4 hours 42 minutes
Hello and welcome to the last video from the first module data collections. And this video is fully dedicated for leveraging ascent in Cyber threat intelligence context. Another interesting data source that can be used for threat intelligence
is awesome or open source intelligence.
Let's see together its advantages. These advantages, the purpose behind using awesome in threat intelligence and some examples and real cases are fused. In essence, open source intelligence is derived from data and information that is available for general public. It's not limited
to ah, what can be found using Google Search engine
off all the threat Intelligence subtypes,
open source intelligence or ascent is perhaps the most widely used, which makes sense because it is mostly free.
There is a great deal off critical information available about your adversaries and startling amount about you, your organization, your assets and infrastructure. And all of them are easily available by anyone
before did diving into us. And let's start with a quick definition. Open source intelligence, mostly called Ascend, is defined by both the U. S. Director off national intelligence and the U. S. Department of Defense, as produced from publicly available information that is collected,
and disseminated in a timely manner to an appropriate audience for the purpose off addressing specific intelligence requirement. So here, the important phrase to focus on is publicly available
when it comes to advantages and disadvantages. Off ascent. The main advantages are awesome. Offer unlimited potential in any topic. They are relatively with low cost and generally up to date and can be shared with anyone. However, the main difficulty
ascent that is, that it could be this information or simply inaccurate. In other words, the chief difficulty is identifying relevant, reliable sources that are from the vast amount off publicly available information.
Ossan is used for multiple purposes, and one of these that I will start with is called the dark side Off Open Source Intelligence.
So basically, ah, the dark side off ascent is anything that can be found by security professor. Professionals
can also be found by threat actors
threat Actors use open source intelligence tools and techniques, toe, identify potential targets and exploit weaknesses in target networks. So once the vulnerability is identified, it is often an extremely quick and simple process to exploit it and achieve
very tee off malicious objectives.
This process is the main reason why so many small and medium sized companies get Hackett each year. It's because vulnerabilities in their networks or website architectures are found using simple Ossan tools. In short, they are easy targets.
Open source intelligence Doesn't Onley enable technical attacks on I t systems? Because threat actors also seek out information about individuals and organizations that can be used for sophisticate. Sophisticated social engineering companies
wasn't can not only leverage by threat actors and hear what concern as the most is using using ascent from a threat, intelligence sight or by threat intelligence team.
So, for instance, Threat intelligence teams use Ascend for Jewell main reasons. First, they can identify the organization's exposed attack surface and even see this aspect in more detail in our the next slights. Also, the second this case is to collect
any information that might be available about your adversaries briefly
from identifying which new flows are being actually exploded. Tool monitoring threat actor communications about upcoming attacks wasn't enable security professionals to prioritize their time and resources to address most significant trending threats.
The main purpose off using innocent toe identify your attack surface is to be one step ahead off Attackers. There are plenty off information that you can collect through ascent. For instance, you can collect Ah, public appearances associated with your organization, and they're open ports.
You can identify company domains and septum sub domains and their associate ID certificates.
You can identify technologies that are being used in your Web sites. You can also find our e mails off your employees and their phone numbers. You can find also exposed servers or databases, and these are not the only things that you can find using. It wasn't because you can also find
public documents that are not supposed to be
public and public source code that can expose passwords, credentials, tokens, et cetera. And, of course, another big source off information is social media.
Another purpose off? Using awesome, particularly as Cyber Threat Intelligence Team is that adversaries leave their evidence that you can enrich to create context and help decision making. For instance, if we take the example off fishing campaign targeting your company,
adversaries will start with delivering the email or send you the malicious email containing a malicious link. Are directing to a credential theft page
here by applying ascend all the malicious you, Earl, you can find their who is records that will help you identify whether the website belongs to the adversaries infrastructure or is it probably compromised? Website
Here you will ask What's the difference here? So your course of actions may change according to these facts.
Also, monitoring social media like Facebook, instagram, Twitter, etcetera, Reddit forums can also help you to get a new overview off threat actors activities. Now let's move to some examples off since one of the most known Ossan sources
is gold Awesome framework.
Awesome Framework is a cyber security framework. Ah, collection off arson tools that are created to make intelligence collection easier For analysts,
it provides simple were based interface that allows youto bro's different horse and tools filtered by categories. When you click all the categories, such as username email address, domain name, a lot off useful resource is will appear on the screen. Inform off secretaries
I really recommend visiting and discover in the different tools offered by us and framework
through their official website
wasn't also offer
Ah specifics, Search and giant
like show Dan senses and binary Etch a probably showdown is the most known that lets users are fine specific types off computers like Webcams, routers, servers, et cetera, connected to the Internet using a verity off
filters. The same thing is offered by
senses and binary edge, so these websites Kroll the Internet for publicly available devices. Multiple threat actors use showdown toe, identify publicly available devices or service is with different configuration.
Senses can be also used to find Web sites associated with a certain certificate i, p's related Toe A organizations, et cetera.
I believe it's worth adding aerial case example. And here I chose, showed, and I tried to find the number off exposed elect Sixers Instances and Docker instances that are publicly exposed through their open ports and product
elastic for a Sixers Instances
and product docker for docker instances. So using the same technique to detect your weaknesses is highly recommended measure for companies on a way to stay aware off your attack surface
Penetration Testing and Ethical Hacking
The Penetration Testing and Ethical Hacking course prepares students for certifications, like CEH. This course ...
7 CEU/CPE Hours Available
Certificate of Completion Offered
MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training
This course prepares you for the ATT&CK® Cyber Threat Intelligence Certification, and provides hands-on instruction ...
3 CEU/CPE Hours Available
Certificate of Completion Offered