THE PLACE OF OSINT IN THE CYBER KILL CHAIN
DOI: 10.31673/2412-4338.2023.015360
Abstract
In recent years, there has been a trend towards an increase in the number of cyber attacks on organizations and individual users. In many cases, a key factor in the implementation of an information security incident is the attacker's effective preparation for a cyber attack: target selection, reconnaissance, i.e. obtaining any information that may be needed when planning an attack, weaponization based on discovered defense mechanisms, software and hardware, etc. and delivery, i.e. choosing how the malware will reach the victim and what steps will be required to activate it further. Having a significant amount of important and critical information for the organization from the point of view of ensuring security provides the attacker with the opportunity to choose the optimal attack scenario and significantly increases the chances of its success.
The problem is that today's OSINT methods and tools allow you to find almost any information that is not protected in a real way, which significantly increases the risks, especially for organizations that find it difficult to control all the information that their employees post on social networks, disclose in interviews or accidentally enters the Internet. However, most intelligence tools are not only available to attackers, so ethical hackers and penetration testers can also use OSINT tools to examine an organization's vulnerabilities and improve its defenses before attackers exploit those vulnerabilities.
The article examines the main methods of intelligence based on open sources, considers the most common and most often used OSINT tools, describes the life cycle of a cyber attack and defines the stages that require the use of OSINT tools when conducting an audit of the organization's information security and penetration tests.
Keywords: cyber security; social engineering; OSINT; Cyber Kill Chain; reconnaissance; penetration testing.
References:
1. ENISA Threat Landscape. 2022. URL: https://www.enisa.europa.eu/publications/enisa-threat-landscape-2022/@@download/fullReport
2. Penetration Testing with Open-Source Intelligence (OSINT): Tips, Tools, and Techniques. URL: https://www.eccouncil.org/cybersecurity-exchange/penetration-testing/penetration-testing-open-source-intelligence-osint/
3. Joseph Poppy. What is the cyber kill chain and why is it important? 2019. URL: https://www.bulletproof.co.uk/blog/what-is-the-cyber-kill-chain
4. OSINT: technology of data collection and analysis from open sources. 2022. URL: https://softlist.com.ua/articles/osint-tekhnologiya-sbora-i-analiza-dannyh-iz-otkrytyh-istochnikov/
5. Pavan Kashyap, Vinesha Selvarajah. Analysis of Different Methods of Reconnaissance 2021. URL: https://www.atlantis-press.com/article/125960844.pdf
6. Rahul Awati. Google dork query. 2022. URL: https://www.techtarget.com/whatis/definition/Google-dork-query
7. W. Mazurczyk. Cyber Reconnaissance Techniques 2021. URL: https://dl.acm.org/doi/pdf/10.1145/3418293
8. Isaac Odun-Ayo. Evaluating Common Reconnaissance Tools and Techniques for Information Gathering. 2021. URL: https://thescipub.com/pdf/jcssp.2022.103.115.pdf
9. Mike Elgan. Malicious Reconnaissance: What It Is and How To Stop It? 2022. URL: https://securityintelligence.com/articles/malicious-reconnaissance-protection-guide/
10. Reconnaissance and information gathering – OSINT toolkit review. 2020. URL: https://defcon.ru/penetration-testing/14235/