SlideShare uma empresa Scribd logo
1 de 44
© Black Hills Information Security
@BHInfoSecurity
Weaponizing Corporate Intel
Beau Bullock (@dafthack)
Mike Felch (@ustayready)
This Time, It’s Personal!
© Black Hills Information Security
@BHInfoSecurity
Overview
• This is an OSINT / Recon talk! We are going to cover stuff you
might already know as well as some brand new techniques!
• Going from zero knowledge of an organization to stalker status
• External resource targeting (w/ less attribution)
• Internal employee targeting (at a personal level)
• Advanced password stuffing attacks
• Out-of-Band Phishing
© Black Hills Information Security
@BHInfoSecurity
About Us
• Mike Felch - @ustayready
• Pentest / Red team at BHIS
• Involved w/ OWASP Orlando
• Host of Tradecraft Security Weekly
• Host of CoinSec Podcast
• Beau Bullock - @dafthack
• Pentest / Red team at BHIS
• Host of Tradecraft Security Weekly
• Host of CoinSec Podcast
• Avid OWA enthusiast
© Black Hills Information Security
@BHInfoSecurity
Attack Surface Recon
External Host Discovery
© Black Hills Information Security
@BHInfoSecurity
Scratching the Surface
• 1st step in any operation = Recon
• Build a solid target list
• Gain understanding around
technologies used
• Can you determine what is used
for:
• Remote access
• Email access
• Security products
© Black Hills Information Security
@BHInfoSecurity
TLDs and Subdomains
• Utilize search engines and “dorking”
• Google
• Bing
• Baidu
• DuckDuckGo
• Recon-NG Modules
• recon/domains-hosts/bing_domain_api
• recon/domains-hosts/google_site_web
© Black Hills Information Security
@BHInfoSecurity
Netblocks
• ASN / Netblock Discovery
• https://bgp.he.net
• https://mxtoolbox.com/arin.aspx
• Regional Internet Registry Search
• https://whois.arin.net
• Also AFRNIC, APNIC, LACNIC, and RIPE
• Recon-NG Module
• recon/companies-multi/whois_miner
© Black Hills Information Security
@BHInfoSecurity
TLDs and Subdomains
• Subdomain Discovery
• shodan.io - recon/domains-hosts/shodan_hostname
• censys.io - recon/netblocks-ports/censysio
• dnsdumpster.com
• hackertarget.com - recon/domains-hosts/hackertarget
• threatcrowd.org - recon/domains-hosts/threatcrowd
• Subdomain bruteforcing - recon/domains-hosts/brute_hosts
© Black Hills Information Security
@BHInfoSecurity
TLDs and Subdomains
• Additional TLD and Subdomain Discovery
• crt.sh
• Search netblocks on shodan.io
• Rinse and repeat with new TLDs and
netblocks
• Recon-NG Modules
• recon/domains-hosts/certificate_transparency
• recon/netblocks-hosts/shodan_net
© Black Hills Information Security
@BHInfoSecurity
Cloud Services
• Microsoft Services
• O365 - Go to outlook.office365.com and try
authenticating with
test@targetdomainname.com
• SharePoint - Check
companyname.sharepoint.com
• Find Skype4Business -
lyncdiscover.targetdomaindomain.com
© Black Hills Information Security
@BHInfoSecurity
Cloud Services
• Google
• Try authenticating with a valid company email
address at Gmail
• Box.com
• Try https://companyname.account.box.com
• Amazon AWS
• Look to see where web resources are being
loaded. Potentially pointing to S3 buckets.
© Black Hills Information Security
@BHInfoSecurity
Portal to Pwnage
Discovering Login Forms and Other Interesting Files
© Black Hills Information Security
@BHInfoSecurity
Active Portal Discovery
• Actively scan to locate web services
• Portscan domain list on common web
ports (80, 443, 2381, 8080, 8443,
10000, etc.)
• Could manually review results
navigating to each service with a
browser…
• Or…
© Black Hills Information Security
@BHInfoSecurity
Active Portal Discovery
• Screenshot webapps with EyeWitness by
Chris Truncer
• https://github.com/FortyNorthSecurity/EyeWit
ness
• Quickly analyze many portals
• Groups common web responses
• I like to make a secondary list of
interesting web servers as I go through
the results
© Black Hills Information Security
@BHInfoSecurity
Interesting File/Dir Discovery
• Directory/File bruteforcing at scale with
Brute-Fruit
• Module in Find-Fruit PowerShell script
• https://github.com/rvrsh3ll/Misc-Powershell-
Scripts/blob/master/Find-Fruit.ps1
• Use file list + web server list
• Discover interesting portals and pages
© Black Hills Information Security
@BHInfoSecurity
BruteFruit Demo
© Black Hills Information Security
@BHInfoSecurity
Remotely Gathering Internal
Domain Information
“The more you know!”
© Black Hills Information Security
@BHInfoSecurity
Info Disclosure FTW
• Information disclosure vulns = Low
…in most cases
• But they are Critical to an attackers
methodology
• In order to successfully perform
password attacks we need to be
confident about two things:
• Username format
• Probability most users can authenticate
© Black Hills Information Security
@BHInfoSecurity
Discovering Username Schema
• User Enumeration Vulns
• Some applications will let you know a
username is valid or not on login
• Microsoft OWA response time vuln
• MailSniper Invoke-
UsernameHarvestOWA module
© Black Hills Information Security
@BHInfoSecurity
Discovering Username Schema
• Metadata attached to files (PDF,
DOCX, XLSX, etc.)
• PowerMeta – Search for publicly
available files hosted by a company,
then extract metadata from each file
• https://github.com/dafthack/PowerMeta
© Black Hills Information Security
@BHInfoSecurity
One Problem
• Servers can detect IP activity
• Servers will block requests
• How can we avoid detection?
• Would be nice to rotate IPs!
• SOCKS? ProxyCannon? CredKing?
• All have limits or are expensive 
• Hmmm…
© Black Hills Information Security
@BHInfoSecurity
Introducing FireProx
© Black Hills Information Security
@BHInfoSecurity
FireProx
• Rotates IP with every request! 
• Leverages AWS API Gateway
• HTTP Pass-through proxy
• Point FireProx at URL and go!
• Scrape, Spray, or Crawl
