Phishing

Course
Time
1 hour 30 minutes
Difficulty
Beginner
CEU/CPE
2

Video Transcription

00:03
welcome to Module one in Cyber is crafting the perfect email course. Re kon. The first step in any successful fishing campaign
00:11
is re kon,
00:15
so re con you've definitely heard of it before. But what is it?
00:19
Reconoce short for reconnaissance, which is a military term for observation of a region to locate an enemy or ascertain strategic features in cybersecurity. Though it's the first stage of attack where an attacker will look for information about his or her target, the trying determine weaknesses and vulnerabilities that they can later exploit.
00:40
There are two types of re con that social engineers or Attackers will use. The first and most common type is passive re kon
00:48
passive re kon is any type of reconnaissance against a target that should go unnoticed. Couple examples of that are Oh Sint Google Food Company websites
00:58
Dr Eyes, actually physically driving by the company to see if you can get a physical layout
01:03
things like that.
01:06
The second type of re kon is active re con. This is much less likely to go unnoticed because the Attackers actually engaging with the target to gather information about vulnerabilities.
01:15
Some examples of active re kon our port scanning
01:19
physically interacting with the employees or target
01:22
phone calls. Things like that.
01:27
So what is? Oh, Sint
01:30
Oh, since is short for open source intelligence, and it's one of the first steps in passive re kon.
01:38
Oh, sin to use is anything that is freely available on the Web,
01:42
and you collect all that data from these publicly available sources. Let's try and find weaknesses or information that you can use to further exploit against the target.
01:53
Why do we use Oh sint?
01:55
So first off, it is a passive type of re kon, meaning you're not going to take anyone off. You're doing recon on them.
02:00
Second, it's very easy, and you're just using information that is freely available on the Web.
02:09
Some common forms of Oh Sint, our social media Lang Facebook linked in
02:15
Instagram
02:16
forums. There's a ton of forums online, and many people do post personal information on there that you could use against them
02:24
the actual company website Google, Dorking
02:28
and the Dark Web.
02:32
So there's a couple off
02:35
really common tools built into Callie Limits, which is a common pen testing platform
02:39
that we can use to do Oh sent one of the first ones I like to use is called The Harvester. It's really easy to use, and it's really quick.
02:49
Another one that takes a little bit deeper. Dive is re Kon en G,
02:55
and we're going to be doing labs on both of those later in the course.
03:02
Another really popular investigation tool just came out of a few years ago. If I remember correctly is boosted or linen,
03:10
it has many built in modules for online investigators. It was developed by David Westcott, Michael Basil of Until Techniques, and that's where it can be found. It's got a ton of built in tools like a custom Firefox browser wave built in Adam's Tor browser, Google Earth Pro, Which is good if you wanted to actually
03:30
look at the company you were trying to do. Oh, stint on
03:32
multi Go wreak on Angie and the Harvester, of course, and many more.
03:42
So let's go ahead. And now we know a little bit more about recon. Let's prep for our upcoming labs, so we're actually gonna go hands on with the harvester and re kon en G. And if you don't have a lab set up, let's go in and download virtual box and grab either the Cali limits VM or boosted Orlin Ex PM
04:00
and they both have over the files that you can import right into virtual box and get started. So, um, there are a couple differences between Callie Limits and boosted or the 1st 1 If you plan to do more
04:13
offensive security, I'd recommend Callie Lennox has got a ton of those built in tools. And if you do plan on doing mawr o cents or just online re sort research and investigations, I would recommend boosted or Lennox. And so these are the sights. You can download them and I'll go out and show you where real quick.
04:31
All right, so on virtual box out of borg slash wiki slash downloads,
04:38
you can see the
04:40
platform packages right here. They've got Windows, Mac limits and Solaris. You just click that and that will allow you to download the virtual box installer.
04:48
And if we go over to Cali dot organise k a. L i dot org's slash downloads.
04:56
That will take us when we go back. One change here
05:00
to this download page, and that's where you can download all the ice oes. But what we're looking for. If you scroll down, they've actually got an O. V. A. Built in for virtual box. And if you click that offensive security download page,
05:13
it'll take us right there
05:15
for both virtual box and I'm VM where
05:17
and we'll click the virtual box images. And here's the over the final a direct download, and they do have a torrent as well.
05:25
I normally recommend the Torrent file. It is a little bit quicker if you're familiar with that. If not, you can use the direct download as well. And they do provide the Shaw
05:35
hash there.
05:36
And last but not least, we wouldn't go to Intel techniques dot com slash bruschetta,
05:43
and that will take us right to the download page here. It tells you a little bit more about the investigative OS and some of the built in tools, and we've got our Google drive download and the direct download, and again they provide that check sums. You can verify that you are downloading what you should be.
06:00
Once you get those downloaded, you can import them right into virtual box, and that will get you ready for our labs,
06:08
and we're going to end this lesson
06:11
with just a really quick who is
06:14
so first what is. Oh sint,
06:19
you don't give you just a second.
06:21
Oh, Sint is short for open source intelligence. It's when we collect data from publicly available sources like the Web.
06:30
Next question. What is the difference between active and passive re? Come?
06:38
And we talked about both these types of re comes
06:41
and the 1st 1 active is a type of re kon, which an attacker actively engages with the target.
06:47
And passive is a type of recon that should go unnoticed. Common way to do Pass Every con is with oh sent
06:57
in last question here. What are two common Lynn experience used to perform Re Kon?
07:03
We talked about how to download both of these, so we'll get right into it. The 1st 1 is Callie Lennox,
07:10
and the 2nd 1 is boosted or Lennox
07:13
and legs that there's a couple differences between the two. There bull for built
07:16
with a lot of tools that you can use. Callie Lennox is geared more towards penetration testers and people doing offensive security and boosted or Lennox is geared towards people that are doing research like online investigators and things like that.
07:31
So next up, we have the R Harvester lab, and we're gonna learn a little bit about the harvester and actually do some active, absent.
07:41
Stay tuned.

Up Next

Phishing

In this online course, you will learn how to craft the perfect phishing email to allow you to teach your team how to avoid actual phishing attempts.

Instructed By

Instructor Profile Image
Dustin Parry
Network Security Engineer
Instructor