Prevention to Sensitive Information Disclosure via OSINT
DOI:
https://doi.org/10.32628/IJSRSET218317Keywords:
OSINT, Open source Intelligence, Reconnaissance, Recon ReportAbstract
This paper describes OSINT Tools and Approaches to find out sensitive information of any organization's Web Application or network. The paper contains the steps for gathering information and how to secure the web application, organization or network. There are many automated and paid tools available for vulnerability finding and penetration testing. In this paper we are performing recon with the help of OSINT to gather information and give the solution, before an attacker uses this vulnerability and exploits it. Nowadays lot many vulnerabilities are on the web application. I already learned the many cases in the security programs, where a Sensitive data leakage was happening on many reputed websites. So I will start to find out a web-application in which such types of information’s are disclosed, the Problem was that if we find out such information leaking like credentials, Token, API key we can easily get authorization to admins/users account. I found a lot many well-known websites where we can easily use this sensitive data. To perform such kind of attack you just need to perform reconnaissance with the help of various open source tools available on internet.
References
- Annie ahuja, “Open source intelligence: An intelligence sustenance,” in International Journal of Recent Trends in Engineering & Research, volume 04, Issue 04; Apr- 2018 [ISSN: 2455-1457]
- Béla Genge and Calin Enachescu,”shoVAT: shodan-based vulnerability assessment tool for internet-facing services” in Willey online library. (May 2015), DOI: 10.1002/sec.1262
- Xiaokui Shu and Danfeng Yao “Privacy preserving detection of sensitive data exposure” in IEEE transactions on information forensics and security, volume 10, May 2015
- Jacob Hedges, “closing gap between data and open source intelligence” in ieworldconference, 2 May 2019.
- J. pastor-galindo, “The not yet exploited goldmine of OSINT” in IEEE Access, volume 8, Jan 2020.
- Maurice Dawson “Open Source Intelligence: Performing Data Mining and Link Analysis to Track Terrorist Activities” in Information Technology - New Generations (pp.159-163), July 2017, DOI:10.1007/978-3-319-54978-1_22
- Ashleigh Powell, “Social Media data in digital forensic investigation” in book digital forensic education (pp.281-303), Jan 2020 DOI:10.1007/978-3-030-23547-5_14
- Aishwarya baby “A literature survey on data leak detection and prevention method” in International Journal of Advanced Research in Computer Science, Volume 8, No. 5, May-June 2017
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.