Maltego là gì? Link Analysis và Threat Intelligence Chi Tiết

Maltego là powerful data mining tool cho link analysis và threat intelligence. Nó cho phép users visualize relationships giữa entities như domains, IP addresses, emails, people, và organizations. Đây là standard tool trong cybersecurity professional toolkit.

Maltego được phát triển bởi Paterva ( headquartered ở South Africa), nổi tiếng trong penetration testing và OSINT (Open Source Intelligence) communities.

Maltego Use Cases

1. Threat Intelligence

  • Trace threat actors’ infrastructure
  • Map attack campaign infrastructure
  • Track malware distribution networks
  • Correlate IOCs (Indicators of Compromise)

2. Digital Forensics

  • Investigate email impersonation
  • Trace source of attacks
  • Find connections between suspects
  • Map criminal infrastructure

3. Penetration Testing

  • Reconnaissance phase automation
  • Discover external infrastructure
  • Map target organization’s footprint
  • Find relationships between assets

4. OSINT Research

  • Background checks on individuals
  • Corporate due diligence
  • Brand protection research
  • Competitive intelligence

Maltego Editions

EditionPriceFeatures
CommunityFreeLimited transforms, basic graphs, Hub items
Classic~€999/yearFull transforms, bigger graphs, team sharing
XL~€2,499/yearAdvanced transforms, API access, custom transforms
EnterpriseCustomAll features + support + training

Entities trong Maltego

DNS Entities

  • Domain: example.com
  • DNS Name: mail.example.com
  • IP Address: 192.168.1.1
  • MX Record: mail server info
  • NS Record: nameserver info

Contact Entities

  • Email Address: john@example.com
  • Person: Name with possible affiliations
  • Phone Number: Phone records

Web Entities

  • URL: https://example.com/page
  • Website: Domain with web presence
  • Link: URL relationships

Infrastructure Entities

  • AS Number: Autonomous System
  • Netblock: IP range
  • Location: Geographic location
  • Company: Business entity

Transforms trong Maltego

Transforms là operations that take an entity và discover related entities. Maltego has hundreds of transforms từ built-in sources và community Hub.

Built-in Transforms

TransformFunction
To DNS Name → DNS Name → MXFind mail servers for domain
To Domain → To WebsiteFind associated websites
To Person → To Email AddressesFind person’s email addresses
To IP Address → To CityGeolocate IP address
To Domain → To RegistrantFind domain registration info

Popular Hub Transforms

  • Shodan: Find设备 exposed on internet
  • Have I Been Pwned: Check if email in breaches
  • VirusTotal: Scan and research IOCs
  • Hunter.io: Find email addresses by company
  • Fullcontact: Person enrichment

Sử Dụng Maltego – Examples

1. Investigate a Domain

  • Drop Domain entity for target.com
  • Run “To DNS Name” transform → find subdomains
  • Run “To Website” transform → find web servers
  • Run “To Registrant” transform → find registration details
  • Run “To MX” transform → find mail servers
  • Continue expanding relationships

2. Track Threat Actor Infrastructure

  • Start with known malicious IP
  • Run “To DNS Name” → find hosted domains
  • Run “To Domain → To Registrant” → find registrant
  • Run “To Email Address → To Person” → find actor’s identity
  • Build comprehensive infrastructure map

3. Email Investigation

  • Start with phishing email address
  • Run “To Person” → find associated name
  • Run “To Phone Numbers” → find linked phones
  • Run “To Domains” → find owned domains
  • Cross-reference với breach databases

Maltego CE (Community Edition) Limitations

LimitationImpact
30 results per transformCan’t see complete datasets
No API accessCan’t automate workflows
Limited transformsMissing many commercial sources
No team sharingCan’t collaborate easily
No persistenceData lost on close (free)

