.3
PPTX
Maltego Webinar Slides
PPTX
Maltego Magic Workshop - BSides London 2015
ZIP
The Twitter API: A Presentation to Adobe
PPTX
Twitter api
PPTX
Extracting and analyzing discussion data with google sheets and google analytics
PDF
Facebook & Twitter API
PPTX
Demo of security tool nessus - Network vulnerablity scanner
PDF
Nessus Basics
PDF
BlackHat Arsenal 2014 - C-SCAD : Assessing Security Flaws in C-SCAD WebX Clie...
PPTX
Network sniffers & injection tools
PDF
Open Source Intelligence (OSINT)
PDF
Introduction to Sentiment Analysis
PDF
Penetrasyon Testlerinde Açık Kod Yazılımların Kullanımı
PDF
Sızma Testlerinde Armitage Kullanımı
DOCX
SIZMA TESTLERİNDE BİLGİ TOPLAMA
DOCX
Twitter analysis by Kaify Rais
PPTX
Sentiment analysis of tweets
PPTX
Sentiment Analysis in Twitter
PDF
Sentiment Analysis of Twitter Data
Real-time Tweet Analysis w/ Maltego Carbon 3.5.3
Maltego Webinar Slides
Maltego Magic Workshop - BSides London 2015
The Twitter API: A Presentation to Adobe
Twitter api
Extracting and analyzing discussion data with google sheets and google analytics
Facebook & Twitter API
Demo of security tool nessus - Network vulnerablity scanner
Nessus Basics
BlackHat Arsenal 2014 - C-SCAD : Assessing Security Flaws in C-SCAD WebX Clie...
Network sniffers & injection tools
Open Source Intelligence (OSINT)
Introduction to Sentiment Analysis
Penetrasyon Testlerinde Açık Kod Yazılımların Kullanımı
Sızma Testlerinde Armitage Kullanımı
SIZMA TESTLERİNDE BİLGİ TOPLAMA
Twitter analysis by Kaify Rais
Sentiment analysis of tweets
Sentiment Analysis in Twitter
Sentiment Analysis of Twitter Data

Similar to Hacker tool talk: maltego (20)

PPTX
information Gathering using Maltego.pptx
PPTX
maltego ppt.pptx maltego ppt is based on cyber security
PPTX
Hands-On Security Breakout Session- ES Guided Tour
PPTX
Maltego Information Gathering
PPTX
Malformity BsidesBoston2013
PPT
Pen-Testing.ppt about cyber security pnetesting
PDF
Kali Linux, Introduction to Ethical Hacking and Penetration Tools
PDF
(Ebook) Learning Kali Linux by Ric Messier
PPTX
SANSFIRE18: War Stories on Using Automated Threat Intelligence for Defense
PPTX
PPTX
OSINT Tool - Reconnaissance with Maltego
PDF
OSINT for Attack and Defense
PPTX
Hands-On Security Breakout Session- ES Guided Tour
PDF
Hacker tool talk: kismet
PDF
[CB19] Deep Exploit: Fully Automatic Penetration Test Tool Using Reinforcemen...
PDF
Breach and attack simulation tools
PDF
Intro2 malwareanalysisshort
PDF
Finding the needle in the haystack: how Nestle is leveraging big data to defe...
PPTX
What do Wardley Maps mean to me? (Map Camp 2020)
information Gathering using Maltego.pptx
maltego ppt.pptx maltego ppt is based on cyber security
Hands-On Security Breakout Session- ES Guided Tour
Maltego Information Gathering
Malformity BsidesBoston2013
Pen-Testing.ppt about cyber security pnetesting
Kali Linux, Introduction to Ethical Hacking and Penetration Tools
(Ebook) Learning Kali Linux by Ric Messier
SANSFIRE18: War Stories on Using Automated Threat Intelligence for Defense
OSINT Tool - Reconnaissance with Maltego
OSINT for Attack and Defense
Hands-On Security Breakout Session- ES Guided Tour
Hacker tool talk: kismet
[CB19] Deep Exploit: Fully Automatic Penetration Test Tool Using Reinforcemen...
Breach and attack simulation tools
Intro2 malwareanalysisshort
Finding the needle in the haystack: how Nestle is leveraging big data to defe...
What do Wardley Maps mean to me? (Map Camp 2020)