• Avoid CAPTCHA and WAF restrictions
• Downside: X-Forwarded-For sent 
© Black Hills Information Security
@BHInfoSecurity
FireProx Demo
© Black Hills Information Security
@BHInfoSecurity
So far…
• We’ve found great hosts and portals
• We’ve identified running services
• We’ve got target servers in sight
• … we just need to find employees
• … but can we change our attacks?
© Black Hills Information Security
@BHInfoSecurity
Introducing Social Trust Attacks
© Black Hills Information Security
@BHInfoSecurity
Social Trust Attacks
• Breaching organizations w/ employee personal data
• Employees aren’t trained on personalized attacks 
• New type of spear-phishing/SE
• New type of password attacks
• What if…
• We get personal information of employees?
• We get personal relationships of employees?
• We get personal emails of employees?
© Black Hills Information Security
@BHInfoSecurity
Discover Employees
• Nothing new here… except more data
• LinkedIn scraping company employees
• Profile URLs from Google/Bing/etc
• site:linkedin.com/in/ “company name”
• Grab:
• first name & last name
• city & state
© Black Hills Information Security
@BHInfoSecurity
Email Formatting
• Hunter.io is great for learning format
• RocketReach.co is good too
• Combine names into company format
• EmailAddressMangler on GitHub
• … now we have company email!
© Black Hills Information Security
@BHInfoSecurity
Need moar data!@#
• Can we get PII/personal emails of employees?
• Can we learn their relationships?
• People Data Brokers give us everything!
• They buy, sell, trade, and give our data at scale
• They collect and aggregate our public data
• i.e. https://www.truepeoplesearch.com/
• Query people sites using name & location
• Now we have PII, personal emails, & relationships
© Black Hills Information Security
@BHInfoSecurity
People Sites.. Opt Out (or abuse)!
• http://www.peoplefinders.com/
• http://www.whitepages.com/
• http://www.spokeo.com/
• http://www.instantcheckmate.com/
• http://www.intelius.com/
• http://www.peoplesmart.com/
• http://www.mylife.com/
• http://www.peekyou.com/
• http://www.pipl.com/
• http://www.radaris.com/
• http://www.411.com/
• http://www.switchboard.com/
• http://www.peeplo.com/
• http://www.zabasearch.com/
• http://www.anywho.com/
• https://truepeoplesearch.com/
• https://www.fastpeoplesearch.com/
SCREENSHOT THIS 
© Black Hills Information Security
@BHInfoSecurity
There’s way more 
• People Data
• Business Data
• Census Data
• Criminal Data
• Debt Data
• Domain Data
• Eviction Data
• Foreclosure Data
• Property Data
• Phone Data
• Work Data
• Marriage Data
• Divorce Data
© Black Hills Information Security
@BHInfoSecurity
Personal Password Attacks
© Black Hills Information Security
@BHInfoSecurity
Personal Passwords Reconciled
• Using personal emails search breach database
• i.e. Collection #1 - #5
• Get passwords for personal emails
• Reconcile passwords to corporate accounts
• Use personal passwords on corporate portals
• Password reuse problems is a huge problem!
© Black Hills Information Security
@BHInfoSecurity
Personal Passwords Reconciled
© Black Hills Information Security
@BHInfoSecurity
Attack Path
1. Find portals
2. Scrape employee name/location
3. Format corporate emails
4. Scrape people sites
5. Get personal passwords
6. Reconcile accounts
7. Use personal passwords w/ corporate email on portals
PROFIT!
© Black Hills Information Security
@BHInfoSecurity
How to Prepare & Prevent
QUIT RE-USING PASSWORDS!
© Black Hills Information Security
@BHInfoSecurity
Social Trust Attacks
© Black Hills Information Security
@BHInfoSecurity
Social Trust Attacks
• Incorporate personal info in phish
• Leverage known relationships
• Doppel ganging as known contact
• Can come from non-corp domain
• High quality personalization!
© Black Hills Information Security
@BHInfoSecurity
Personal Data Prepared
• The amount of data is staggering
• Sites retrieve more data then UI shows
• All names, aliases, previous names and dates
• Date of birth / Age
• Living vs Deceased
• Current & Previous Addresses w/ Dates & Geo
• Current & Previous Phones w/ Dates & Telco/Geo
• Neighbors & Neighborhood Info
• Email Addresses
• Relatives & Relative Type w/ DOB
• Associates w/ DOB
• Voter Records
• Employment History
© Black Hills Information Security
@BHInfoSecurity
Fast People Search
© Black Hills Information Security
@BHInfoSecurity
Exaggerated… Personalized Phish
Hey <first name>! How have you been? It’s <associate first name>
from <previous city>. I haven’t talked to you since you lived over on
<previous street name>! I tried calling <previous phone number> but
it said it was disconnected. Hope you don’t mind me emailing you at
work. I was trying to reach out to see if you heard the news about
<mutual associate name>? I couldn’t believe it when I heard the
news and then I read the news article <phishing link> and was
convinced it was true. Anyhow, I hope you are well. Feel free to email
me when you get some time.
- <associate first name> <associate last name>
© Black Hills Information Security
@BHInfoSecurity
How to Prepare & Prevent
• Reduce your digital footprint
• Watch for personal emails @ work
• Start opting out everywhere
• Vermont data brokers search
• https://www.vtsosonline.com/online/BusinessInquire/
• Become an EU resident!
• Estonia eResident program
• https://e-resident.gov.ee/
• GDPR Erasure clauses
© Black Hills Information Security
@BHInfoSecurity
Questions
• Black Hills Information Security
• http://www.blackhillsinfosec.com
• @BHInfoSecurity
• Beau Bullock @dafthack
• Mike Felch @ustayready
Mike’s journey reducing data (leaving Google services)
• https://www.blackhillsinfosec.com/how-to-purge-google-and-start-over-part-1/
• https://www.blackhillsinfosec.com/how-to-purge-google-and-start-over-part-2/

