Transcript
A (0:05)
Hello from Spearfish, South Dakota. It's the Black Hills Information Security podcast. This is the podcast version of our webcast, so some of the slides we might reference will be missing, but you can find the whole episode on our YouTube page. This is weaponizing corporate intel. This time it's personal with Mike Felch and Bo Bullock. Enjoy.
B (0:29)
I want to say thank you, everybody, for coming to yet another webcast from Active Countermeasures and Black Hills Information Security. As always, the webcast is brought to you by Black Hills Information Security. Hey, you need a pen test? We do those. You should check it out. Also, it's brought to you by Active Countermeasures. Hey, you need a hunt team. We do those. And if you would like a demo, as always. All right, everybody. So thank you very much for coming to this webcast. There's been a lot of new classes and different things kicking out about recon and whether or not recon, the state of recon, can actually be advanced. And I think out of all the different aspects of penetration testing and red teaming, recon is one of those aspects that changes the most quickly. And I think attending as many webcasts as you can of different new and advanced techniques is really, really key. And Mike and Bo have been doing a lot of research on how to do recon in a faster, more efficient, and absolutely horrifying way. And this is all part of what we do for some pen tests and then also for red teams as well. So with that, I'm going to hand it over to Beau and Mike and.
C (1:32)
They will take it away.
B (1:33)
Thank you so much, guys.
D (1:34)
Go for it.
C (1:35)
Yeah. So I always like to preface this part of particular presentation with the first half of this entire thing is what I kind of consider like a recon, almost like 101 kind of refresher of like, kind of a methodology we kind of go through. A lot of it is stuff that I feel like is well known, but there might be some. Some tidbits in here that are, you know, new to you if you're listening to this, this. So through this talk, what this is, it's a recon talk with a new attack path kind of tagged onto the end of this presentation in regards to a newer password attack and a new way to identify information about your targets. So we're going to go from knowing absolutely nothing about an organization to what I kind of consider stalker status a little bit. Like, it's scary, the amount of information that we can get. And it's one of those things, like, you know, when we're doing a pen test. We don't necessarily need to know your Social Security number, but it's. It's possible to get it in a lot of cases now. And it's just. It adds an additional layer of something we can use to target your employees. You know, if you're, if you're an organization who is, you know, somebody who's going to be targeted by an attacker, there's a lot of stuff we can look at. And we're going to walk through basically all of those aspects of leading up from. From knowing nothing to learning about your external attack surface, to who works for your company, and then ultimately kind of trying to tie in how that works whenever we're looking at attacking your company. So the main reason I want to kind of lead with all this kind of like, initial recon is that I believe it really kind of reinforces what happens later. Like, I don't think that we just dove right in and started showing you all this new stuff that it would really make as much of an impact as. As if we can kind of show you all the steps it takes and the amount of information we can gain throughout this entire process.
![BHIS Podcast: Weaponizing Corporate Intel: This Time, It’s Personal! - Talkin' Bout [Infosec] News cover](/_next/image?url=https%3A%2F%2Fimg.transistor.fm%2FAukI425sRBc3M3UIa9lVng7qjeNeYEQ8BZfzCEXhALs%2Frs%3Afill%3A0%3A0%3A1%2Fw%3A1400%2Fh%3A1400%2Fq%3A60%2Fmb%3A500000%2FaHR0cHM6Ly9pbWct%2FdXBsb2FkLXByb2R1%2FY3Rpb24udHJhbnNp%2Fc3Rvci5mbS8xZTA1%2FZWZhNDcxZGM4ZTFj%2FZGJhMTMwNmYzMmJj%2FZjBkNi5wbmc.jpg&w=1920&q=75)