arrow_back POLARDB - A database architecture for the cloud
Onion Services for devops arrow_forward
OSINT for Proactive Defense
Submitted by Shubham Mittal (@shubhammittal) on Saturday, 8 June 2019
Section: Full talk Technical level: Intermediate Session type: Lecture
In today’s age, when every organization has an online presence in multiple shape (eg. social media, code repositories, cloud infrastructure, etc.), it’s difficult to keep a track of the assets as well as the amount of sensitive information that goes out knowingly or unknowingly. Such assets or information can cause catastrophic damage to the organization, unless identified and remediated.
Examples of such data could be a legacy host running unauthenticated mysql, or a list of confidential subdomains leaking via Certificate Transparency, an anonymous read-only bucket serving images along with backup.tar, etc.
Since such issues can allow any attacker to compromise organization’s perimeter security, Security Teams should keep a very close eye on what information (about the organization) is being leaked out on the Surface as well as the Dark web.
This talk will discuss Open Source Intelligence (OSINT) Tools, Techniques and Procedures (TTP), that are highly useful and effective for Blue Teams in order to keep their perimeter security intact.
Below is an outline of the presentation:
- Overview of OSINT
- Why Security Teams should use OSINT
- Continuous Discovery and Monitoring of Assets
- Use OSINT Data for Periodic Attack Simulation
- Discovering Sensitive Information Leakage
- Monitoring Breached Passwords
- Proactively Identifying Security Incidents using SOCMint
- OSINT Countermeasures
Shubham Mittal is co-founder of @RedHuntLabs and is an active Information Security researcher with 7+ years of experience in Pentesting, OSINT and Perimeter Security. He has worked both in offensive as well as defensive security roles. He is a BlackHat Asia Review Board Member and has spoken/trained at multiple conferences including BlackHat, NullCon, HackMiami, c0c0n, etc. He is the author of OSINT Framework - DataSploit (listed in Top Ten Security Tools of 2016) and is co-founder of @Recon-Village which runs @DEFCON Vegas and China. He works from the command line, uses vi and loves beer.