Mais conteúdo relacionado

Mais procurados

Shopify’s $25k Bug Report, and the Cluster Takeover That Didn’t Happen
Shopify’s $25k Bug Report, and the Cluster Takeover That Didn’t HappenShopify’s $25k Bug Report, and the Cluster Takeover That Didn’t Happen
Shopify’s $25k Bug Report, and the Cluster Takeover That Didn’t HappenGreg Castle
 
A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency EcosystemsA Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency EcosystemsBeau Bullock
 
BlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure AD
BlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure ADBlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure AD
BlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure ADBlueHat Security Conference
 
How to Build Your Own Physical Pentesting Go-bag
How to Build Your Own Physical Pentesting Go-bagHow to Build Your Own Physical Pentesting Go-bag
How to Build Your Own Physical Pentesting Go-bagBeau Bullock
 
Fade from Whitehat... to Black
Fade from Whitehat... to BlackFade from Whitehat... to Black
Fade from Whitehat... to BlackBeau Bullock
 
Troopers 19 - I am AD FS and So Can You
Troopers 19 - I am AD FS and So Can YouTroopers 19 - I am AD FS and So Can You
Troopers 19 - I am AD FS and So Can YouDouglas Bienstock
 
Threat Hunting, Detection, and Incident Response in the Cloud
Threat Hunting, Detection, and Incident Response in the CloudThreat Hunting, Detection, and Incident Response in the Cloud
Threat Hunting, Detection, and Incident Response in the CloudBen Johnson
 
I'm in your cloud... reading everyone's email. Hacking Azure AD via Active Di...
I'm in your cloud... reading everyone's email. Hacking Azure AD via Active Di...I'm in your cloud... reading everyone's email. Hacking Azure AD via Active Di...
I'm in your cloud... reading everyone's email. Hacking Azure AD via Active Di...DirkjanMollema
 
Mobile Application Scan and Testing
Mobile Application Scan and TestingMobile Application Scan and Testing
Mobile Application Scan and TestingBlueinfy Solutions
 
OWASP Top 10 Security Vulnerabilities, and Securing them with Oracle ADF
OWASP Top 10 Security Vulnerabilities, and Securing them with Oracle ADFOWASP Top 10 Security Vulnerabilities, and Securing them with Oracle ADF
OWASP Top 10 Security Vulnerabilities, and Securing them with Oracle ADFBrian Huff
 
