Time
13 hours 9 minutes
Difficulty
Intermediate
CEU/CPE
13

Video Transcription

00:00
Hello and welcome to another penetration. Testing execution Standard discussion. Today we're going to be looking at intelligence gathering basics now a quick disclaimer. Pee Test videos do cover tools that could be used for system hacking. Any tools used or disgust or demonstrated
00:19
should be researched and understood by the user.
00:22
Please research your laws and regulations regarding the use of such tools in your given area. While we're having fun and learning or maybe picking up a new tool, we want to ensure that we don't get into any trouble with the law. So let's go ahead and look at our objectives.
00:39
So today we're going to discuss what is intelligence gathering? Why do we do intelligence gathering and what intelligence gathering is not? It's essential that we ensure we're on the same page as we move into our you know, next sets of discussions and that we all have a baseline understanding of what intelligence gathering is.
01:00
So they get started. What is intelligence gathering?
01:03
Well, intelligence gathering is performing reconnaissance against a target to gather as much information as possible to be utilized when penetration, testing or doing the testing. Um, enduring the vulnerability assessment, exploitation phases specifically.
01:19
So a lot of times open source intelligence is used for social engineering and things that nature. But it could also be used for
01:26
mounting an attack or understanding how a particular system could be attacked based on its version and things of that nature. So the more information you can gather, the more likely you'll be able to attack systems and use that information in the future.
01:42
Open source Intelligence is a form of intelligence collection management that involves finding,
01:47
selecting and acquiring information from publicly available sources and analyzing it to produce actionable intelligence. And so that is. The key is that we want to be able to produce actionable intelligence just because you find ah lot of documentation or information on an organization.
02:06
If you can't effectively analyze the information or it's extremely dated
02:09
than it may not provide actionable intelligence.
02:14
Now, why do we do intelligence gathering? Well, we perform open source intelligence gathering to determine various entry points, so that's important. Various entry points. These entry points can be physical and electronic or human in nature.
02:30
So many companies fail to take into account information about themselves that they place in the public
02:36
and how it can be used by a determined attacker. And on top of that, many employees fail to take into account how they put information about themselves in the public and how that information can be used to attack them or their employer. And so,
02:51
with respect to what we're doing in our day to day, we're really looking at the employer and maybe how the employees could impact the employer based on information they put out there, like data about a deal.
03:02
Information about systems, maybe a project that a technical resource is working on. Maybe there's a message boards out there where they've posted Cem,
03:10
you know, kind of requests for help
03:13
and things of that nature. And so we really aren't going to focus as much on attacking the employees. A CZ faras. They're personal device or their personal computer, or to collect their personal data because it's typically not in the scope of what we're doing. A security testers.
03:31
Now let's go ahead and look at what intelligence gathering is not so
03:38
open. Source. Intelligence is not accurate or timely, depending on the age of the information, depending on whether not systems have been updated since then, replaced since then. You know, if it's an article from 2012 and we're now in 2019 it may not be a CZ relevant
03:59
as something that you find from two or three weeks ago. So the information sources may be deliberately or accidentally manipulated to reflect erroneous data. Information may become obsolete as time passes or simply not be complete or whole.
04:14
It does not encompass dumpster diving in the dumpster diving or any method of retrieving company information off physical items found on premise.
04:21
The reason for that is that open source intelligence gathering is gathering of information from public data sets. Dumpster diving is typically trust passing your typically digging through something that is owned by the company that may be in a space that would be considered off. Limits are protected.
04:40
Same thing goes for retrieving a company. Information off physical items found on premise you're now doing like physical security type testing or attempting to gain access to physical systems to pull data off of them so that information is not open source. It's not available to the public. You have to have some type of
04:59
privileged access
05:00
to get to those systems. And so in that case, that is not considered intelligence gathering.
05:09
Now let's do a quick check on learning true or false. Bo sent open source. Intelligence is timely and accurate information.
05:18
Well, you should have recognized and remembered after a previous discussion that open source intelligence is in fact not
05:27
timely
05:28
and accurate information that would be false. Remember that this information convene it manipulated it could be changed. It could just be inaccurate. It could be old, so any of those things could play into its timeliness and its level of accuracy. So always remember that open source information
05:46
eyes not 100% reliable.
05:49
So in summary
05:51
to reiterate, we discussed what intelligence gathering is
05:57
We discussed why we do intelligence gathering, and we discussed what intelligence gathering is not. While some folks like to go straight into just scamming I P addresses and looking for exploits and looking at vulnerabilities,
06:11
open source, intelligence gathering and intelligence gathering in general could be a critical part of building a risk profile for an organization and helping them to determine
06:19
what is available to the public, as well as what their employees were putting out there on the Internet that could be used to the detriment of the organization. So it's always been official to do at least
06:31
level one intelligence gathering, as we previously discussed, which isn't always best practice, but it's better than absolutely nothing at all. But we would recommend, in the most cases, trying to do at least the best practice level to intelligence gathering, where you do some automated tool collection of information.
06:48
And then you attempt to use some of that information to do some lightweight
06:53
manual analysis and maybe build some type of web of relationships or something of that nature, but again not required if you want to do at least level one intelligence gathering.
07:02
So with that, I want to thank you for your time today, and I look forward to seeing you again soon.

Up Next

Penetration Testing Execution Standard (PTES)

In this course we will lay out the Penetration Testing Execution Standard (PTES) in all its phases and their application for business leaders and Security Professionals alike.

Instructed By

Instructor Profile Image
Robert Smith
Director of Security Services at Corsica
Instructor