Search Results for: reconnaissance

U.S. and U.K. Warn of Russian Hackers Exploiting Cisco Router Flaws for Espionage

April 20, 2023 U.K. and U.S. cybersecurity and intelligence agencies have warned of Russian nation-state actors exploiting now-patched flaws in networking equipment from Cisco to conduct reconnaissance and deploy malware against targets. The intrusions, per the authorities, took place in 2021 and targeted a small number of entities in Europe, U.S. government institutions, and about 250 Ukrainian victims. …

U.S. and U.K. Warn of Russian Hackers Exploiting Cisco Router Flaws for Espionage Read More »

What Is Spear Phishing? Examples, Types, Prevention, and More 

What is Spear Phishing and How Can You Prevent It | David Tidmarsh |Ethical Hacking Spear phishing is one of the biggest cybersecurity threats that organizations must know. According to Symantec’s Internet Security Threat Report (ISRT), 65% of threat actors have used spear phishing emails to attack. Deloitte estimates that 91% of successful cyberattacks begin…

The post What Is Spear Phishing? Examples, Types, Prevention, and More  appeared first on Cybersecurity Exchange.

CompTIA PenTest+ (PT0-002)

CompTIA PenTest+ (PT0-002)

CompTIA PenTest+ (PT0-002) Training + Labs + Exam + Practice Exam Infocerts LLP (Official CompTIA ATC) CompTIA PenTest+ is for cybersecurity professionals tasked with penetration testing and vulnerability management. Open the door to your cybersecurity career. We help you gain the core knowledge and skills you need to land a job in cybersecurity, a rapidly …

CompTIA PenTest+ (PT0-002) Read More »

Maryam — Best Info Gathering Framework Ever?

Nowadays Kali Linux repository comes with OWASP Maryam Open-Source Intelligence (OSINT) Framework. Maryam Framework will be very helpful for penetration testers and cybersecurity experts. This is based on Recon-ng and written on Python3. This framework collects informations very intelligently from our given data and gather the informations in a systematic and structured way.

Maryam Kali Linux OSINT tool

What is Maryam

Open-source intelligence (OSINT) uses open source tools to collect information and analyze them for a specific purpose. OSINT can be very helpful for cybersecurity experts to use to garner data about particular organizations.

Today, using Open sources like Bing, Google, Yahoo, etc, for data gathering, are essential steps for reconnaissance, which is a common task. It should be a tool to automate this routine. One of the best tools in this field is ​The OWASP Maryam. The interface of Maryam is is very similar to Recon-ng and Metasploit. If we are familiar with these tools then Maryam will be very easy to use.

Key Features of Maryam

  1. Metasploit like Interface.
  2. Identifying WebApps and WAF.
  3. Extracts Emails, Docs and Subdomains from search engines.
  4. Extracts Links, CSS and JS files, Emails, Keywords from Web Sources.
  5. Extracting DNS, TLD by brute-force.
  6. Crawl Web Pages and search our RegExp.
  7. More upgrading in developing…

Installing Maryam on Kali Linux

As we told that Maryam comes with Kali Linux repository, so we don’t need much effort to install it. We can install it simply using following command:

sudo apt install maryam -y

After putting our sudo password Maryam installing will be start on our system. As we can see in the following screenshot:

installing maryam on kali linux

After the installation process is done, we can check the the tool is running by following command:

maryam

We can see the output of the above command in the following screenshot:

maryam framework

Here we need to run help command to see the the help options of Maryam Framework as we can see in the following screenshot:

maryam help options

It’s interface is seems very similar to Metasploit. Here we can run following command to see the modules:

show modules
modules on maryam

Grabbing Social Media using Maryam

Let’s run this tool. For an example we are running social_nets OSINT module. Before running it we can check it’s help by just entering the module name or <module-name> –help, as we can see the help of social_nets in the following screenshot:

social nets module on maryam

Let’s run this module by following command:

social_nets -q hax4us -e google,yahoo,bing

By using the above command we are trying to discover social media accounts of hax4us (my friend’s brand) on the search results of Google, Yahoo and Bing. We can use more supported search engines here (like Yandex etc).

Now multiple use of this function may be detected by search engines and they will detect the bot and it gives following CAPTCHA errors.

