📘
CAS Cybersecurity
  • Start
  • Reconnaissance
    • Opensource Intelligence
  • Docker basics and Images
    • Damn Vulnerable Webapp
    • bWAPP
    • Juice Webshop
    • Webgoat
    • Metasploitable 2
    • Metasploitable 3
    • MISP Docker (old)
    • MISP Docker (new)
  • Scanning and Enumeration
    • Scanning with zenmap
    • Scanning with nmap
    • Scanning with msf auxiliary
  • Vulnerability Scanning and Analysis
    • OpenVAS
    • nmap vulnerability scan
    • MSF Auxiliary Modules
  • Exploitation
    • Metasploitable 2
    • Redis Server
    • Print Nightmare
    • Baron Samedit
    • Polkit
    • Heartbleed
  • Man in the Middle
    • ARP Cache poisoning
    • RDP MitM Exercise
  • Windows Hacking
    • Throwback Network
      • Entering the breach
      • Exploring the caverns
      • Webshells and you!
      • First Contact
    • WinAttack LAB
      • Module 01
      • Module 02
      • Module 03
      • Module 04
      • Module 05
      • Module 06
      • Module 07
      • Module 08
      • Module 09
      • Module 10
  • Web Application Security
    • Burp Proxy Introduction
    • DVWA
      • DVWA Exercises 1
      • DVWA Exercises 2
      • DVWA Exercises 3
      • DVWA Exercises 4
      • DVWA Exercises 5
      • DVWA Exercises 6
      • DVWA Exercises 7
      • DVWA Exercises 8
  • CTF and Crypto Exercises
    • Cyberchef Challenge
    • HTB Invite Challenge
    • BSides London 2019 Challenge
    • Ninja Sec Challenge
  • Threat Intelligence
    • MISP Exercise 1
    • MISP Exercise 2
    • MISP Exercise 3
    • MISP Exercise 4
    • MISP Exercise 5
    • MISP Exercise 6
    • MISP Exercise 7
    • MISP Exercise 8
    • Virus Total Graph Exercise
    • RFI Incoming!
  • Forensic Exercises
    • Disk Forensics
      • The Sleuth Kit Intro
      • Filecarving with Foremost
      • Filecarving with scalpel
      • Bulk extractor
      • Disk acquisition with dd
      • Disk acquisition with dcfldd
      • Disk acquisition with ewftools
      • Disk acquisition with FTK Imager
      • Mount disk image (raw)
      • Unknown USB Stick
      • USB Stick Filecarving
      • Autopsy Exercise
    • Windows Forensics
      • Bitunlocker
      • Alternate Datastreams
    • Memory Forensics
      • Volatility2 Basics (Linux)
      • Volatility2 Exercise 1
      • Volatility3 Exercise 1
      • Volatility3 Exercise 2
      • Volatility3 Exercise 3
    • Image Forensics
      • Unswirl Image
      • Manual Filecarving 1
      • Manual Filecarving 2
    • Browser Forensics
    • Mail Header Analysis
    • Timestomping Exercise
    • Network Forensics
      • Tshark Exercise
  • Malware Analysis
    • Ransomware
      • General Introduction
      • Ryuk
      • RansomEXX
      • REvil
      • BlackMatter
      • Hades
      • Egregor
      • DoppelPaymer
    • YARA
      • YARA Install
      • yarGen
      • YARA with Cyberchef
      • TCP dump analysis
      • Memory dump analysis
    • Dosfuscated Scripts
  • Android Malware
    • LAB Setup 1
    • LAB Setup 2
    • Android Manifest
    • Android Permissions
    • APP Tracing with Frida
    • AES Key decryption
    • RedAlert
    • BlackRoseLucy
    • Crackme RE Challenge
  • Forensic Readiness
    • Windows Event Logs
    • Windows Sysmon
    • Sysmon: Capture Clipboard
    • Sysmon: Process Injection
    • Ransomware Detection
      • Signature based
  • Live Response
    • Velociraptor P1
    • Velociraptor P2
    • Velociraptor P3
    • Windows Response LAB
      • Lateral Movement Detection
      • Detect persistence
      • Volatility Analysis
Powered by GitBook
On this page
  • 1. What is OSINT?
  • 2. Use cases

Was this helpful?

