exploiting twitter with tinfoleak for investigative purposes vicente aguilera...

27
www.isecauditors.com Exploiting Twitter with Tinfoleak for investigative purposes Vicente Aguilera Díaz @VAguileraDiaz #SHA2017 Scoutinglandgoed Zeewolde The Netherlands 08/08/2017

Upload: others

Post on 30-May-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Exploiting Twitter with Tinfoleak for investigative purposes Vicente Aguilera …vicenteaguileradiaz.com/pdf/SHA2017-Exploiting_Twitter... · 2017-09-09 · Exploiting Twitter with

www.isecauditors.com

Exploiting Twitter with Tinfoleak for investigative purposes

Vicente Aguilera Díaz @VAguileraDiaz

#SHA2017 Scoutinglandgoed Zeewolde The Netherlands 08/08/2017

Page 2: Exploiting Twitter with Tinfoleak for investigative purposes Vicente Aguilera …vicenteaguileradiaz.com/pdf/SHA2017-Exploiting_Twitter... · 2017-09-09 · Exploiting Twitter with

© Internet Security Auditors 2

Agenda1. Tinfoleak

1.1 Why? Why Twitter?

1.2 Can you help me?

1.3 Nice to meet you!

1.4 Please, show me your power...

1.5 Action!

2. References

Agenda1. Tinfoleak

1.1 Why? Why Twitter?

1.2 Can you help me?

1.3 Nice to meet you!

1.4 Please, show me your power...

1.5 Action!

2. References

SHA2017 - #tinfoleak

Page 3: Exploiting Twitter with Tinfoleak for investigative purposes Vicente Aguilera …vicenteaguileradiaz.com/pdf/SHA2017-Exploiting_Twitter... · 2017-09-09 · Exploiting Twitter with

© Internet Security Auditors 3

1. Tinfoleak 1.1 Why? Why Twitter? 1. Tinfoleak 1.1 Why? Why Twitter?

SHA2017 - #tinfoleak

Page 4: Exploiting Twitter with Tinfoleak for investigative purposes Vicente Aguilera …vicenteaguileradiaz.com/pdf/SHA2017-Exploiting_Twitter... · 2017-09-09 · Exploiting Twitter with

© Internet Security Auditors 4

SHA2017 - #tinfoleak

Page 5: Exploiting Twitter with Tinfoleak for investigative purposes Vicente Aguilera …vicenteaguileradiaz.com/pdf/SHA2017-Exploiting_Twitter... · 2017-09-09 · Exploiting Twitter with

© Internet Security Auditors 5

SHA2017 - #tinfoleak

Page 6: Exploiting Twitter with Tinfoleak for investigative purposes Vicente Aguilera …vicenteaguileradiaz.com/pdf/SHA2017-Exploiting_Twitter... · 2017-09-09 · Exploiting Twitter with

© Internet Security Auditors 6

1. Tinfoleak 1.2 Can you help me? 1. Tinfoleak 1.2 Can you help me?

SHA2017 - #tinfoleak

Page 7: Exploiting Twitter with Tinfoleak for investigative purposes Vicente Aguilera …vicenteaguileradiaz.com/pdf/SHA2017-Exploiting_Twitter... · 2017-09-09 · Exploiting Twitter with

© Internet Security Auditors 7

SHA2017 - #tinfoleak

Target of Analysis

Page 8: Exploiting Twitter with Tinfoleak for investigative purposes Vicente Aguilera …vicenteaguileradiaz.com/pdf/SHA2017-Exploiting_Twitter... · 2017-09-09 · Exploiting Twitter with

© Internet Security Auditors 8

SHA2017 - #tinfoleak

Useful at different levels# Security Forces# Intelligence Analyst# Social Engineer# Pentester# Private Investigator# Journalist# ...