Security Compensation - How to Invest in Start-Up Security
Security Compensation - How to Invest in Start-Up SecuritySecurity Compensation - How to Invest in Start-Up Security
Security Compensation - How to Invest in Start-Up SecurityChristopher Grayson
 
Devbeat Conference - Developer First Security
Devbeat Conference - Developer First SecurityDevbeat Conference - Developer First Security
Devbeat Conference - Developer First SecurityMichael Coates
 
How an Attacker "Audits" Your Software Systems
How an Attacker "Audits" Your Software SystemsHow an Attacker "Audits" Your Software Systems
How an Attacker "Audits" Your Software SystemsSecurity Innovation
 
Top 10 Threats to Cloud Security
Top 10 Threats to Cloud SecurityTop 10 Threats to Cloud Security
Top 10 Threats to Cloud SecuritySBWebinars
 
O365Con19 - O365 Identity Management and The Golden Config - Chris Goosen
O365Con19 - O365 Identity Management and The Golden Config - Chris GoosenO365Con19 - O365 Identity Management and The Golden Config - Chris Goosen
O365Con19 - O365 Identity Management and The Golden Config - Chris GoosenNCCOMMS
 
Secure Web Services
Secure Web ServicesSecure Web Services
Secure Web ServicesRob Daigneau
 
Joe Gelb: Taxonomy and Delivery
Joe Gelb: Taxonomy and DeliveryJoe Gelb: Taxonomy and Delivery
Joe Gelb: Taxonomy and DeliveryJack Molisani
 

Mais procurados (20)

Shopify’s $25k Bug Report, and the Cluster Takeover That Didn’t Happen
Shopify’s $25k Bug Report, and the Cluster Takeover That Didn’t HappenShopify’s $25k Bug Report, and the Cluster Takeover That Didn’t Happen
Shopify’s $25k Bug Report, and the Cluster Takeover That Didn’t Happen
 
A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency EcosystemsA Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
 
OAuth 2.0 Security Reinforced
OAuth 2.0 Security ReinforcedOAuth 2.0 Security Reinforced
OAuth 2.0 Security Reinforced
 
BlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure AD
BlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure ADBlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure AD
BlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure AD
 
How to Build Your Own Physical Pentesting Go-bag
How to Build Your Own Physical Pentesting Go-bagHow to Build Your Own Physical Pentesting Go-bag
How to Build Your Own Physical Pentesting Go-bag
 
Fade from Whitehat... to Black
Fade from Whitehat... to BlackFade from Whitehat... to Black
Fade from Whitehat... to Black
 
Troopers 19 - I am AD FS and So Can You
Troopers 19 - I am AD FS and So Can YouTroopers 19 - I am AD FS and So Can You
Troopers 19 - I am AD FS and So Can You
 
Threat Hunting, Detection, and Incident Response in the Cloud
Threat Hunting, Detection, and Incident Response in the CloudThreat Hunting, Detection, and Incident Response in the Cloud
Threat Hunting, Detection, and Incident Response in the Cloud
 
I'm in your cloud... reading everyone's email. Hacking Azure AD via Active Di...
I'm in your cloud... reading everyone's email. Hacking Azure AD via Active Di...I'm in your cloud... reading everyone's email. Hacking Azure AD via Active Di...
I'm in your cloud... reading everyone's email. Hacking Azure AD via Active Di...
 
Mobile Application Scan and Testing
Mobile Application Scan and TestingMobile Application Scan and Testing
Mobile Application Scan and Testing
 
OWASP Top 10 Security Vulnerabilities, and Securing them with Oracle ADF
OWASP Top 10 Security Vulnerabilities, and Securing them with Oracle ADFOWASP Top 10 Security Vulnerabilities, and Securing them with Oracle ADF
OWASP Top 10 Security Vulnerabilities, and Securing them with Oracle ADF
 
Security Compensation - How to Invest in Start-Up Security
Security Compensation - How to Invest in Start-Up SecuritySecurity Compensation - How to Invest in Start-Up Security
Security Compensation - How to Invest in Start-Up Security
 
The Power of Social Login
The Power of Social LoginThe Power of Social Login
The Power of Social Login
 
Devbeat Conference - Developer First Security
Devbeat Conference - Developer First SecurityDevbeat Conference - Developer First Security
Devbeat Conference - Developer First Security
 
How an Attacker "Audits" Your Software Systems
How an Attacker "Audits" Your Software SystemsHow an Attacker "Audits" Your Software Systems
How an Attacker "Audits" Your Software Systems
 
Top 10 Threats to Cloud Security
Top 10 Threats to Cloud SecurityTop 10 Threats to Cloud Security
Top 10 Threats to Cloud Security
 
O365Con19 - O365 Identity Management and The Golden Config - Chris Goosen
O365Con19 - O365 Identity Management and The Golden Config - Chris GoosenO365Con19 - O365 Identity Management and The Golden Config - Chris Goosen
O365Con19 - O365 Identity Management and The Golden Config - Chris Goosen
 
presentation
presentationpresentation
presentation
 
Secure Web Services
Secure Web ServicesSecure Web Services
Secure Web Services
 
Joe Gelb: Taxonomy and Delivery
Joe Gelb: Taxonomy and DeliveryJoe Gelb: Taxonomy and Delivery
Joe Gelb: Taxonomy and Delivery
 

Semelhante a Weaponizing Corporate Intel: This Time, It's Personal!

