Rootconf 2019

On infrastructure security, cloud architecture, cloud optimization and distributed systems

From data to decisions - Leveraging OSINT data to take security decisions

Submitted by Bharath (@synster) on Thursday, 22 November 2018

videocam_off

Technical level

Beginner

Section

Full talk of 40 mins duration

Status

Confirmed

Vote on this proposal

Login to vote

Total votes:  +1

Abstract

As a companies grow large, they tend to leave a lot of digital trail about their infrastructure on the Internet. This information can be accessed by anyone who knows what/where to look for. The information that is available publicly is known as Open Source INTelligence(OSINT) in the hacker lingo. Attackers perform reconnaissance and gather OSINT data about their target organisations to increase the attack surface. An attacker will use these ‘digital breadcrumbs’ to plan and execute their attacks against the target infrastructure.

Being able to visualise and monitor OSINT data is definitely useful to attackers such as bug bounty hunters and also anyone who is an infrastructure security professional in an organisation.

In this talk we will show how to do the following -

  1. Create a pipeline for gathering and storing OSINT data
  2. How to process & visualise the OSINT data we have already stored in step 1
  3. Integrate Slack to alert and monitor based on new data that we keep discovering

Specific digital breadcrumbs we will be working with:

  1. SSL/TLS certificates
  2. Domains and subdomains
  3. Cloud storage

Outline

  • What is OSINT?
  • What can attackers do with OSINT data?
  • Where/How do attackers(or I) find this OSINT data? (Tools/Techniques)
  • What can I do about OSINT data on my organisation?
  • Building visualisation, monitoring and alerting solutions
    • Monitoring an organisation’s SSL/TLS certificates, domains and subdomains in near-real time
    • Visualising public datasets (scans.io) to gain insights into an organisation’s external posture
      • Answering business related security questions using visualisations
    • Building monitoring and alerting solutions around various OSINT data
  • Key takeaways and Moving forward

Requirements

Requirements

Audience

  • Attackers and bug bounty hunters
  • Infrastructure security professionals and experts

Speaker bio

Bharath is a Security Engineer with Appsecco. He has a strong passion for information security and building solutions that solve real world problems.
Bharath is an active member and contributor at various security and developer communities including null open security community and Python Malaysia User Group.
His core interest lies in Infrastructure security, Reconnaissance, Application security and Protocol security.

Bharath has presented at many security and developer conferences including:

  • Defcon 26: Recon Village
  • Bsides Delhi 2017
  • Bugcrowd LevelUp 2017 & 2018
  • FUDCon 2012.

Bharath has conducted trainings at various conferences including:

  • c0c0n, 2018
  • Nullcon, Bangalore, 2018

For more details:

Links

Comments

  • 1
    Zainab Bawa (@zainabbawa) Reviewer a month ago

    Share draft slides and preview video by 18 February to close evaluation of your proposal.

Login with Twitter or Google to leave a comment