Reconnaissance -Searching, Phishing

Here's a refined and visually structured version with better readability and organization:


πŸ•΅οΈ Reconnaissance πŸ”

Goal:

πŸ“Œ The attacker gathers intelligence about the target to plan future attacks.

Techniques:

πŸ›  Open-Source Intelligence (OSINT) | 🌐 Network Scanning | 🎭 Social Engineering


🎣 What is Phishing?

Phishing for information is a social engineering attack where adversaries attempt to trick targets into revealing sensitive data such as:
βœ… Credentials (Usernames, Passwords)
βœ… Financial Information (Bank Details, Credit Card Numbers)
βœ… Internal Company Data (Organizational Structure, Policies)

Unlike traditional phishing, which often focuses on delivering malware, this method primarily aims to gather actionable intelligence for future attacks.

πŸ›  Sub-Techniques:

πŸ”Ή Spearphishing Service – Using third-party platforms like social media & personal email.
πŸ”Ή Spearphishing Attachment – Sending malicious files via email (PDF, DOC, XLS).
πŸ”Ή Spearphishing Link – Directing victims to credential-harvesting phishing pages.
πŸ”Ή Spearphishing Voice (Vishing) – Using phone calls to extract sensitive information.


πŸ” Search Methods for Intelligence Gathering

πŸ” πŸ”Ž Search Closed Sources (λΉ„κ³΅κ°œ μ†ŒμŠ€ 검색)

Collection of technical/threat intelligence from non-public sources:
βœ” Paid/non-public databases (e.g., RocketReach, CrunchBase business databases)
βœ” Dark web monitoring for leaked credentials and internal documents
βœ” Goal: Gain initial access or prioritize advanced attacks based on collected intelligence


🌎 πŸ“‚ Search Open Technical Databases (곡개 기술 λ°μ΄ν„°λ² μ΄μŠ€ 검색)

Collection of technical/threat intelligence from public sources:
βœ” WHOIS database – Identifying domain registration details (organization names, location)
βœ” Digital certificates – Extracting information from SSL/TLS certificates
βœ” CDN (Content Delivery Network) insights – Analyzing CloudFlare CDN and related services

πŸ” Internet-Connected Device Search:
βœ” Shodan – Searches for exposed internet-connected devices using various filters (open ports, services, IPs)
βœ” FOFA – The Chinese equivalent of Shodan for identifying exposed devices


🌐 πŸ”— Search Open Websites & Domains (곡개 μ›Ήμ‚¬μ΄νŠΈ/도메인 검색)

βœ” Social media, search engines, business hosting sites, code repositories
βœ” Kimsuky – Known to initiate reconnaissance via Google searches
βœ” LAPSUS$ – Exploited credentials exposed in code repositories (e.g., GitHub leaks)


🏒 πŸ“‘ Search Victim-Owned Websites (곡격 λŒ€μƒ μ›Ήμ‚¬μ΄νŠΈ 뢄석)

βœ” Analyzing target websites to extract:
πŸ”Ή Department & business unit names
πŸ”Ή Physical locations
πŸ”Ή Organizational hierarchy & key personnel
πŸ”Ή Employee roles, emails, and other relevant details


This version enhances clarity, structure, and readability while making it more visually appealing. πŸš€

Β