Red Team Tactics for Cracking the GSuite Perimeter
Red Team Tactics for Cracking the GSuite PerimeterRed Team Tactics for Cracking the GSuite Perimeter
Red Team Tactics for Cracking the GSuite PerimeterMike Felch
 
What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?Precisely
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityGianluca Varisco
 
Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsSloan Carne
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control DBmaestro - Database DevOps
 
Plain talk about security public - ms1
Plain talk about security   public - ms1Plain talk about security   public - ms1
Plain talk about security public - ms1Mike Stone
 
You Are The Weakest Link: Attacking Organizations Through the Human Element
You Are The Weakest Link: Attacking Organizations Through the Human ElementYou Are The Weakest Link: Attacking Organizations Through the Human Element
You Are The Weakest Link: Attacking Organizations Through the Human ElementSavannah Lazzara
 
Better to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and SecurityBetter to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and SecurityEric Kavanagh
 
Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Blueinfy Solutions
 
iOS Application Security Testing
iOS Application Security TestingiOS Application Security Testing
iOS Application Security TestingBlueinfy Solutions
 
Security and Privacy Brown Bag
Security and Privacy Brown BagSecurity and Privacy Brown Bag
Security and Privacy Brown Bag501 Commons
 
Security for Enterprise Search : SearchBlox
Security for Enterprise Search : SearchBloxSecurity for Enterprise Search : SearchBlox
Security for Enterprise Search : SearchBloxTimo Selvaraj
 
So whats in a password
So whats in a passwordSo whats in a password
So whats in a passwordRob Gillen
 
Finding Security a Home in a DevOps World
Finding Security a Home in a DevOps WorldFinding Security a Home in a DevOps World
Finding Security a Home in a DevOps WorldShannon Lietz
 
The Shifting Landscape of PoS MalwareOutput
The Shifting Landscape of PoS MalwareOutputThe Shifting Landscape of PoS MalwareOutput
The Shifting Landscape of PoS MalwareOutputSilas Cutler
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19TechSoup
 
Modern Web Security
Modern Web SecurityModern Web Security
Modern Web SecurityBill Condo
 
Danger! Danger! Your Mobile Applications Are Not Secure
Danger! Danger! Your Mobile Applications Are Not SecureDanger! Danger! Your Mobile Applications Are Not Secure
Danger! Danger! Your Mobile Applications Are Not SecureTechWell
 
Trust in a Digital World
Trust in a Digital WorldTrust in a Digital World
Trust in a Digital Worlditnewsafrica
 

Semelhante a Weaponizing Corporate Intel: This Time, It's Personal! (20)

Red Team Tactics for Cracking the GSuite Perimeter
Red Team Tactics for Cracking the GSuite PerimeterRed Team Tactics for Cracking the GSuite Perimeter
Red Team Tactics for Cracking the GSuite Perimeter
 
What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on Security
 
Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU Investigators
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control
 
Plain talk about security public - ms1
Plain talk about security   public - ms1Plain talk about security   public - ms1
Plain talk about security public - ms1
 
You Are The Weakest Link: Attacking Organizations Through the Human Element
You Are The Weakest Link: Attacking Organizations Through the Human ElementYou Are The Weakest Link: Attacking Organizations Through the Human Element
You Are The Weakest Link: Attacking Organizations Through the Human Element
 
Better to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and SecurityBetter to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and Security
 
Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013
 
iOS Application Security Testing
iOS Application Security TestingiOS Application Security Testing
iOS Application Security Testing
 
Android attacks
Android attacksAndroid attacks
Android attacks
 
Security and Privacy Brown Bag
Security and Privacy Brown BagSecurity and Privacy Brown Bag
Security and Privacy Brown Bag
 
Security for Enterprise Search : SearchBlox
Security for Enterprise Search : SearchBloxSecurity for Enterprise Search : SearchBlox
Security for Enterprise Search : SearchBlox
 
So whats in a password
So whats in a passwordSo whats in a password
So whats in a password
 
Finding Security a Home in a DevOps World
Finding Security a Home in a DevOps WorldFinding Security a Home in a DevOps World
Finding Security a Home in a DevOps World
 
The Shifting Landscape of PoS MalwareOutput
The Shifting Landscape of PoS MalwareOutputThe Shifting Landscape of PoS MalwareOutput
The Shifting Landscape of PoS MalwareOutput
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
 
