Nilson Networking Presentation Notes
Introduction
- Social Media and Attention Seekers: Examples of oversharing, reckless behavior on social media.
- Relevance to OSINT: OSINT (Open Source Intelligence) involves collecting, evaluating, and analyzing publicly available info.
Understanding osint
- Definition: osint stands for Open Source Intelligence.
- Collection and evaluation of publicly available information.
- Purpose: Answer specific intelligence questions.
- Information vs. Intelligence:
- Information: Raw data or reports, not yet analyzed.
- Intelligence: Analyzed and interpreted information useful for decision-making.
Sources of Open Source Information
- Public Records and Websites: Internet, images, videos.
- Dark Web: Another source of open-source information.
Users of osint
- Everyone Uses It: Not just hackers or governments.
- Examples:
- Personal: Using social media for information on someone of interest.
- Corporate: Using social media to vet potential employees.
Objectives of the Video
- Discover Use Cases of OSINT:
- Security and intelligence gathering.
- Ethical hacking and penetration testing.
Practical Example: Penetration Testing
- Scenario: Cybersecurity company hired for penetration test with minimal info.
- Company Example: Nmap Software LLC.
Google Dorks
- Introduction: Known as Google hacking.
- Purpose: Use advanced search operators for deeper internet searches.
- Use Cases:
- Finding information on companies and individuals.
- Leveraging search operators like
site, filetype, intitle.
- Example Searches: Using LinkedIn for employees, Facebook for additional info.
Shodan
- Introduction: Search engine for internet-connected devices.
- Purpose: Gather info on devices and network reconnaissance.
- Use Cases:
- Vulnerability scanning of internet-facing devices.
- Finding IPs, open ports, vulnerabilities.
Have I Been Pwned
- Introduction: Online database of data breaches.
- Uses:
- Check if email or passwords have been compromised.
- Gather information for penetration tests.
Spiderfoot
- Introduction: Open-source Recon tool.
- Capabilities:
- Identify subdomains, gather whois info.
- Map infrastructures, open ports, DNS records.
- Integration: Works with Shodan and Have I Been Pwned.
Recon NG
- Introduction: Open-source Recon framework.
- Similar to Metasploit: Automates info collection.
- Capabilities:
- Install modules for specific tasks.
- Example: Profile module to find email info and profiles.
Paid Tools
- Maltego: Visualization of relationships between data points.
- Visual network maps, expensive.
- Intelligence X: Historical archives, data search engine.
- Archives past versions of websites, expensive.
Conclusion
- Summary: Overview of tools and their capabilities for OSINT.
.
Note: This presentation emphasizes the value of open-source intelligence tools for cybersecurity professionals and how they aid in practical scenarios like penetration testing.