SlideShare a Scribd company logo
1 of 42
Open Source
Intelligence
Leveraging Data into Intelligence
Deep Shankar Yadav
Digital Forensics Analyst
root@charlie:~$ whoami
• Digital Forensics Analyst
• Co-Leader – OWASP AppSec India
• OSINT Enthusiast
• Consultant to a few Law Enforcement
Agencies
• @TheDeepSYadav
Agenda
• What is Intelligence?
• What is OSINT?
• Why OSINT?
• What is Value of OSINT?
• Sources of Data
• Demo
What is Intelligence?
• Data : Raw Report, Images or Broadcast
• Information : Collected Data of Generic Interest
• Intelligence : concisely tailored answer reflecting
a deliberate process of discovery, discrimination,
distillation, and delivery of data precisely suited to
need
Types of Intelligence
• HUMINT – Human Intelligence Sleeper Cells
• SIGINT - Signal Intelligence Traffic Analysis,
TEMPEST
• MSINT – Measurement and Signature Intelligence
Radar, Nuclear and Earthquake
• Tactical Intelligence – Intelligence about Weapons
used by Forces
• OSINT – Open Source Intelligence
What is OSINT?
Open-source intelligence (OSINT) is intelligence
collected from publicly available sources.
It’s not a tool, It’s not a website, It’s not with any
fee but it’s not free….. :)
Why OSINT?
Why OSINT?
• Internet is not limited to Google Searches.
• Not even limited to search engines, social media and
blogs.
• Huge number of sensational hacks in recent times
Organizations getting hacked even after using so
called "sophisticated" defense mechanisms.
• Basic recon usually ignored during security
assessments.
• If your SECRET is out there in the open, someone
WILL find it.
• It's just data until you leverage it to create
intelligence.
If you are lucky you will get
everything
Sensitive
Information
Hard
coded
keys in
Github
Credential
leaks in
Pastebin
0-days
sold in
darknet
Hack info
in micro
blog
Corporate
email
credentials
Open
Bugs or
ports
Why is it becoming easy?
Typical Pentesting Methodology
Post-
Exploit
Cover
Tracks
Write
report
I.G Scan Enumerate Exploit
What everyone focus on:
Enumera
te
Post-
Exploit
Cover
Tracks
Write
report
I.G Scan Exploit
Attacker Methodology
Informaion Gathering
Discover what makes
the company money
Do whatever it
takes...
Steal it
Discover what is
valuable to the
atacker
OSINT PROCESS
Source Identification
Data harvesting
Data processing and
Integration
Data Analysis
Results Delivery
Source Identification
Data Harvesting
Data Processing
Data Analysis
• Selecting Data as per Case.
• Removing Noise (Buy Disprin Before it :P )
• Making Intelligence on behalf of data. (Give wake
up call to your inner Sherlock)
Results Delivery
Data Sources
• Web Directories – WWW Library and Internet Public Library
• Search Engines – Google, Yahoo, Bing, Baidu, MSN etc. etc.
• Important Engine – Wolframe Alpha, ROBTEX
• Serial Search Engines – Soolve , myallsearch
• Hardware Search Engine – Shodan
• Scientific Search Engine – Google Scholar, Academia
• Encyclopedia – Wikipedia
• Book Stores – Amazon, Google Books etc.
• Translations – Google, Bing and many more
• Aeronautical – flightradar24.com and many more
• Blogs – Blogspot, Wordpress and many more
Cntd.
• Company Information – MCA.gov.in, Zaubacorp
• Images – Google Images, Flickr, PICASA and much important –
Tineye
• Internet Tools – Archive.org, Whois, VisualRoute,
ip2location.com etc etc
• Thousand of Journals and Print Media Sources
• Maps – Google Maps, Google Earth, Wikimap
• People Finders – pipl, spokeo etc etc, Public Records -
Intellius
• Social Networking Websites – Facebook, Twitter, G Plus,
LinkedIn etc etc
• Matrimonial Websites
• Job Portals
Data Harvesting
A.K.A:
• Information Gathering:
The act of collecing informaion
• Foot printing:
Is the technique of gathering informaion about
computer systems and the eniies they belong to.
• Web mining:
The act of collecing informaion from the web
Data Harvesting – How?
•
•
•
•
•
•
•
•
Scraping (raw)
Open APIs
Commercial APIS
Network Scanning
Purchasing data
Open source Data sets
Databases
Logfiles
Offensive OSINT – goals
•
•
•
•
•
Phishing
Social Engineering
Denial of Services
Password brute force
Target infiltraion
atacks
What data is interesting?
Emails
Users / Employees names
-Interests
-People relationships
-Alias
Emails
•
•
•
PGP servers
Search engines
Whois
Employees
linkedin.com
jigsaw.com
people123.com
pipl.com
peekyou.com
/ Usernames / Alias
Glassdoor.com
Hoovers.com
Corpwatch.org
intelius.com
Google Finance / Etc.
Usernamecheck.com
checkusernames.com
Username checks
Social Media
Metadata
Metadata: is data about data.
Is used to facilitate the understanding, use and management
of data.
•
•
•
•
•
Office documents
Openoffice documents
PDF documents
Images EXIF metadata
Others
Brace yourself Demo is starting
Some Notable tools to work upon
• Datasploit (http://github.com/upgoingstar)
• Metagoofil
• The Harvestor
• FOCA
• Creepy
• Maltego
Current Problems in OSINT
•
•
•
Source availability
Changes in Terms of Use
Generaing valid intelligence
Any Queries?
Sources
• Slideshare.com
• Google.com
• Some Deep Web Forums
I might have copied some images and content from
other ppt’s and articles and credits are given where
required so don’t worry  I got them via googling
only
Deep Shankar Yadav
• mail@deepshankaryadav.net
• advisorcybercell@gmail.com
• http://www.deepshankaryadav.net
• fb.me/deepshankaryadav
• @TheDeepSYadav

