Chapter 19 Quiz: OSINT & Reconnaissance¶
Test your knowledge of open-source intelligence techniques, passive reconnaissance, analyst OPSEC, and attribution methods.
Questions¶
1. An analyst wants to find all subdomains of target.com that have appeared in public TLS certificates without sending any packets to target.com's infrastructure. Which resource should they query?
- A) Shodan
- B) Certificate Transparency logs (e.g., crt.sh)
- C) Censys full-text search
- D) VirusTotal passive DNS
Answer
B — Certificate Transparency logs (e.g., crt.sh)
Certificate Transparency (CT) logs are publicly append-only logs of all TLS certificates issued by participating CAs. Querying crt.sh or similar CT log aggregators reveals every certificate issued for a domain, including wildcard certs and subdomains, without any interaction with the target. This is a critical passive recon technique for attack surface mapping.
2. A threat intelligence analyst is building an attribution case for a suspected nation-state intrusion. They find that two separate malware samples — one from this intrusion and one from a known APT — share an identical mutex name and custom XOR key. What type of OSINT-supported evidence does this represent?
- A) Tactical attribution based on geolocation of C2 servers
- B) Behavioral / code-level overlap that supports clustering samples to the same threat actor
- C) Strategic attribution based on geopolitical targeting patterns
- D) Victimology overlap
Answer
B — Behavioral / code-level overlap that supports clustering samples to the same threat actor
Shared implementation details — mutex names, encryption keys, string formatting, code structure — represent strong technical indicators for clustering malware families and attributing them to the same development team. This is a higher-confidence attribution signal than infrastructure overlap (IPs/domains change) or victimology (multiple actors may target the same sector).
3. Which Google dork would be most effective for finding publicly exposed login portals for a specific organization's remote access VPN?
- A)
inurl:vpn site:target.com filetype:pdf - B)
site:target.com inurl:login OR inurl:remote-access OR intitle:"SSL VPN" - C)
link:target.com vpn - D)
cache:target.com/vpn
Answer
B — site:target.com inurl:login OR inurl:remote-access OR intitle:"SSL VPN"
Google dorking uses advanced search operators to find specific content. site: restricts results to the target domain, inurl: matches URL path strings, and intitle: matches page titles. Combining these targets login pages and VPN portals indexed by Google — common OSINT reconnaissance to identify externally facing authentication surfaces before active scanning.
4. When performing OSINT against a threat actor's infrastructure, an analyst accesses a suspected C2 IP address directly from their corporate workstation. What OPSEC risk does this create?
- A) No risk — passive OSINT from a workstation is always safe
- B) The analyst's corporate IP is logged by the threat actor, potentially alerting them to the investigation and burning analyst tradecraft
- C) The threat actor's malware may be automatically deployed to the analyst's system
- D) Corporate firewall logs will be deleted
Answer
B — The analyst's corporate IP is logged by the threat actor, potentially alerting them to the investigation and burning analyst tradecraft
Directly visiting threat actor infrastructure from a corporate or personal IP reveals the investigator's identity and organization. Sophisticated threat actors monitor access logs to their C2 infrastructure. Analysts must use anonymization infrastructure (VPNs, Tor, cloud-based analysis VMs with ephemeral IPs) for all active OSINT collection against adversary-controlled resources.
5. Shodan is best described as which type of OSINT resource?
- A) A dark web marketplace monitor
- B) A search engine that indexes internet-connected devices by crawling and banner-grabbing exposed services
- C) A social media aggregation platform
- D) A passive DNS resolution service
Answer
B — A search engine that indexes internet-connected devices by crawling and banner-grabbing exposed services
Shodan continuously scans the internet and stores service banners (SSH versions, HTTP headers, SSL certificates, ICS/SCADA protocol responses) from every reachable port on every public IP. Analysts use it to find exposed services, identify software versions, locate specific devices (cameras, PLCs, routers), and map an organization's attack surface without directly probing the target.
6. DNS enumeration during passive reconnaissance reveals mail.target.com → 203.0.113.42 and autodiscover.target.com → 203.0.113.42. What does this information allow an attacker to infer?
