180 likes | 223 Views
One OSINT Tool to Rule Them All. by: Émilie St-Pierre BSidesLV Proving Ground, July 24 th 2017. $ whoami. Émilie St-Pierre Security Analyst at Rapid7 Active in information security for 5 years Director at large for the SYN Shop hackerspace https:// synshop.org
E N D
One OSINT Tool to Rule Them All by: Émilie St-Pierre BSidesLV Proving Ground, July 24th 2017
$whoami Émilie St-Pierre Security Analyst at Rapid7 Active in information security for 5 years Director at large for the SYN Shop hackerspace https://synshop.org Co-host of the weekly Greynoisepodcast https://greynoi.se Twitter: @L4bF0x
Define: OSINT Open Source Intelligence (OSINT) … is locating, and analyzing publicallyavailable sources of information … [with the] goal of producing current and relevant information that is valuable to either an attacker or competitor. http://www.pentest-standard.org/index.php/PTES_Technical_Guidelines#OSINT
Valuable types of OSINT • Usernames • E-mails • Technology in use • Location data • Corporate data
Methodology Compiled a list of reputable, free and popular tools with a focus on organizational penetration testing: • Default Kali Linux OSINT tools • Tools listed in popular pentesting books • Word-of-mouth • OSINT tool lists (osintframework.com)
Methodology Compared them against 3 benchmarks: • Data variety • Data quality • Relevancy
Data Limitations • Non-exhaustive list. • Some tools contain some stand-alone tools. • Some tools are hybrids that do more than OSINT. • Data accuracy could be biased based on chosen sample (sample size = 42).
My top picks • Best e-mail lists: • Recon-ng (URL) • Most user-friendly: • Spiderfoot • Easiest metadata analysis: • FOCA
Thank you! Émilie St-Pierre @L4bF0x https://github.com/L4bF0x/osintcomparison OSINT Tool Comparison Table https://bit.ly/osintcomparison osintcomparison@gmail.com