Time
1 hour 41 minutes
Difficulty
Beginner
CEU/CPE
2

Video Transcription

00:00
Hey, guys, welcome back to the Sabbath. Cult in question savvy. This is at the minimum. And in today's episode, we're going to continue reconnaissance.
00:08
Either said before reconnaissance might be one of the most important steps during a targeted attack. The hacker wants to gather as much information as possible during reconnaissance. Reconnaissance will help him in the following six steps.
00:22
It would make life a lot easier when you have all of the information handy and you know what to expect
00:28
doing an attack.
00:30
But we only covered the passive kind of the passive type off reconnaissance where we got the I. P s. We got the ah,
00:39
you others. We got the, uh, the the user's. We went through social media. We want we know who is the system admin and so on. However we stay
00:49
still need more information that would help us, let alone something that would help us and delivery something with Dobson. The solution on dhe even organization. So the passive, uh,
01:02
reconnaissance was looking for publicly available information. Now we need to get more active. We need to start interacting with the target. We need to get
01:10
this information like from the target, and this can be technical and and technical, keeping in mind that the target is not necessarily a system. So in technical, a vulnerability scanning is one of the most popular activities here, because what you're doing is
01:26
you want to find the vulnerability that you would exploit. So running of on abilities can is very popular. During the Constance you will get. What are they available? Service is you'll get. What are the boredom of service is that I use. You also get the vulnerable a less if they're using of ANA below us
01:44
something if they're using a Web application or this system is resting up application. Some of these scandals would actually give you the vulnerabilities and the application or the dependencies that are used by the application.
01:57
Keeping them under 12. Applications usually are extremely targeted because oftentimes the application server
02:06
hosting, though of application, is running as route or administrator.
02:09
So if you get access to a vulnerability that would allow you to run code on the application,
02:17
you'll run code as route because you're one as the application server running the Web application so vulnerabilities. Canning is kind of crucial. You want to get.
02:29
You want to use all of the information that you get from passive V I. P is the links, the others dependencies, All the communication that we got from the passive on Donovan abilities can against it.
02:40
Obviously, you want to be as quiet as possible because you don't want the
02:46
the target to notice any scanning that is going on.
02:52
So the second thing is fingerprinting and fingerprinting. What we're trying to get is what are the open service is what are they available service without the open ports and most important, T. What is Ah, the OS
03:07
and one of the most popular
03:08
tools as and map, obviously. And map. That's a lot more than that. There's also a virgin of and mop
03:14
that is going based and call Gemma. I'm going to leave in the resource pages. Ah, links to and maps and map on resource that would help you get ah, information about and map on dhe Zen map.
03:29
So let's go here, and map provides a upset
03:34
that is out there to be scan. Obviously you have to be plucked, scanning it and not overdo it over school to scan me that and map dot Oregon.
03:45
So let's end this candidacy. What kind of permission? We're getting back. So, as I said, what we want from the scan is the open ports available service is on, most importantly, ah, the OS itself. We don't have this information. The open ports. I know you might say in census or short, and we got
04:03
disinformation that 80 and forfeit your open Savary. However, this is obvious because these are Web applications on job applications tend to use 80. And for 40 However, we need to get more information about their politics system here. So we get poor 22 open, which is a set.
04:23
And this would give us an indication that was actually a Lennox.
04:27
The other thing that they do to guess the S
04:30
S T C P sequence. So TCP sequence would actually give the map some sort of,
04:40
uh, information that would help them make an educated guess about a deal permitting system. Obviously, we got a number of operating systems. They're all in the nineties. Ah, guessing. Ah, score.
04:55
But most all of them actually are Lennox opening systems.
04:59
So
05:00
that's a name up. This is the information that we got from Emma.
05:02
Sometimes you'll get something like an open FTP port or even avian support that is open. And I've seen this before. Avian sea port was open. When you go to the to your brother and an Evian see, ah,
05:16
application
05:17
targeting that port,
05:20
you get automatic, gooey based connection to the applicant to the server hosting thing application.
05:30
So the next thing is true of application scanning. And, uh, this would give you hidden links It would give you also ah,
05:39
if you Spider through an application would give you all the next available. All of the service is available. The dependent dependencies available. You can also look at
05:47
if they have a portal for
05:49
administrators, a porter for employees. This would be given using Web applications Canada, one of the most important one of the most famous of applications. Scanning tools. Ah,
06:03
and map, sir. And I'm up Burke, sweet or eyes up. And these are both proxy scanning.
06:13
The tours,
06:14
the other type of active reconnaissance is not technical.
06:17
The 1st 1 that is not very popular, however it can happen is physical interaction where a attacker would actually go and communicate with the target again. the target is not necessarily a system, however
06:32
they can talk. He can, uh,
06:35
meet with him or see him or or follow him
06:40
to a, uh,
06:42
a bar or a compares and elegant and start communicating with him. The other thing. The social media.
06:47
Again, it's often used as a help for active reconnaissance. Where a number a message on Facebook or on in male in Newington would be sent,
07:00
uh, to one of the target employees or the tiger system admin
07:05
with a interesting
07:09
information or interesting offered, or something like that
07:12
that the hacker got during the passive. Ah,
07:15
reconnaissance based.
07:17
And then ah, more interaction
07:21
between the hacker on the target would give the hacker more information about the targeted system or the target himself.
07:31
So we covered the Constance active and passive. We have a number of questions
07:39
through our force thing and slick up. Our examples are passively Constance
07:44
well, and a slick up his butt. Pink is not because you're communicating with the end server
07:50
or the target server, and I've seen a lot of companies with good security operations centers that they actually monitored the pink attack and investigate
08:01
any, uh, malicious or something that looks malicious. Even if it was just a pink attack,
08:09
however, it and then just look up. What you're doing is you're quitting wth e d Ennis.
08:15
Second is how can I determine the west of the target? And as I said, one way is and map
08:20
Ah, lot of Elizabeth's candles would actually try to predict the West as well.
08:26
Ah, 100% is not usually feasible because this kind of information is hidden.
08:33
Three is what would a vote abilities can act? My targeted attack, as I said you would get the valuable service, is you would get,
08:41
uh, the open ports you would get
08:45
if there's a vulnerability in the application or the dependencies that are used by the application. Finally, how can an attack of the social media and active recon, as I said he can use? The information that used during the power he gathered during the, uh,
09:03
the passive reconnaissance
09:05
on dhe exceed a targeted campaign? Is spearfishing attack on
09:11
a system admin or in employees can get his passwords. You can get
09:16
him to click a link that would run something in the decide off the
09:24
of the target and so on.
09:26
So in today's lecture, we covered Step two, Step one of the sad occult and reconnaissance recovered active reconnaissance. And we went through a number of example of active recon. In the next video, we're going to talk about organization,
09:43
the face
09:45
Onda weaponization techniques. See you then.

Up Next

Cybersecurity Kill Chain™

A practical take on Lockheed Martin Cyber Kill Chain™, The course simulates an example target attack following the 7 phases of the Cyber Kill Chain™.

Instructed By

Instructor Profile Image
Abdulrahman Alnaim
Security Operations Manager
Instructor