OSINT Flashcards

1
Q

What does OSINT stand for?

A

Open-Source Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is OPSEC?

A

operational security – the practice of hiding yourself online by disassociating your online persona with your real self

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a public exposure assessment?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How is OSINT useful to attackes?

A

aids in potentially effective social-engineering attacks, and spear-phishing email campaigns to be conducted, tailored to their intended targets to make them more believable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the process of collecting publically available information for malicious purposes commonly referred to?

A

target information gathering, or passive information gathering (because the attacker is not directly engaging with the target’s systems, such as port or vulnerability scanning)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which roles utilize OSINT?

A
  • Tactical Threat Analyst
  • Strategic Threat Analyst
  • Security Analyst
  • Vulnerability Analyst
  • Penetration Tester/Red Teamer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does a Tactical Threat Analyst utilize OSINT?

A
  • conduct intelligence operations, gathering information on adversaries that may target their organization
  • stay up to date with the latest trends and techniques used by these groups, in order to implement defenses
  • collect IOCs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does a Strategic Threat Analyst utilize OSINT?

A
  • conduct threat exposure assessments
  • identify any information that the organization is “leaking” out on the internet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does a Security Analyst utilize OSINT?

A
  • checking the reputation of IOCs such as IP addresses (VirusTotal, IPVoid), or email addresses and file hashes (VirusTotal, IBM X-Force Exchange)
  • investigating fake social-media accounts that are being used to launch social engineering attacks against employees
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does a Vulnerability Analyst utilize OSINT?

A
  • crucial for this role to as they need to keep up to date with the latest publicly-announced vulnerabilities
  • great OSINT source is the National Vulnerability Database and using TweetDeck to monitor Twitter for vulnerability-related news and disclosures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does a Penetration Tester/Red Teamer utilize OSINT?

A

gain information about their target company, such as internal systems and employee information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does the The Intelligence Cycle term describe?

A

a series of stages and procedures that a researcher has to perform to convert the collected data and information into intelligence products capable of bringing solutions to the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the 5 steps in the The Intelligence Cycle?

A
  1. Planning and Direction
  2. Collection (gathering of data and information)
  3. Processing of data and information
  4. Analysis to produce meaningful intelligence
  5. Dissemination of intelligence to the clients
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is determined in the Planning and Direction phase?

A

the purpose of research and what kind of information you are looking for

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the objective of the Collection phase?

A

identification of which kind of processes you will use to carry out the collection of such information, and then, using all the techniques you know, obtain the data that will help you carry out your intelligence operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the objectives in the Processing of data and information phase?

A
  • visualization of the information
  • application of decoding, decryption, validation, and evaluation techniques to filter the huge amount of information obtained
  • identify useful data for the research
17
Q

What is done in the Analysis to produce meaningful intelligence phase?

A
  • compile all the information you filtered in the previous step to obtain the solutions to your initial problem
  • creation of a coherent intelligence product (report, conference, etc.) that allows you to clearly explain the process you recently carried out
18
Q

What is done in the Dissemination of intelligence to the clients phase?

A

deliver the product you developed throughout the process to the stakeholders (individuals or groups) that requested it

19
Q

Why are the OSINT operations called a “passive operation”?

A

they are completely invisible and at no time will the individual or organization you are investigating realize who you are

20
Q

What are the 3 techniques used for online fingerprinting?

A
  1. IP address
  2. cookies
  3. browser fingerprinting
21
Q

What is Sock Puppetry?

A

a deceptive practice in which a single individual creates and controls multiple accounts or personas to manipulate or deceive others

22
Q

What is the The Harvester tool used for?

A

command-line information-gathering tool that utilizes OSINT sources to gather information about the target domain and retrieves information such as hostnames, IP addresses, employees (and their positions), email addresses, and much more

23
Q

How to use theharvester to do a simple reconnaissance on the domain google.com, using Google as the data source?

A
theharvester -d google.com -l 100 -b google
24
Q

How to use theharvester to do a simple reconnaissance on the domain google.com, using LinkedIn as the data source?

A
theharvester -d google.com -l 100 -b linkedin
25
Q

What is Maltego?

A

data mining and information gathering tool, capable of obtaining real-time data on different types of entities (companies, people, websites, etc.), and representing them graphically through nodes, showing all the connections that the program was able to obtain over the Internet, about the subject under investigation

26
Q

What is the name of the website that is a hub for hundreds of OSINT sources and tools, and is easily sorted so you can find the tool that you need quickly?

A

https://osintframework.com

27
Q

What is the the https://tineye.com/ web app used for?

A

conduct reverse image searches

28
Q

Why is tineye useful?

A

with the alert service, we can be notified every time one of our images is identified on the internet - useful for monitoring the use of logos, especially trademarked ones

29
Q

What is the Google’s alternative of ‘tineye’?

A

https://images.google.com - search by image