All language subtitles for 1. Passive Reconnaissance Overview

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,060 --> 00:00:06,090 So in this section we are going to be talking about information gathering and all information gathering 2 00:00:06,090 --> 00:00:08,990 we're going to do in this section is going to be passive. 3 00:00:09,000 --> 00:00:12,860 So I'm calling this passive recon or passive reconnaissance. 4 00:00:12,870 --> 00:00:18,660 I wanted to give a brief overview of what we're going to be covering and talk about some high level 5 00:00:18,660 --> 00:00:23,190 topics before we get into the weeds and really dive into our target. 6 00:00:24,030 --> 00:00:32,190 So let's talk about the different types of passive recon so on the physical or social side physical 7 00:00:32,190 --> 00:00:38,880 meaning actually going on site and maybe doing a physical engagement or the social engineering aspect 8 00:00:38,880 --> 00:00:45,450 of maybe doing a fishing assessment or even including in a physical engagement or a bashing assessment 9 00:00:45,730 --> 00:00:51,130 just gathering this information from the physical social aspect is incredibly useful. 10 00:00:51,150 --> 00:00:59,040 So we have location information so we might utilize something like satellite images or often we'll go 11 00:00:59,040 --> 00:01:04,470 on site and do drone reconnaissance where we fly a drone around and try to gain information. 12 00:01:04,470 --> 00:01:09,920 And what we're really after with these images of this drone recon is we're trying to find out hey what 13 00:01:09,920 --> 00:01:12,040 is the building layout look like. 14 00:01:12,150 --> 00:01:15,670 Are there badge readers are there break areas. 15 00:01:15,690 --> 00:01:17,310 Does security exist. 16 00:01:17,310 --> 00:01:19,590 Do they have somebody posted out front. 17 00:01:19,590 --> 00:01:21,410 Can you just walk right in the door. 18 00:01:21,420 --> 00:01:23,850 What is their fencing look like. 19 00:01:23,850 --> 00:01:28,080 Are there areas where they're just leaving the doors propped open. 20 00:01:28,080 --> 00:01:30,290 Where do people go out and smoke in these break areas. 21 00:01:30,300 --> 00:01:35,670 Because those are a good place to just walk up to somebody light up a cigarette even if you don't smoke 22 00:01:35,760 --> 00:01:40,650 and to start a conversation and then tailgate right in with them into the building. 23 00:01:40,650 --> 00:01:48,960 Now the other aspect of this is the job information so we might be looking for employees online I might 24 00:01:48,960 --> 00:01:55,440 want to know somebody whose name job title phone number who their manager is I try to get a good idea 25 00:01:55,440 --> 00:01:56,700 of what people look like. 26 00:01:56,700 --> 00:02:00,330 So if I see them on site I have a good idea who they are. 27 00:02:00,330 --> 00:02:06,840 I also look for pictures so I cannot tell you how many times a badge photo is posted on LinkedIn or 28 00:02:06,840 --> 00:02:12,630 somebody posted on Twitter that you can see all the means out there about people posting their photos 29 00:02:12,690 --> 00:02:13,560 at work. 30 00:02:13,710 --> 00:02:14,480 And it's bad. 31 00:02:14,490 --> 00:02:15,780 It happens all the time. 32 00:02:15,780 --> 00:02:17,580 I see it to this day. 33 00:02:17,580 --> 00:02:24,060 So we're looking for badge photos I'm looking for desk photos computer photos I had a situation once 34 00:02:24,060 --> 00:02:30,090 where somebody took a picture of her watching a game at work she was watching a basketball game at work 35 00:02:30,480 --> 00:02:37,860 and the basketball game was on her computer and on her screen there it showed all the different tools 36 00:02:37,860 --> 00:02:39,560 that they utilized at work. 37 00:02:39,600 --> 00:02:42,310 She had a work application open in this photo. 38 00:02:42,420 --> 00:02:46,040 There was a desk in the background you can see different things. 39 00:02:46,170 --> 00:02:49,650 And it just gives us information and that's where they were after. 40 00:02:49,650 --> 00:02:51,470 What kind of information can we gather. 41 00:02:51,600 --> 00:02:57,000 Now this course is not a course on physical or social so I kind of wanted to give a high level of what 42 00:02:57,000 --> 00:02:57,930 to expect. 43 00:02:58,020 --> 00:03:03,840 We won't really be doing a whole lot of this in this course with this type of information gathering 44 00:03:03,960 --> 00:03:06,420 but these are the things that you should be looking for. 45 00:03:06,450 --> 00:03:12,060 So if you are tasked with the physical assessment do go out there and look for satellite images try 46 00:03:12,060 --> 00:03:18,590 to get a good feel of the building layout and also try to get a feel for who the employees are who maybe 47 00:03:18,600 --> 00:03:24,510 the I.T. manager is in case you're going to say you know I work for I.T. they may ask you who your manager 48 00:03:24,510 --> 00:03:26,400 is you might need to know those names. 49 00:03:26,580 --> 00:03:31,500 And of course look for pictures you can find a good badge photo and what that looks like. 50 00:03:31,530 --> 00:03:37,770 You can make a fake badge go on site and you'll be way more passable with that badge but sometimes they 51 00:03:37,770 --> 00:03:40,030 don't even look it can be drawn in crayon. 52 00:03:40,080 --> 00:03:45,790 So from there let's go ahead and talk about what we will be doing a lot of which is the Web and hosts. 53 00:03:46,680 --> 00:03:52,380 So when you get a web or a host assessment the first thing you really should do is what is called Target 54 00:03:52,380 --> 00:03:53,590 validation. 