More Related Content

What's hot

What's hot (20)

Bsides Knoxville - OSINT
Bsides Knoxville - OSINTBsides Knoxville - OSINT
Bsides Knoxville - OSINT
 
OSINT
OSINTOSINT
OSINT
 
Offensive OSINT
Offensive OSINTOffensive OSINT
Offensive OSINT
 
Osint {open source intelligence }
Osint {open source intelligence }Osint {open source intelligence }
Osint {open source intelligence }
 
Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)
 
OSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan BraganzaOSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan Braganza
 
How to Use Open Source Intelligence (OSINT) in Investigations
How to Use Open Source Intelligence (OSINT) in InvestigationsHow to Use Open Source Intelligence (OSINT) in Investigations
How to Use Open Source Intelligence (OSINT) in Investigations
 
What is Open Source Intelligence (OSINT)
What is Open Source Intelligence (OSINT)What is Open Source Intelligence (OSINT)
What is Open Source Intelligence (OSINT)
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and Defense
 
From OSINT to Phishing presentation
From OSINT to Phishing presentationFrom OSINT to Phishing presentation
From OSINT to Phishing presentation
 
Owasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudiniOwasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudini
 
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
 
Open source intelligence
Open source intelligenceOpen source intelligence
Open source intelligence
 
Threat Intelligence
Threat IntelligenceThreat Intelligence
Threat Intelligence
 
Cyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metricsCyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metrics
 
Casos reales usando osint
Casos reales usando osintCasos reales usando osint
Casos reales usando osint
 
OpenSourceIntelligence-OSINT.pptx
OpenSourceIntelligence-OSINT.pptxOpenSourceIntelligence-OSINT.pptx
OpenSourceIntelligence-OSINT.pptx
 
MITRE ATT&CK Framework
MITRE ATT&CK FrameworkMITRE ATT&CK Framework
MITRE ATT&CK Framework
 
Osint skills
Osint skillsOsint skills
Osint skills
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 

Viewers also liked

TakeDownCon Rocket City: “White Hat Anonymity”: Current challenges security r...
TakeDownCon Rocket City: “White Hat Anonymity”: Current challenges security r...TakeDownCon Rocket City: “White Hat Anonymity”: Current challenges security r...
TakeDownCon Rocket City: “White Hat Anonymity”: Current challenges security r...
EC-Council
 

Viewers also liked (19)

Datasploit - An Open Source Intelligence Tool
Datasploit - An Open Source Intelligence ToolDatasploit - An Open Source Intelligence Tool
Datasploit - An Open Source Intelligence Tool
 
Blackmagic Open Source Intelligence OSINT
Blackmagic Open Source Intelligence OSINTBlackmagic Open Source Intelligence OSINT
Blackmagic Open Source Intelligence OSINT
 
What you need to know about OSINT
What you need to know about OSINTWhat you need to know about OSINT
What you need to know about OSINT
 
Enterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringEnterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence Gathering
 
