Skip to content
This repository has been archived by the owner on Sep 8, 2021. It is now read-only.

Latest commit

 

History

History

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 

2.1 Given a scenario, perform passive reconnaissance.

DNS lookups

Identify technical contacts

Administrator contacts

Cloud vs. self-hosted

Social media scraping

  • Key contacts/job responsibilities

  • Job listing/technology stack

Cryptographic flaws

  • Secure Sockets Layer (SSL) certificates

  • Revocation

Company reputation/security posture

Data

  • Password dumps

  • File metadata

  • Strategic search engine analysis/enumeration

  • Website archive/caching

  • Public source-code repositories

Open-source intelligence (OSINT)

OSINT is a multi-factor (qualitative, quantitative) methodology for collecting, analyzing and making decisions about data accessible in publicly available sources to be used in an intelligence context.

  • Tools

  • Sources

    • Common weakness enumeration (CWE): Community-developed list of software and hardware weakness types and mitigations for implementing good secure coding practices and software design. It serves as a common language, a measuring stick for security tools, and as a baseline for weakness identification, mitigation, and prevention efforts. The CWE security weaknesses are broken uo into three categories:
      • Research concepts: Intended for academic research
      • Development concepts: Weaknesses encountered during software development.
      • Architectural concepts: Weaknesses encountered during software engineering.
    • Common vulnerabilities and exposures (CVE): The Common Vulnerabilities and Exposures (CVE) system provides a reference-method for publicly known information-security vulnerabilities and exposures.