August 11

Webinar takeaway: OSINT: Learn the Methods Bad Actors Use to Hack Your Organization

0  comments

My key takeaways

  • It's all about reducing the attack surface
  • OSINT Setup: use VPN's and VM's
  • The "OSINT-kill-chain":
    1. Organization
    2. Company website (eg press releases)
    3. Third-party ressources (eg LinkedIn, Glassdoor, Indeed)
    4. Employees (eg Facebook, LinkedIn, Instagram)
    5. Other tools (eg Google)
  • Google dorking is still the basic tool for every OSINT investigation
    • remember to concat the dorks with AND or OR
  • John Matherly, the founder of Shodan needed less the 5h to ping every IP on the internet
  • Censys does ZMap scans 3 times a day and syncs the results with certifcates
    • you can search on IP ranges
  • "the Harvester" is not just about email addresses anymore, but can also be used to determine threat landscapes and can be enhanced with API's
  • Spiderfoot is good for OSINT automation
    • can search for BTC addresses as well
  • Spyse is one of the largest DBs and has API's
    • strong at subdomain discovery
    • web spidering on target

Env

additional links


Tags

OSINT, recon


You may also like

Event takeaway: Layer8 Conference

My key takeaways HUMINT phrases to identify background characteristics an interesting OSINT aspect in conversation is special prononciation of certain words identifying the persons origin List of words of identifiers per language The great casino heist: key takeaways from my first big social engineering engagement "get out of jail"-cards must be signed to work career

Read More

twitch takeaway: staying mentaly healthy as an investigator

My key takeaways Nicole says: Remember H.A.L.T (hungry, angry, lonely, tired) it really does make a huge difference! 5,4,3,2,1 – A grounding technique to take a step back from the investigation. 5 things I can see 4 things I can hear 3 things I can smell e.g lemon 2 things I can touch 1 thing

Read More