55 00:03:53,610 --> 00:03:56,670 So we're going to be targeting something on bug crowds. 56 00:03:56,670 --> 00:04:02,010 We're not really going to focus on this but what we're going to do in the real world is we would validate 57 00:04:02,010 --> 00:04:02,550 the target. 58 00:04:02,580 --> 00:04:09,090 Now there are situations where a client will give you an IP address or a Web site and they might they 59 00:04:09,090 --> 00:04:09,710 might fudge it. 60 00:04:09,720 --> 00:04:09,960 Right. 61 00:04:09,960 --> 00:04:15,870 They might accidentally fat finger it put the wrong number but the wrong letter and the Web site and 62 00:04:15,870 --> 00:04:16,620 then guess what. 63 00:04:16,620 --> 00:04:22,440 You're off attacking somebody else's Web site and there if you are a podcast listener there's a good 64 00:04:22,440 --> 00:04:24,570 darknet diaries episode on this. 65 00:04:24,570 --> 00:04:27,050 If you don't as a darknet diaries go check it out. 66 00:04:27,270 --> 00:04:34,800 There's a great episode with a guy named Rob Fuller a.k.a. musics and he talks about getting the wrong 67 00:04:35,460 --> 00:04:41,520 IP address on an assessment and attacking the wrong people and actually gaining access to that machine 68 00:04:41,550 --> 00:04:45,350 which is a really really big big screw up on both parts right. 69 00:04:45,370 --> 00:04:49,360 So you should always validate your targets on top of this. 70 00:04:49,350 --> 00:04:53,680 We're doing our web and our hosts on the web side. 71 00:04:53,700 --> 00:04:58,190 We're going to look for subdomains and we'll talk more about that as we get into it. 72 00:04:58,560 --> 00:05:03,560 But we can do that with we can do that with any map sublets or there's so many different tools that 73 00:05:03,560 --> 00:05:06,290 we can use and we'll cover some of the tools and how to do it. 74 00:05:06,440 --> 00:05:10,790 Get a little deep into that as well especially as we get into the web side of things. 75 00:05:10,790 --> 00:05:15,350 There's fingerprinting we need to know what's running on a Web site or what's running on a host. 76 00:05:15,350 --> 00:05:17,250 What kind of services are out there. 77 00:05:17,270 --> 00:05:20,180 Are they running a web server What's that web servers. 78 00:05:20,210 --> 00:05:23,450 ISIS is an Apache what version is it right. 79 00:05:23,450 --> 00:05:26,150 Are they running what ports are open on their machines. 80 00:05:26,150 --> 00:05:29,210 Oh they have FTC open what version of FTB is open. 81 00:05:29,210 --> 00:05:33,530 So we need to fingerprint machines and kind of understand what on the passive side. 82 00:05:33,530 --> 00:05:35,620 We're not touching any machine right. 83 00:05:35,630 --> 00:05:38,030 So we're not gonna be doing much scanning against the host. 84 00:05:38,060 --> 00:05:41,590 We just have to utilize what kind of information might already be out there. 85 00:05:41,630 --> 00:05:46,160 So if we go out to a Web site it's on the border of active. 86 00:05:46,190 --> 00:05:50,060 But as long as we're not scanning it in my book it's still passive. 87 00:05:50,060 --> 00:05:50,680 So we'll do. 88 00:05:50,720 --> 00:05:55,940 We will cover some of the passive slash active side in this section and then when we get into scanning 89 00:05:55,940 --> 00:05:59,000 we'll get way more active with it. 90 00:05:59,000 --> 00:06:05,240 Lastly we're gonna hit heavy especially in the beginning on data breaches data breaches are the most 91 00:06:05,240 --> 00:06:11,570 common way when we're doing an external assessment that we get into networks Absolutely by far. 92 00:06:11,570 --> 00:06:17,240 When we talk about data breaches we're talking about breached incidents from the past that have leaked 93 00:06:17,300 --> 00:06:18,110 data. 94 00:06:18,110 --> 00:06:25,130 Again these are like Home Depot Equifax linked in all kinds of breaches that are out there that have 95 00:06:25,130 --> 00:06:30,250 had credentials dumped and then those credentials become available to us eventually. 96 00:06:30,260 --> 00:06:35,570 And we try to utilize those to gain access or at least utilize the user names to gain access. 97 00:06:35,630 --> 00:06:42,350 Nowadays most the time there's not going to be an easy just scan find something vulnerable and exploit 98 00:06:42,350 --> 00:06:45,000 it on the external side of the house. 99 00:06:45,020 --> 00:06:50,660 So we're looking for these data breaches and this information that we can gather and this is why information 100 00:06:50,660 --> 00:06:57,140 gathering and then enumeration and scanning most important by far the better scanning enumeration that 101 00:06:57,140 --> 00:07:01,940 you can do and the better information gathering you can do the better hacker you're going to be in the 102 00:07:01,940 --> 00:07:03,660 better you're going to be at your job. 103 00:07:03,680 --> 00:07:06,750 So take these first two sections really serious. 104 00:07:06,800 --> 00:07:13,190 So we're going to start in with identifying what our target's going to be for this part of the section 105 00:07:13,520 --> 00:07:17,870 and then we're going to go ahead and start talking about data breaches and why they're important and 106 00:07:17,870 --> 00:07:19,360 go deeper into that. 107 00:07:19,460 --> 00:07:24,960 And then we'll go off some of these tools that you see here on this list and really dive into those. 108 00:07:24,980 --> 00:07:30,620 So I will look forward to seeing you in the next video when we identify our target and get some information 109 00:07:30,620 --> 00:07:31,370 gathering started. 11715

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.