§ Tim Tomes (LaNMaSteR53) § Christian/Father/Husband/Veteran § Black Hills Information Security § SANS Instructor § Security Blogger – lanmaster53.com / pauldotcom.com § "Coder" Me
Traditional Recon § Select and verify scope § Gather info for: – authentication testing – social engineering § Learn of implemented technologies and configurations § Search for vulnerable code snippets – GitHub dorks § Identify weaknesses in physical security
The Problem § Often overlooked or skipped – Internal – "I already know everything about my..." – External – Not enough time § My argument – Internal - You never know everything – External - You end up going back for it anyway – Isn’t it good to know what the rest of the world knows?
Caveats § Using 3rd party websites may violate Nondisclosure Agreements (NDA) and contracts. – Anonymizing proxies – Authorization § Active recon vs. Passive recon – Active ~ Discovery § Not all data is free – $0 to > $60k
Information Gathering § LinkedIn – Social Networking for professionals – Accurate and precise § Jigsaw – Cloud based CRM – Owned by Sales Force – Crowd sourced – Scraping is free, API is better § PGP Key Servers – RedIRIS – MIT
http://recon-ng.com http://lanmaster53.com Want more free tools and webcasts? Send me your contact information! @LaNMaSteR53 [email protected] Thank You!