Presentation Material
Abstract
Allows to set up periodic scans for defensive purposes
Intelligence on co-relation and identify verification
Maps vulnerabilities as per the identified attack surface
Reverse Image Search Works closely with Facebook, Twitter and Linkedin APIs
Sets up fake identities for investigating cases
Performs automated OSINT on a domain/email/username/phone and find out relevant information from different sources
Useful for pen-testers, cyber investigators, product companies, defensive security professionals, etc
Correlates and collaborate the results, show them in a consolidated manner
Tries to find out credentials, api-keys, tokens, subdomains, domain history, legacy portals, etc. related to the target
Available as single consolidating tool as well as standalone scripts
Available in both GUI and Console
Utilizing various Open Source Intelligence (OSINT) tools and techniques that we have found to be effective, DataSploit brings them all into one place, correlates the raw data captured and gives the user, all the relevant information about the domain/email/ phone number/person, etc. It allows you to collect relevant information about a target which can expand your attack/defence surface very quickly. Sometimes it might even pluck the low hanging fruits for you without even touching the target and give you quick wins. More documentation here: http://datasploit.readthedocs.io/en/latest/
Presented By Shubham Mittal & Nutan Kumar Panda