Your life online: Introduction Roelof Temmingh ([email protected]) Just Google Not the classical music crowd (but family) Paterva / Maltego? Just Google www.paterva.com CE version is free for non-commercial use Be sure to check out the TDS – to extend Maltego capabilities and share transforms Agenda Introduction – what is Maltego really? Stalking – a case study An evil government could... Counter Intelligence Prevention Detection Who are you anyway? Maltego introduction Web browser is a tool to navigate web pages Web sites are connected by hyper links Links are ‘man made’ Can we build a tool to navigate chunks of information? Links could be Rigid - man made Flexible - implied Links are determined in real time by software / plugins / transforms Stop the Zen right now! Example (rigid / man made): DNS Name -> IP Address Mail.abc.com -> 100.100.100.100 The ‘link’ here is DNS Example (implied / fuzzy): Telephone number -> Email address 202 555 1234 -> [email protected] The ‘link’ here is some webpage where these are mentioned in close proximity No context, no certainty Very fuzzy like Maltego concepts... Entities: ‘things’ DNS Name / Person / Phone number / more... Can be extended with custom entities Transforms: convert data types DNS resolving / Searching / Database access / Deep web Can be extended with TDS / local transforms Why is this really cool? What are the private email addresses of people working at XXX agency? How? Assume all phone numbers for agency starts with the same digits Someone that gave out work number and their private email address – that appears in the same snippet Man & Machine Machines are good at automation Transforms Humans are good at pattern recognition Visualization and Graphs Let’s work together Maltego Google network* * Only a small part of it Live demo Let me show you how... Please stop me if I spend too much time on this slide There are still 30 slides to go... No kidding...for real ! Case Study Given name and email address Name is common, email address at Gmail No references to email address on the web Name too common to search for Email address used on LinkedIn, high ranking military official Email address also on Facebook, but completely closed profile Email address used in the past with Flickr (thnx Rapleaf) Flickr profile has NO info, photos, only an alias But alias is very unique Alias hits on 2 porn sites – one has DOB, corresponds in year to LinkedIn info, but no other information Other has very compromising photos User’s photo is blurred Seems unlikely, so have to be verified with other information Case Study Profiling took 7 hours Profile: Full names (x 5) Work and private email addresses Physical location Work and education history (x 2) Phone numbers – both work, home and mobile I.M. Details Children names, hobbies, interests Photos of all Friend lists Why would we want a profile? And what’s next? When worlds collide Digital but not online Things you own Property (public, commercial) Transport (car, bike, boat, plane) Money - bank account(s) Things you use Internet (proxy logs, RADIUS logs from ISPs) Mobile phones (CDR), fixed line Credit card, ATMs Utilities (water, power etc.) Travel info – passports Things you are Director, member of trust Records ○ Major retail details ○ Criminal / court ○ Education ○ Tax ○ ID number An evil government could... Have to assume that .gov has all of the above information Gets scary when combining real world with cyber world No concept of ID number on the Internet Mostly linked to email address Can hope for phone number but unlikely What can they do? Example 1: Geo location to social net Example 2: Tracking forum members Demo (video) Challenges we suspect they may have Format of data across tables 083 448 6996 != (0)83448 6996 Temmingh R != RW Temmingh Typos, bad captures Multiple email addresses [email protected] [email protected] Scaling the solution with new sources E2 – E problem Cool problems to solve here.. Use it to your advantage! Entering your details in (digital) forms 44B vs 44b vs 4 4 b vs 44 B 0834486996 vs 083 448 6996 vs 08344869961 Roeloftemmingh vs roelof.temmingh Catch all addresses [email protected] For non-digital forms Write like your doctor Preventing data mining Infrastructure / networks: Use generic address to register domains or use domain registration services Keep your fwd DNS zone as generic as possible Make sure you control zone transfers! Keep your rev DNS zone as clean as possible. Keep as much away from your real network NS/MX/www Preventing data mining Photos Reverse image search is