Information Gathering (OSINT) Explained and Practiced - Preliminary

Tip: Like first, watch later, make it a habit.

foreword

In our social engineering, a lot of intelligence belongs to OSINT (Open Source Intelligence). Learning to collect open source intelligence can help us do more with less.


1. What are the points of OSINT?

It can be roughly divided into two types, one is non-technical OSINT and the other is technical OSINT.

1. What is non-technical OSINT, and what is technical OSINT?

1. Non-technical OSINT: It refers to social engineers interacting directly with the target, for example, when the target logs in to the website, he can peek at his password, account number and other privacy without being discovered. (referred to as observation skills)

2. Technical OSINT: Refers to social engineers collecting open-source intelligence about targets on the Internet through computers, and launching attacks against them (common tools include zoomeye, fofa, and Skyeye)

2. Examples of OSINT problems

     organization type                             question to ask
company How the company uses the Internet
company How the company uses social media
company

how the company pays

company how the company gets paid
company The company has a single or multiple offices
company How many suppliers does the company have
company What suppliers does the company have
personal what hobbies does this person have
personal What social media accounts does this person have
personal what is this person's occupation
personal Information about the person's family members
personal Does this person have a related website
personal How educated is this person
personal where does this person usually go

2. Sequence of social engineering 

  OSINT, collect information----> design camouflage----> plan attack----> launch attack----> report

3. Simulate OSINT (see picture)

Here we look up someone's information:

By querying q binding, the target's phone number and address are obtained

Then, the approximate name of the user × Jin x was obtained through Z Baobo, and compared with the original address, it was determined that this person was the target person. Afterwards we can confirm the exact name with a big phone call. If you dig deeper later, you can get more relevant information.


Summarize

In this chapter, we talked about OSINT (information collection) in social engineering. Through the explanation in this chapter, we took you to understand the first step of social engineering.

Guess you like

Origin blog.csdn.net/m0_72532016/article/details/125985063