blog
    Pentesting 101: Human OSI ...
    05 January 21

    Pentesting 101: Human OSINT Continued

    Posted byHisomeru
    facebooktwitterlinkedin
    news-featured

    Google and file searches on a website are good ways to accomplish manual Human OSINT. However, most penetration testers like automation. There is a tool called “Maltego” that automates many of the search processes one would use on multiple search engines and social media platforms. Maltego is an application that has many plugins that interface with APIs of various internet databases. Some of these databases are ones that previous articles have mentioned like shodan.io. These APIs can be installed and searched separately.


    INE's guide to penetration testing fundamentals continues with more information on human OSINT. To read our last post on Human OSINT click here

    maltegoAPIs.png

    Using Maltego is straight forward. It creates nodes and links to pieces of data related to search terms input into the APIs. Using Maltego’s interface is quite easy and helps to view data graphically instead of mostly text based. This is a good way to build a profile of a pentester’s target network, email addresses, hosted files, servers, subdomains, etc. Keep in mind that there are different tiers of Maltego. The examples shown are what can be found using the free version of Maltego. Paid versions offer more access to different APIs, which could provide more information on a particular target. Below are screenshots of nodes and links when using Maltego for data mining.

    1-2.webp

    2.webp

    Examples of how this data can be used is vast. In later articles, they will build upon the significance of conducting Human OSINT. However, just to jog the mind before those articles are released, here are a couple small examples:

    • The last article on Technical OSINT talked about the tool “theHarvester.” Using it, one could glean a domain registrar’s email address. Turning around and using the email address schema to email another user who has posted a .pdf on the company website from a CEO’s faked email address.
    • Some websites will host a spreadsheet to word document online that has their telephone directory with names. Using that data, an attacker could setup a fake website that looks identical to their organization’s website. However, the attacker’s website hosts malware. Using a name found in the telephone directory, a fake network administrator could call someone from HR and ask them to click on a link they receive in their email.

    CONCLUSION

     Having Human OSINT helps build a profile for the target network. Doing homework up front on human factors of the network can yield a foothold into the network. Things like email attachments or targeted password reset links are just a couple of ways to use the information gained through Human OSINT to boost your cyber security. Even though Human and Technical OSINT are split into two categories, the data they produced are used to help shape the picture. These two OSINT disciplines complement each other.

    Again, the way these tools were used in this article only scratches the surface of their true capacity. There are many other tools out there that can bring more or different information than presented above. The goal of this article is to show the concepts of Human OSINT and it can be accomplished through different means. Use the concepts seen here and apply them to other tools and learn those tools the best you can.


    Hey! Don’t miss anything - subscribe to our newsletter!

    © 2022 INE. All Rights Reserved. All logos, trademarks and registered trademarks are the property of their respective owners.
    instagram Logofacebook Logotwitter Logolinkedin Logoyoutube Logo