69
OFFENSIVE OSINT CHRISTIAN MARTORELLA OSIRA SUMMIT 2014 LONDON, UK

Offensive OSINT

Embed Size (px)

Citation preview

Page 1: Offensive OSINT

OFFENSIVE OSINT CHRISTIAN MARTORELLA

OSIRA SUMMIT 2014

LONDON, UK

Page 2: Offensive OSINT

About me

Chris&an  Martorella:  –  I  work  in  Skype  (MS),  Product  Security  team  

–  Founder  of  Edge-­‐security.com  

–  Developed  open  source  projects  like  theHarvester,  Metagoofil,  Wfuzz  and  Webslayer  

–  Presented  in  many  Security  conferences  (Blackhat  Arsenal,  Hack.lu,  WhaNheHack,  OWASP,  Source)  

–  Over  12  years  focusing  on  offensive  security  

 

Page 3: Offensive OSINT

Disclaimer

Any views or opinions presented in this presentation are solely those of the author and do not necessarily represent those of the employer

Page 4: Offensive OSINT

OSINT - Intro Open-­‐source  intelligence  (OSINT)  is  intelligence  collected  from  publicly  available  sources.  

•  “Open"  refers  to  overt,  publicly  available  sources  (as  opposed  to  covert  or  clandes&ne  sources)  

•  It  is  not  related  to  open-­‐source  soUware  or  public  intelligence.  

Page 5: Offensive OSINT

OSINT

     

What  is  Threat  Intelligence  /  Cyber  Intelligence  ?  

Page 6: Offensive OSINT

OSINT PROCESS Source Identification

Data harvesting

Data Analysis

Data processing and Integration

Results Delivery

Page 7: Offensive OSINT

Source Identification

Page 8: Offensive OSINT

Data Harvesting

Page 9: Offensive OSINT

Data processing

Page 10: Offensive OSINT

Data Analysis

Page 11: Offensive OSINT

Results Delivery

Page 12: Offensive OSINT

Offensive OSINT

Page 13: Offensive OSINT

Offensive vs. Defensive OSINT

From  the  security  perspec&ve  we  can  separate  OSINT:    Offensive:  Gathering  informa&on  before  an  aNack.    Defensive:  Learning  about  aNacks  against  the  company  

Page 14: Offensive OSINT

Offensive OSINT

•  Finding  as  much  informa&on  as  possible  that  will  facilitate  the  aNack  

•  S&ll  now,  many  Penetra&on  Tes&ng  companies  skip  this  phase  

•  ANackers  usually  spend  more  &me  than  testers  on  this  phase  

Page 15: Offensive OSINT

Typical Pentesting Methodology

I.G Scan Enumerate Exploit Post-Exploit

Cover Tracks

Write report

Page 16: Offensive OSINT

What everyone focus on:

I.G   Scan     Enumerate   Exploit  

Post-­‐Exploit  

Cover  Tracks  

Write  report  

Page 17: Offensive OSINT

Attacker Methodology

Discover  what  makes  the  company  money  

Discover  what  is  valuable  to  the  aNacker  

Do  whatever  it  takes...   Steal  it  

Informa&on  Gathering  

Page 18: Offensive OSINT

Data  Harves:ng  

Page 19: Offensive OSINT

Data Harvesting A.K.A:  •  Informa:on  Gathering:  

The  act  of  collec&ng  informa&on    •  Foot  prin:ng:    

Is  the  technique  of  gathering  informa&on  about  computer  systems  and  the  en&&es  they  belong  to.    

•  Web  mining:    The  act  of  collec&ng  informa&on  from  the  web    

   

Page 20: Offensive OSINT

Data Harvesting – How? Techniques:    •  Scraping  (raw)  •  Open  APIs  •  Commercial  APIS  •  Network  Scanning  •  Purchasing  data  •  Open  source  Data  sets  •  Databases  •  Logfiles    

Page 21: Offensive OSINT
Page 22: Offensive OSINT

Data  Harves&ng    -­‐  Passive  vs  Ac&ve  

•  Passive  data  harves:ng:  Our  ac&ons  can’t  be  detected  by  the  target  (Non  aNribu&on)  

•  Ac:ve  data  harves:ng:  our  ac&ons  leave  traces  that  can  be  detected  by  the  target  

Page 23: Offensive OSINT

Offensive OSINT targets

Page 24: Offensive OSINT

Offensive OSINT – end goals

•  Phishing    •  Social  Engineering  •  Denial  of  Services  •  Password  brute  force  aNacks  •  Target  infiltra&on    

Page 25: Offensive OSINT

What  data is interesting?

