OSINT Training
OSINT Training
https://paypal.me/KDMentoring
OS OPERATION CHIMERA
OSINT MODULE // SECURITY BLUE TEAM
ASSOCIATED ROLES
The below roles generally contain work that includes utilizing Open-Source
Intelligence for defensive cyber purposes:
I strongly suggest you check out this tool and see what interesting sites and
tools you can find from it. https://www.osintframework.com
You can reverse this, and enter in the email address of a target, and see if they
have been spotted in a breach. From there, you could try find access to a
dump of the breach and see if their email was leaked with a password, or other
information which could be used to conduct social engineering attacks (make
sure this is in scope of your threat simulation engagement). Try it out yourself
at https://haveibeenpwned.com (If you’ve been pwned, might be time to
change your passwords!)
Maltego: This is a great tool that allows you to visually record all data point
you find using OSINT techniques, allowing you to map out all the information
you have. “The basic focus of the application is analyzing real-world
relationships (social networks and computer network nodes) between people,
groups, webpages, domains, networks, internet infrastructure, and affiliations
with online services such as Twitter and Facebook”. This tool comes included
in Kali Linux, so have a go yourself!
Google Dorks: Google is helpful in general, but Google Dorks are little hacks,
where we can use special arguments in a normal Google query to find specific
information. Real-world examples of using Dorks include:
OS OPERATION CHIMERA
OSINT MODULE // SECURITY BLUE TEAM
Now let’s see how Dorks can be used to enumerate all subdomains of a
domain, for passive reconnaissance purposes. For this, we will use Facebook
again as the example, with the following query:
site:”Facebook.com” -site:”wwwFacebook.com”
(Look for sites that include .Facebook.com) (but NOT www.Facebook.com)
Here we can see the list begins with two subdomains, code.facebook.com, and
portal.facebook.com. We have successfully enumerated subdomains using
Google Dorks! Have a go yourself with any Domain you choose.
Google Dorks are very useful, so take a look at this list of common Dorks and
use them yourself to really understand how they work, and how they could be
used for defensive or offensive security.
https://securitytrails.com/blog/google-hacking-techniques
OS OPERATION CHIMERA
OSINT MODULE // SECURITY BLUE TEAM
This didn’t give us too much information, but knowing the IPs associated with
google subdomains could be useful. Now let’s try something a little bit
different. If we wanted to launch social engineering attacks against some
OS OPERATION CHIMERA
OSINT MODULE // SECURITY BLUE TEAM
Now we have a list of potential targets, along with their job titles. We can do
further reconnaissance on them using Linkedin itself and build up a profile on
them using a tool like Maltego, then we can launch spear-phishing attacks as
part of a threat simulation engagement.
Try using The Harvester with different domains, and different data sources.
You can access the help sheet for this tool by using the command theharvester.
COUNTER-OSINT
In such a digital world, it’s hard to maintain total privacy, especially with the
popularity of social-media, and social expectations to share everything you
do. However, over time laws and regulations regarding privacy have become
more prominent, and now it’s easier than ever to take control of who sees your
content, as well as use products and services to keep your online life private.
This section will cover three main areas, VPNs (Private Internet Access), Social
Media, and Operational Security (OpSec) – COMING SOON.
OS OPERATION CHIMERA
OSINT MODULE // SECURITY BLUE TEAM
MODULE CHALLENGE
If you feel you’re familiar with what OSINT is, and how to gather information
effectively, then you may be ready for the Challenge! We suggest you still do
some of your own research using the ‘Useful Links’ on the first page before
attempting the Challenge.
Challenge Brief:
Throughout the following tasks there will be flags which can be submitted for
points. Please find the submission form on the website
https://securityblue.team/operation-chimera
Part One) Setup your own Tweetdeck monitoring panel. Create 3 columns to
monitor for security-related activity (see my Tweetdeck blog post above).
Create a fourth column which is performing the following search:
#Unc4gedSq4d AND flag
Part Two) Use Google Dorks to find all pages (visible and hidden) of
SecurityBlue.Team (site:”securityblue.team” -site:”www.securityblue.team”)
1. How many pages can you find this way?
2. What is the name of the page that features my Tweetdeck image?
3. What is the flag on the “secret” page? (Use a different Dork for this!)
4. What is the name of the first PDF result under the domain
Twitter.com?