As a companies grow large, they tend to leave a lot of digital trail about their infrastructure on the Internet. This information can be accessed by anyone who knows what/where to look for. The information that is available publicly is known as Open Source INTelligence(OSINT) in the hacker lingo. Attackers perform reconnaissance and gather OSINT data about their target organisations to increase the attack surface. An attacker will use these 'digital breadcrumbs’ to plan and execute their attacks against the target infrastructure.
Being able to visualise and monitor OSINT data is definitely useful to attackers such as bug bounty hunters and also anyone who is an infrastructure security professional in an organisation.
In this talk we will show how to do the following -
- Create a pipeline for gathering and storing OSINT data
- How to process & visualise the OSINT data we have already stored in step 1
- Integrate Slack to alert and monitor based on new data that we keep discovering
Specific digital breadcrumbs we will be working with:
- SSL/TLS certificates
- Domains and subdomains
- Cloud storage
- What is OSINT?
- What can attackers do with OSINT data?
- Where/How do attackers(or I) find this OSINT data? (Tools/Techniques)
- What can I do about OSINT data on my organisation?
- Building visualisation, monitoring and alerting solutions
- Monitoring an organisation’s SSL/TLS certificates, domains and subdomains in near-real time
- Visualising public datasets (scans.io) to gain insights into an organisation’s external posture
- Answering business related security questions using visualisations
- Building monitoring and alerting solutions around various OSINT data
- Key takeaways and Moving forward
- Attackers and bug bounty hunters
- Infrastructure security professionals and experts
Bharath is a Security Engineer with Appsecco. He has a strong passion for information security and building solutions that solve real world problems.
Bharath is an active member and contributor at various security and developer communities including null open security community and Python Malaysia User Group.
His core interest lies in Infrastructure security, Reconnaissance, Application security and Protocol security.
Bharath has presented at many security and developer conferences including:
- Defcon 26: Recon Village
- Bsides Delhi 2017
- Bugcrowd LevelUp 2017 & 2018
- FUDCon 2012.
Bharath has conducted trainings at various conferences including:
- c0c0n, 2018
- Nullcon, Bangalore, 2018
For more details:
{{ gettext('Login to leave a comment') }}
{{ gettext('Post a comment…') }}{{ errorMsg }}
{{ gettext('No comments posted yet') }}