- A) The organization uses a cloud-only email provider with no on-premises systems
- B) The mail server and autodiscover service share the same IP, revealing a mail infrastructure host that may run Exchange or similar — a high-value target for credential harvesting and privilege escalation
- C) The organization has two separate data centers
- D) The DNS zone transfer is enabled and the full zone can be retrieved
Answer
B — The mail server and autodiscover service share the same IP, revealing a mail infrastructure host that may run Exchange or similar — a high-value target for credential harvesting and privilege escalation
autodiscover is a Microsoft Exchange service discovery endpoint. Co-located with the mail server, it strongly suggests on-premises Exchange — historically one of the most exploited enterprise services (ProxyLogon, ProxyShell). This DNS information narrows the attack surface to a specific high-value host and technology stack.
7. The OSINT Framework (osintframework.com) organizes OSINT sources into a taxonomy. Under which top-level category would you find resources for investigating a target individual's professional background, employment history, and technical skills?
- A) Domain Name
- B) People Search Engines
- C) Social Networks / Professional (LinkedIn-type resources)
- D) Geolocation Tools
Answer
C — Social Networks / Professional (LinkedIn-type resources)
The OSINT Framework categorizes professional networking sites (LinkedIn, Xing, GitHub profiles) under social networks, specifically professional/business networks. These sources reveal organizational hierarchy, employee names and roles, technical skill stacks, and project history — all valuable for spear-phishing pretexts and targeting specific insiders during a social engineering campaign.
8. An analyst uses amass enum -passive -d target.com to enumerate subdomains. What makes this command "passive" and what are its limitations compared to active enumeration?
- A) It is passive because it uses UDP only; limitation is speed
- B) It is passive because it queries third-party data sources (CT logs, DNS datasets, APIs) without sending queries directly to target.com's DNS servers; limitation is it may miss recently created subdomains not yet in third-party indexes
- C) It is passive because it only resolves A records; limitation is it misses CNAME chains
- D) It is passive because it runs without root privileges; limitation is reduced accuracy
Answer
B — It is passive because it queries third-party data sources (CT logs, DNS datasets, APIs) without sending queries directly to target.com's DNS servers; limitation is it may miss recently created subdomains not yet in third-party indexes
Passive enumeration with tools like Amass queries external intelligence sources — Censys, Shodan, VirusTotal, CT logs, DNS dumpster — without generating DNS traffic that the target could log. The trade-off is temporal lag: newly created subdomains may not appear in third-party indexes for hours to days, and internal/split-horizon DNS entries are never visible passively.
9. Which of the following represents the primary "data aggregation risk" in OSINT that Chapter 19 specifically highlights?
- A) OSINT databases may contain inaccurate information
- B) Individual pieces of benign public data, when combined, can reveal sensitive information that none of the individual pieces would expose on their own
- C) OSINT collection is always illegal without a court order
- D) Public data sources may be taken offline without notice
Answer
B — Individual pieces of benign public data, when combined, can reveal sensitive information that none of the individual pieces would expose on their own
Data aggregation is a core privacy and security concern: a person's name is public, their employer is public, their neighborhood is public, their commute time is public — but combining these creates a detailed profile enabling physical surveillance, targeted phishing, or identity theft. This is why OSINT-based reconnaissance is so powerful and why minimizing public data exposure is important for high-risk individuals.
10. When attributing a cyber intrusion using OSINT, what does "attribution confidence level" describe, and why is high confidence attribution rare?
- A) The percentage of malware samples recovered from the intrusion
- B) A qualitative or quantitative assessment of certainty that a specific actor is responsible, which is rarely high because adversaries deliberately use false flags, shared tooling, and attribution-obfuscating infrastructure
- C) The number of OSINT sources consulted during the investigation
- D) Whether the attribution has been confirmed by law enforcement
Answer
B — A qualitative or quantitative assessment of certainty that a specific actor is responsible, which is rarely high because adversaries deliberately use false flags, shared tooling, and attribution-obfuscating infrastructure
Attribution confidence accounts for the possibility that indicators were planted, that tools were shared or leaked (as happened with CIA tools via the Shadow Brokers), or that infrastructure was rented from bulletproof hosting used by multiple actors. Intelligence agencies use structured confidence levels (e.g., "high/medium/low" or "with high confidence") specifically to communicate uncertainty — premature high-confidence attribution has historically caused geopolitical incidents.
Scoring¶
| Score | Performance |
|---|---|
| 9–10 | Expert — OSINT and reconnaissance concepts fully internalized |
| 7–8 | Proficient — Ready to conduct structured OSINT investigations |
| 5–6 | Developing — Review Chapter 19 passive recon techniques and analyst OPSEC sections |
| <5 | Foundational — Re-read Chapter 19 before proceeding |
Return to Chapter 19 | Next: Chapter 20