Abstract
Reconnaissance is the first phase of the cyber-death chain. In this project, we aim to identify and gather all possible information about the target using passive reconnaissance. In this method, the scanner's IP address should not be tagged in the victim's server. Several tools such as theHarvester, Metagoofil, Nmap, Nessus, Hunter IO, and Sublister3r were used to figure out the workflow of reconnaissance. Based on the survey a Python tool named OSILIZER was designed to embed the basic reconnaissance needed for an organization to gather critical information about the target domain.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Hu, H., Peng, P., Wang, G.: Towards understanding the adoption of anti-spoofing protocols in email systems. In: 2018 IEEE Cybersecurity Development (SecDev), Cambridge, MA, pp. 94–101 (2018). https://doi.org/10.1109/SecDev.2018.00020
Wang, R., Gao, L., Sun, Q., Sun, D.: An improved CVSS-based vulnerability scoring mechanism. In: 2011 Third International Conference on Multimedia Information Networking and Security, Shanghai, China, pp. 352–355 (2011). https://doi.org/10.1109/MINES.2011.27
Sanghvi, H., Dahiya, M.: Cyber reconnaissance: an alarm before cyber attack. Int. J. Comput. Appl. 63, 36–38 (2013). https://doi.org/10.5120/10472-5202
Shinde, P.S., Ardhapurkar, S.B.: Cybersecurity analysis using vulnerability assessment and penetration testing. In: 2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave), Coimbatore, India, pp. 1–5 (2016). https://doi.org/10.1109/STARTUP.2016.7583912
Uehara, K., et al.: Basic study on targeted e-mail attack method using OSINT. In: Barolli, L., Takizawa, M., Xhafa, F., Enokido, T. (eds.) AINA 2019. AISC, vol. 926, pp. 1329–1341. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-15032-7_111
Yeboah-Ofori, A.: Cyber intelligence and OSINT: developing mitigation techniques against cybercrime threats on social media. Int. J. Cyber-Secur. Digital For. 7, 87–98 (2018). https://doi.org/10.17781/P002378
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Balaji, S.J., Karmel, A. (2022). Detecting Vulnerabilities Using Open-Source Intelligence. In: Abraham, A., et al. Hybrid Intelligent Systems. HIS 2021. Lecture Notes in Networks and Systems, vol 420. Springer, Cham. https://doi.org/10.1007/978-3-030-96305-7_49
Download citation
DOI: https://doi.org/10.1007/978-3-030-96305-7_49
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-96304-0
Online ISBN: 978-3-030-96305-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)