jsoma / data-studio-projects

12 stars 18 forks source link

Setting up a social engineering campaign #246

Open hakantan opened 6 years ago

hakantan commented 6 years ago

Pitch

There are a lot of tools that enable scouring the web, finding information on companies and people that can later be used to set up a hacking campaign. A mail-address you find with one tool can be checked against a database that will tell you whether this address has been part of a data breach in the past. If yes, that password might be exposed. Security-wise, that can be a huge risk.

Summary

For this project, I want to understand ways in creating such a campaign. I'm looking at companies from the german blue-chip stock market index.

Due to time limits I will just look at one aspect of this campaign. (Normally, you would check the names of the mail addresses you've found, see if it as a person, find more information about them etc. I'm only looking at mail-addresses.)

Details

My challenges are two-fold:

  1. Gathering mail-addresses from these companies
  2. Checking whether these addresses have been part of a breach.

This is obviously being done for research purposes only.

Possible headline(s):

Getting a foot in the door: How hackers leverage open source intelligence to set up their campaigns

Data set(s): Using two scripts. Infoga and Datasploit.

Code repository: Not yet available, due to privacy issues. Here. (I won't be releasing the names/addresses of the people I've found.)

Possible problems/fears/questions:

Work so far

Started collecting mail addresses, running into problems with the script. No images so far.

Checklist

This checklist must be completed before you submit your draft.

hakantan commented 6 years ago

Update

osint-01

Any changes in direction or topic?

No changes.

Problems/Questions

One of the APIs returns ~100 results max. and I don't know why. Maybe it is an API limitation, but that somewhat skews the results in a weird way, because there a way more than 100 mail-addresses associated with these companies.

Repo can be found here.

Checklist

sarahslo commented 6 years ago

I read about Datasploit. What if you fed it the email addresses of people at one company? you could then get a picture of what it collects.

As you can see with the API limits you're ending up chart what you can collect, not what is out there.