Your life online:
Download
Report
Transcript Your life online:
Your life online:
Introduction
Roelof Temmingh ([email protected])
Just Google
Not the classical music crowd (but family)
Paterva / Maltego?
Just Google
www.paterva.com
CE version is free for non-commercial use
Be sure to check out the TDS – to extend Maltego
capabilities and share transforms
Agenda
Introduction – what is Maltego really?
Stalking – a case study
An evil government could...
Counter Intelligence
Prevention
Detection
Who are you anyway?
Maltego introduction
Web browser is a tool to navigate web pages
Web sites are connected by hyper links
Links are ‘man made’
Can we build a tool to navigate chunks of
information?
Links could be
Rigid - man made
Flexible - implied
Links are determined in real time by
software / plugins / transforms
Stop the Zen right now!
Example (rigid / man made):
DNS Name -> IP Address
Mail.abc.com -> 100.100.100.100
The ‘link’ here is DNS
Example (implied / fuzzy):
Telephone number -> Email address
202 555 1234 -> [email protected]
The ‘link’ here is some webpage where these are
mentioned in close proximity
No context, no certainty
Very fuzzy like
Maltego concepts...
Entities: ‘things’
DNS Name / Person / Phone number / more...
Can be extended with custom entities
Transforms: convert data types
DNS resolving / Searching / Database access / Deep web
Can be extended with TDS / local transforms
Why is this really cool?
What are the private email addresses of people
working at XXX agency? How?
Assume all phone numbers for agency starts with the same
digits
Someone that gave out work number and their private email
address – that appears in the same snippet
Man & Machine
Machines are good at automation
Transforms
Humans are good at pattern
recognition
Visualization and Graphs
Let’s work together
Maltego
Google network*
* Only a small part of it
Live demo
Let me show you how...
Please stop me if I spend too much time on this slide
There are still 30 slides to go...
No kidding...for real !
Case Study
Given name and email address
Name is common, email address at Gmail
No references to email address on the web
Name too common to search for
Email address used on LinkedIn, high ranking military official
Email address also on Facebook, but completely closed
profile
Email address used in the past with Flickr (thnx Rapleaf)
Flickr profile has NO info, photos, only an alias
But alias is very unique
Alias hits on 2 porn sites – one has DOB, corresponds in year
to LinkedIn info, but no other information
Other has very compromising photos
User’s photo is blurred
Seems unlikely, so have to be verified with other information
Case Study
Profiling took 7 hours
Profile:
Full names (x 5)
Work and private email addresses
Physical location
Work and education history (x 2)
Phone numbers – both work, home and mobile
I.M. Details
Children names, hobbies, interests
Photos of all
Friend lists
Why would we want a profile?
And what’s next?
When worlds collide
Digital but not online
Things you own
Property (public, commercial)
Transport (car, bike, boat, plane)
Money - bank account(s)
Things you use
Internet (proxy logs, RADIUS logs from ISPs)
Mobile phones (CDR), fixed line
Credit card, ATMs
Utilities (water, power etc.)
Travel info – passports
Things you are
Director, member of trust
Records
○ Major retail details
○ Criminal / court
○ Education
○ Tax
○ ID number
An evil government could...
Have to assume that .gov has all of the
above information
Gets scary when combining real world
with cyber world
No concept of ID number on the Internet
Mostly linked to email address
Can hope for phone number but unlikely
What can they do?
Example 1: Geo location to social net
Example 2: Tracking forum members
Demo (video)
Challenges we suspect they may have
Format of data across tables
083 448 6996 != (0)83448 6996
Temmingh R != RW Temmingh
Typos, bad captures
Multiple email addresses
[email protected]
[email protected]
Scaling the solution with new sources
E2 – E problem
Cool problems to solve here..
Use it to your advantage!
Entering your details in (digital)
forms
44B vs 44b vs 4 4 b vs 44 B
0834486996 vs 083 448 6996 vs
08344869961
Roeloftemmingh vs roelof.temmingh
Catch all addresses
[email protected]
For non-digital forms
Write like your doctor
Preventing data mining
Infrastructure / networks:
Use generic address to register domains or
use domain registration services
Keep your fwd DNS zone as generic as
possible
Make sure you control zone transfers!
Keep your rev DNS zone as clean as possible.
