Jump to content

OSINT Framework, Interactive


Recommended Posts

IMO this is only a mind map of passive reconnaissance resources. And that's only half of the first step of Lockheed Martin's cyber killchain.  Not to diminish the usefulness of the link at all. As far as passive reconnaissance goes the resources mentioned look quite comprehensive. You could, for example, prepare an initial dossier report to hand off to another active recon team so they could map the company profile to a network topology.  This step is indispensable for a large APT, but to say that this covers all the steps is an exaggeration.  Because it throws in links to malware analysis resources, and exploit archives, one could get confused about this link and think it was appropriately covering all the resources, but it's by no means its strong point.


Again, I don't intend to diminish the usefulness of this link at all! Passive information gathering is the most important step to a large scale APT, yet it's the most glossed over subject in every security course! If you check out Sparc FLOW's "how to hack like a god" and some of his other books, he actually gives some emphasis on casing your target. AND NO WONDER! His books are actually just case studies!



  • I Like This! 2
Link to comment
Share on other sites

No, you're dead right, about everything. I definitely misspoke. That's what I get for posting while drinking, thank you for your respectful correction.

I have edited my post to reflect the actual use of the link.

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

  • Similar Content

    • cwade12c
      By cwade12c
      Hi all! I wanted to take some time to put together a comprehensive privacy guide with the goal of offering viable solutions to common services and software that are privacy oriented.
      When determining my recommendations and suggestions, I am mostly utilizing the following criteria:
      Follows the GNU four freedoms Services not based in mandatory key disclosure jurisdictions Audited or transparent  
      "That's great Wade, but I don't have anything to hide." This is a fallacy I would like to disrupt. Voluntarily giving information away is perfectly reasonable, so long as one understands the costs/benefits and risks. There are security considerations that many people fail to realize when they suggest that privacy is not important. Humans can be the greatest vulnerability and easiest way to gain unauthorized access to a system; simply knowing information, especially that people voluntarily provide or publicly make available, can be valuable in the information gathering phases of an attack. An attacker can use this information to social engineer you or people related to you, causing potential financial damage to you or those around you.
      Some in the intelligence community suggest that reducing privacy is a necessary cost for increasing security. I look at this differently. Strong privacy goes hand-in-hand with security. I will attempt to demonstrate this in a related thread, Twenty+ Reasons Why Mass Surveillance is Dangerous.
      In the meantime, you are welcome to view my original publication on Packet Storm Security titled, Twenty Reasons Why Mass Surveillance is Dangerous.
      Additional resources I'd like to recommend on why privacy is important, to support my motiviation:
      The Value of Privacy by Bruce Schneier When Did You First Realize the Importance of Privacy? by EFF The Little Book of Privacy by Mozilla  
      Table of Contents
      ---- Providers
      -------- Cloud Hosting
      -------- DNS
      ------------ Resolvers
      ------------ Clients
      -------- Email
      ------------ Hosts
      ------------ Clients
      -------- Image Hosting
      -------- News Aggregation
      -------- Search Engines
      -------- Social Networks
      -------- Text Hosting (Pastebin)
      -------- Video Hosting
      -------- Web Hosting
      ---- Software
      -------- Calendars and Contacts
      -------- Chat
      -------- Document and Note Taking
      -------- Encryption
      -------- File Sharing
      -------- Metadata Removal
      -------- Password Managers
      -------- Web Browsers
      ------------ Browser Specific Tweaks
      ------------ Browser Specific Extensions
      ---- Operating Systems and Firmware
      -------- Desktop
      -------- Mobile
      -------- Routers
      I will update this thread and table of contents as the subsidiary topics are created.
    • killab
      By killab
      ExploitDB, Offensive Security's Exploit Database Archive is an amazing resource.
      Be it for google dorks, exploits, shellcode, or technical papers.
      Want to be able to search for exploits offline, or via terminal?
      Check out the following, a few simple commands will arm you with the entire DB!
    • killab
      By killab
      Many of you will no doubt already have this site bookmarked but it is worth a mention even if one person does not.
      This site contains a ton of recent news on topics like how apple has fucked up yet again, or what malware is now sweeping the globe.
      Along with that, they also have many exploits, and informative whitepapers.
    • killab
      By killab
      Old school e-zine with a ton of interesting articles.
      You wont find any color pictures there if that's your thing.
  • Create New...