SlideShare a Scribd company logo
Detecting the Undetectable:
What You Need to Know
About OSINT
Hack all the things!
Jerod Brennen, CISSP, GWAPT
You can find me at:
Twitter: @slandail
LinkedIn: /in/slandail
Hacker,
hack
thyself.
Want Answers? Start With the Right Questions.
◉What the heck is OSINT?
◉What’s your process?
◉What OSINT tools should I know about?
◉How do I defend myself?
1.
What the heck is OSINT?
Let’s begin at the beginning.
OSINT
Open Source INTelligence
Penetration Testing
OSINT is a key component
of the Penetration Testing
Execution Standard
(PTES).
[Image from https://www.trustedsec.com/penetration-testing/]
2.
What’s your process?
Wash. Rinse. Repeat.
EDGAR
U.S. Securities and Exchange
Commission. Over 20 million
filings for publicly traded
companies.
You can also split your content
Google Finance
Leadership, performance, news
stories, external links.
Step 1: Profile the Company
LinkedIn
Company page. Products,
services, 30k foot view.
Company Website
Careful, here. Visits from your
laptop = a record of your IP
touching their web
infrastructure.
LinkedIn
Employee names, titles, history
with the company, and
technologies that the IT staff
uses.
You can also split your content
Facebook
What do they eat for lunch?
(More importantly, the answers
to their secret questions.)
Step 2: Profile the People
Twitter
Who do they talk to?
What do they talk about?
Search Engines
Google, Bing, Duck Duck Go
Individual Internet footprint
In two or three columns
The Wall of Shame
U.S. Department of
Health and Human
Services
Office for Civil Rights
Breach Portal: Notice
to the Secretary of
HHS Breach of
Unsecured Protected
Health Information.
Breaches Affecting
500 or More
Individuals
PrivacyRights.org
Chronology of Data
Breaches (2005 –
present).
Filter by source (if
known), industry,
and/or year.
PasteBin / Cryptbin
Designed to let
programmers share
and troubleshoot
snippets of code,
they’ve also become
repositories for proof
of breach.
For example. “Here are
1,000 passwords. Send
xxx bitcoins to this
address for the other
49,000.
Step 3: Research Previous Breaches
Mobile Apps
Start with Google Play and
iTunes.
Download the app file (.apk, .ipa)
to your testing machine, unzip it,
and start poking around.
If they have an app in Google
Play, reverse the app back to it’s
original Java source code.
You can also split your content
Web Infrastructure
Lots to cover here, folks. Let’s
save the details for the next
section.
Step 4: Profile the Internet-Facing Infrastructure
3.
What OSINT tools do I need to know about?
Automation, folks. That’s where it’s at.
Tell Me About Your Web Apps
◉ Netcraft Site Report
http://toolbar.netcraft.com/site_report
◉ ICANN WHOIS
https://whois.icann.org/en
◉ ARIN WHOIS-RWS
https://whois.arin.net/ui/advanced.jsp
◉ Hurricane Electric BGP Toolkit
http://bgp.he.net/
These Are a Few of My Favorite Things
◉ Qualys SSL Labs – SSL Server Test
https://www.ssllabs.com/ssltest/
◉ PunkSPIDER
https://www.punkspider.org/
◉ UltraTools DNS Zone Transfer Lookup
https://www.ultratools.com/tools/zoneFileDump
◉ SHODAN
https://www.shodan.io/
◉FOCA
https://www.elevenpaths.co
m/labstools/foca/index.ht
ml
◉ Google Hacking
http://www.hackersforcharity.o
rg/ghdb/
Passive  Active
““Automation, folks. That’s where it’s
at.” – Jerod Brennen, just a few
minutes ago
◉Maltego
https://www.paterva.com/w
eb6/products/maltego.php
◉ recon-ng
https://bitbucket.org/LaNMaSt
eR53/recon-ng
Replace Yourself With a Very Small Shell Script
4.
How do I defend myself?
Sitting under your desk and crying is not an option.
Riddle Me This, Batman…
How much of what we’ve
discussed would trigger
an alert in your IDS/IPS?
◉ Unauthorized ports open on
Shodan? Close them.
◉ Web app vulnerabilities on
PunkSPIDER? Fix them.
◉ Zone transfers were
successful? Disable them.
◉ Passwords on Pastebin?
Change them.
◉ Users oversharing on social
media? Train them.
Let’s Not Overcomplicate Things
Would You Like to Know More?
◉Online Strategies
http://www.onstrat.com/osint/
◉Penetration Testing Execution Standard
http://www.pentest-standard.org/index.php/Main_Page
◉IT Security Career
http://www.itsecuritycareer.com/blog/what-you-dont-know-
about-osint-can-hurt-you/
Thanks!
ANY QUESTIONS?
You can find me at:
Twitter: @slandail
LinkedIn: /in/slandail