Modern Web Security
Modern Web SecurityModern Web Security
Modern Web Security
 
Danger! Danger! Your Mobile Applications Are Not Secure
Danger! Danger! Your Mobile Applications Are Not SecureDanger! Danger! Your Mobile Applications Are Not Secure
Danger! Danger! Your Mobile Applications Are Not Secure
 
Trust in a Digital World
Trust in a Digital WorldTrust in a Digital World
Trust in a Digital World
 

Mais de Beau Bullock

Getting Started in Blockchain Security and Smart Contract Auditing
Getting Started in Blockchain Security and Smart Contract AuditingGetting Started in Blockchain Security and Smart Contract Auditing
Getting Started in Blockchain Security and Smart Contract AuditingBeau Bullock
 
Red Team Apocalypse - BSides Peru (En español)
Red Team Apocalypse - BSides Peru (En español)Red Team Apocalypse - BSides Peru (En español)
Red Team Apocalypse - BSides Peru (En español)Beau Bullock
 
Pwning the Enterprise With PowerShell
Pwning the Enterprise With PowerShellPwning the Enterprise With PowerShell
Pwning the Enterprise With PowerShellBeau Bullock
 
Pentest Apocalypse - SANSFIRE 2016 Edition
Pentest Apocalypse - SANSFIRE 2016 EditionPentest Apocalypse - SANSFIRE 2016 Edition
Pentest Apocalypse - SANSFIRE 2016 EditionBeau Bullock
 
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...Beau Bullock
 
Pentest Apocalypse
Pentest ApocalypsePentest Apocalypse
Pentest ApocalypseBeau Bullock
 

Mais de Beau Bullock (6)

Getting Started in Blockchain Security and Smart Contract Auditing
Getting Started in Blockchain Security and Smart Contract AuditingGetting Started in Blockchain Security and Smart Contract Auditing
Getting Started in Blockchain Security and Smart Contract Auditing
 
Red Team Apocalypse - BSides Peru (En español)
Red Team Apocalypse - BSides Peru (En español)Red Team Apocalypse - BSides Peru (En español)
Red Team Apocalypse - BSides Peru (En español)
 
Pwning the Enterprise With PowerShell
Pwning the Enterprise With PowerShellPwning the Enterprise With PowerShell
Pwning the Enterprise With PowerShell
 
Pentest Apocalypse - SANSFIRE 2016 Edition
Pentest Apocalypse - SANSFIRE 2016 EditionPentest Apocalypse - SANSFIRE 2016 Edition
Pentest Apocalypse - SANSFIRE 2016 Edition
 
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
 
Pentest Apocalypse
Pentest ApocalypsePentest Apocalypse
Pentest Apocalypse
 

Último

Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 

Último (20)

Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 

Weaponizing Corporate Intel: This Time, It's Personal!