possible (TinEye) so don’t share photos Getting tagged on other people’s photos! Don’t geo tag photos Beware of identifiable objects (car, bike, house, office, logos) in photos EXIF info on photos Email addresses May not be used outside organization - policy Don’t use firstname.lastname when registering (I.M. too) Make sure your mail server does not allow verifying (!VRFY!) Keep your email address off PGP key rings Preventing data mining Websites/blogs Links to your site, links from your site No staff lists, internal phone lists, email list Use generic email addresses for things like sales/info ○ Also consider generic addresses for domain registration Keep XLS, DOCs away from the site (duh) ○ All in PDF. Clean meta information ! Robots.txt / sitemap.xls (?) Javascript phone numbers and email addresses or make them images Preventing data mining Phone numbers Use a generic number for office, never direct lines Don’t answer your phone with your name Listing of company phone numbers on public sites (ads) Javascript or image phone numbers where possible Common sense Friends and family is your weakest link Never mention your DOB online / star sign Bios, interviews and videos – ‘Jane said...’ Everything ends up on the ‘net. Be careful with who you leave your CV Don’t use unique aliases Guest books and blog comments Do them a favor and name your children ‘Bob’ and ‘Mary’ Detecting data mining Infrastructure Monitor your DNS servers for signs of brute force / zone transfers Check your web server logs for mirroring & look at User Agents Inspect the referrers in your web server logs for referral from search engines...and the search term. Detecting data mining Personal How do I know if someone has a Google alert on me? Setting up fake blogs, social network profiles ○ ○ ○ With CAPTCHAs and email alerts Cannot make the jump too obvious Perfect place for counter intelligence Referrer IP address User Agent Browser exploits ? Analytics on websites, blogs Listing ‘red’ phone numbers on 2nd jumps. Think outside the box How do I know when people Google for something? I run a super secret project called Sookah. I don't ever want people to know about it. When someone search for the word Sookah I want to know it leaked out somehow I don't want them to find out that I know I register an Adword...isn't Google wonderful? Trick question Which is better: No Internet profile at all / Closed profile Open, Full blown Internet profile? None / closed == open for impersonation Open / Full == open for stalking Impersonation ○ Competing with real person Complete new, fake ○ Easy, ask Robin Sage The Curious case of Eugene Eugene Gregoria Location: Singapore Industry: Telecommunications Employer: Pacnet (formerly Asia Netcom) Last Facebook status: On basketball: 'I liked the choreography, but I didn't care for the costumes.' ~Tommy Tune, on why he never considered playing basketball Last 2 Tweets: German school reports 30 cases of A/H1N1 flu [link] I saw this nice web site on poker called "Bill's Poker Blog" [link] Blog: I like watching western movies. We watched 'Giant' directed by George Stevens. I really enjoyed it. I found this really interesting: It was the highest grossing film in Warner Bros. history until the release of Superman (1978). WYSIWYG? Not always... Investigator /target will follow the crumbs… …but nothing is real on the Internet (Eugene is made up from many different people, algorithms, headlines and snippets from the Internet) 2 of 2:fakes ; Mandatory ‘Profound’ quote “If we assume that only a small percentage of the Internet consists of unique information then creating acceptable content and human-like behavior becomes no more than a complex copy and paste process. If we acknowledge the existence of a single fake identity on the Internet an entire automated community should soon be within our reach. “ How to make friends and... So what’s the big deal? Manipulate ratings of anything Sway public opinion Influence political polls Alter stock prices – directly or indirectly Perform social denial of service Keep in mind that people are flock animals – you just need to be the initial catalyst and get critical mass Thus in conclusion The gap between the real world and the online world is closing every minute... ...So is the gap between your online profile and your actual life Information itself is a vulnerability Network->OS->Application->Information- >People It feels like the 90s again! Think of the children... Questions? Eric (the iPhone guy) threaten me already so let’s grab a beer / coffee..
© Copyright 2024