- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
IDG News Service - From Google Maps, the U.S. National Security Agency's parking lot has a larger footprint than the building itself. And for the high secrecy surrounding what goes on inside, there is plenty of information flowing just outside.
In a demonstration on Wednesday at the Breakpoint security conference, Roelof Temmingh, who founded the company Paterva, showed how his company's application, called Maltego, can scoop up scattered online clues, quickly providing an insightful picture of individuals or organizations.
What Maltego does is quickly and succinctly draws on public data sources to put together a graphical digital footprint. Temmingh and four people developed Maltego, a made-up name with no special meaning, from a converted 105-year-old barn in South Africa.
Before his demonstration, Temmingh stressed that all of the information collected by Maltego is from public sources.
"No controls were broken to get to the information that we got," he said. "This is the information that's out there on the net. We just kind of put it together in a nice way."
Maltego is highly efficient at quickly assembling digital crumbs and linking those pieces together, which would be tedious work otherwise. Temmingh used Maltego to search Twitter with coordinates for the vicinity of the NSA's parking lot. Twitter is capable of labeling messages with geo-location data, which then can be searched, although Twitter's geo-location API (application programming interface) isn't that accurate.
Maltego pulled up a web of scattered tweets in Maltego. He picked out one person. First, he said it is prudent to check if the Twitter messages from a particular person actually fit in context of them being in certain place. For the person he chose, it appeared the person lived or worked in the area.
Then Maltego combed social networking sites, checking sources such as Facebook, MySpace and LinkedIn. An identical photo linked the person's Facebook and MySpace page. From there, Maltego spotted more information. After a day of searching, Maltego discovered the person's email address, date of birth, travel history, employment and education history.
"This is about a day's worth of digging around," Temmingh said. "It's not weeks and weeks."
Other interesting information can come from EXIF (exchangeable image file) data, which is information often embedded in a photograph that can include timestamps and the make and model of the camera or mobile device used to take a photo. The photos can be pulled from social networking sites.
With all of that information, it would be easy for an attacker to target the person with a convincing email, asking the person to click on a link causing malicious software to be downloaded to their computer.
When used to analyze large organizations, Maltego makes it much easier to create detailed graphics of, for example, how a company's network is structured, the addresses of mail servers, IP address blocks and what providers support their internet connectivity. It shines a light on an organization's "attack surface," a term used describe the potential weaknesses in a network.