Kuboid
Open Luck·Kuboid.in

Open Source Intelligence: A Quickstart Guide

DEFCONConference3,527 views15:43over 1 year ago

This talk provides a foundational overview of Open Source Intelligence (OSINT) techniques for gathering actionable information on targets without direct interaction. It demonstrates how to leverage public social media, search engines, and specialized tools to map physical locations, identify infrastructure, and perform reconnaissance. The presentation highlights the risks of oversharing information online and how such data can be used for social engineering or physical security assessments.

Stop Ignoring the Physical Footprint in Your Digital Recon

TLDR: Most reconnaissance focuses on subdomains and cloud buckets, but physical infrastructure often leaks the most sensitive data. By combining floor plans, HVAC schematics, and Wi-Fi mapping, you can identify entry points and security blind spots that traditional network scanning misses. This post breaks down how to pivot from digital OSINT to physical site exploitation using publicly available data.

Security researchers often fall into the trap of tunnel vision. We spend hours hunting for misconfigured S3 buckets or forgotten subdomains, yet we ignore the physical reality of the targets we are testing. If you are performing a red team engagement or a physical security assessment, the digital footprint of a building is often more revealing than the network perimeter. A building is just another piece of hardware, and like any other system, it has documentation, schematics, and public-facing management interfaces that are ripe for exploitation.

Mapping the Physical Attack Surface

The most effective way to start a physical assessment is by treating the building as a target in Maltego. You are not looking for open ports here; you are looking for relationships between entities. When you pull data from social media, you are not just looking for employee names. You are looking for photos of badges, office layouts, and server rooms.

Employees love to post photos of their new office space on their first day. These photos are gold mines. They show the layout of the floor, the type of badge readers installed, and the location of security cameras. If you can identify the building, you can often find the floor plans. Many commercial property management companies host these documents online to attract tenants. A simple search query can often yield the exact blueprints you need:

filetype:pdf "floor plan" "basement" site:example.com

Once you have the floor plan, you can identify the "pipe space," mechanical rooms, and emergency exits. These are the areas that are rarely monitored with the same rigor as the front lobby. If you know where the HVAC units are located on the roof, you can infer which rooms they serve. This is critical for physical access. If you need to bypass a locked door, knowing the layout of the ceiling plenum or the location of the nearest fire alarm pull station can save you hours of onsite reconnaissance.

The Power of Wi-Fi and Infrastructure Recon

Wigle is the standard for mapping wireless networks, but it is underutilized in physical security assessments. By looking at the BSSIDs and signal strength of access points in a specific area, you can determine the physical location of networking equipment. If you see a high concentration of access points in a specific corner of a building, that is likely where the main distribution frame or a server closet is located.

Cross-referencing this with Shodan allows you to identify the hardware behind those signals. If you find a router or a building management system exposed to the internet, you can often determine the manufacturer and model. This gives you a head start on finding known vulnerabilities or default credentials before you even step foot on the property.

Using AI for Geolocation

GeoSpy AI has changed the game for image-based reconnaissance. While it is not perfect, it provides a solid baseline for verifying the location of a target. If you have a photo of a building exterior, you can feed it into the tool to get a coordinate set. Even if the AI is off by a few kilometers, it narrows down the search area significantly.

The real value, however, is in the verification. Once you have a potential location, you can use Google Maps street view to confirm the presence of cameras, the type of locks on the doors, and the number of entry points. If you see a camera pointed at the front door, you know to look for a back entrance or a loading dock. If you see a specific type of badge reader, you can research the OWASP documentation on physical access control vulnerabilities to see if that specific reader is susceptible to replay attacks or cloning.

The Social Engineering Pivot

Physical security is rarely about picking locks. It is about social engineering. When you have the floor plans and the knowledge of the building's layout, you can craft a much more convincing pretext. If you know the name of the property management company and the contact person for the building, you can pose as a contractor or a maintenance worker.

The goal is to get inside the building and gain access to a desk or a conference room. Once you are inside, you can drop a rogue device or simply walk around and take photos of the network jacks. Most people will not question someone who looks like they belong there, especially if you are carrying a ladder or a box of donuts.

Defensive Considerations

Defenders need to realize that their physical security is just as important as their digital security. If you are a security manager, you need to audit what documents are available online. Are your floor plans public? Are your employees posting photos of their badges on LinkedIn?

You should also implement a strict policy on what can be shared on social media. If an employee wants to post a photo of their office, make sure they are not including any sensitive information in the background. And finally, ensure that your physical security team is aware of the digital reconnaissance techniques that are being used against them. If you know what an attacker is looking for, you can make it much harder for them to find it.

Stop treating physical security as a separate silo. The next time you are doing a pentest, take a look at the building itself. You might be surprised at what you find.

Premium Security Audit

We break your app before they do.

Professional penetration testing and vulnerability assessments by the Kuboid Secure Layer team. Securing your infrastructure at every layer.

Get in Touch
Official Security Partner
kuboid.in