More from Chris Hammond-Thrasher (12)

PPTX
Alice and bob: Love & the most important crypto on the net
PPTX
Six health privacy experiments that should *NEVER* be caried out
PPTX
Spiritualists, magicians and security vendors
PPTX
hackers vs suits
PPT
Introduction to Green IT
PPTX
Hacker tooltalk: Social Engineering Toolkit (SET)
PDF
Hacker tool talk: kismet
ODP
Open Source Library Software
ODP
Infosec Workshop - PacINET 2007
PDF
Popular GIS: a webliography
ODP
PPT
How hackers do it
Alice and bob: Love & the most important crypto on the net
Six health privacy experiments that should *NEVER* be caried out
Spiritualists, magicians and security vendors
hackers vs suits
Introduction to Green IT
Hacker tooltalk: Social Engineering Toolkit (SET)
Hacker tool talk: kismet
Open Source Library Software
Infosec Workshop - PacINET 2007
Popular GIS: a webliography
How hackers do it

Recently uploaded (20)

PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Encapsulation theory and applications.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Electronic commerce courselecture one. Pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
The Rise and Fall of 3GPP – Time for a Sabbatical?
Chapter 3 Spatial Domain Image Processing.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
20250228 LYD VKU AI Blended-Learning.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Diabetes mellitus diagnosis method based random forest with bat algorithm
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Big Data Technologies - Introduction.pptx
Encapsulation theory and applications.pdf
Review of recent advances in non-invasive hemoglobin estimation
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
The AUB Centre for AI in Media Proposal.docx
Electronic commerce courselecture one. Pdf

