Open-Source Intelligence (OSINT) Flashcards

Lesson 6 (52 cards)

1
Q

Weaknesses in encryption identified through

A

OSINT techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DNS Lookups used for:

A

Examination of company domain names to uncover internal network
structure

Potentially reveals less-guarded entry points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the Definition of Information Disclosure?

A

Occurs when a system, application, or service inadvertently exposes
sensitive data without authorization.

Exposed data can include technical configurations, user personal
information, or business trade secrets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are Certificate Transparency Logs?

A

Public records of SSL certificates issued for domains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What happens when you have Misconfigured Servers?

A

Can expose directory listings or server status pages to the public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What happens when you have Insecure Data Storage?

A

Sensitive data not stored securely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What happens when you have
Faulty Application Code?

A

Can reveal sensitive information through error messages and logs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What happens when you have
Careless Handling of Error Messages and Logs?

A

Can provide unintended insights into the system’s workings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When you Penetration Testing for Information Disclosure:

A

Verify Error Messages: Ensure applications display generic error messages that do not disclose system details

Audit Server Configurations: Check server response headers, open ports,
directory listings, and software versions

Evaluate API Security: Test for weak authentication, improper
authorization checks, and insecure data handling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Preventative Measures for Information Disclosure:

A

Error Handling: Use generic error messages and secure storage for
detailed error logs

Server Configuration: Disable directory listings, close unnecessary ports, and update software regularly

API Security: Encrypt data exchanges, generate and monitor API access
logs, simulate API attacks using automated tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Name 3 things that Importance of Digital Certificates:

A

Authenticate the identity of web servers

Facilitate secure exchange of cryptographic keys

Essential for maintaining trust and security in online transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Tools for Analyzing Certificates:

A

OpenSSL- Command-line tool for gathering detailed certificate information.

Online SSL Checkers- Validate certificate chains, check for vulnerabilities, assess
compliance with best practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Certificate Transparency (CT):

A

Framework introduced by Google

Provides publicly auditable logs of issued certificates

Detects mistakenly or maliciously issued certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Certificate Revocation Mechanisms-
Online Certificate Status Protocol (OCSP):

A

Checks certificate revocation status

OCSP Stapling: Performance optimization technique for efficient certificate validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Certificate Revocation Mechanisms-
Certificate Revocation Lists (CRL):

A

Lists revoked certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is the BEST reason why job boards like Indeed or Glassdoor are valuable for penetration testers during OSINT?

A

They list roles, required skills, and technologies in use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following is a common cause of information disclosure, often revealing sensitive details such as database dumps or server file paths?

A

Error messages

frequently cause information disclosure by displaying sensitive system details like database dumps or server paths. DNS misconfiguration can expose other technical details, password spraying is an attack technique, and social engineering targets individuals rather than systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What command in Linux is used to perform DNS lookups to retrieve information about a domain’s IP addresses?

A

DIG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What role do Certificate Transparency logs play in enhancing digital certificate security?

A

Detect rogue certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which search engine operator restricts results to a specific website or domain?

A

site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a DNS (Domain Name System)?

A

Translates human-friendly hostnames into machine-readable IP
addresses

22
Q

What is Reverse DNS?

A

Maps IP addresses back to hostnames, useful for network
administrators and security professionals

23
Q

How DNS Lookups Work:

A

User enters a URL in a web browser

DNS resolver contacts a root DNS server, then a TLD server, and
finally the authoritative DNS server

Returns the corresponding IP address to the browser

24
Q

How Reverse DNS Lookups Work:

A

Querying the DNS with an IP address to find the associated PTR
(pointer) record

25
What is a DNS Flood?
Overwhelms a DNS server with excessive traffic, causing Denial of Service (DoS)
26
What is a DNS Amplification?
Small query results in a much larger response, directed at the victim's network
27
What is DNS Cache Poisoning?
Inserts false DNS information into the resolver’s cache
28
What is DNS Zone Transfers?
Unauthorized transfers reveal entire DNS database
29
Testing DNS Vulnerabilities -Stress Testing:
Use tools like dnsperf to simulate heavy DNS traffic and test server load capacity
30
Testing DNS Vulnerabilities- Cache Poisoning Prevention
Ensure DNS servers implement transaction ID randomization and source port randomization
31
Testing DNS Vulnerabilities- Reverse DNS for Security
Identify if an IP address belongs to the organization or an external threat
32
What is Introduction to Certificate Transparency (CT)?
An open framework developed by Google for a publicly auditable record of all issued digital certificates
33
What is the Purpose of Certificate Transparency (CT)?
Prevent malicious or mistakenly issued certificates from compromising network communications
34
How Certificate Transparency Logs Work- Certificate Authorities (CAs):
Required to submit newly issued SSL/TLS certificates to CT logs
35
How Certificate Transparency Logs Work? Certificate Entries:
Include a timestamp and cryptographic signature ensuring authenticity and integrity
36
How Certificate Transparency Logs Work? Monitors:
Constantly scan CT logs for suspicious certificates
37
How Certificate Transparency Logs Work? Auditors:
Verify the consistency and validity of log entries to ensure logs are tamper-resistant
38
What is Web PKI?
Includes everything required to issue and verify certificates used for TLS on the web
39
How dose a Web PKI Certificates:
Bind a public cryptographic key to a domain name
40
What are Rogue Certificates?
Certificates issued without the domain owner's authorization
41
How can u detect Rogue Certificates?
Monitors can detect rogue certificates through CT logs
42
What are Certificate Misissuance?
Certificates issued by mistake without proper validation
43
Penetration Testing with CT Logs in the Reconnaissance Phase:
CT logs provide actionable intelligence for uncovering unknown subdomains and hidden services
44
Certificate Landscape Analysis Identifying:
expired certificates, weak encryption algorithms, and misconfigurations
45
Mapping External Infrastructure:
Identifying CAs, service dependencies, and prioritizing security assessments
46
Search Engine Operators- Quotation Marks ("")
Searches for an exact phrase
47
Search Engine Operators- Minus Sign (-)
Excludes specific terms
48
Search Engine Operators- AND/OR
Combines or broadens search queries.
49
Search Engine Operators- what operator Restricts search to specific sites or URL structure?
site .com limits the search to that domain
50
Search Engine Operators- Filetype
Filters results by specific file types
51
What are the tools for Reverse Image Searches?
TinEye Google Images Bing Visual Search
52
What are Google Alerts?
Monitor changes or new content related to a keyword.