TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Black Hills InfoSec

OSINT for Incident Response (Part 1)

Kassie Kimball · 2023-12-07 · Read original ↗

ATT&CK techniques detected

5 predictions
T1087.003Email Account
73%
"on the first touchpoint with the client, i knew their primary tld ( top - level domain ) and jumped right into my “ 5 - minute osint ” routine. first ( drum roll please! ), my email enumeration secret weapon : “ name server lookup ” ( ba - dum - bum - ching! ). yep, good ‘ ol “ n…"
T1486Data Encrypted for Impact
72%
"frequently the internet. osint can quickly and easily give us visibility into what the internet knows about the client organization. if the internet knows, the threat actors know, and as incident responders, we need to know! as a dfir consultant, an engagement begins with client …"
T1021.001Remote Desktop Protocol
59%
"or ‘ ip : 10. 1. 0. 128 / 25 ’ leakix. net example : https : / / leakix. net “ service ” – ip : ” 10. 1. 0. 128 / 25 ” remember, this is not deep - dive analysis. it should take longer to read this post than to perform the actual queries! i ’ m just doing a quick “ attack surface…"
T1563.002RDP Hijacking
37%
"or ‘ ip : 10. 1. 0. 128 / 25 ’ leakix. net example : https : / / leakix. net “ service ” – ip : ” 10. 1. 0. 128 / 25 ” remember, this is not deep - dive analysis. it should take longer to read this post than to perform the actual queries! i ’ m just doing a quick “ attack surface…"
T1571Non-Standard Port
31%
"or two, i took a stab at the range of addresses in use by the client, e. g. “ 10. 1. 0. 128 / 25 ” or “ 10. 1. 0. 129 - 140 ” ( that ’ s a private address range, i ’ m just using it as an example here ) and headed to shodan. io. if you don ’ t have a shodan. io account, then you …"

Summary

Being a digital forensics and incident response consultant is largely about unanswered questions. When we engage with a client, they know something bad happened or is happening, but they are […]

The post OSINT for Incident Response (Part 1) appeared first on Black Hills Information Security, Inc..