More Related Content

PPTX
Ed McCabe - Putting the Intelligence back in Threat Intelligence
PPTX
Jason Samide - State of Security & 2016 Predictions
PPTX
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
PPTX
Crowd-Sourced Threat Intelligence
PPTX
Red team Engagement
PPTX
An Introduction To IT Security And Privacy In Libraries
PDF
Zero-Knowledge Proofs: Identity Proofing and Authentication
PPTX
Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledg...
Ed McCabe - Putting the Intelligence back in Threat Intelligence
Jason Samide - State of Security & 2016 Predictions
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
Crowd-Sourced Threat Intelligence
Red team Engagement
An Introduction To IT Security And Privacy In Libraries
Zero-Knowledge Proofs: Identity Proofing and Authentication
Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledg...

What's hot (20)

PPT
3 Hkcert Trend
PPTX
An Introduction To IT Security And Privacy In Libraries & Anywhere
PDF
Is AI going to provide safety for us?
PPTX
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...
PDF
Ransomware ly
PPTX
Attack Vectors in Biometric Recognition Systems
PPT
Mark Arena - Cyber Threat Intelligence #uisgcon9
PPTX
Maltego Webinar Slides
PPTX
Targeted attacks
PDF
Cyber Forensics & Challenges
PPTX
An Introduction To IT Security And Privacy - Servers And More
PPTX
Biometrics and Multi-Factor Authentication, The Unleashed Dragon
PDF
Threat Hunting Report
PDF
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare Nelson
PPT
Hacking
PPT
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
PDF
Threat Intelligence
PPTX
Cyber threat intelligence: maturity and metrics
PPTX
Common Techniques To Identify Advanced Persistent Threat (APT)
PDF
Welcome to the world of Cyber Threat Intelligence
3 Hkcert Trend
An Introduction To IT Security And Privacy In Libraries & Anywhere
Is AI going to provide safety for us?
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...
Ransomware ly
Attack Vectors in Biometric Recognition Systems
Mark Arena - Cyber Threat Intelligence #uisgcon9
Maltego Webinar Slides
Targeted attacks
Cyber Forensics & Challenges
An Introduction To IT Security And Privacy - Servers And More
Biometrics and Multi-Factor Authentication, The Unleashed Dragon
Threat Hunting Report
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare Nelson
Hacking
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
Threat Intelligence
Cyber threat intelligence: maturity and metrics
Common Techniques To Identify Advanced Persistent Threat (APT)
Welcome to the world of Cyber Threat Intelligence
Ad

Similar to Jerod Brennen - What You Need to Know About OSINT (20)

