Active Directory (Part 7)
Foothold
OSINT and Phishing
OSINT is a process of collecting and analyzing publicly available information from various sources, like social media, news websites, and public databases. It helps in gathering information about target organization or individual. It can help a penetration tester to gain information about an organization's AD environment such as the names and titles of employees, the technologies and software they use, and nay information that can prove useful in a targeted phishing attack. Methods to gather such information are:
- Google dorking- Advanced search operators of Google can be used to find sensitive information about a target organization, like login pages, unsecured servers, or exposed documents.
- Public records search- Analyzing public records, such as court documents, corporate filings, and property records, can be used to gather more knowledge of a target organization or individual.
- Domain name analysis- Analyzing the domain names registered by an organization can be used to offer information about their online presence and potential discovery of useful subdomains.
- Network scanning- Scanning of publicly accessible network resources, like servers and routers, can be used to know more about the technology and software being used the organization.
Phishing is a type of technique that is used to trick individuals into giving away sensitive information, such as login credentials. The attacker pretends to be a legitimate source and send messages through email, social media, or any other source of communication to get the malicious work done. Similarly, the penetration tester can use this method to gain initial access into an AD environment via targeted email sent to an employee of an organization disguised as a legit source and request login credentials or other sensitive information. If the employee falls for the trick and revert with the requested information, the tester can use it to gain initial access into the AD environment. Some of its examples are as follows:
- Email phishing- Sending a targeted email to an employee, pretending to be a legitimate source, such as coworker or a trusted vendor, and requesting login credentials.
- Spear phishing- Sending a targeted email to a particular employee or group of employees, with the help of the information gathered via OSINT to make the email seem more legit and increase the probability of success.
- SMS phishing- Sending a text message to an employee, pretending to be a legitimate source and requesting login credentials.
- Social media phishing- Make use of social media to send a message or post a link that appears to be from a legitimate source, but is designed to trick the recipient into giving away legitimate information.
- Voice phishing- Using phone calls to trick individuals into giving away sensitive information, such as login credentials.
Comments
Post a Comment