Tim Tomes
(@LaNMaSteR53)
Look Ma,
No Exploits!
The Next Generation of Open
Source Reconnaissance:!
The Recon-ng Framework!
Slide 2
Slide 2 text
§ Tim Tomes (LaNMaSteR53)
§ Christian/Father/Husband/Veteran
§ Black Hills Information Security
§ SANS Instructor
§ Security Blogger
– lanmaster53.com / pauldotcom.com
§ "Coder"
Me
Slide 3
Slide 3 text
Credits
§ Ethan Robish (@EthanRobish)
§ Micah Hoffman (@WebBreacher)
§ Thrapt
§ Brendan Coles
§ Jay Turla (@shipcod3)
§ Robert Frost (@frosty_1313)
§ Drumm
§ Dan Woodruff (@dewoodruff)
§ John Babio (@3vi1john)
§ Kenan Abdullahoglu (@kyabd)
§ Matteo Cantoni (nothink.org)
§ Mike Siegel
§ Anthony Miller-Rhodes (@_s1lentjudge)
§ Eric Gragsone
Slide 4
Slide 4 text
Disclaimer
Due to the dynamic nature of the
demos, offensive material is possible.
While I don’t condone it, I can’t
prevent it.
Slide 5
Slide 5 text
Reconnaissance Defined
§ Merriam-Webster - “A preliminary
survey to gain information.”
§ ...using open sources and without
making direct contact.
Slide 6
Slide 6 text
Pentest Methodologies
§ Network
1. Information
Gathering
2. Scanning and
Enumeration
3. Exploitation
4. Analysis and
Reporting
§ Web App
1. Reconnaissance
2. Mapping
3. Discovery
4. Exploitation
5. Reporting
Slide 7
Slide 7 text
Traditional Recon
§ Select and verify scope
§ Gather info for:
– authentication testing
– social engineering
§ Learn of implemented technologies and
configurations
§ Search for vulnerable code snippets
– GitHub dorks
§ Identify weaknesses in physical security
Slide 8
Slide 8 text
The Problem
§ Often overlooked or skipped
– Internal – "I already know everything
about my..."
– External – Not enough time
§ My argument
– Internal - You never know everything
– External - You end up going back for it
anyway
– Isn’t it good to know what the rest of the
world knows?
Advanced Recon
§ Efficiently develop storylines
§ Enumerate server-side technologies
§ Discover live vulnerabilities
§ Harvest full credentials
§ Conduct remote physical security
analysis
Who
has
the
)me?
Slide 12
Slide 12 text
You do.
Recon-ng
“Recon,
in
about
an
hour.”
Slide 13
Slide 13 text
Caveats
§ Using 3rd party websites may violate
Nondisclosure Agreements (NDA)
and contracts.
– Anonymizing proxies
– Authorization
§ Active recon vs. Passive recon
– Active ~ Discovery
§ Not all data is free
– $0 to > $60k
Slide 14
Slide 14 text
The Recon-ng Framework
§ Interactive
§ Look and feel of MSF
§ Modular
§ Data driven
§ Scriptable (recon-cli)
§ Documented (wiki)
§ Developer friendly
§ Python (native)
§ http://www.recon-ng.com
Slide 15
Slide 15 text
Framework Methodology
Social Engineering
Web Attack
Network Attack
Recon Discovery Exploitation Post-exploitation
Mapping
Metasploit
SET
Meterpreter
Recon-ng
Info.
Gather
Scanning &
Enumeration
Exploitation Post-exploitation
Burp
Slide 16
Slide 16 text
UI Highlights
§ Interactive help
§ Command completion everywhere
§ Smart loading
§ Module switching
§ Direct data access
§ Workspaces
§ Verbose / Debugging
Contact Harvesting
§ Information Gathering
§ Data Manipulation
§ Storyline Development
Slide 24
Slide 24 text
Information Gathering
§ LinkedIn
– Social Networking for professionals
– Accurate and precise
§ Jigsaw
– Cloud based CRM
– Owned by Sales Force
– Crowd sourced
– Scraping is free, API is better
§ PGP Key Servers
– RedIRIS
– MIT
http://recon-ng.com
http://lanmaster53.com
Want more free tools and webcasts?
Send me your contact information!
@LaNMaSteR53
[email protected]
Thank You!