20070317 Osint Presentation
20070317 Osint Presentation20070317 Osint Presentation
20070317 Osint Presentation
 
Osint ashish mistry
Osint ashish mistryOsint ashish mistry
Osint ashish mistry
 
Open source intelligence analysis
Open source intelligence analysisOpen source intelligence analysis
Open source intelligence analysis
 
Utilizing cyber intelligence to combat cyber adversaries (OA Cyber Summit)
Utilizing cyber intelligence to combat cyber adversaries (OA Cyber Summit)Utilizing cyber intelligence to combat cyber adversaries (OA Cyber Summit)
Utilizing cyber intelligence to combat cyber adversaries (OA Cyber Summit)
 
Digital Forensics and Incident Response (DFIR) using Docker Containers
Digital Forensics and Incident Response (DFIR) using Docker ContainersDigital Forensics and Incident Response (DFIR) using Docker Containers
Digital Forensics and Incident Response (DFIR) using Docker Containers
 
The Open Archives Initiative
The Open Archives InitiativeThe Open Archives Initiative
The Open Archives Initiative
 
Sharing with the Open Archives Initiative
Sharing with the Open Archives InitiativeSharing with the Open Archives Initiative
Sharing with the Open Archives Initiative
 
OSINT tools for security auditing [FOSDEM edition]
OSINT tools for security auditing [FOSDEM edition] OSINT tools for security auditing [FOSDEM edition]
OSINT tools for security auditing [FOSDEM edition]
 
Think Like a Hacker
Think Like a HackerThink Like a Hacker
Think Like a Hacker
 
Boletín de noticias riet n° 6 – noviembre 2015
Boletín de noticias riet n° 6 – noviembre 2015Boletín de noticias riet n° 6 – noviembre 2015
Boletín de noticias riet n° 6 – noviembre 2015
 
Eurosint Forum Presentation
Eurosint Forum PresentationEurosint Forum Presentation
Eurosint Forum Presentation
 
TakeDownCon Rocket City: “White Hat Anonymity”: Current challenges security r...
TakeDownCon Rocket City: “White Hat Anonymity”: Current challenges security r...TakeDownCon Rocket City: “White Hat Anonymity”: Current challenges security r...
TakeDownCon Rocket City: “White Hat Anonymity”: Current challenges security r...
 
Gates Toorcon X New School Information Gathering
Gates Toorcon X New School Information GatheringGates Toorcon X New School Information Gathering
Gates Toorcon X New School Information Gathering
 
Information Gathering With Google
Information Gathering With GoogleInformation Gathering With Google
Information Gathering With Google
 
Competitive Intelligence Abu Dhabi UAE
Competitive Intelligence Abu Dhabi UAECompetitive Intelligence Abu Dhabi UAE
Competitive Intelligence Abu Dhabi UAE
 

Similar to OSINT- Leveraging data into intelligence

Toward revealing Advanced Persistence Threats in your organization - Public
Toward revealing Advanced Persistence Threats in your organization - PublicToward revealing Advanced Persistence Threats in your organization - Public
Toward revealing Advanced Persistence Threats in your organization - Public
Charles Lim
 
Building Effective Frameworks for Social Media Analysis
Building Effective Frameworks for Social Media AnalysisBuilding Effective Frameworks for Social Media Analysis
Building Effective Frameworks for Social Media Analysis
Open Analytics
 
Karel Obluk (Evolution Equity Partners) - Cybersecurity: Challenges and Oppor...
Karel Obluk (Evolution Equity Partners) - Cybersecurity: Challenges and Oppor...Karel Obluk (Evolution Equity Partners) - Cybersecurity: Challenges and Oppor...
Karel Obluk (Evolution Equity Partners) - Cybersecurity: Challenges and Oppor...
Techsylvania
 
Hunting: Defense Against The Dark Arts
Hunting: Defense Against The Dark ArtsHunting: Defense Against The Dark Arts
Hunting: Defense Against The Dark Arts
Spyglass Security
 
open-data-presentation.pptx
open-data-presentation.pptxopen-data-presentation.pptx
open-data-presentation.pptx
DennicaRivera
 

Similar to OSINT- Leveraging data into intelligence (20)

Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU Investigators
 
Corporate Intelligence: Bridging the security and intelligence community
Corporate Intelligence: Bridging the security and intelligence communityCorporate Intelligence: Bridging the security and intelligence community
Corporate Intelligence: Bridging the security and intelligence community
 
Catching the Golden Snitch- Leveraging Threat Intelligence Platforms to Defen...
Catching the Golden Snitch- Leveraging Threat Intelligence Platforms to Defen...Catching the Golden Snitch- Leveraging Threat Intelligence Platforms to Defen...
Catching the Golden Snitch- Leveraging Threat Intelligence Platforms to Defen...
 
