Search for Leaked Databases using Elastic Search [OSINT]

Search for Leaked Databases using Elastic Search [OSINT]
Search for Leaked Databases using Elastic Search [OSINT]
Search for Leaked Databases using Elastic Search [OSINT]
Search for Leaked Databases using Elastic Search [OSINT]
Search for Leaked Databases using Elastic Search [OSINT]

What is OSINT?

OSINT or open-source intelligence is basically using publicly available sources such as the internet or the newspaper to collect information about an individual or an organization.

Footprinting or Information gathering is a very important phase in any attack scenario in which the hacker gathers information about a target before launching the attack.

The information collected by a hacker could be used in many attack scenarios, such as social engineering or spear-phishing attacks.

OSINT investigation

Example:

The hacker was able to find that John Smith works in XYZ company. After knowing in which company John works, the hacker will then search for the CEO of the company. Once the CEO is found, the hacker will send a spear-phishing email pretending to be the CEO of that company, asking John to send a document or click on a certain link.

Since the email came from an authority figure, John will feel obligated to click on the malicious link the attacker has sent, ending up being hacked.

To learn more about social engineering, check out the Social Engineering: The Science of Human Hacking book by Christopher Hadnagy.

What is Elastic Search?

Elasticsearch is an open-source fully distributed search and analytics engine that is based on Apache Lucene that uses a NoSQL database.

Now, for us to find these public databases, we are going to use Shodan to perform an Elastic search.

Keep in mind, these databases are not intended to be online but a mistake by the owner of the company that made the database online.

What is Shodan?

Shodan  is a search engine that crawls devices connected to the internet such as (printers, webcams, databases, Smart TVs/refrigerators/washing machines, etc…)

Shodan lets the user find specific types of devices (webcams, routers, servers, etc.) connected to the internet using a variety of filters.

IOT

While search engines like Google, Bing, and Yandex index websites, Shodan indexes everything connected to the internet, making it very favorable to hackers.

Here is a video explaining how to find Leaked databases using Elasticsearch:

https://youtu.be/0bu15Qlz4b0

 

Note: Before using ElasticSearch.py, make sure to run the following command on your Linux machine:

pip install nested_lookup

URLs:

Shodan Search Engine: https://www.shodan.io/

ElasticSearch.py: https://bit.ly/3mqRImB

OSINT tool by IntelTechniques: https://bit.ly/3yd1Kdt

 

Leave a Reply

Your email address will not be published. Required fields are marked *