1 00:00:00,300 --> 00:00:08,890 So this is the first Netsch and we are on the next and the another wonderful session and this session 2 00:00:08,910 --> 00:00:18,580 is about Rickon energy to Briga and G is a very powerful tool and it's an open source intelligence to 3 00:00:18,660 --> 00:00:18,990 OK. 4 00:00:19,320 --> 00:00:25,890 And this is going not going to solve a whole lot of problems of our information gathering speech. 5 00:00:26,670 --> 00:00:27,540 Let's get started. 6 00:00:28,530 --> 00:00:33,930 So this is how it looks like it comes up with the CLIA option. 7 00:00:34,440 --> 00:00:36,930 So we just have to go to the command prompt. 8 00:00:36,980 --> 00:00:41,090 I mean, the candy and just Ergon Energy and you're good to go. 9 00:00:41,670 --> 00:00:46,770 Yes, it is already built in with the decanting, so you don't have to install any anything special 10 00:00:46,770 --> 00:00:50,970 with it, if not than you can of course, install. 11 00:00:50,970 --> 00:00:53,070 It depends on which version you are. 12 00:00:53,670 --> 00:01:00,450 OK, so as I said, it's it's an open source, information gathering, intelligence, information gathering 13 00:01:00,450 --> 00:01:10,550 tool and whatever they say that it means it is used to gather information from openly available sources. 14 00:01:10,560 --> 00:01:11,740 What are those sources? 15 00:01:12,090 --> 00:01:16,060 It could be these, but not limited to that's for sure. 16 00:01:16,680 --> 00:01:20,000 Google, Twitter, Bing for sure. 17 00:01:20,340 --> 00:01:21,600 As Shodan Israel. 18 00:01:22,170 --> 00:01:29,910 For those who who don't know my children children is a pretty powerful tool, will be talking very much 19 00:01:29,910 --> 00:01:38,010 about children because children is the tool, which is mainly mean for hackers or I would say organization 20 00:01:38,010 --> 00:01:44,240 as well, to know what are the devices vulnerable from the external world. 21 00:01:44,250 --> 00:01:44,550 Right. 22 00:01:45,420 --> 00:01:49,310 So you have CCTV cameras, you have your Web servers. 23 00:01:49,320 --> 00:01:57,090 If you just want to know from the external world which which of my applications are currently vulnerable 24 00:01:57,270 --> 00:02:03,120 to any of the attacks or which of my boats, which are these sensitive ports open from the external 25 00:02:03,120 --> 00:02:12,540 world, this this show that has multiple probes which keep keep scanning to the owners of your devices, 26 00:02:12,810 --> 00:02:13,740 login banners. 27 00:02:14,010 --> 00:02:16,380 And that's how we get to know what is the current status. 28 00:02:17,020 --> 00:02:23,590 There has been millions of devices got exposed in the past and their credentials as well. 29 00:02:23,910 --> 00:02:25,610 All credit goes to shorted. 30 00:02:26,970 --> 00:02:33,860 People say it's not really a good tool or not legal or something, but I would say it is very much in 31 00:02:33,870 --> 00:02:41,730 it and it is used by many of the enterprises as well, because initially it was leaving a whole lot 32 00:02:41,730 --> 00:02:47,850 of, you know, a whole lot of information which can be exploited, which can be used, which used to 33 00:02:47,850 --> 00:02:49,730 be used by the backor as well. 34 00:02:49,740 --> 00:02:55,470 But this also help organization as well to strengthen their security posture. 35 00:02:56,100 --> 00:02:59,510 OK, so you have about the short let's get started. 36 00:02:59,910 --> 00:03:04,800 The next point is about what what all it basically take care of. 37 00:03:05,100 --> 00:03:10,960 So it basically take care of the Cretaceous, some metric on it, and we can look for any compromise 38 00:03:11,000 --> 00:03:18,030 credentials outside of the, you know, and anywhere on the network we can get to know about if contacts, 39 00:03:18,030 --> 00:03:22,380 contacts could be email address of the target organization. 40 00:03:22,380 --> 00:03:29,010 So if I want to know about the email address of the DOGOOD organization or anybody the any any email 41 00:03:29,010 --> 00:03:33,210 address in the dog, maybe a job, maybe it's a marketing team, anybody. 42 00:03:33,660 --> 00:03:39,480 So if they have posted or they have mentioned their email address, maybe on the LinkedIn somewhere 43 00:03:39,480 --> 00:03:43,670 or any of the job postings and all this stuff. 44 00:03:43,680 --> 00:03:50,900 So this tool can capture all those who can deliver to deliver it to us. 45 00:03:50,910 --> 00:03:51,160 Right. 46 00:03:51,540 --> 00:03:53,860 Link, data, domain and horse. 47 00:03:54,390 --> 00:03:56,610 So that's what we would be talking about. 48 00:03:57,090 --> 00:04:01,350 Domain's and Horse does basically we can get to know about subdomains. 49 00:04:02,370 --> 00:04:05,970 We can capture all the subdomains of the target website. 50 00:04:06,420 --> 00:04:13,180 And now how exactly to do it's doing is basically making use of brute force attack as well. 51 00:04:13,220 --> 00:04:13,430 Right. 52 00:04:13,530 --> 00:04:15,690 So it has multiple ways to do it. 53 00:04:16,050 --> 00:04:20,630 But these are some of the some of the possible techniques that it can stop it. 54 00:04:20,940 --> 00:04:21,300 All right. 55 00:04:21,300 --> 00:04:29,850 So we'll be making use of of angel recon and not just for subdomain, but will be making use of it for 56 00:04:29,850 --> 00:04:31,740 a couple of more tasks as we go ahead. 57 00:04:32,100 --> 00:04:39,000 Although we are we are we have to start with subdominant initially to understand how we can make use 58 00:04:39,000 --> 00:04:44,700 of Rickon energy to gather subdomains of the dog website to understand what are the different, you 59 00:04:44,700 --> 00:04:46,710 know, activities. 60 00:04:46,710 --> 00:04:51,390 The target domain is basically taken care of and then we get more clarity about it. 61 00:04:51,620 --> 00:04:51,870 Right. 62 00:04:52,260 --> 00:04:53,780 So we'll get you in the next session then. 63 00:04:53,780 --> 00:04:54,210 Thank you.