Google has a lot of power built into it’s search bar. It’s one of many tools used by #infosec to perform Open Source INTelligence research. Here are some dorks to find items of interest, edit and try them out! 🔎
The Cyber Attack Lifecycle describes the actions taken by an attacker from initial identification and recon to mission complete. This helps us understand and combat bad actors, ransomware, and others.
Intruder selects target, researches it, and attempts to identify vulnerabilities in the target network. Some things attackers use and look for:
Whois
Target IP Ranges
Web Properties, Domains & Subdomains
Open Cloud Buckets
Google dorking
Initial Compromise 📬 - 3/9
Attacker compromises a vulnerable host. This may be a DMZ host or something in a higher security group via email phish. This is the first step into a network and why security people always say:
Don't click email links!
Don't open email attachments!