当前位置:网站首页>[Research Report on the contents, methods, tools and results of information collection]
[Research Report on the contents, methods, tools and results of information collection]
2022-07-23 06:00:00 【Demon 95】
Tips : When the article is finished , Directories can be generated automatically , How to generate it, please refer to the help document on the right
List of articles
Preface
Understand the concept of information collection and open channel information collection 、 Network service information collection
Methods and defensive measures
One 、 Information collection and analysis
Two 、 Public information collection - Search engine
3、 ... and 、 Information collection and Prevention
Four 、 Information gathering tools
- summary
Preface 
One 、 Information collection and analysis

HUMINT( Artificial intelligence )
Artificial intelligence comes from human , Whether through underground secret collection , Or collect it publicly through diplomatic means , Artificial intelligence is the oldest form of intelligence gathering . Whether cyber Threat Intelligence can be obtained from HUMINT The conclusion is controversial . An example is trying to have an interview or conversation with those who are involved in the invasion or experienced in the invasion . The other is considered the closest HUMINT An example of this is through restricted or member only online forums , Interact with hackers to get information . This type of intelligence gathering can also be considered SIGINT, Because it comes from electronic communication .
SIGINT( Intelligence signals )
Signal intelligence includes intelligence obtained from electronic signals , Including communication intelligence (COMINT)、 Electronic intelligence (ELINT) And external instrument signal intelligence (FISINT). Most technical intelligence gathering belongs to SIGINT, After all, the function of computer comes from electronic signals , So anything exported from computers or other network devices can be regarded as SIGINT.
OSINT( Public information )
Public sources of information include news 、 social media 、 Commercial databases and other sources . Among them, the public report on network security threats is OSINT A type of . The other type is publicly accessible IP Technical details of address or domain name , for example ,WHOIS Query the details of the malicious domain name registrant .
IMINT( Image intelligence )
Image information is collected from visual representation , For example, photography and radar .IMINT Usually not the source of cyber Threat Intelligence .
MASINT( Measurement and feature intelligence )
MASINT It means in addition to signals and images , Information collected through technical means .MASINT Usually includes nuclear 、 light 、 radio frequency 、 Characteristics of acoustics and seismic characteristics . because MASINT Does not contain signal intelligence , It is usually not a typical source of cyber Threat Intelligence .
GEOINT( Geospatial information intelligence )
Geospatial information intelligence comes from geospatial data , Including satellite images 、 Reconnaissance map 、GPS Data and other location related data sources . Some companies believe that IMINT yes GEOINT Part of , Some enterprises think it is a separate discipline . And IMINT similar ,GEOINT Not a typical source of cyber Threat Intelligence , But it can provide contextual information about threats , To help you understand how attackers use network domains to achieve their goals .
Two 、 Public information collection - Search engine
3、 ... and 、 Information collection and Prevention
• Public information collection defense
• Information display minimization principle , Don't release unnecessary information

Four 、 Information gathering tools

1、NSLOOKUP
nslookup The command is almost in all PC It is installed on the operating system , Used for query DNS The record of , Check whether domain name resolution is normal , It is used to diagnose network problems when the network fails . Information security personnel , You can collect information through the returned information .
2、DIG
Dig It's also true DNS A tool for collecting information ,dig comparison nsllooup Not only more functions , First, connect by default DNS The server queries the corresponding IP Address , Then set dnsserver For up connection DNS The server .
3、Whois
whois It is used to check whether the domain name has been registered , And a database of registered domain name details ( Such as domain owner 、 Domain registrar ). adopt whois To realize the query of domain name information . In the early whois Query mostly exists with command line interface , But now there are some online query tools with simplified web interface , You can query different databases at one time .
Web interface query tools still rely on whois Protocol sends query request to server , Command line interface tools are still widely used by system administrators .whois Usually use TCP agreement 43 port . Each domain name /IP Of whois Information is kept by the corresponding management organization .
5、 Active information collection
Recon-ng It is a framework for information collection , It can be compared with exploit To metasploit framework、 Social engineering is for SET.
5、 Active information collection
Active information collection is the use of some tools and means , Some interaction with the collected target , So as to obtain target information . Some traces can't be avoided in the process of active information collection .
summary
The content of research information collection
Methods of information collection
Tools for information collection
边栏推荐
猜你喜欢

在局域网内配置LoRaWAN的私有ChirpStack
![[jmeter] solution to Chinese garbled response content](/img/ff/3d68a0cc34486e0b6cb35291ce10c0.png)
[jmeter] solution to Chinese garbled response content

Digital verification code identification completes automatic login

嵌入式系统移植【2】——交叉开发环境的搭建

IA笔记2

Amber tutorial 4.6: hydrogen bond analysis of the system

DNS域名解析服务

Iptables firewall

get请求与post请求的区别以及抓包

Link: fatal error lnk1104: unable to open the file "opencv_world340.lib"
随机推荐
用户和组管理
File类的使用,常用API及如何遍历目录及子目录
Software service function process
SNAT and DNAT
BeanShell 内置变量 ctx
存储过程
迷茫的五月
Crawl web pages to dynamically load comments
Use of vim editor
Selenium基础知识 调试方法
Regular expression II
正则表达式Ⅱ
腾讯云接入LoRaWAN并调试
Link: fatal error lnk1104: unable to open the file "opencv_world340.lib"
Common test case methods
信息收集调研报告
Source code compilation and installation lamp
zstuAcm学生信息库的建立(用链表完成)
Basic process of unit approval
指针学习日记(三)