Page 9: Exploiting Twitter with Tinfoleak for investigative purposes Vicente Aguilera …vicenteaguileradiaz.com/pdf/SHA2017-Exploiting_Twitter... · 2017-09-09 · Exploiting Twitter with

© Internet Security Auditors 9

1. Tinfoleak 1.3 Nice to meet you! 1. Tinfoleak 1.3 Nice to meet you!

SHA2017 - #tinfoleak

Page 10: Exploiting Twitter with Tinfoleak for investigative purposes Vicente Aguilera …vicenteaguileradiaz.com/pdf/SHA2017-Exploiting_Twitter... · 2017-09-09 · Exploiting Twitter with

© Internet Security Auditors 10

SHA2017 - #tinfoleak

# Python script# Open Source (CC BY-SA 4.0)# SOCMINT# Data vs Intelligence# Requirements:

# Python# Tweepy# Jinja2# Oauth Tokens

Page 11: Exploiting Twitter with Tinfoleak for investigative purposes Vicente Aguilera …vicenteaguileradiaz.com/pdf/SHA2017-Exploiting_Twitter... · 2017-09-09 · Exploiting Twitter with

© Internet Security Auditors 11

SHA2017 - #tinfoleak

# Included in several Linux distros:

Buscador C.A.IN.E BlackArch

Page 12: Exploiting Twitter with Tinfoleak for investigative purposes Vicente Aguilera …vicenteaguileradiaz.com/pdf/SHA2017-Exploiting_Twitter... · 2017-09-09 · Exploiting Twitter with

© Internet Security Auditors 12

SHA2017 - #tinfoleak

HTMLCSVKML

Page 13: Exploiting Twitter with Tinfoleak for investigative purposes Vicente Aguilera …vicenteaguileradiaz.com/pdf/SHA2017-Exploiting_Twitter... · 2017-09-09 · Exploiting Twitter with

© Internet Security Auditors 13

SHA2017 - #tinfoleak

# v2.1 “SHA2017 Edition” released 08/07/2017# Major changes:

# Global Timeline Analysis# Followers / Friends Analysis# Likes Analysis# Word Frequency Analysis

# Minor changes:# Bugs fixed# Report improvement

Page 14: Exploiting Twitter with Tinfoleak for investigative purposes Vicente Aguilera …vicenteaguileradiaz.com/pdf/SHA2017-Exploiting_Twitter... · 2017-09-09 · Exploiting Twitter with

© Internet Security Auditors 14

1. Tinfoleak 1.4 Please, show me your power 1. Tinfoleak 1.4 Please, show me your power

SHA2017 - #tinfoleak

Page 15: Exploiting Twitter with Tinfoleak for investigative purposes Vicente Aguilera …vicenteaguileradiaz.com/pdf/SHA2017-Exploiting_Twitter... · 2017-09-09 · Exploiting Twitter with

© Internet Security Auditors 15

SHA2017 - #tinfoleak

Page 16: Exploiting Twitter with Tinfoleak for investigative purposes Vicente Aguilera …vicenteaguileradiaz.com/pdf/SHA2017-Exploiting_Twitter... · 2017-09-09 · Exploiting Twitter with

© Internet Security Auditors 16

SHA2017 - #tinfoleak

Page 17: Exploiting Twitter with Tinfoleak for investigative purposes Vicente Aguilera …vicenteaguileradiaz.com/pdf/SHA2017-Exploiting_Twitter... · 2017-09-09 · Exploiting Twitter with

© Internet Security Auditors 17

SHA2017 - #tinfoleak

3 Main Search Types:# About a user

./tinfoleak.py -u <user> …Example: Where is the home of this user?

# About a place./tinfoleak.py --search <LAT,LON,KM> …Example: Which users are in this manifestation?

# About content./tinfoleak.py --search …Example: Who is talking about terrorism?

Page 18: Exploiting Twitter with Tinfoleak for investigative purposes Vicente Aguilera …vicenteaguileradiaz.com/pdf/SHA2017-Exploiting_Twitter... · 2017-09-09 · Exploiting Twitter with

© Internet Security Auditors 18

SHA2017 - #tinfoleak

About a user # Account info # Apps / Devices / Use Frequency# Hashtags / Mentions / Likes# Text / Media / Metadata # Visited Places / Routes / Top locations# Social Networks# Followers / Friends # Conversations

Page 19: Exploiting Twitter with Tinfoleak for investigative purposes Vicente Aguilera …vicenteaguileradiaz.com/pdf/SHA2017-Exploiting_Twitter... · 2017-09-09 · Exploiting Twitter with