  • 1. © Black Hills Information Security @BHInfoSecurity Weaponizing Corporate Intel Beau Bullock (@dafthack) Mike Felch (@ustayready) This Time, It’s Personal!
  • 2. © Black Hills Information Security @BHInfoSecurity Overview • This is an OSINT / Recon talk! We are going to cover stuff you might already know as well as some brand new techniques! • Going from zero knowledge of an organization to stalker status • External resource targeting (w/ less attribution) • Internal employee targeting (at a personal level) • Advanced password stuffing attacks • Out-of-Band Phishing
  • 3. © Black Hills Information Security @BHInfoSecurity About Us • Mike Felch - @ustayready • Pentest / Red team at BHIS • Involved w/ OWASP Orlando • Host of Tradecraft Security Weekly • Host of CoinSec Podcast • Beau Bullock - @dafthack • Pentest / Red team at BHIS • Host of Tradecraft Security Weekly • Host of CoinSec Podcast • Avid OWA enthusiast
  • 4. © Black Hills Information Security @BHInfoSecurity Attack Surface Recon External Host Discovery
  • 5. © Black Hills Information Security @BHInfoSecurity Scratching the Surface • 1st step in any operation = Recon • Build a solid target list • Gain understanding around technologies used • Can you determine what is used for: • Remote access • Email access • Security products
  • 6. © Black Hills Information Security @BHInfoSecurity TLDs and Subdomains • Utilize search engines and “dorking” • Google • Bing • Baidu • DuckDuckGo • Recon-NG Modules • recon/domains-hosts/bing_domain_api • recon/domains-hosts/google_site_web
  • 7. © Black Hills Information Security @BHInfoSecurity Netblocks • ASN / Netblock Discovery • https://bgp.he.net • https://mxtoolbox.com/arin.aspx • Regional Internet Registry Search • https://whois.arin.net • Also AFRNIC, APNIC, LACNIC, and RIPE • Recon-NG Module • recon/companies-multi/whois_miner
  • 8. © Black Hills Information Security @BHInfoSecurity TLDs and Subdomains • Subdomain Discovery • shodan.io - recon/domains-hosts/shodan_hostname • censys.io - recon/netblocks-ports/censysio • dnsdumpster.com • hackertarget.com - recon/domains-hosts/hackertarget • threatcrowd.org - recon/domains-hosts/threatcrowd • Subdomain bruteforcing - recon/domains-hosts/brute_hosts
  • 9. © Black Hills Information Security @BHInfoSecurity TLDs and Subdomains • Additional TLD and Subdomain Discovery • crt.sh • Search netblocks on shodan.io • Rinse and repeat with new TLDs and netblocks • Recon-NG Modules • recon/domains-hosts/certificate_transparency • recon/netblocks-hosts/shodan_net
  • 10. © Black Hills Information Security @BHInfoSecurity Cloud Services • Microsoft Services • O365 - Go to outlook.office365.com and try authenticating with test@targetdomainname.com • SharePoint - Check companyname.sharepoint.com • Find Skype4Business - lyncdiscover.targetdomaindomain.com
  • 11. © Black Hills Information Security @BHInfoSecurity Cloud Services • Google • Try authenticating with a valid company email address at Gmail • Box.com • Try https://companyname.account.box.com • Amazon AWS • Look to see where web resources are being loaded. Potentially pointing to S3 buckets.
  • 12. © Black Hills Information Security @BHInfoSecurity Portal to Pwnage Discovering Login Forms and Other Interesting Files
  • 13. © Black Hills Information Security @BHInfoSecurity Active Portal Discovery • Actively scan to locate web services • Portscan domain list on common web ports (80, 443, 2381, 8080, 8443, 10000, etc.) • Could manually review results navigating to each service with a browser… • Or…
  • 14. © Black Hills Information Security @BHInfoSecurity Active Portal Discovery • Screenshot webapps with EyeWitness by Chris Truncer • https://github.com/FortyNorthSecurity/EyeWit ness • Quickly analyze many portals • Groups common web responses • I like to make a secondary list of interesting web servers as I go through the results
  • 15. © Black Hills Information Security @BHInfoSecurity Interesting File/Dir Discovery • Directory/File bruteforcing at scale with Brute-Fruit • Module in Find-Fruit PowerShell script • https://github.com/rvrsh3ll/Misc-Powershell- Scripts/blob/master/Find-Fruit.ps1 • Use file list + web server list • Discover interesting portals and pages
  • 16. © Black Hills Information Security @BHInfoSecurity BruteFruit Demo
  • 17. © Black Hills Information Security @BHInfoSecurity Remotely Gathering Internal Domain Information “The more you know!”
  • 18. © Black Hills Information Security @BHInfoSecurity Info Disclosure FTW • Information disclosure vulns = Low …in most cases • But they are Critical to an attackers methodology • In order to successfully perform password attacks we need to be confident about two things: • Username format • Probability most users can authenticate
  • 19. © Black Hills Information Security @BHInfoSecurity Discovering Username Schema • User Enumeration Vulns • Some applications will let you know a username is valid or not on login • Microsoft OWA response time vuln • MailSniper Invoke- UsernameHarvestOWA module
  • 20. © Black Hills Information Security @BHInfoSecurity Discovering Username Schema • Metadata attached to files (PDF, DOCX, XLSX, etc.) • PowerMeta – Search for publicly available files hosted by a company, then extract metadata from each file • https://github.com/dafthack/PowerMeta
  • 21. © Black Hills Information Security @BHInfoSecurity One Problem • Servers can detect IP activity • Servers will block requests • How can we avoid detection? • Would be nice to rotate IPs! • SOCKS? ProxyCannon? CredKing? • All have limits or are expensive  • Hmmm…
  • 22. © Black Hills Information Security @BHInfoSecurity Introducing FireProx
  • 23. © Black Hills Information Security @BHInfoSecurity FireProx • Rotates IP with every request!  • Leverages AWS API Gateway • HTTP Pass-through proxy • Point FireProx at URL and go! • Scrape, Spray, or Crawl • Avoid CAPTCHA and WAF restrictions • Downside: X-Forwarded-For sent 
