Wednesday, October 4, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Hacking

A powerful tool to show you how exposed you are online

Researcher by Researcher
September 15, 2023
in Hacking
0
A powerful tool to show you how exposed you are online
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


Privacy

A primer on how to use this powerful tool for uncovering and connecting information from publicly available sources

Sol González

22 Jun 2023
 • 
,
4 min. read

Maltego: Check how exposed you are online

It’s a truism that personal data is a valuable asset for cybercriminals, as it allows them to tailor and otherwise improve their phishing and other social engineering attacks. The wealth and variety of personal data that is available online is leveraged for attacks and scams that target not only people but also companies.

But organizations too can tap into techniques such as Open Source Intelligence (OSINT) that allow them to see their network the way attackers might see it and to gather various kinds of publicly available information about themselves in order to identify their weak points and ultimately enhance their security. One such popular and powerful information-gathering tool is a piece of software called Maltego.

What is Maltego and why use it?

Maltego is a piece of software that allows ethical hackers, penetration testers and other security practitioners to uncover information about people or companies on the internet. It enables them to cross-match data and map out connections between social media profiles, email addresses, phone numbers, locations, professional affiliations and other information. The information is represented in easy-to-digest graphical links and relationship diagrams.

Read also: 5 free OSINT tools for social media

Maltego offers a slew of benefits for various entities, both in the private and public sectors. Cybersecurity practitioners can leverage Maltego for gathering valuable information about threats that might jeopardize the security of a company’s information and infrastructure. Law enforcement agencies can use Maltego to collect valuable data that helps in investigating fraud and gathering digital evidence, among other things.

What type of information can Maltego collect?

The tool’s most-used features are those that let you identify and visualize relationships between what the tool calls entities, such as IP addresses, domain names, e-mails, social media profiles, etc. In addition, Maltego allows you to integrate different sources of information, such as databases, online search tools, APIs, etc.

Even Maltego’s free version fetches a large amount of information, including:

  1. Network information: Maltego can scan and gather information about network hosts, open ports and protocols used. For example, with Maltego, you can download Shodan within the tool, which allows you to gather more specific information about the network to be analyzed.
  2. Domain and email information: Maltego can gather information about domains, such as our DNS entries, email logs, and host name logs. It can also gather information about email addresses, domain names, email providers and DNS records.
  3. Social media information: You can get Maltego to collect various kinds of information from social media, including profiles, posts, friends, followers and connections.
  4. Information about people and organizations: Maltego can gather information about people or organizations, including their names, addresses, telephone numbers, email addresses, websites and social media profiles.
  5. Malware information: Maltego can gather information about malware, such as file names, fingerprints, attack patterns and behavior. This helps gather information about threats, making it a handy tool for threat intelligence tasks. 

Here’s what happens under the hood:

maltego-estructura
  • The Maltego client sends a request in XML format to seed servers over HTTPS.
  • The request from the seed server is sent to transform application servers (TAS) that, in turn, forward it to the service providers.
  • The results are sent to the Maltego client.

How to use Maltego

Download and install Maltego on Windows, macOS or Linux and create an account on the tool’s website that will allow you to use the app and the free servers. Once you install the software and sign in, you have to create a new search page and drag the entity there (i.e., the type of search you want to make – in this case, a person) to then run the search and see the results.

Getting started with Maltego

Once you have selected the type of search you want to make, double click on the person icon to access the configuration section and, once you enter the name, just right click on the person icon and select “run transform”. Within this category, there are different subcategories, where you can search for specific information, such as email addresses, IP addresses of a website, etc. In this particular case, we will use the “all transforms” option to search for all possible information in the Internet, so it will quickly start gathering data and the result will be similar to that shown in the image below:

Related articles

Hackers Steal User’s Database From European Institute

Hackers Steal User’s Database From European Institute

October 3, 2023
Hackers Bypass Cloudflare Firewall & DDoS using Cloudflare

Hackers Bypass Cloudflare Firewall & DDoS using Cloudflare

October 2, 2023

Example of information search results

In the screenshot, you can see websites where the name “John Doe” was mentioned or there is information related to it. It is worth mentioning that this tool is so powerful that it may find profiles in Facebook, LinkedIn, Instagram, Tik Tok, Snapchat, Twitter, and Youtube, among others. But that’s not all, as you can also find friends related to this person in social media. To see it in more detail, click on the “List View” button in the “View” lateral bar, where you can see the links and other information.

Type of information gathered by Maltego

Conclusion

The information gathered using Maltego can also be used by cybercriminals when deploying their attacks. This is why it’s useful to understand what kind of information a cybercriminal can learn about us or our company and be cognizant of – and possibly decrease – our level of exposure.

It goes without saying that whenever you use an OSINT tool, make sure you are aware of local and national laws and regulations related to the collection and use of information so that you do not commit a crime or violate the privacy of others. Also, when collecting and storing information, it is important to take measures to protect it against possible theft or data breaches.



Source link

Tags: exposedonlinePowerfulshowtool
Share76Tweet47

Related Posts

Hackers Steal User’s Database From European Institute

Hackers Steal User’s Database From European Institute

October 3, 2023
0

The European Telecommunications Standards Institute (ETSI) has uncovered a data breach in which threat actors obtained a database holding a...

Hackers Bypass Cloudflare Firewall & DDoS using Cloudflare

Hackers Bypass Cloudflare Firewall & DDoS using Cloudflare

October 2, 2023
0

Cloudflare, a prominent cybersecurity vendor renowned for its web protection services, faces a security challenge that could expose its customers...

Hackers Inject Malicious Ads into GPT-4 Powered Bing Chat

Hackers Inject Malicious Ads into GPT-4 Powered Bing Chat

October 2, 2023
0

In February 2023, Microsoft unveiled its revolutionary AI-assisted search engine, Bing Chat, driven by OpenAI’s cutting-edge GPT-4 technology. This announcement marked...

BlackTech APT Attacking Network Routers to Breach Networks

BlackTech APT Attacking Network Routers to Breach Networks

September 28, 2023
0

Since 2010, a group of hackers known as BlackTech APT has been engaging in malicious activities. The targets of their...

How to Secure Your Vehicles Against Hacking

How to Secure Your Vehicles Against Hacking

September 27, 2023
0

Though we can’t see it, the world brims with more technology than ever. These days, devices with internet connectivity live...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
Microsoft to Block Macros by Default in Office Apps

Qakbot Email Thread Hijacking Attacks Drop Multiple Payloads

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
Browse Safer and Faster Around the World with JellyVPN for just $34.99

Browse Safer and Faster Around the World with JellyVPN for just $34.99

October 3, 2023
Hackers Steal User’s Database From European Institute

Hackers Steal User’s Database From European Institute

October 3, 2023
Hackers Bypass Cloudflare Firewall & DDoS using Cloudflare

Hackers Bypass Cloudflare Firewall & DDoS using Cloudflare

October 2, 2023
AWS Honeypot to Disrupt Threat Actors

AWS Honeypot to Disrupt Threat Actors

October 2, 2023

Recent Posts

Browse Safer and Faster Around the World with JellyVPN for just $34.99

Browse Safer and Faster Around the World with JellyVPN for just $34.99

October 3, 2023
Hackers Steal User’s Database From European Institute

Hackers Steal User’s Database From European Institute

October 3, 2023
Hackers Bypass Cloudflare Firewall & DDoS using Cloudflare

Hackers Bypass Cloudflare Firewall & DDoS using Cloudflare

October 2, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • LetsAskBinuBlogs
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cyber Cybersecurity Data Digital exploited financial Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches platform Ransomware RoundUp security services Software Stories TFT Threat Top vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved