Maltego
The OSINT Tool
Cyber Threat
Intelligence
A Practical Lab Manual- III
Performer:
CTI Analyst
Name Sheraz Hussain
Domain Cyber Threat Intelligence
Mail ID [email protected]
LinkedIn URL https://www.linkedin.com/in/sherazbaloch
Supervisor:
Instructor and Course
Prof. Naveed Naeem Abbas
Instructor
Cyber Threat Intelligence
Domain
https://www.linkedin.com/in/naveednaeemabbas
Instructor LinkedIn
https://www.linkedin.com/in/sherazbaloch
Cyber Threat Intelligence
Passive Reconnaissance
Table of Contents
❖ Maltego Overview
❖ Lab Objectives
❖ Lab Environment
❖ Reconnaissance Techniques
-> Domain Investigation
-> Email & Social Enumeration
-> Threat Actor Profiling
-> Real-World Scenario
❖ Conclusion
2
https://www.linkedin.com/in/sherazbaloch
🛡️ Maltego Overview
Maltego is a widely used tool in Cyber Threat Intelligence (CTI)
and Open-Source Intelligence (OSINT) for performing visual
reconnaissance and mapping relationships between public data. It
is particularly effective in discovering domain links, emails, IP
addresses, and infrastructure with minimal effort.
📌 Key Features of Maltego
● Visual link analysis for mapping relationships
● 200+ built-in transforms for OSINT (DNS, WHOIS, social media,
etc.)
● Integration with platforms like Shodan, VirusTotal, and
HaveIBeenPwned
● Custom entity creation and flexible export options
● Cross-platform support (Windows, Linux, macOS)
3
https://www.linkedin.com/in/sherazbaloch
🎯 Lab Objectives
● Explore and use Maltego for passive OSINT
reconnaissance.
● Visualize links between domains, emails, and infrastructure.
● Gather actionable intelligence from public sources.
● Apply transforms and generate investigation reports.
🖥️ Lab Environment
● Host Machine: Kali Linux / Windows
● Tool Used: Maltego Community Edition (CE)
● Target: Public domains and threat infrastructure (ethical
scope)
4
https://www.linkedin.com/in/sherazbaloch
⚙️ Maltego Installation & Configuratio n
Installation Process
Step 1: Install Maltego on Kali Linux
sudo dpkg -i Maltego.v4.9.2.deb
Step 2: Activate Maltego ID
● Register with institutional email (e.g.,
@student23317.au.edu.pk)
● Select Community Edition (CE)
Step 3: Configure Data Sources
● Enable integrations: VirusTotal, Shodan, WHOIS
5
https://www.linkedin.com/in/sherazbaloch
🔍 Reconnaissance Techniques
1.Domain Investigation
📌 Target: www.certifiedhacker.com
📌 Performed transforms from Domain → IP → DNS →
Website
📌 Identified subdomains: ftp.certifiedhacker.com,
mail.certifiedhacker.com
6
https://www.linkedin.com/in/sherazbaloch
📌 Geolocated IP address to Provo, United States
📌 Cross-referenced results with WHOIS
7
https://www.linkedin.com/in/sherazbaloch
2. Email & Social Enumeration
📌 Extracted email addresses from domain search
📌 Mapped discovered emails to with relevant ip
8
https://www.linkedin.com/in/sherazbaloch
[email protected]
3. Threat Actor Profiling
📌 Mapped phishing infrastructure including domain, SSL,
and IP
9
https://www.linkedin.com/in/sherazbaloch
📌 Labeled attack patterns using Mail Server
📌 Visual graph exported for reporting (.graphml)
10
https://www.linkedin.com/in/sherazbaloch
🚀 Real-World Scenario
● Investigated ransomware domain: evilcorp.xyz
● Found malicious hashes, IPs, and C2 references
● Blocked malicious IPs and flagged employee
emails for awareness
🏁 Conclusion
This lab demonstrated Maltego’s ability to:
● Map digital footprints and threat infrastructure
● Gather passive intelligence from public sources
● Aid cybersecurity operations through visual CTI
techniques
11