PPTX
SplunkLive! Paris 2018: Intro to Security Analytics Methods
PPTX
Intro to INFOSEC
PPTX
Bug Bounty #Defconlucknow2016
PPTX
Data Privacy for Activists
PPTX
SplunkLive! Frankfurt 2018 - Intro to Security Analytics Methods
PPT
Pentesting hygt frde education of engi.ppt
PPT
Bulletproof IT Security
PDF
Stephanie Vanroelen - Mobile Anti-Virus apps exposed
PDF
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods
PDF
Zen and the art of Security Testing
PDF
Spyware
PDF
Cyber security awareness presentation nepal
DOCX
Research Paper Sentence OutlineResearch Question How e-commer.docx
PDF
Daniel billing exploring the security testers toolbox
PPTX
Basics of getting Into Bug Bounty Hunting
PPTX
Peerlyst Delhi NCR Chapter Meet
PPTX
BsidesMCR_2016-what-can-infosec-learn-from-devops
DOCX
Earn Money from bug bounty
PDF
BugBounty Roadmap with Mohammed Adam
PDF
BSides LA/PDX
SplunkLive! Paris 2018: Intro to Security Analytics Methods
Intro to INFOSEC
Bug Bounty #Defconlucknow2016
Data Privacy for Activists
SplunkLive! Frankfurt 2018 - Intro to Security Analytics Methods
Pentesting hygt frde education of engi.ppt
Bulletproof IT Security
Stephanie Vanroelen - Mobile Anti-Virus apps exposed
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods
Zen and the art of Security Testing
Spyware
Cyber security awareness presentation nepal
Research Paper Sentence OutlineResearch Question How e-commer.docx
Daniel billing exploring the security testers toolbox
Basics of getting Into Bug Bounty Hunting
Peerlyst Delhi NCR Chapter Meet
BsidesMCR_2016-what-can-infosec-learn-from-devops
Earn Money from bug bounty
BugBounty Roadmap with Mohammed Adam
BSides LA/PDX
Ad

More from centralohioissa (20)

PPTX
Mike Spaulding - Building an Application Security Program
PPTX
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
PPTX
Bob West - Educating the Board of Directors
PDF
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
PPTX
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
PPTX
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
PPTX
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
PPTX
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
PPTX
Tre Smith - From Decision to Implementation: Who's On First?
PDF
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
PPTX
Sean Whalen - How to Hack a Hospital
PDF
Robert Hurlbut - Threat Modeling for Secure Software Design
PPTX
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
PDF
Rafeeq Rehman - Breaking the Phishing Attack Chain
PDF
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
PPTX
Jack Nichelson - Information Security Metrics - Practical Security Metrics
PPTX
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
PDF
Ruben Melendez - Economically Justifying IT Security Initiatives
PDF
Ofer Maor - Security Automation in the SDLC - Real World Cases
PPTX
Jim Libersky: Cyber Security - Super Bowl 50
Mike Spaulding - Building an Application Security Program
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Bob West - Educating the Board of Directors
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Tre Smith - From Decision to Implementation: Who's On First?
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Sean Whalen - How to Hack a Hospital
Robert Hurlbut - Threat Modeling for Secure Software Design
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
Rafeeq Rehman - Breaking the Phishing Attack Chain
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
Ruben Melendez - Economically Justifying IT Security Initiatives
Ofer Maor - Security Automation in the SDLC - Real World Cases
Jim Libersky: Cyber Security - Super Bowl 50

Recently uploaded (20)

PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
KodekX | Application Modernization Development
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Modernizing your data center with Dell and AMD
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Unlocking AI with Model Context Protocol (MCP)
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Spectral efficient network and resource selection model in 5G networks
Per capita expenditure prediction using model stacking based on satellite ima...
Advanced methodologies resolving dimensionality complications for autism neur...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Big Data Technologies - Introduction.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Network Security Unit 5.pdf for BCA BBA.
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
KodekX | Application Modernization Development
Understanding_Digital_Forensics_Presentation.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
NewMind AI Weekly Chronicles - August'25 Week I
The Rise and Fall of 3GPP – Time for a Sabbatical?
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Modernizing your data center with Dell and AMD
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Unlocking AI with Model Context Protocol (MCP)