  • 24. © Black Hills Information Security @BHInfoSecurity FireProx Demo
  • 25. © Black Hills Information Security @BHInfoSecurity So far… • We’ve found great hosts and portals • We’ve identified running services • We’ve got target servers in sight • … we just need to find employees • … but can we change our attacks?
  • 26. © Black Hills Information Security @BHInfoSecurity Introducing Social Trust Attacks
  • 27. © Black Hills Information Security @BHInfoSecurity Social Trust Attacks • Breaching organizations w/ employee personal data • Employees aren’t trained on personalized attacks  • New type of spear-phishing/SE • New type of password attacks • What if… • We get personal information of employees? • We get personal relationships of employees? • We get personal emails of employees?
  • 28. © Black Hills Information Security @BHInfoSecurity Discover Employees • Nothing new here… except more data • LinkedIn scraping company employees • Profile URLs from Google/Bing/etc • site:linkedin.com/in/ “company name” • Grab: • first name & last name • city & state
  • 29. © Black Hills Information Security @BHInfoSecurity Email Formatting • Hunter.io is great for learning format • RocketReach.co is good too • Combine names into company format • EmailAddressMangler on GitHub • … now we have company email!
  • 30. © Black Hills Information Security @BHInfoSecurity Need moar data!@# • Can we get PII/personal emails of employees? • Can we learn their relationships? • People Data Brokers give us everything! • They buy, sell, trade, and give our data at scale • They collect and aggregate our public data • i.e. https://www.truepeoplesearch.com/ • Query people sites using name & location • Now we have PII, personal emails, & relationships
  • 31. © Black Hills Information Security @BHInfoSecurity People Sites.. Opt Out (or abuse)! • http://www.peoplefinders.com/ • http://www.whitepages.com/ • http://www.spokeo.com/ • http://www.instantcheckmate.com/ • http://www.intelius.com/ • http://www.peoplesmart.com/ • http://www.mylife.com/ • http://www.peekyou.com/ • http://www.pipl.com/ • http://www.radaris.com/ • http://www.411.com/ • http://www.switchboard.com/ • http://www.peeplo.com/ • http://www.zabasearch.com/ • http://www.anywho.com/ • https://truepeoplesearch.com/ • https://www.fastpeoplesearch.com/ SCREENSHOT THIS 
  • 32. © Black Hills Information Security @BHInfoSecurity There’s way more  • People Data • Business Data • Census Data • Criminal Data • Debt Data • Domain Data • Eviction Data • Foreclosure Data • Property Data • Phone Data • Work Data • Marriage Data • Divorce Data
  • 33. © Black Hills Information Security @BHInfoSecurity Personal Password Attacks
  • 34. © Black Hills Information Security @BHInfoSecurity Personal Passwords Reconciled • Using personal emails search breach database • i.e. Collection #1 - #5 • Get passwords for personal emails • Reconcile passwords to corporate accounts • Use personal passwords on corporate portals • Password reuse problems is a huge problem!
  • 35. © Black Hills Information Security @BHInfoSecurity Personal Passwords Reconciled
  • 36. © Black Hills Information Security @BHInfoSecurity Attack Path 1. Find portals 2. Scrape employee name/location 3. Format corporate emails 4. Scrape people sites 5. Get personal passwords 6. Reconcile accounts 7. Use personal passwords w/ corporate email on portals PROFIT!
  • 37. © Black Hills Information Security @BHInfoSecurity How to Prepare & Prevent QUIT RE-USING PASSWORDS!
  • 38. © Black Hills Information Security @BHInfoSecurity Social Trust Attacks
  • 39. © Black Hills Information Security @BHInfoSecurity Social Trust Attacks • Incorporate personal info in phish • Leverage known relationships • Doppel ganging as known contact • Can come from non-corp domain • High quality personalization!
  • 40. © Black Hills Information Security @BHInfoSecurity Personal Data Prepared • The amount of data is staggering • Sites retrieve more data then UI shows • All names, aliases, previous names and dates • Date of birth / Age • Living vs Deceased • Current & Previous Addresses w/ Dates & Geo • Current & Previous Phones w/ Dates & Telco/Geo • Neighbors & Neighborhood Info • Email Addresses • Relatives & Relative Type w/ DOB • Associates w/ DOB • Voter Records • Employment History
  • 41. © Black Hills Information Security @BHInfoSecurity Fast People Search
  • 42. © Black Hills Information Security @BHInfoSecurity Exaggerated… Personalized Phish Hey <first name>! How have you been? It’s <associate first name> from <previous city>. I haven’t talked to you since you lived over on <previous street name>! I tried calling <previous phone number> but it said it was disconnected. Hope you don’t mind me emailing you at work. I was trying to reach out to see if you heard the news about <mutual associate name>? I couldn’t believe it when I heard the news and then I read the news article <phishing link> and was convinced it was true. Anyhow, I hope you are well. Feel free to email me when you get some time. - <associate first name> <associate last name>
  • 43. © Black Hills Information Security @BHInfoSecurity How to Prepare & Prevent • Reduce your digital footprint • Watch for personal emails @ work • Start opting out everywhere • Vermont data brokers search • https://www.vtsosonline.com/online/BusinessInquire/ • Become an EU resident! • Estonia eResident program • https://e-resident.gov.ee/ • GDPR Erasure clauses
  • 44. © Black Hills Information Security @BHInfoSecurity Questions • Black Hills Information Security • http://www.blackhillsinfosec.com • @BHInfoSecurity • Beau Bullock @dafthack • Mike Felch @ustayready Mike’s journey reducing data (leaving Google services) • https://www.blackhillsinfosec.com/how-to-purge-google-and-start-over-part-1/ • https://www.blackhillsinfosec.com/how-to-purge-google-and-start-over-part-2/