Open-Source Intelligence (OSINT) Flashcards

1
Q

what is Open source intelligence (OSINT)

A

is unclassified information
that discovered, has been deliberately discriminated, distilled, and disseminated to a select audience in order to address a specific question.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

T/F osint It is not a tool, it is not a website, it is not with fee, it is not free…

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is Open on (Open source intelligence)?

A

refers to overt, publicly available sources (as opposed to covert or clandestine sources). [It is not related to open-source software or public intelligence].

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Threat Intelligence / Cyber Intelligence?

A

Based on the collection of intelligence using:

  • Open source intelligence (OSINT)
  • Social media intelligence (SOCMINT)
  • Human Intelligence (HUMINT)
  • Technical intelligence
  • Intelligence from the deep and dark web.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

in Threat Intelligence / Cyber Intelligence Research and analyze trends and technical
developments in three areas:

A
  • Cybercrime
  • Hacktivism
  • Cyber espionage
    (e.g. Advanced Persistent Threat-APT-)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Actionsable intelligence

A

-Relevant
-Accurate
-Analyzed
-Predective
-Contextualized
-Timely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why OSINT?

A

In a world that changes rapidly, we need to have high quality information in the exact moment we need it.

Offensive:
* Information Gathering
* Industrial Espionage
Defensive:
* Penetration Testing
* Breach detection
* Chatter Monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

During WWII, foreign Agents Collected:

A
  • Print publications
  • Newspaper
  • Enemy propaganda
  • Radio transmissions
  • Obituary notices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is Social Media ?

A

platforms that enable users to create and share content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is SOCMINT

A

collection of tools that allow organizations to monitor social media channels and
conversation, respond to social signals and synthetize social data points into meaningful analysis
based on the user’s needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

T/F SOCMINT allows to collect intelligence gathering from social media sites, using both intrusive or
non-intrusive means, from open and closed social networks.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SOCMINT – Surveillance

A
  • Chat monitoring
  • Geolocation
  • Face recognition
  • Augmented reality
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Big Data’s 4 V Big Challenges

A

Volume – Data Size
Velocity – Data Streaming Speed
Variety – Data Formats
Veracity – Data Trustworthiness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SOCMINT – Opinion mining

A

Also known as Sentiment analysis, refers to the use of Natural Language Processing (NLP), text analysis, computational linguistics, and biometrics to systematically identify, extract and study affective states and subjective information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Volume – Data Size

A

40 Zettabytes (1021) of data is predicted to be
created by 2020.
* 2.5 Exabytes (1018) of data are created every
day.
* 6 Billion (109) people have mobile phones.
* 100 Terabytes (1012) of data (at least) is stored
by most U.S. companies.
* 966 Petabytes (1015) was the approximate
storage size of the American manufacturing
industry in 2009

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Variety – Data Formats

A
  • 150 Exabytes (1018) was the estimated size of
    data for health care throughout the world in
    2011.
  • More than 4 Billion (109) hours each month are
    used in watching YouTube.
  • 30 Billion (109) contents are exchanged every
    month on Facebook.
  • 200 Million (106) monthly active users exchange
    400 Million tweets every day
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Velocity – Data Streaming Speed

A
  • 1 Terabyte (1012) of trade information is
    exchanged during every trading session at the
    New York Stock Exchange.
  • 100 sensors (approximately) are installed in
    modern cars to monitor fuel level, tire pressure,
    etc.
  • 18.9 Billion (109) network connections are
    predicted to exist by 2016.
17
Q

Veracity – Data Trustworthiness

A
  • 1 out of 3 business leaders have experienced
    trust issues with their data when trying to make
    a business decision.
  • 3.1 Trillion (1012) a year is estimated to be
    wasted in the U.S. economy due to poor data
    quality
18
Q

OSINT Process

A

1-Planning
2-Source Identification
3-Data Harvesting
4-Data Processing
5-Data Analysis
6- Results Delivery

19
Q

OSINT Process: Planning

A
  • What are we looking for?
  • Which strategy is the best?
  • What about the cost?
  • … and time?
20
Q

OSINT Process: Source Identification

A
  • Who is the target?
  • Which source should we consider?
  • How many data are available?
  • How accurate are the data?
21
Q

