On This Page

Tactical OSINT for Pentesters

Shubham Mittal | March 26 - 27



Overview

RECONNAISSANCE, the very first phase of any Risk Assessment Exercise, is often underestimated by many security professionals. Every pentester's arsenal should, however, include Open Source Intelligence (OSINT) and active reconnaissance for an effective assessment and measure the security posture against real world adversaries. This training not only talks about using OSINT to extract data but also focuses on the significance of this data and how it could be directly enriched and used offensively for attacking and compromising Modern Digital Infrastructures.

The training will cover topics like Mapping the Attack Surface, Enriching Collected Data, Tech Stack Enumeration, Cloud Recon, Employee Profiling, Identifying Hidden Injection Points, Credential Spraying, Compromising Federation Server, Exploiting Domain Trust, Social Engineering, and much more. Participants will perform real-life attack scenarios in our lab having a Forest Environment expanding over segregated Domains to compromise various services. Also, using Social Engineering and Human aspect of OSINT, students will be guided to compromise the segregated domain environment which otherwise is unreachable through previously compromised domain. The training will not only cover these topics but will also go in-depth on how OSINT techniques can be chained together and even a small piece of information can lead to the catastrophic damage to an organization.

The ultimate objective of this training program is to bring together the mindset and the artillery of a modern adversary to ultimately make the organization resilient. The students will be provided a framework to manage and prioritize all the data collected during the course. A private ONE MONTH LAB ACCESS will also be provided to each participant where they can practice the skills learned during the course.

The training program will cover the following topics:

Day 1

  • Target Scoping and Mapping the Attack Surface
  • ASN ID, IP Lookups, Allocated IP Range Extraction, Domain IP History
  • Subdomain Enumeration
  • Certificate Transparency, Brute Forcing, LDNS Walking, Internet Scan Repositories
  • Organization's Social Media Profiling
  • Employee(s) Profiling
  • Identifying Organizations Associations
  • Acquisitions, Mergers, Vendors, Customers etc.
  • Hunting Code Repositories, Dark Web, Paste Sites and Leaked Data
  • Cloud Recon
  • Server Instances, Cloud Storage Objects, Federation Server Discovery
  • Art of Making Notes

  • Enriching OSINT Data
  • Generating Username/Password Patterns
  • Bucket/Spaces Pattern Generation
  • Tech Stack Profiling
  • Capturing Screenshots of Exposed Services
  • Port Scanning (Active/Passive)
  • Identifying SSO/Login/Admin/VPN Portal(s)
  • Explore Breached Password Databases
  • Metadata Extraction
  • Automating CSE for Dork Matching
  • Identifying and Prioritizing Targets

  • Attacking and Exploitation
  • Targeted Credential Spraying on Infrastructure Assets and Third Party Authentication
  • Compromising Business Communication Infrastructure (BCI)
  • Exploring the Compromised Assets [Bonus Lab Exercise]

Day 2

  • Attacking and Exploitation Continued...
  • Attacking Network Services using collated data
  • Stealing information from Buckets/Blobs
  • Compromising Cloud Server Instances
  • Discovering and Exploiting Hidden Injection Points
  • Compromising Federation Servers/Domain Controller Servers
  • Mapping Forest Environment
  • Exploiting Domain Trust to Identify New Input Vector (Users) for Further OSINT
  • Exploring Human Attack Surface
  • Attack Planning: Compromise the Unreachable Domain

  • Practical Social Engineering
  • User Profiling
  • Watering Hole Attack
  • Spear Phishing and Targeted Client Side Exploitation
  • Dropping Payloads using BCI

  • Post Exploitation & Persistence
  • Privilege Escalation in Windows Environment
  • Dumping Privileged User Credentials
  • Compromising AD and Network Persistence

Who Should Take this Course

  • Penetration Testers
  • Social Engineers
  • Red-Teamers
  • Bug Bounty Hunters
  • OSINT Researchers
  • Risk Management Professionals

Student Requirements

Should have basic understanding of Pen-testing and OSINT

What Students Should Bring

  • Students should have a laptop with admin access on it, minimum 4GB RAM and at least 30 GB of free HDD space.
  • It should have a browser and should support Wifi Connection in order to reach the Internet.
  • Any OS is fine (Windows/Mac/Linux). Everything else will provided in the Student kit.

  • Please avoid Chrome-books and iPads.

What Students Will Be Provided With

  • One Month Private Lab Access
  • Student Pack which contains
  • Slide deck
  • Custom VM
  • OSINT and Pentest Cheat-Sheets
  • Custom Scripts
  • Answers to Lab Exercises
  • Bonus Challenges
  • Access to private CTF Server

Trainers

Shubham Mittal is an active Information Security researcher with 6+ years of experience in Pentesting and OSINT. He is CTO at NEOTAS and leads the research and development of their products and services. He has Trained at multiple conferences including Black Hat, NullCon, HackMiami, c0c0n, etc. He is the author of OSINT Framework - DataSploit (listed in Top Ten Security Tools of 2016) and is core organizer of @Recon Village which runs @DEFCON. He works from the command line, uses vi and loves beer.

Sudhanshu Chauhan is an information security professional with 6+ years of experience. He is the developer of RedHunt OS and one of the core contributors to DataSploit (Open Source OSINT Framework). Sudhanshu has co-authored 'Hacking Web Intelligence', a book on OSINT concepts and techniques. He has been a speaker at various conferences such as Ground Zero Summit, CyberHackathon Bar-Ilan University, BlackHat Arsenal; has delivered training at BlackHat US, AppSec EU, etc. and is core organizer of @Recon Village. Sudhanshu has also identified multiple critical vulnerabilities in various applications of organizations like Adobe, ATT, Freelancer, Yandex etc. Twitter: (@sudhanshu_C)