  1. Reconnaissance

Opensource Intelligence

PreviousReconnaissanceNextDocker basics and Images

Last updated 3 years ago

Was this helpful?

1. What is OSINT?

OSINT, short for Open-Source Intelligence, is data that has been obtained from publicly-available sources, that are accessible without payment. OSINT is widely used within law enforcement work, cyber crime activities such as planning an attack, or for business operation purposes, such as checking out the competition. This course will primarily be focusing on the application of OSINT tools and techniques for both red (offensive) and blue (defensive) teams. Let’s explore some examples of OSINT data:

  • A company that has a public web page that introduces some/all of their employees (think a “meet the team!” page). An attacker could use this to very easily gather a list of targets for social engineering attacks. Some sites may even include contact email addresses or phone numbers, which can aid the social engineering process dramatically.

  • Job Descriptions that leak information about a company’s internal systems (example: a system administrator role requiring experience with Windows Server 2016 and Solaris). An attacker can use this to plan internal attacks, lateral movement, and privilege escalation once they have gained a foothold in the network.

  • Photos on social-media that are geotagged and contain device information in the metadata (example: that nice photo you shared on holiday? we can find where that is, usually in a matter of seconds – and the device you took it on).

  • Reading a user’s social-media profile to build up a profile of them (information such as date of birth, locations, friends, interests, family). This can be used to learn more about an individual, which is commonly done pre-interview so that employees can get a sense of how the person will act in the workplace.

  • Exposing Cyber Criminals. Whilst this begins to move into the Threat Intelligence domain, it is possible to use OSINT sources and social-engineering skills to identify the true identity of cyber criminals, and pass the details to law enforcement. Whilst this is out of scope for this entry-level course, it shows how powerful OSINT can be in the right hands.

2. Use cases

OSINT can be a powerful ressource for defenders, law enforcement, businesses and as well for attackers.

2.1 Defenders

By looking at the information that is available on the internet, defenders can take steps to reduce this, or implement other controls that will mitigate attacks or reduce their effectiveness. If an attacker was able to build a detailed profile on an employee, this could be very dangerous. However, if that employee has had security training, then they will potentially be better at spotting malicious emails and social engineering attacks. By removing information online that may aid an attacker, the defenders are reducing the attack surface, which is the total area that an attacker could exploit to gain access to internal systems. This activity is often referred to as conducting public exposure assessments. Examples include gathering information employees put on social media, identifying internet-facing assets, DNS checks, finding old login portals or websites, and much more

2.2 Law Enforcement

Government and Police organisations will utilise OSINT to track persons-of-interest, such as criminals, suspects, and terrorists. Profiling is the activity of collecting information on an individual to build up a picture of their personality and behaviour. This can be used to predict where they will be at certain times, based on interests and previous locations. OSINT can be used to uncover the identities of cyber criminals that have poor OPSEC (operational security – the practice of hiding yourself online by disassociating your online persona with your real self). It can also be used to help find missing persons (a great example of this is , a non-profit organisation that hosts online OSINT CTFs, which actually work to track missing people and assist law enforcement).

2.3 Businesses

Businesses can utilise OSINT to keep an eye on the competition, watch for market activity, learn more about their customer and how to best engage with them, improve business operations via data enrichment, and also monitor for security risks such as leaked credentials, employees sharing confidential information, or hackers planning attacks

2.4 Attackers

OSINT sources can be a great way to discover information about a target company or individual. By working out what systems a company uses, the right exploits and attack methods can be planned out in advance. Employee information can be harvested, allowing potentially effective social-engineering attacks, and spear-phishing email campaigns to be conducted, tailored to their intended targets to make them more believable. A company should be careful about what information their systems and employees are sharing online. The process of collecting this information for malicious purposes is commonly referred to as target information gathering, or passive information gathering (because the attacker is not directly engaging with the target’s systems, such as port or vulnerability scanning).

Trace Labs
Hackers find missing people