Time
4 minutes
Difficulty
Intermediate

Video Transcription

00:04
Hello, everyone. And welcome back to so library on demand here, where you're watching breaking stuff with Joe today, we're gonna do something a little bit different for breaking stuff with Joe Video. Instead of focusing on tools that new command injection or vulnerability analysis, or really automate the pen testing process, we're going to be talking about automate ER
00:22
in Cali based utility for open source intelligence gathering
00:25
a spectacular utility and one that we don't really get to touch on as often as we want. Open source Intelligence is one of the main keys to a successful penetration effort, and the reason for that is simply that when it's on open source, you have tons and tons of different utilities tons of differently, sources that you can access you can use in order to gain information instead of just
00:43
your own brain, your own wits and the tools at your disposal.
00:47
Automate ER is a spectacular utility because of the fact that it will allow you to quickly aggregate all of that open source intelligence to perform your mission. So again today, we're talking about automated here on breaking stuff with Joe. Stay tuned and see how you can use open source intelligence today. Will all of your penetration testing work?
01:04
So here we are, as always, in our Callie BM. And we're actually going to spend a very short period of time in it today because one of the best things about the automata utility is that it is, in fact, uh,
01:18
super simple tool very quick and very easy to use. So we're gonna see how to use it pretty quickly. We're going to just go ahead and type automate er
01:26
age and see what we get back.
01:29
All right. So, scrolling back up to the top, you can see here it's an I p u r l and hash analysis tool. If you just give it
01:37
as an argument, you give it a night P address. It's just going to clear that i p address against a series of different databases that has access to and tell you what it confined. Obviously, you see, there are a few different other options. You could have source files that have lots of different, or yet you can have files. I have lots of different targets. You can have a source engines to specify against a specific
01:56
tool that it's pulling from a specific database that is looking at.
01:59
There are all sorts of sort of simple configuration or more complex configurations like that. But the very simple, straightforward We can just go ahead and run automate er
02:08
and we'll go ahead and try this again stuff you know, you w dot cyber ery dot i t.
02:14
Let's see what we get back.
02:17
Actually, before I let that run a minute,
02:20
oh,
02:24
area, clear my screen up
02:28
so you can see what's happening a little bit better.
02:30
So it takes a little bit of time to run its querying out to a lot of data bases on the Internet. So it's a little bit of a process, but it's a very straightforward tool. As you can see, you just gave it the earl and let it run,
02:40
and then we'll do a little bit of movie magic and come back here when it's finished.
02:45
All right, so now that it's finished running didn't take nearly as long as I expected it to. You can see all of the information that it pulled down so nothing was founded. F net. None in the unread erect. Here you can see there's a lot of cases of no results from virus total. We got a little bit of information on D. N s information. It is worth noting that when you run against a specific target,
03:04
it doesn't. Just because data comes back doesn't necessarily mean
03:07
that it's an actually bad finding. As you can see here, there's nothing actually militia, no malicious jorelys actually found for this website on Virus Total. And of course, as we go back down through this list, you can see that. Fortunately, there's nothing malicious associated with our website, which is great news. But what's really cool to show here and what I really wanted to take a second and demonstrate
03:25
is that what this tool really is doing is going through all of these different websites on all these different source engines and finding out
03:31
what information it possibly can open. Source. It never touches the website. It never does anything that would cause you to get caught by your target. It's completely safe to run, but it gives you aton of information about whoever you're targeting really, really useful tool you can see here you've got your l avoid that checked virus total McAfee
03:50
Malko owed. I think those were the primary ones of the checks.
03:53
You can add percent you can remove. Your sentence could specify at that sort of thing with the configuration options we saw above. But just running it straight out of the box is going to generally give you, ah, lot of information, a lot of what you're looking for. That's all there is for this video that was automated of the open source automation tool.
04:11
And I highly recommend you play around with a little bit
04:14
tested against your own websites tested against other websites. Just see what information you can get and get familiar with interpreting the results that come back. Thank you all for watching. This has been breaking stuff. Joe on Cyber eri on demand.

How to Use Automater (BSWJ)

In this course, you will hear an overview of Automater, which is an OSINT tool present in the Kali Linux Distribution. The popular security analysis tool Automater utilizes urls, IP's, and Hashes to return information pertaining to intrusion detection.

Instructed By

Instructor Profile Image
Joe Perry
Senior Technical Instructor at FireEye, Inc
Instructor