Discover advanced threats with threat intelligence - Jeremy Li
Discover advanced threats with threat intelligence - Jeremy LiDiscover advanced threats with threat intelligence - Jeremy Li
Discover advanced threats with threat intelligence - Jeremy Li
 
DECEPTICONv2
DECEPTICONv2DECEPTICONv2
DECEPTICONv2
 
Building Effective Frameworks for Social Media Analysis
Building Effective Frameworks for Social Media AnalysisBuilding Effective Frameworks for Social Media Analysis
Building Effective Frameworks for Social Media Analysis
 
Toward revealing Advanced Persistence Threats in your organization - Public
Toward revealing Advanced Persistence Threats in your organization - PublicToward revealing Advanced Persistence Threats in your organization - Public
Toward revealing Advanced Persistence Threats in your organization - Public
 
Building Effective Frameworks for Social Media Analysis
Building Effective Frameworks for Social Media AnalysisBuilding Effective Frameworks for Social Media Analysis
Building Effective Frameworks for Social Media Analysis
 
The art of deceiving humans a.k.a social engineering
The art of deceiving humans a.k.a social engineeringThe art of deceiving humans a.k.a social engineering
The art of deceiving humans a.k.a social engineering
 
Karel Obluk (Evolution Equity Partners) - Cybersecurity: Challenges and Oppor...
Karel Obluk (Evolution Equity Partners) - Cybersecurity: Challenges and Oppor...Karel Obluk (Evolution Equity Partners) - Cybersecurity: Challenges and Oppor...
Karel Obluk (Evolution Equity Partners) - Cybersecurity: Challenges and Oppor...
 
Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing
Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and SharingData-Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing
Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing
 
Hunting: Defense Against The Dark Arts
Hunting: Defense Against The Dark ArtsHunting: Defense Against The Dark Arts
Hunting: Defense Against The Dark Arts
 
Technical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvertTechnical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvert
 
OWASP_OSINT_Presentation.pdf
OWASP_OSINT_Presentation.pdfOWASP_OSINT_Presentation.pdf
OWASP_OSINT_Presentation.pdf
 
open-data-presentation.pptx
open-data-presentation.pptxopen-data-presentation.pptx
open-data-presentation.pptx
 
OSINT mindset to protect your organization - Null monthly meet version
OSINT mindset to protect your organization - Null monthly meet versionOSINT mindset to protect your organization - Null monthly meet version
OSINT mindset to protect your organization - Null monthly meet version
 
Empowering red and blue teams with osint c0c0n 2017
Empowering red and blue teams with osint   c0c0n 2017Empowering red and blue teams with osint   c0c0n 2017
Empowering red and blue teams with osint c0c0n 2017
 
[Bucharest] Catching up with today's malicious actors
[Bucharest] Catching up with today's malicious actors[Bucharest] Catching up with today's malicious actors
[Bucharest] Catching up with today's malicious actors
 
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with Splunk
 

Recently uploaded

一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
ayvbos
 
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Monica Sydney
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Monica Sydney
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
pxcywzqs
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
ydyuyu
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
F
 

Recently uploaded (20)

