Chapter 3 - Reconnaissance and Intelligence Gathering
Chapter 3 - Reconnaissance and Intelligence Gathering
• https://dnsdumpster.com
Other Tools:
Shodan
• THE search engine for vulnerable devices online
• https://shodan.io
Other Tools:
host
• Can provide information about a system’s IPv4 and IPv6 addresses as
well as its email servers by using the host command in Linux
Other Tools:
dig
• dig axfr @digi.ninja zonetransfer.me
• SOA record reveals:
• primary nameserver
• contact email (dots not @)
• current S/N for domain (2019100801 as of 12/24/20)
• time secondary servers should wait between changes (172,800 seconds)
• time for primary to wait upon failed refresh (900 seconds)
• time secondary can claim to have authoritative records (1,209,600 seconds)
• minimum TTL for domain (3,600 seconds)
Other Tools:
Responder
• Python script hybrid between active and
passive scanning.
• Starts passive, then tries to hijack
connections.
• github.com/SpiderLabs/Responder
Domains and IP Ranges
• Five regional Internet registries (RIRs)
• African Network Information Center (AFRINIC) for Africa
• American Registry for Internet Numbers (ARIN) for the United States, Canada,
parts of the Caribbean region, and Antarctica
• Asia-Pacific Network Information Centre (APNIC) for Asia, Australia, New
Zealand, and other countries in the region
• Latin America and Caribbean Network Information Centre (LACNIC) for Latin
America and parts of the Caribbean not covered by ARIN
• Réseaux IP Européens Network Coordination Centre (RIPE NCC) for Central
Asia, Europe, the Middle East, and Russia
Information Aggregation and
Analysis Tools
• theHarvester
• Designed to gather emails, domain information, hostnames, employee
names, and open ports and banners using search engines
• Maltego
• Designed to build relationship maps between people and their ties to other
resources
• Shodan
• Designed for Internet-connected devices and their vulnerabilities
Information Gathering using Packet
Captures
Gathering Organizational
Intelligence
Organizational Data
• Locations
• Relationships
• Organizational Charts
• Document Analysis
• Financial Data
• Individuals
Electronic Document Harvesting
• Websites
• Gather both current and historical information
• Social Media Analysis
• Obtain information about individuals
• Social Engineering
• Exploit the human element of security
Electronic Document Harvesting
• How about eadesmar over at TSB?
• Metadata in files like author, contributors, last edit, etc.
• Photos may have made of phone/camera, location data, etc.
• Exif data (Exchangeable Image File format)
• Can use tools like Document Inspector in Word, Examine Document in
Acrobat, or other metadata scrubbing utilities
Electronic Document Harvesting
• https://github.com/MacroConnections/immersion
Website Scraping
• The Internet Archive (a.k.a. the Wayback Machine)
• Time Travel Service
• Google cache
Social Engineering
• Social media posts
• Social Engineer Toolkit (SET)
• Creepy geolocation (not maintained)
• Metasploit (can tie SET into it)
Detecting, Preventing, and
Responding to Reconnaissance
Data Sources Packet analysis
Protocol analysis
Network traffic
analysis
Traffic and flow
analysis
Device and system
logs
Wireless analysis
Typical data Port and vulnerability
sources scans
SIEM systems
Data Analysis Methods
• Anomaly analysis: differences between established patterns/behaviour
• Signature analysis: fingerprint or signature based on existing data
• Manual analysis: Analysis that you perform
• Heuristic, or behavioural analysis: detect threats based on their behaviour
• Trend analysis: prediction based on existing data
Preventing Reconnaissance
• Preventing Active Reconnaissance
• Limiting external exposure of services and ensuring that you know your
external footprint
• Using an IPS or similar defensive technology that can limit or stop probes to
prevent scanning
• Using monitoring and alerting systems to notify you about events that
continue despite these preventive measures
Preventing Reconnaissance
• Preventing Passive Reconnaissance
• Blacklisting systems or networks that abuse the service
• Using CAPTCHAs to prevent bots
• Providing privacy services that use third-party registration information instead
of the actual person or organization registering the domain
• Implementing rate limiting to ensure that lookups are not done at high speeds
• Not publishing zone files if possible, but gTLDs are required to publish their
zone files, meaning this works for only some ccTLDs
Video: Sharpen your skills with
OSINT