1. Home
  2. Training Library
  3. 2. Reconnaissance

How To: Maltego

Developed with
QA

Contents

keyboard_tab
Cyber Primer Online Learning
1
Reconnaissance
PREVIEW9m 29s

The course is part of this learning path

Cyber Primer
course-steps
5
description
1
play-arrow
Start course
Overview
DifficultyBeginner
Duration19m
Students161
Ratings
5/5
starstarstarstarstar

Description

Course Description

This module will introduce some techniques used for reconnaissance and social engineering. The software simulations introduce some of the methods and software that can be used in reconnaissance.

  • Reconnaissance 
  • Social Engineering
  • Twitter Profiling  
  • Google Hacking  
  • Maltego  

Intended Audience  

Although perceived as an IT issue, cyber security is, in fact, a subject relevant to all business units. Cyber Primer is aimed at anyone with an interest in cyber security, whether they are looking to pursue a career as a penetration tester, or just want to get a feel for the world of cyber security.

Prerequisites

There are no prerequisites for this course, however, participants are expected to have a basic understanding of computers and the internet.

Feedback 

We welcome all feedback and suggestions - please contact us at qa.elearningadmin@qa.com to let us know what you think.

Transcript

 In this video we're going to cover some of the basics of using Maltego. Maltego is a program that is used for doing opensource intelligence, also know as OSINT. Let's have a little look at using Maltego. Okay, let's start by launching VirtualBox. We're going to be launching our Kali Linux session. Once inside Kali Linux, we're going to launch our Maltego framework. It comes pre-installed in Kali. Maltego can be launched by opening a terminal and typing Maltego. This will launch a graphical user interface, or GUI application. As it opens and appears, Multigo will require you to put in some credentials in order to use its functionality, but you can create these for free at the Maltego site using a community account. Enter your created credentials, select next, confirm your details. It will install some transforms, select next again, then select finish. We have machines that we can run. Run the machine found on the tabbed menu at the top. We're going to look for footprint level three, that is a very deep footprint, going three levels deep on a domain. Select the footprint level three and proceed by selecting next. You will provide a domain name for this to work. Here I'm just going to provide example.com. As it begins, the machine will tell you about restricted results. This is simply because you are using the community addition. Disregard this and select the triple dot button. You will have a window regarding the name server records. You can press next, confirming them and then another window also will ask you about relevant domains. You can select proceed with these. What you should see in your screen is a graph beginning to be built of the various connections between these domains and name servers. Going foreword, the graph will become more and more complex. Let's zoom out. We can see that there are far more connections to example.com. If we scroll down a little, we see example.com seems to be a website held and managed by I-A-N-A. If this graph is too busy for you, what we can do is we can put it in list view. Displaying the information in this manner makes picking out the type of information that we have to us on the graph easier to see, as it separates it into a list. Looking for things, such as net blocks becomes easier to find. You could go foreword later and do a Twitter Digger X that will work to analyze retweets of an individual. However, in order to do so, you will have to provide a Twitter account, so having a temporary, or burner Twitter account may be important and that's a bit of Maltego.

About the Author
Students529
Courses5
Learning paths1

Originating from a systems administration/network architecture career, a solid part of his career building networks for educational institutes. With security being a mainstay his implementation he grew a strong passion for everything cyber orientated especially social engineering. The educational experience led to him mentoring young women in IT, helping them to begin a cyber career. He is a recipient of the Cisco global cyber security scholarship. A CCNA Cyber Ops holder and elected for the CCNP Cyber Ops program.