Emails Users / Employees names

-Interests -People relationships -Alias

     

Page 26: Offensive OSINT

Emails

•  PGP  servers  •  Search  engines  •  Whois    

Page 27: Offensive OSINT

Employees / Usernames / Alias

linkedin.com  jigsaw.com  people123.com  pipl.com  peekyou.com  Google  Finance  /  Etc.    Usernamecheck.com  checkusernames.com    

Glassdoor.com  Hoovers.com  Corpwatch.org  intelius.com  

Page 28: Offensive OSINT

Username checks

Page 29: Offensive OSINT

Social Media  

Page 30: Offensive OSINT

•  Employees  of  a  company  •  Profile  picture  •  Special&es  •  Role  •  Country  •  Emails  

Page 31: Offensive OSINT

Linkedin  

Simon  LongboNom  [email protected]    Product  defini&on,  proposi&on  research,  pricing,  product  marke&ng,  product  promo&on,  market  research,  new  product  introduc&on    pictureUrl':  'hNp://m.c.lnkd.licdn.com/mpr/mprz/’}  

Page 32: Offensive OSINT

Linkedin  

Page 33: Offensive OSINT

Google+  

Page 34: Offensive OSINT

 GRAPH  SEARCH:    “People  who  work  at  Amazon.com”    “People  who  work  at  Amazon.com  and  live  in  SeaNle  Washington”  

Page 35: Offensive OSINT

@google.  News  and  updates  from  Google.  Mountain  @googlenexus.  Phones  and  tablets  from  Google  @GoogleDoodles  @googlewmc.  News  and  resources  from  @googleindia  @GoogleChat.  Twee&ng  about  all  things  Google  @googleaccess.  The  official  TwiNer  @googleglass.  Geing  technology  out  of  the  way.  @googlenonprofit.  News  and  updates  from  @googlewallet.  News  @googlereader.  News  @googlefiber  @googleio.  Google  @googledevs  for  updates.  San  Francisco  @GoogleIO  for  ...  If  you  @GoogleMsia.  Official  Google  Malaysia  on  TwiNer.  Kuala  @googlejobs.  Have  you  heard  we  

@googleapps.  Google  Apps  news  for  ISVs  @GooglePlay.  Music  @GoogleAtWork.  The  official  TwiNer  home  of  Google  Enterprise.  Mountain  View  @FaktaGoogle.  Googling  Random  Facts.  Don  @googlemobileads.  Official  Google  Mobile  @googlepoli&cs.  Trends  @ericschmidt.  Execu&ve  Chairman  @GoogleMobile.  News  @googledownunder.  Google  Australia  and  @AdSense.  News  and  updates  from  the  Google  AdSense  @googlecalendar.  The  official  TwiNer  home  of  @googledevs.  News  about  and  from  @googlenews.  Breaking  news  @GoogleB2BTeam.  @GoogleB2BTeam  Google  @Jus&nCutroni  

Google  query:  site:twiNer.com  in&tle:"on  TwiNer"  ”Google"    

Page 36: Offensive OSINT

Domain  name  

Page 37: Offensive OSINT

Geo-location

•  People  loca&on  •  Servers  loca&on  •  Wireless  AP  loca&on      

Page 38: Offensive OSINT

Geo-location

Social  media  posts  Foursquare  Pictures  TwiNer  Facebook    

Page 39: Offensive OSINT

Twitter - Creepy

Page 40: Offensive OSINT

Images

Reverse  image  search  Face  iden&fica&on  Exif  Metadata  analysis:    Profile  pictures    ANachments  

   

Page 41: Offensive OSINT

Images

•  Pic from “Novartis” search on TwwepSearch

Page 42: Offensive OSINT
Page 43: Offensive OSINT

INFRASTRUCTURE IP Hostnames Services Networks Geo-location Software version CDN Multitenant Hosting

Page 44: Offensive OSINT

Infrastructure

Internet  Census  project  Whois  ServerSniff  Jobsites  Search  engines  ShodanHQ    

Page 45: Offensive OSINT

Infrastructure    

•  Once  we  have  iden&fied  the  Infrastructure  components,  what  can  we  do?  

