Reconnaissance

Summary

The remote assessment methodology focuses on direct observation of an organization and their infrastructure, consisting of passive reconnaissance of publicly available data sources ("Open Source Intelligence") This allows the auditor to identify publicly available resources (such as websites, extranets, email servers, but also social media information) connected to the organization and remotely gather information about those resources.

Purpose

While much of SAFETAG focuses on digital security challenges within and around the office, unintended information available from "open sources" can pose real threats and deserve significant attention. This also builds the Auditor's understanding of the organization's digital presence and will guide specific vulnerabilities to investigate once on site.

The Flow Of Information

Reconnaissance Information Flow

Guiding Questions

Approaches

Outputs

Operational Security

Preparation

:

Resources

Open Source Intelligence (General)

Organizational Information Gathering

Searching

Pastebin Searching

Recon-ng

Activities

undefined


  1. Accumulating information about partners, clients, and competitors - The Penetration Testing Execution Standard

  2. The flow of information through the Recon-ng framework. (See: "Data Flow" section)

Activities

 

Developed with ❤ by

Information Innovation Lab

Applied research and development of public interest technology.