Isn't that what Google is for?
• Yeah kinda, Google-fu is important but we’re not going to talk much about Google hacking, go read the book.
BayTSP is an innovator in digital copyright,image, trademark, music and textprotection. Located in the heart of SiliconValley, BayTSP offers a revolutionary wayfor digital content owners to track downtheir valuable online property, in order toeffectively deter its theft and misuse.
OSINT: Information Gathering and Domain Name Search:
- whois info, NS and AS reports
- search using target domain name and subdomain
- who's handling mail, DNS, net blocks, web hosting, etc
OSINT: Information Gathering and Key Words:
- use that google-fu
- password
- login
- target specific keywords
- database/secret/yak yak
- google dorks
- use SEAT/Goolag to audit a specific domain
OSINT: Information Gathering and File Search:
We're looking for:
- network diagrams (.vsd, .jpg, gif)
- databases (.mdb)
- papers and documents (.doc, .pdf, .sdw)
- spreadsheets (.xls, .ods, .sdc)
- configuration files (.txt, .rft)
Thanks metagoofil!
OSINT: Information Gathering and email addresses
- Information Gathering and email addresses (email harvesting scripts and frameworks)
- Information Gathering and Cached Data/Links (archive.org, waybackmachine, google)
- Information Gathering and Source Code (spider the site, look at HTML source and comments, file paths, file names, scripts used on the site)
FierceDNS
- meant specifically to locate likely targets both inside and outside a corporate network
- tries your standard DNS tricks but also does some bruteforcing of domain names and tries to throw some intelligence into the searches
- bruteforce only as good as your wordlist
SEAT (Search Engine Assessment Tool)
“SEAT uses information stored in search engine databases, cache repositories, and other public resources to scan a site for potential vulnerabilities. It’s multi-threaded, multi-database, and multi-searchengine capabilities permit easy navigation through vast amounts of information with a goal of system security assessment.”
Google Mail Harvesters
• Goog-mail.py
• theHarvester.py
• There are plenty others
• Consider changing the regex to search for different @ variations: [at] <at> (at)
Metagoofil
- Meta-what???
- MetaGoofil - Metadata analyzer, information gathering tool.
- Created by Christian Martorella of Edge Security.
- http://www.edge-security.com/metagoofil.php
- “Metagoofil is an information gathering tool designed for extracting metadata of public documents (pdf,doc,xls,ppt,odp,ods) available in the target/victim websites.
- “It will generate a html page with the results of the metadata extracted, plus a list of potential usernames and path disclosure, can be useful for preparing a bruteforce attack on open services like ftp, pop3,web applications, vpn, etc.”
Why Metadata?
• Metadata can:
• Reveal the creator of a document, and even a possible
network username or derive naming convention.
• Reveal the application that created the document.
• Reveal the version of the software that created the
document.
• Reveal creation date. Document was created recently
with vulnerable version.
• We now have possible usernames, applications used by those individuals and the software versions. Now we can deliver a directed client side attack for something installed in the enterprise.
• Also try running your word documents through The Revisionist by Michael Zalewski
http://lcamtuf.coredump.cx/strikeout/
• The Revisionist can pull out deleted comments and text if the “track changes” had been used and dump the document with deleted text to an HTML file.
ServerSniff.net
http://serversniff.net/
NS/MX Reports
AS Reports
Subdomains
TLDs
Hostnames on an IP
Domains on webserver
Web Tools
HTML Comments
HTML Code
SSL Certificate Info
Links within page
Web Server Headers
http://www.domaintools.com/
Hosting history: Track previous web hosts and hosting providers
Domain history: viewing contact information before it was privatized
Registrant Alert: Find new registrations by someone
Registrant Search: Find all domains someone owns
Links to Wikipedia references
Best/Most tools on site are for pay :-(
http://centralops.net/co/
http://clez.net/net
• Query port and service scan information
• dns, ping, whois, ssl info, traceroutes
• email verification, open relay checking
http://www.robtex.com/
spoke.com
Search for people locate their company
Search for companies and retrieve names
TouchGraph
• http://touchgraph.com
• “TouchGraph's powerful visualization solutions reveal relationships between people,
organizations, and ideas.”
• Visually show the big picture on how things are tied together using Google results.
Maltego
http://www.paterva.com/web2/Maltego/maltego.html
• By Roelof Temmingh from Paterva
• What is it?
• Maltego is a program that can be used to determine the relationships and
real world links between:
– People
– Groups of people (social networks)
– Companies
– Organizations
– Web sites
– Internet infrastructure such as: • Domains
• DNS names
• Netblocks
• IP addresses
– Phrases
– Affiliations
– Documents and files
• All using open source intelligence (OSINT)
• What else can Maltego do?
• Technorati transforms, blog tags, search blogs for phrases
• Incoming links, who links to your domain
• Social network transforms; find a name, find their email, blog, phone number, etc
• Print graphs on several pages
• Can export the data into .csv, can save the maltego file and be opened by any other maltego instance
• Save pieces of graphs as images
• Can write your own transforms or stand up your own server.
• ** version 2 is for pay but cheap $430 USD for first year
So What?
• Ok lots of information what did I get from all of it?
– If you are allowed to send social engineered emails or do client side attacks, you have an initial target list of email addresses. Using email dossier/maltego I can verify working email addresses. I only need one person to open/click that email for my foothold.
– Naming conventions, users and offices, phone numbers, relationships between organizations
– Target organization’s IP Space and footprint. VPN server’s IP, Terminal/Citrix server IPs, firewall’s IP, etc.
– Software versions of software that is typically targeted in client side attacks (MS office)
– Using Maltego we see the relationships between our site and other sites in addition to the above.
– All gained without your typical definition of “scanning”