A Proven Methodology for Open-Source Intelligence Gathering and Social Engineering
SE-RI, June 16th 2018
Presented by Émilie St-Pierre and Robert Stewart
whoami - Émilie St-Pierre
whoami - Robert Stewart
Overview
Storytime!
Setting Clear Goals
Setting Goals
OSINT Target Areas
Technology
People
Presence
Industry
Technology
Domain & Subdomain Enumeration
Open services (passive search)
Technology
People
Employee Names, Emails and Titles:
Customers:
Industry
Compliance & Regulations:
Legal Cases
Presence
Storytime with Robby
Results
A Sampling of 60 Reports �from 2015 - 2018
Data points?
OSINT
Types of Pretext
Let’s look at some Pretexts!
What Works
What Doesn’t Work (most of the time)
What Works? - (Harvesting Credentials)
What Doesn’t Work? - (Harvesting Credentials)
What Works? - (Execute Payload)
What Doesn’t Work? - (Execute Payload)
SMB IMG Tags to Harvest Creds!!
Include it on Phishing emails to capture creds,
Include it on Landing pages to capture creds,
Include it on Everything!!
Other Tips and Tricks
Free Pretexts
https://github.com/L4bF0x/PhishingPretexts
Free Pretexts!
Questions? �
Émilie St-Pierre
Emilie_St-Pierre@Rapid7.com
Twitter: @L4bF0x
Robert Stewart
Robert_Stewart@Rapid7.com
Twitter: @RizzyRong
Free Pretexts: https://github.com/L4bF0x/PhishingPretexts
Slides: https://goo.gl/U6qiiy