Google captcha errors caused by bot
Google got the bot

Finding Document Files

We can easily find Document files like PDF files, text files etc by using Maryam Open-Source Intelligence Framework, we are going use docs_search module for this, and the command will be like following:

docs_search -q amazon -f pdf -e google,bing,metacrawler

For searching document we had used docs_search module in the above command, and -q flag to set our query, -f flag used to specify file format and -e to specify engines (search engines) to find these files.

And in the following screenshot we can see that we got links of PDF files related to Amazon.

searching files using maryam

DNS Brute Force using Maryam

Let’s have a look how can we Brute Force DNS records using Maryam’s dnsbrute module. To do so we are going to use following command:

dnsbrute -d target.com --thread 10 --wordlist /path/of/wordlist

Crawling Pages using Maryam

Now we are going to use the crawl_pages module to crawl an website (Regex search) for juicy information. To do so we are going to use following command:

crawl_pages -d koushikpal.com -r https?://[A-z0-9./]+

In the following screenshot we can see the output. It scans the website for duplicate information.

crawling websites for regex

Final Words

This is how we can install and use Maryam on our Kali Linux system, we learned basic things we can do with OWASP Maryam OSINT Framework. OWASP Maryam is a modular open-source framework based on OSINT and data gathering. It is designed to provide a robust environment to harvest data from open sources and search engines quickly and thoroughly.

It has a lots of advanced features like we can set proxy, agents and timeout. For more information we can check the official page.

Love our articles? Stay updated with our articles by following us on Twitter and GitHub. Be a part of the KaliLinuxIn community by joining our Telegram Group, where we focus on Linux and Cybersecurity. We’re always available to help in the comment section and read every comment, ensuring a prompt reply.

C|EH Prepares You for Multiple Cybersecurity Jobs and Roles 

C|EH Opens Doors to Multiple Job Roles in Cybersecurity | Ryan Clancy |Ethical Hacking Certified Ethical Hacker (C|EH) is a qualification offered by EC-Council that is considered an entry-level certification in cybersecurity. C|EH training covers a range of topics, from penetration testing to forensic investigations, and can lead to a number of different job roles…

The post C|EH Prepares You for Multiple Cybersecurity Jobs and Roles  appeared first on Cybersecurity Exchange.

Russian Turla Hackers Hijack Decade-Old Malware Infrastructure to Deploy New Backdoors

January 9, 2023 The Russian cyberespionage group known as Turla has been observed piggybacking on attack infrastructure used by a decade-old malware to deliver its own reconnaissance and backdoor tools to targets in Ukraine. Google-owned Mandiant, which is tracking the operation under the uncategorized cluster moniker UNC4210, said the hijacked servers correspond to a variant of …

Russian Turla Hackers Hijack Decade-Old Malware Infrastructure to Deploy New Backdoors Read More »

Researchers Discover Hundreds of Amazon RDS Instances Leaking Users’ Personal Data

November 17, 2022 Hundreds of databases on Amazon Relational Database Service (Amazon RDS) are exposing personal identifiable information (PII), new findings from Mitiga, a cloud incident response company, show. “Leaking PII in this manner provides a potential treasure trove for threat actors – either during the reconnaissance phase of the cyber kill chain or extortionware/ransomware …

Researchers Discover Hundreds of Amazon RDS Instances Leaking Users’ Personal Data Read More »

Certified Ethical Hacker v12 Module 0 : Ethical Hacking Concepts

Certified Ethical Hacker v12 Module 0 : Ethical Hacking Concepts

Introduction Lab Topology Exercise 1 — Information Security and Ethical Hacking Overview Learning Outcomes In this module, you will complete the following exercises: Exercise 1 — Information Security and Ethical Hacking Overview After completing this module, you will have further knowledge of: Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information …

Certified Ethical Hacker v12 Module 0 : Ethical Hacking Concepts Read More »

Pivoting to Access Networks in Penetration Testing 

Pivoting to Access Networks in Penetration Testing | David Tidmarsh |Penetration Testing Penetration testing is the process of simulating a cyberattack against a computer system or network to identify and fix vulnerabilities. Pivoting in penetration testing is a technique in which the ethical hackers—also known as white-hat hackers—simulating the attack can move from one system…

The post Pivoting to Access Networks in Penetration Testing  appeared first on Cybersecurity Exchange.

Open Whatsapp chat
Whatsapp Us
Chat with us for faster replies.