Jerod Brennen - What You Need to Know About OSINT

  • 1. Detecting the Undetectable: What You Need to Know About OSINT
  • 2. Hack all the things! Jerod Brennen, CISSP, GWAPT You can find me at: Twitter: @slandail LinkedIn: /in/slandail
  • 4. Want Answers? Start With the Right Questions. ◉What the heck is OSINT? ◉What’s your process? ◉What OSINT tools should I know about? ◉How do I defend myself?
  • 5. 1. What the heck is OSINT? Let’s begin at the beginning.
  • 7. Penetration Testing OSINT is a key component of the Penetration Testing Execution Standard (PTES). [Image from https://www.trustedsec.com/penetration-testing/]
  • 9. EDGAR U.S. Securities and Exchange Commission. Over 20 million filings for publicly traded companies. You can also split your content Google Finance Leadership, performance, news stories, external links. Step 1: Profile the Company LinkedIn Company page. Products, services, 30k foot view. Company Website Careful, here. Visits from your laptop = a record of your IP touching their web infrastructure.
  • 10. LinkedIn Employee names, titles, history with the company, and technologies that the IT staff uses. You can also split your content Facebook What do they eat for lunch? (More importantly, the answers to their secret questions.) Step 2: Profile the People Twitter Who do they talk to? What do they talk about? Search Engines Google, Bing, Duck Duck Go Individual Internet footprint
  • 11. In two or three columns The Wall of Shame U.S. Department of Health and Human Services Office for Civil Rights Breach Portal: Notice to the Secretary of HHS Breach of Unsecured Protected Health Information. Breaches Affecting 500 or More Individuals PrivacyRights.org Chronology of Data Breaches (2005 – present). Filter by source (if known), industry, and/or year. PasteBin / Cryptbin Designed to let programmers share and troubleshoot snippets of code, they’ve also become repositories for proof of breach. For example. “Here are 1,000 passwords. Send xxx bitcoins to this address for the other 49,000. Step 3: Research Previous Breaches
  • 12. Mobile Apps Start with Google Play and iTunes. Download the app file (.apk, .ipa) to your testing machine, unzip it, and start poking around. If they have an app in Google Play, reverse the app back to it’s original Java source code. You can also split your content Web Infrastructure Lots to cover here, folks. Let’s save the details for the next section. Step 4: Profile the Internet-Facing Infrastructure
  • 13. 3. What OSINT tools do I need to know about? Automation, folks. That’s where it’s at.
  • 14. Tell Me About Your Web Apps ◉ Netcraft Site Report http://toolbar.netcraft.com/site_report ◉ ICANN WHOIS https://whois.icann.org/en ◉ ARIN WHOIS-RWS https://whois.arin.net/ui/advanced.jsp ◉ Hurricane Electric BGP Toolkit http://bgp.he.net/
  • 15. These Are a Few of My Favorite Things ◉ Qualys SSL Labs – SSL Server Test https://www.ssllabs.com/ssltest/ ◉ PunkSPIDER https://www.punkspider.org/ ◉ UltraTools DNS Zone Transfer Lookup https://www.ultratools.com/tools/zoneFileDump ◉ SHODAN https://www.shodan.io/
  • 17. ““Automation, folks. That’s where it’s at.” – Jerod Brennen, just a few minutes ago
  • 19. 4. How do I defend myself? Sitting under your desk and crying is not an option.
  • 20. Riddle Me This, Batman… How much of what we’ve discussed would trigger an alert in your IDS/IPS?
  • 21. ◉ Unauthorized ports open on Shodan? Close them. ◉ Web app vulnerabilities on PunkSPIDER? Fix them. ◉ Zone transfers were successful? Disable them. ◉ Passwords on Pastebin? Change them. ◉ Users oversharing on social media? Train them. Let’s Not Overcomplicate Things
  • 22. Would You Like to Know More? ◉Online Strategies http://www.onstrat.com/osint/ ◉Penetration Testing Execution Standard http://www.pentest-standard.org/index.php/Main_Page ◉IT Security Career http://www.itsecuritycareer.com/blog/what-you-dont-know- about-osint-can-hurt-you/
  • 23. Thanks! ANY QUESTIONS? You can find me at: Twitter: @slandail LinkedIn: /in/slandail