© Internet Security Auditors 19

SHA2017 - #tinfoleak

About a place# Hashtags / Mentions# Text / Media / Metadata# Geolocated users# Tagged users

Page 20: Exploiting Twitter with Tinfoleak for investigative purposes Vicente Aguilera …vicenteaguileradiaz.com/pdf/SHA2017-Exploiting_Twitter... · 2017-09-09 · Exploiting Twitter with

© Internet Security Auditors 20

SHA2017 - #tinfoleak

About global timeline# Hashtags / Mentions# Text# Media# Metadata

Page 21: Exploiting Twitter with Tinfoleak for investigative purposes Vicente Aguilera …vicenteaguileradiaz.com/pdf/SHA2017-Exploiting_Twitter... · 2017-09-09 · Exploiting Twitter with

© Internet Security Auditors 21

1. Tinfoleak 1.5 Action! 1. Tinfoleak 1.5 Action!

SHA2017 - #tinfoleak

Page 22: Exploiting Twitter with Tinfoleak for investigative purposes Vicente Aguilera …vicenteaguileradiaz.com/pdf/SHA2017-Exploiting_Twitter... · 2017-09-09 · Exploiting Twitter with

© Internet Security Auditors 22

SHA2017 - #tinfoleak

Live Demo

Page 23: Exploiting Twitter with Tinfoleak for investigative purposes Vicente Aguilera …vicenteaguileradiaz.com/pdf/SHA2017-Exploiting_Twitter... · 2017-09-09 · Exploiting Twitter with

© Internet Security Auditors 23

2. References 2. References

SHA2017 - #tinfoleak

Page 24: Exploiting Twitter with Tinfoleak for investigative purposes Vicente Aguilera …vicenteaguileradiaz.com/pdf/SHA2017-Exploiting_Twitter... · 2017-09-09 · Exploiting Twitter with

© Internet Security Auditors 24

SHA2017 - #tinfoleak

# Tinfoleak www.isecauditors.com/herramientas-tinfoleakwww.vicenteaguileradiaz.com/tools

# Buscadorhttps://inteltechniques.com/buscador/

# C.A.IN.Ehttp://www.caine-live.net/

# BlackArchhttp://blackarch.org/

Page 25: Exploiting Twitter with Tinfoleak for investigative purposes Vicente Aguilera …vicenteaguileradiaz.com/pdf/SHA2017-Exploiting_Twitter... · 2017-09-09 · Exploiting Twitter with

© Internet Security Auditors 25

SHA2017 - #tinfoleak

# Tweepy – Python library for accessing the Twitter APIwww.tweepy.org

# Jinja2 – Python template enginejinja.pocoo.org

# Oauth – Authorization frameworkoauth.net

Page 26: Exploiting Twitter with Tinfoleak for investigative purposes Vicente Aguilera …vicenteaguileradiaz.com/pdf/SHA2017-Exploiting_Twitter... · 2017-09-09 · Exploiting Twitter with

© Internet Security Auditors

Thanks for your time!

?

Thanks for your time!

?

Page 27: Exploiting Twitter with Tinfoleak for investigative purposes Vicente Aguilera …vicenteaguileradiaz.com/pdf/SHA2017-Exploiting_Twitter... · 2017-09-09 · Exploiting Twitter with

C. Santander, 101. Edif. A. 2º E-08030 Barcelona (Spain) Tel.: +34 93 305 13 18 Fax: +34 93 278 22 48

C. Arequipa, 1 E-28043 Madrid (Spain)Tel.: +34 91 763 40 47 Fax: +34 91 382 03 96

[email protected]

Calle 90 # 12-28. Bogotá (Colombia)Tel: +57 (1) 638 68 88Fax: +57 (1) 638 68 88

Su Seguridad es Nuestro Éxito

C. Santander, 101. Edif. A. 2º E-08030 Barcelona (Spain) Tel.: +34 93 305 13 18 Fax: +34 93 278 22 48

C. Arequipa, 1 E-28043 Madrid (Spain)Tel.: +34 91 763 40 47 Fax: +34 91 382 03 96

Calle 90 # 12-28. Bogotá (Colombia)Tel: +57 (1) 638 68 88Fax: +57 (1) 638 68 88

[email protected]