Page 46: Offensive OSINT

ShodanHQ

Page 47: Offensive OSINT
Page 48: Offensive OSINT

Bugs databases

Page 49: Offensive OSINT

INDICATORS OF COMPROMISE (IOC)

IP addresses Domains URLs Hashes Stolen Passwords

Page 50: Offensive OSINT

IOC

Collec&ve  Intelligence  Framework  sources  (70)  Abuse.CH  Shadowserver.org  Nothink.org  Virustotal.com  Malwr  Seculert  

Page 51: Offensive OSINT

DATA LEAKS  Pastebin.com    @pastebindorks    Pastebin  clones    

Page 52: Offensive OSINT
Page 53: Offensive OSINT

Infrastructure •     DNS  

o  Bruteforce  o  Zone  Transfer  

•  SMTP  o  Header  analysis  o  Vrfy,  expn  

•  Web  sites  o  Hidden  files  /  directories  bruteforce  

•  Network  scanning  •  Metadata  

Page 54: Offensive OSINT

Metadata

 

•  Office  documents  •  Openoffice  documents  •  PDF  documents    •  Images  EXIF  metadata  •  Others    

Metadata:  is  data  about  data.            Is  used  to  facilitate  the  understanding,  use  and  management  of  data.    

Page 55: Offensive OSINT

Cat Schwartz - Tech TV

Page 56: Offensive OSINT

Washington Post Botmaster location exposed by the Washington Post

SLUG: mag/hacker!DATE: 12/19/2005!PHOTOGRAPHER: Sarah L. Voisin/TWP!id#: LOCATION: Roland, OK!CAPTION:!PICTURED: Canon Canon EOS 20D!Adobe Photoshop CS2 Macintosh 2006:02:16 15:44:49 Sarah L. Voisin!

There are only 1.500 males in Roland Oklahoma

Page 57: Offensive OSINT

Metagoofil - Results

Page 58: Offensive OSINT

Metagoofil - Results

Page 59: Offensive OSINT

Metagoofil - results

Page 60: Offensive OSINT
Page 61: Offensive OSINT

INFORMATION GATHERING TOOLS

•  FOCA  •  Spiderfoot  •  Tapir  •  Creepy  •  theHarvester  •  Metagoofil    

Page 62: Offensive OSINT

This  tool  is  intended  to  help  Penetra&on  testers  in  the  early  stages  of  the  penetra&on  test  in  order  to  understand  the  customer  footprint  on  the  Internet.      It  is  also  useful  for  anyone  that  wants  to  know  what  an  aNacker  can  see  about  their  organiza&on  and  reduce  exposure  of  the  company.    

Page 63: Offensive OSINT

 -­‐  Sources  

             google                                                  googleCSE                                                  bing                                                  bingapi                                                  pgp                                                  linkedin  

             people123                                                  jigsaw                                                  twiNer                                                  GooglePlus  

             shodanhq                                                    

•  Open  source  soUware  •  Command  line    •  Extendable  

Page 64: Offensive OSINT
Page 65: Offensive OSINT
Page 66: Offensive OSINT

•  python  theHarvester.py  -­‐d  lacaixa.es  -­‐b  googleCSE  -­‐l  500  -­‐v  -­‐h  

Page 67: Offensive OSINT

- Intelligence

Implement  en&&es  Cross  reference  en&&es  Image  reverse  search  /  profile  pictures  Geo-­‐loca&on  Iden&fy  vulnerable  services  Username  search  in  other  services  Target  priori&za&on    

Page 68: Offensive OSINT

Challenges

•  Source  availability    (APIs)  •  Changes  in  Terms  of  Use  •  Genera&ng  valid  intelligence  

Page 69: Offensive OSINT

? TwiNer:  @laramies  Email:  cmartorellaW@edge-­‐security.com