1 / 21

Maltego ® -- a New Threat of Privacy Disclosure

Maltego ® -- a New Threat of Privacy Disclosure. Jingjing Gao Department of Computer Science and Engineering April 16 th ,2014. Outline. Introduction of Maltego ® Maltego ® in Information Warfare Threats caused by Maltego ® Accountability. Introduction of Maltego ® .

nico
Download Presentation

Maltego ® -- a New Threat of Privacy Disclosure

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Maltego® -- a New Threat of Privacy Disclosure JingjingGao Department of Computer Science and Engineering April 16th,2014

  2. Outline Introduction of Maltego® Maltego® in Information Warfare Threats caused by Maltego® Accountability

  3. Introduction of Maltego® Maltego® is a kind of software which gathers open sources information online and analyzes them intellectually with an outcome of a graphical way.

  4. Introduction of Maltego® Gathering a bunch of data with regard to: People Groups of people (social networks) Companies Organizations Web sites Internet infrastructure such as: Domains, DNS names, Netblocks and IP address. Affiliations Documents and files

  5. Outline Introduction of Maltego® Maltego® in Information Warfare Threats caused by Maltego® Accountability

  6. Maltego® in Information Warfare National Security Defensive Operation Commercial Competitive Application Social Engineering and Forensic Application toward Individuals

  7. Maltego® in Information Warfare National Security Defensive Operation “Who is tweeting from NSA’s parking lot?” [1] • Figure 1: Twitter[2]

  8. Maltego® in Information Warfare Commercial Competitive Application • Figure 2. Graph of BOA Location[3] Figure 3. Graph of BOA Department[3]

  9. Maltego® in Information Warfare Social Engineering and Forensic Application toward Individuals Provide context for social Engineering e.g. the language the target person use. Forensic application Show internal relations between different persons and different organizaitons.

  10. Outline Introduction of Maltego® Maltego® in Information Warfare Threats caused by Maltego® Accountability

  11. Threats Result from Maltego® Violation of Privacy Reliability of Maltego® as a Forensic Application

  12. Threats Result from Maltego® Violation of Privacy

  13. Threats Result from Maltego® Violation of Privacy

  14. Threats Result from Maltego® Violation of Privacy Easy and convenient for malicious social engineering attack, e.g. Phishing Emails, account guessing Open type Mailing lists are vulnerable target’s interests, concerns

  15. Threats Result from Maltego® Reliability of Maltego® as a Forensic Application Unreliable Twitter Geo-location Mislead

  16. Threats Result from Maltego® Reliability of Maltego® as a Forensic Application Unreliable Twitter Geo-location Various of app especially for Android system Not authorized officially

  17. Threats Result from Maltego® Reliability of Maltego® as a Forensic Application Mislead

  18. Outline Introduction of Maltego® Maltego® in Information Warfare Threats caused by Maltego® Accountability

  19. Accountability Government and Organization Accountability Need new regulations for collections of integrated personal information Specify the usage of different part of personal information Appeal to whole society to protect privacy Individual Accountability Be aware of innocuous information may lead to privacy disclosure Pay attention to privacy settings of the app in your smart phone and PC Form good use habit e.g. When leave the local wifi connection, click “forget this network”

  20. References [1] Jeremy Kirk, (2014, March 11), “Who is tweeting from NSA’s parking lot?” Computer World, [Online],Available:http://www.computerworld.com/s/article/9232476/Who_is_tweeting_from_the_NSA_39_s_parking_lot [2] video-gillen-twitter-articleLarge.jpg, https://www.google.com/search?q=twitter&espv=2&es_sm=93&source=lnms&tbm=isch&sa=X&ei=mLlOU_2zHYq-sQS7poLgCQ&ved=0CAkQ_AUoAg&biw=1366&bih=600#facrc=_&imgdii=_&imgrc=pZeQN_7zq2lhOM%253A%3BUIvMeomJTRpZYM%3Bhttp%253A%252F%252Fgraphics8.nytimes.com%252Fimages%252F2013%252F10%252F28%252Fbusiness%252Fvideo-gillen-twitter%252Fvideo-gillen-twitter-articleLarge.jpg%3Bhttp%253A%252F%252Fwww.nytimes.com%252F2013%252F11%252F07%252Ftechnology%252Ftwitter-prices-ipo-at-26-a-share.html%3B600%3B338 [3] Csitech, (2014, March 8),“Mapping Corporate infrastructure with open source data”, CSITECH, [Online], Available: http://www.csitech.co.uk/mapping-corporate-infrastructure-with-open-source-data/

  21. Thank You!

More Related