Company Intelligence

Information Can be used for...
Locations and Addresses General understanding of a companys geographical layout. Targets for physical engagements.
Phone Numbers Ranges War Dialing
Business Areas General understanding of a companys business and to identify business processes.
Products / Portfolio Targets for exfiltration (digital assets) or for Social Engineering
Organigram Knowledge about a companys personal structure and allocate VIPs as targets for Social Engineering
Employees and contact information Targets for Social Engineering
Technologies (Systems / Software) Allocating vulnerabilities and weak points to attack during Gaining Access and Maintaining Access phase.
(Security-) Policies Get an understanding of a companys security posture and find weak spots tu utilize during Gaining Access and Maintaining Access phase.
Events Physical engagements and Social Engineering

Personal Information

Information Can be used for...
Names and Contact information Social Engineering
Usernames and Passwords Gaining Access phase.
Family and Pents Social Engineering
Interests and Hobby Social Engineering

Network Information

Type Used for...
Domain- and Hostnames Targets for Scanning and Enumeration phase. Attack Surface during Gaining Access phase.
IP-Blocks and -Addresses Targets for Scanning and Enumeration phase. Attack Surface during Gaining Access phase.
Routing Information Communication Paths through the target network and allocating network devices for Scanning and Enumeration and Gaining Access phase.
System Types (Routers, Firewalls,Servers,...) Target information for Gaining Access phase.
Remote Access Services Targets for Scanning and Enumeration phase. Attack Surface during Gaining Access phase.

System Information

Type Used for...
Operating System and Patch Versions Identification of target environment. Detection of vulnerabilities and exploits during Gaining Access and Maintaining Access phases.
Ports and Services Targets for Scanning and Enumeration phase. Detection of vulnerabilities and exploits during Gaining Access and Maintaining Access phases.
Applications and Software Versions Targets for Scanning and Enumeration phase. Detection of vulnerabilities and exploits during Gaining Access and Maintaining Access phases.
Authentication Mechanisms Detection of vulnerabilities and exploits during Gaining Access and Maintaining Access phases.
Access Control Lists (ACL) Detection of vulnerabilities and exploits during Gaining Access and Maintaining Access phases.
Encryption (Types and Algorithms) Detection of vulnerabilities and exploits during Gaining Access and Maintaining Access phases.

results matching ""

    No results matching ""