Hacker tool talk: maltego

  • 1. Hacker tool talk: Maltego“Security through knowledge”Chris Hammond-Thrasherchris.hammond-thrasher <at> ca.fujitsu.comFujitsu Edmonton Security LabFebruary 20111Fujitsu Edmonton Security Lab
  • 2. AgendaWhy are we here?About MaltegoInstalling MaltegoMaltego demoWhat’s next?2Fujitsu Edmonton Security Lab
  • 3. Why are we here?3Fujitsu Edmonton Security Lab
  • 4. Ethics and motives“Every single scam in human history has worked for one key reason; the victim did not recognize it as a scam.”- R. Paul Wilson4Fujitsu Edmonton Security Lab
  • 5. OSINT“Open source intelligence (OSINT) is a form of intelligence collection management that involves finding, selecting, and acquiring information from publicly available sources and analyzing it to produce actionable intelligence.”- Wikipedia5Fujitsu Edmonton Security Lab
  • 7. FeaturesMaps relationships between numerous physical or digital objectsDiscovers information from numerous online sourcesExtensible: Maltego can model relationships between almost anything – add your own “entities”, write your own “transforms” and integrate to other systems with the APIFree Community Version (as in beer and speech) and a powerful commercial version for ~US$700 for the first year7Fujitsu Edmonton Security Lab
  • 8. LimitationsDoes not search social media sites due to policy restrictions on those sitesDoes not search commercial data sourcesFujitsu Edmonton Security Lab8
  • 9. Maltego vs. othersYou can manually gather similar data with search engines, DNS, whois, and social media searchesi123people iPhone app (free)Commercial alternatives to MaltegoCEMaltego (commercial)Visual Analytics VisualLinksI2 Group Analyst’s NotebookOthers9Fujitsu Edmonton Security Lab
  • 10. Legit uses of MaltegoTracking SPAM posts on websites and mailing listsVerifying IT assetsCompetitive intelligence from public sourcesGathering supporting information for individual background checksOther creative uses are possible – it is a flexible tool10Fujitsu Edmonton Security Lab
  • 11. h4X0r$Passive reconnaissance in advance of a system attackPassive reconnaissance in advance of a social engineering attack11Fujitsu Edmonton Security Lab
  • 13. ChoicesCurrent release of Maltego Community Edition is 3.0Easiest: Get latest Backtrack (BT4R2) live CD or VMhttp://www.backtrack-linux.org/downloads/Windows installer with or without Javahttp://www.paterva.com/Linux rpm and deb binary packages availablehttp://www.paterva.com/MacOS coming soon13Fujitsu Edmonton Security Lab
  • 14. Getting startedInstall via the usual means for your platformStart MaltegoCEdouble-click the icon in Windows maltego-ce from the Linux command lineFujitsu Edmonton Security Lab14
  • 15. Register and loginFujitsu Edmonton Security Lab15
  • 16. Update your transformsFujitsu Edmonton Security Lab16
  • 17. Install the cool Shodan add-onsStep 1: API keyGet a free Shodan API key (free registration required)http://www.shodanhq.com/api_docFujitsu Edmonton Security Lab17
  • 18. Install the cool Shodan add-onsStep 2: entitiesDownload the entities at: http://maltego.shodanhq.com/downloads/shodan_entities.mtzIn Maltego, select "Manage Entities" in the "Manage" tab.Select "Import..."Locate the "shodan_entities.mtz" file you just downloaded and click "Next".Make sure all entities are checked, and click "Next".Enter "Shodan" as a category for the new entities. Click "Finish".Fujitsu Edmonton Security Lab18
  • 19. Install the cool Shodan add-onsStep 3: transformsSelect "Discover Transforms" in the "Manage" tab.In the "Name" field, enter "Shodan"As a URL, use: https://cetas.paterva.com/TDS/runner/showseed/shodanClick "Add"Make sure the "Shodan" seed is selected, then click "Next"Again make sure you see "Shodan" selected, then click "Next"You now see a list of transforms that the "Shodan" seed has. Just click "Next"Click "Finish"Fujitsu Edmonton Security Lab19
  • 21. Maltego demoStarting it upTour through menus and windowsInvestigating a system targetInvestigating a human target21Fujitsu Edmonton Security Lab
  • 23. Learn moreRead the Maltego wikihttp://ctas.paterva.com/view/What_is_MaltegoRead the Social-Engineer.org websitehttp://social-engineer.org/Read my old “How do hackers do it?” presentationhttp://www.picisoc.org/tiki-download_file.php?fileId=51&ei=TMI4TcOHBI2WsgOzrZHfAw&usg=AFQjCNH8Y_JPsbADDoOPvlNvPO7udJlmpQ23Fujitsu Edmonton Security Lab
  • 24. Act locallyAt homeUse MaltegoCE to manage what information you are exposing about yourself onlineYou can request that Google remove content about youhttp://www.google.com/support/bin/answer.py?answer=164734&hl=enMonitor your children’s adherence to the family acceptable usage policy24Fujitsu Edmonton Security Lab
  • 25. Act locallyAt workUse Maltego to audit public information about corporate systemsTrack down troublesome website or mailing list users (or bots) using publically available information25Fujitsu Edmonton Security Lab
  • 26. Thank you!Want more presentations like this?Is there a particular tool or hack that you would like to see demoed?Chris Hammond-ThrasherFujitsu Edmonton Security LabEmail: chris.hammond-thrasher <at> ca.fujitsu.comTwitter: thrashor26Fujitsu Edmonton Security Lab

Editor's Notes

  • #6: In the intelligence community (IC), the term &quot;open&quot; refers to overt, publicly available sources (as opposed to covert or classified sources); it is not related to open-source software or public intelligence.