Maltego Trong Security Workflow

Reconnaissance Phase

# Example: Passive reconnaissance for pentest
1. Start with target company domain
2. Discover subdomains (DNS enumeration)
3. Find associated IP ranges
4. Discover email patterns
5. Map employee names to emails
6. Find social media accounts
7. Document findings in graph

Threat Intelligence Investigation

# Example: Investigate malware campaign
1. Start with malicious URL from sandbox
2. Run transforms to discover infrastructure
3. Map all domains hosted on same IP
4. Find registrant details for campaign domains
5. Track historical changes (passive DNS)
6. Correlate with other known campaigns
7. Create IOCs for team

Incident Response

# Example: Investigate phishing attack
1. Extract sender email and domain
2. Find all domains registered by same entity
3. Map infrastructure (IPs, nameservers)
4. Correlate with other phishing campaigns
5. Identify attacker's real identity if possible
6. Create blocks/bounces based on findings

Maltego Alternative Tools

ToolFocusPrice
MaltegoLink analysis, all sources€999+/year
ivreNetwork recon, command-lineFree
CrunchData correlation, OSINTFree
ObsidianPersonal knowledge graphFree (self-hosted)

Advanced Maltego Techniques

Machine Transforms

Machine transforms run automatically across entire graphs, helping discover patterns that manual transforms might miss.

  • Run all transforms on all entities
  • Discover hidden relationships
  • Automate large-scale investigations

Custom Transforms (API)

Create custom transforms using Maltego API to integrate proprietary data sources:

# Example: Create custom transform server
from flask import Flask, jsonify
from maltego_trx.entities import Domain
from maltego_trx.transform import DiscoverableTransform

app = Flask(__name__)

class MyCompanyDomains(DiscoverableTransform):
    @classmethod
    def create_entities(cls, request):
        company = request.Value
        domains = my_company_database.get_domains(company)
        for domain in domains:
            ent = Domain(domain)
            request.responseEntity.addLinkToParents(ent, "owned by")
            request.responseEntity.addEntity(ent)

app.run(port=8080)

Pastebin Hunter

Search Pastebin for leaked credentials, sensitive data. Integrates với Maltego để track leak sources.

# Maltego transform to search Pastebin
# Useful for: breach investigation, credential stuffing detection

1. Start with email address
2. Run transform to search Pastebin for leaks
3. Find all pastes containing that email
4. Analyze leaked data types
5. Correlate with other compromised accounts

Maltego for Defenders

  • Brand monitoring: Track domain squatting, impersonation
  • Supply chain security: Map vendor relationships
  • Attack surface analysis: Discover external-facing assets
  • Fraud investigation: Track scammer infrastructure
  • Due diligence: Research partners/vendors

Privacy và Legal Considerations

Legal Boundaries

  • Only use on systems you have permission for
  • Public data only for OSINT
  • Check terms of service for data sources
  • Don’t use for stalking or harassment

Data Handling

  • Don’t upload sensitive data to cloud services
  • Encrypt findings at rest
  • Handle PII carefully
  • Document data sources for evidentiary value

Kết Luận

Maltego là powerful link analysis tool essential for cybersecurity professionals. Nó excels at visualizing complex relationships between entities, making it invaluable for threat intelligence, forensics, và OSINT research.

While Community Edition có limitations, it’s still powerful enough for many use cases. For advanced needs, Classic hoặc XL editions provide access to more transforms và API capabilities.

Các Câu Hỏi Thường Gặp (FAQ)

1. Maltego có miễn phí không?

2. Tôi cần bao lâu để học Maltego?

3. Maltego dùng trong pentesting như thế nào?

4. Alternative nào cho Maltego?

5. Maltego có thể automate được không?

Chào các bạn mình là Quốc Hùng , mình sinh ra thuộc cung song tử ,song tử luôn khẳng định chính mình ,luôn luôn phấn đấu vượt lên phía trước ,mình sinh ra và lớn lên tại vùng đất võ cổ truyền ,đam mê của mình là coder ,ngày đi học tối về viết blog ...