Chapter 8

Leveraging Open-Source Intelligence

Richard Ackroyd,    Senior Security Engineer, RandomStorm Limited

The old saying “If I had eight hours to chop down a tree, I’d spend six sharpening my axe” could not relate more perfectly to this phase. The reconnaissance work you perform will make or break a social engineering engagement. It will truly form the foundations of any work that follows it. There is a wealth of information at our fingertips. This chapter will show you how to find and manipulate it to aid in your assessment. Harvesting e-mail addresses, document metadata, corporate websites, and social media will all be covered.

Keywords

Passive Spider; FOCA; Metagoofil; photographic metadata; Exiftool; image picker; Wget; GeoSetter; reverse ...

Get Social Engineering Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.