Social Mapper is a new open source intelligence tool that uses facial recognition to correlate social media profiles. The tool has been developed by Trustwave, a company that provides ethical hacking services. Apparently, the tool has already been tested in several penetration tests and red teaming engagements.
Social Mapper “takes an automated approach to searching popular social media sites for names and pictures of individuals to accurately detect and group a person’s presence, outputting the results into a report that a human operator can quickly review”.
What Social Platforms Does Social Mapper Support?
Who Can Use Social Mapper?
The tool is primarily designed for pentesters and red teamers to use it to expand their target lists to counter social media phishing scenarios.
(Red Teaming is a full-scope, multi-layered attack simulation that measures how well a company’s people and networks, applications and physical security controls can withstand an attack from a real-life adversary).
Social Mapper comes in handy because it makes it possible to automate search scans and perform them faster and on a mass scale at once.
“Performing intelligence gathering online is a time-consuming process, it typically starts by attempting to find a person’s online presence on a variety of social media sites,” Trustwave says.
How Does Social Mapper Work?
Shortly said, the tool goes through three main stages. The first stage is where Social Mapper creates the target list which contains names and pictures, based on the particular data input. The data input can be in a CSV file, images in a folder or via people registered to a company on LinkedIn.
The second stage is where the target data is processed and the tool (Read more...)
*** This is a Security Bloggers Network syndicated blog from How to, Technology and PC Security Forum | SensorsTechForum.com authored by Milena Dimitrova. Read the original post at: https://sensorstechforum.com/social-mapper-facial-recognition-users/