THM - Advent of Cyber [Day 15 & 16]

Day 15

Today’s task is a break about what kind of security roles there are available, which actually works out perfectly for me considering that last night I ended up working late and couldn’t get to posting a write up anyway. Unfortunately I also lost my streak so that sucks.

Looking at all the roles, the ones that I was most interested in are the Penetration Tester and Red Teamer, but Incident Responder also looked interesting. I think though, that there might be some more pressure to incident responder.

Day 16

This task deals with OSINT or Open Source Intelligence, which is publicly available information that we can leverage against the grinch in our Advent of Cyber story. We actually did some of this a while back in one the tasks build by John Hammond where we looked at PowerShell logs. The task goes on to tell us that there are two real sources of information in OSINT, the clearweb and the darkweb. The clearweb describes well known websites that we know like FaceBook, Twitter, and GitHub. The darknet is accessed through a TOR browser primarily and offers services like Freenet (encypted chat), I2P (networking layer), IPFS (InterPlanetary File Share), and Zeronet (Peer to Peer web hosting). This room, and I’d argue most OSINT, is done though the clearnet. This is because there are a significant amount of more people on the clearnet.

Two OSINT Models

The task shows two kinds of OSINT Methodologies. The first is the RIS-OSINT data-information model. It’s based on gathering information from data that can turn into Intelligence and form a decision in order to make a change.

The other OSINT model is called RIS-OSINT Roller Coaster revolves around making decisions for the client. This model is quite fluid and looks something like this. Undernearth it, I’ll also describe the steps below it.

RSI PhaseDefinitionExample
ClientWhat is the question/objective?Email
SourceWhat is available on the objective?Email Servers
MonitoringWhat is happening with the objective?Email has been inactive
Selecting/FindingWhere is the Objective? How can we find the objective?Leaked database
IndexingHow is the objective retrievable?ID information from email
SynthesesHow can we combine this with others?ID information from email
DisseminationHow can you action/qualify this objective?Report/Plan

Account Discovery & Analysis

This is the process of looking at public accounts trying to find a target. These are sites like Reddit, Twitter, Instagram, etc.

ObjectivePurpose
ID real or personasSometimes people make anonymous personas to hide behind. Depending on initial info, we could be looking for multiple accounts. End objective is to ID further information and accounts that our target owns
ID emailLess common to openly find, but still possible and can lead to real name or link to persona
Locate linked accountsTargets will often link other public accounts leading to further information or their real name/persona
HistoryImportance can vary based on what the end goal is
Information from postsContinuing from the history of posts, you can obtain various info from posts. This can include location, other accounts, real names, interests, etc.

Google Dorking

Google can be an invaluable tool when doing OSINT gathering. We can perform special searches via google by using specific syntax. This is known as Google Dorking.

TermPurposeExample
siteSpecifically searches that particular site and lists all the results for that site.site:”www.google.com”
filetypeSearches for a particular filetype mentioned in the queryfiletype:”pdf”
linksearches for external links to pageslink :”keyword”
inurlSearches for a URL matching one of the keywords.inurl:”keyword”
before/afterUsed to search within a particular date range(before:2001-01-01 after:2001-01-01)

OSINT & The Blockchain

The advent of blockchain technology brought a complete openness coupled with a large degree of anonymity. We can see what users are doing, without knowing who they are. The methodology can stay the same because the goal is still to get back to a traditional persona. This will ultimately change over time as blockchain technology and decentralization evolve.

Unique Software Features

It should be noted that each social media site, software, and platform will have their own quirks and features that can be more or less useful when engaging in OSINT. For instance, GitHub showing all changes to a working branch.

The Task

The task is pretty straightforward. It involves translating the initial text that we have and going from there. HINT: It’s a language used by a country that has a lot of ransomware actors. Then we can do some google searches along with looking at certain sites special features to get the last couple of questions.

Follow Me on Mastodon! Follow Me on Twitter