OSINT Process: Data Harvesting

A
  • Collect data from the sources
  • The more information we are able to gather, the more vectors of attack you may be able to use in the future
22
Q

OSINT Process: Data Processing

A
  • Distinguish mere information from facts
  • Untrusted vs. trusted
  • Irrelevant vs. relevant
  • Current vs. outdated
  • Unimportant vs. important
  • Cleansing
  • Formatting
23
Q

OSINT: Data Analysis

A
  • Analyze, evaluate, integrate data
  • Validity, relevance, reliability
  • Evaluate the implications
  • Visualize results in an effective way
24
OSINT: Results delivery
* Provide accurate intelligence to client * Punctual delivery * Adapt report language to the recipient * Evaluate results and… back to planning again
25
T/F Offensive OSINT is when you gather information before an attack (attackers usually spend more time than testers), while defensive is learning about the attacks against your company (investigation and post mortem evaluation).
T
26
T/F OSINT gives opportunities to both the defender and attacker; you can learn the weakness of a company and fix it; or… the same weakness could be exploited by an adversary.
T
27
Industrial / Corporation
* Attack: * OSINT against Industrial sector * Defense: * OSINT to support strategic plans * Type: * In-house * Contracted out
28
Industrial / Corporation – OSINT Attack Surface
* Physical: * Address List, Ownership, Security measures * Relationships: * Business partners, suppliers, clients, competitors * Organizational chart: * Position identification, transactions, affiliates * Infrastructure Assets: * Network Block owned, email addresses, technologies used, defense technologies * Financial : * Market Analysis, trade capital, value history
29
Industrial / Corporation – OSINT Defense
Why? * Gain further insight into their own cyber security threats (data breach detection, vulnerable public facing devices, etc.) * Listen to what is being said about the company (reputation, a brand to protect, etc.) How? * Uncovering ongoing threats – Reactive Detection * Online reconnaissance - Proactive Prevention * Combination of both
30
OSINT targeting Individuals
* Public Registries: - Court Records - Professional licenses or registries * Internet Presence: - Email Address - Personal Handles/Nicknames - Personal Domain Names registered - Assigned Static IPs/Netblocks * Mobile Footprint: -Phone number - Device Type
31
OSINT targeting Individuals
* Social Media Presence Social Network (SocNet) Profile * Metadata Leakage: Location awareness via Photo Metadata * Tone: identification of the tone used in communications (aggressive, passive, appealing, sales, praising, dissing, condescending, arrogance etc.) * Frequency: Identification of the frequency of publications (once an hour/day/week, etc…)
32
Supporting Technologies -Online Anonymity:
* Hide personal identity to prevent attacks attribution * Perform stealthy researches, without alerting the target * Circumvent Geo-blocking
33
Supporting Technologies - Major Tools:
* Changing IP Address (ToR, VPNs) * Avoid to leave traces, such as browser fingerprint (VMs)
34
Supporting Technologies - OSINT Searching Surface:
* Surface Web * Deep Web * Dark Web
35
The Onion Router (TOR) What is:
* Short for “The Onion Router” * free and open-source software for enabling anonymous communications
36
TOR What does it do?
* It protects the anonymity of users that want to communicate over a network * It will help them defend against traffic analysis * It will hide the destinations of all communications (any outside observer will not be able to tell whom the user is communicating with and for how long)
37
Virtual Private Network (VPN)
A virtual private network extends a private network across a public network. * Enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network * Creates a safe and encrypted connection over a less secure network, such as the Internet * To ensure safety, data travels through secure tunnels (tunneling)
38
Protocol that allows for the secure movement of data from one network to another through a process called ..................
encapsulation
39
VPN - Functions
* Authentication The data were sent from the sender * Access Control Preventing unauthorized users from accessing the network * Confidentiality Preventing the data to be read or copied while being transported * Data Integrity Ensuring that the data has not been altered
40
So, by using VPN I will be safe
Actually, not really.. * Problems with anonymity The user cannot be 100% sure to be anonymous. The VPN provider has the ability to view all the browsing history via its server * The inexperience of the VPN provider When a VPN provider lacks experience, there may be data leaks that may affect the privacy of the user
41
OSINT Searching Surface
Web resources that: * are easy to access * are indexed by typical search engines * are indexed by specific search engines * Can be accessed only by using external technologies