best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
 

OSINT- Leveraging data into intelligence

  • 1. Open Source Intelligence Leveraging Data into Intelligence Deep Shankar Yadav Digital Forensics Analyst
  • 2. root@charlie:~$ whoami • Digital Forensics Analyst • Co-Leader – OWASP AppSec India • OSINT Enthusiast • Consultant to a few Law Enforcement Agencies • @TheDeepSYadav
  • 3. Agenda • What is Intelligence? • What is OSINT? • Why OSINT? • What is Value of OSINT? • Sources of Data • Demo
  • 4. What is Intelligence? • Data : Raw Report, Images or Broadcast • Information : Collected Data of Generic Interest • Intelligence : concisely tailored answer reflecting a deliberate process of discovery, discrimination, distillation, and delivery of data precisely suited to need
  • 5. Types of Intelligence • HUMINT – Human Intelligence Sleeper Cells • SIGINT - Signal Intelligence Traffic Analysis, TEMPEST • MSINT – Measurement and Signature Intelligence Radar, Nuclear and Earthquake • Tactical Intelligence – Intelligence about Weapons used by Forces • OSINT – Open Source Intelligence
  • 6. What is OSINT? Open-source intelligence (OSINT) is intelligence collected from publicly available sources. It’s not a tool, It’s not a website, It’s not with any fee but it’s not free….. :)
  • 8. Why OSINT? • Internet is not limited to Google Searches. • Not even limited to search engines, social media and blogs. • Huge number of sensational hacks in recent times Organizations getting hacked even after using so called "sophisticated" defense mechanisms. • Basic recon usually ignored during security assessments. • If your SECRET is out there in the open, someone WILL find it. • It's just data until you leverage it to create intelligence.
  • 9. If you are lucky you will get everything
  • 10. Sensitive Information Hard coded keys in Github Credential leaks in Pastebin 0-days sold in darknet Hack info in micro blog Corporate email credentials Open Bugs or ports
  • 11. Why is it becoming easy?
  • 12.
  • 14. What everyone focus on: Enumera te Post- Exploit Cover Tracks Write report I.G Scan Exploit
  • 15. Attacker Methodology Informaion Gathering Discover what makes the company money Do whatever it takes... Steal it Discover what is valuable to the atacker
  • 16.
  • 17. OSINT PROCESS Source Identification Data harvesting Data processing and Integration Data Analysis Results Delivery
  • 21. Data Analysis • Selecting Data as per Case. • Removing Noise (Buy Disprin Before it :P ) • Making Intelligence on behalf of data. (Give wake up call to your inner Sherlock)
  • 23. Data Sources • Web Directories – WWW Library and Internet Public Library • Search Engines – Google, Yahoo, Bing, Baidu, MSN etc. etc. • Important Engine – Wolframe Alpha, ROBTEX • Serial Search Engines – Soolve , myallsearch • Hardware Search Engine – Shodan • Scientific Search Engine – Google Scholar, Academia • Encyclopedia – Wikipedia • Book Stores – Amazon, Google Books etc. • Translations – Google, Bing and many more • Aeronautical – flightradar24.com and many more • Blogs – Blogspot, Wordpress and many more
  • 24. Cntd. • Company Information – MCA.gov.in, Zaubacorp • Images – Google Images, Flickr, PICASA and much important – Tineye • Internet Tools – Archive.org, Whois, VisualRoute, ip2location.com etc etc • Thousand of Journals and Print Media Sources • Maps – Google Maps, Google Earth, Wikimap • People Finders – pipl, spokeo etc etc, Public Records - Intellius • Social Networking Websites – Facebook, Twitter, G Plus, LinkedIn etc etc • Matrimonial Websites • Job Portals
  • 25. Data Harvesting A.K.A: • Information Gathering: The act of collecing informaion • Foot printing: Is the technique of gathering informaion about computer systems and the eniies they belong to. • Web mining: The act of collecing informaion from the web
  • 26. Data Harvesting – How? • • • • • • • • Scraping (raw) Open APIs Commercial APIS Network Scanning Purchasing data Open source Data sets Databases Logfiles
  • 27. Offensive OSINT – goals • • • • • Phishing Social Engineering Denial of Services Password brute force Target infiltraion atacks
  • 28. What data is interesting? Emails Users / Employees names -Interests -People relationships -Alias
  • 30. Employees linkedin.com jigsaw.com people123.com pipl.com peekyou.com / Usernames / Alias Glassdoor.com Hoovers.com Corpwatch.org intelius.com Google Finance / Etc. Usernamecheck.com checkusernames.com
  • 33. Metadata Metadata: is data about data. Is used to facilitate the understanding, use and management of data. • • • • • Office documents Openoffice documents PDF documents Images EXIF metadata Others
  • 34.
  • 35.
  • 36. Brace yourself Demo is starting
  • 37. Some Notable tools to work upon • Datasploit (http://github.com/upgoingstar) • Metagoofil • The Harvestor • FOCA • Creepy • Maltego
  • 38. Current Problems in OSINT • • • Source availability Changes in Terms of Use Generaing valid intelligence
  • 40.
  • 41. Sources • Slideshare.com • Google.com • Some Deep Web Forums I might have copied some images and content from other ppt’s and articles and credits are given where required so don’t worry  I got them via googling only
  • 42. Deep Shankar Yadav • mail@deepshankaryadav.net • advisorcybercell@gmail.com • http://www.deepshankaryadav.net • fb.me/deepshankaryadav • @TheDeepSYadav