Keep as much away from your real network NS/MX/www
Preventing data mining
Photos
Reverse image search is possible (TinEye) so don’t
share photos
Getting tagged on other people’s photos!
Don’t geo tag photos
Beware of identifiable objects (car, bike, house,
office, logos) in photos
EXIF info on photos
Email addresses
May not be used outside organization - policy
Don’t use firstname.lastname when registering (I.M.
too)
Make sure your mail server does not allow verifying
(!VRFY!)
Keep your email address off PGP key rings
Preventing data mining
Websites/blogs
Links to your site, links from your site
No staff lists, internal phone lists, email list
Use generic email addresses for things like
sales/info
○ Also consider generic addresses for domain
registration
Keep XLS, DOCs away from the site (duh)
○ All in PDF. Clean meta information !
Robots.txt / sitemap.xls (?)
Javascript phone numbers and email
addresses or make them images
Preventing data mining
Phone numbers
Use a generic number for office, never direct lines
Don’t answer your phone with your name
Listing of company phone numbers on public sites (ads)
Javascript or image phone numbers where possible
Common sense
Friends and family is your weakest link
Never mention your DOB online / star sign
Bios, interviews and videos – ‘Jane said...’ Everything ends
up on the ‘net.
Be careful with who you leave your CV
Don’t use unique aliases
Guest books and blog comments
Do them a favor and name your children ‘Bob’ and ‘Mary’
Detecting data mining
Infrastructure
Monitor your DNS servers for signs of brute
force / zone transfers
Check your web server logs for mirroring &
look at User Agents
Inspect the referrers in your web server logs
for referral from search engines...and the
search term.
Detecting data mining
Personal
How do I know if someone has a Google alert on
me?
Setting up fake blogs, social network profiles
○
○
○
With CAPTCHAs and email alerts
Cannot make the jump too obvious
Perfect place for counter intelligence
Referrer
IP address
User Agent
Browser exploits ?
Analytics on websites, blogs
Listing ‘red’ phone numbers on 2nd jumps.
Think outside the box
How do I know when people Google for
something?
I run a super secret project called Sookah.
I don't ever want people to know about it.
When someone search for the word Sookah I
want to know it leaked out somehow
I don't want them to find out that I know
I register an Adword...isn't Google wonderful?
Trick question
Which is better:
No Internet profile at all / Closed profile
Open, Full blown Internet profile?
None / closed == open for impersonation
Open / Full == open for stalking
Impersonation
○ Competing with real person
Complete new, fake
○ Easy, ask Robin Sage
The Curious case of Eugene
Eugene Gregoria
Location: Singapore
Industry: Telecommunications
Employer: Pacnet (formerly Asia Netcom)
Last Facebook status: On basketball: 'I liked the choreography, but I
didn't care for the costumes.' ~Tommy Tune, on why he never
considered playing basketball
Last 2 Tweets:
German school reports 30 cases of A/H1N1 flu [link]
I saw this nice web site on poker called "Bill's Poker Blog" [link]
Blog: I like watching western movies. We watched 'Giant' directed by
George Stevens. I really enjoyed it. I found this really interesting: It
was the highest grossing film in Warner Bros. history until the
release of Superman (1978).
WYSIWYG? Not always...
Investigator /target will follow the
crumbs…
…but nothing is real on the Internet
(Eugene is made up from
many different people,
algorithms, headlines and
snippets from the Internet)
2 of 2:fakes
;
Mandatory ‘Profound’ quote
“If we assume that only a small
percentage of the Internet consists
of unique information then creating
acceptable content and human-like
behavior becomes no more than a
complex copy and paste process.
If we acknowledge the existence of a
single fake identity on the Internet
an entire automated community should
soon be within our reach. “
How to make friends and...
So what’s the big deal?
Manipulate ratings of anything
Sway public opinion
Influence political polls
Alter stock prices – directly or indirectly
Perform social denial of service
Keep in mind that people are flock animals –
you just need to be the initial catalyst and
get critical mass
Thus in conclusion
The gap between the real world and the
online world is closing every minute...
...So is the gap between your online
profile and your actual life
Information itself is a vulnerability
Network->OS->Application->Information-
>People
It feels like the 90s again!
Think of the children...
Questions?
Eric (the iPhone guy) threaten me
already so let’s grab a beer / coffee..