background preloader

Intelligence Gathing

Facebook Twitter

Theharvester - Information Gathering. The objective of this program is to gather emails, subdomains, hosts, employee names, open ports and banners from different public sources like search engines, PGP key servers and SHODAN computer database. This tool is intended to help Penetration testers in the early stages of the penetration test in order to understand the customer footprint on the Internet. It is also useful for anyone that wants to know what an attacker can see about their organization. This is a complete rewrite of the tool with new features like: Time delays between request All sources search Virtual host verifier Active enumeration (DNS enumeration, Reverse lookups, TLD expansion) Integration with SHODAN computer database, to get the open ports and banners Save to XML and HTML Basic graph with stats New sources Passive discovery: Google: google search engine - www.google.com Google-profiles: google search engine, specific search for Google profiles Bing: microsoft search engine - www.bing.com Active discovery:

WiGLE - Wireless Geographic Logging Engine - Plotting WiFi on Maps. OSINT. OSINT. Intelligence. Tracking (and Being Tracked) with Twitter. The aptly named Creepy is a "geolocation aggregator," which is to say that it gathers location data from social networking sites and image hosting services. Digital image files contain EXIF tags which record the image's date and time stamp information. Some cameras and smart phones can also provide GPS data along with the time stamp. So ... by using Creepy to collect information from Twitter, Flickr and other apps, you can track a subject's movements and create a composite map.

According the Creepy website, "Using Creepy for any illegal or unethical purposes is strictly forbidden and the developer assumes no liability. " Even so, this application is a stalker's dream. Installing Creepy I decided to take Creepy for a test run using a couple of colleagues as guinea pigs. Downloading the Creepy executable from the web was as simple as it gets. Tracking the First Subject I began the tracking exercise by entering the Twitter Username in the box of the same name and clicking "Geolocate Target. " Maltego. Basic Use Of Maltego For Network Intelligence Gathering. Description: This is a screen-cast demonstration of the basic uses of Maltego, a powerful program used in network and open source intelligence gathering, by Rick Gurley of Risk Management Research & Investments, Inc. - a licensed private investigation agency in Columbia, Missouri.

With the continued growth of your organization, the people and hardware deployed to ensure that it remains in working order is essential, yet the threat picture of your “environment” is not always clear or complete. In fact, most often it’s not what we know that is harmful - it’s what we don’t know that causes the most damage. This being stated, how do you develop a clear profile of what the current deployment of your infrastructure resembles? What are the cutting edge tool platforms designed to offer the granularity essential to understand the complexity of your network, both physical and resource based?

Maltego offers the user with unprecedented information. Information is leverage. Information is power. Investigation. Check Usernames - Social Media Username Availability. Informática 64.