So I responded in another thread where someone posted this link.... I'm not throwing shade at this person or anything but what I want to make clear from my professional opinion is that this doesn't mean that this person has breached their network. I've seen a few things being thrown around saying this was the smoking gun / this person has breached their systems.
What you're looking at is output from a tool(s) used to basically map out relationships between a target and other things. Just because they have endpoints on the internet doesn't mean they are voting machines, or API endpoints for voting data, etc.
This is usually the first step someone would take prior to doing anything... exciting...
That being said - anyone can use OSINT tools to try and corroborate theories. It'd be better if they used the output of this though to get a smoking gun directly from inside their infrastructure...
So I responded in another thread where someone posted this link.... I'm not throwing shade at this person or anything but what I want to make clear from my professional opinion is that this doesn't mean that this person has breached their network. I've seen a few things being thrown around saying this was the smoking gun / this person has breached their systems.
What you're looking at is output from a tool(s) used to basically map out relationships between a target and other things. Just because they have endpoints on the internet doesn't mean they are voting machines, or API endpoints for voting data, etc.
This is usually the first step someone would take prior to doing anything... exciting...
That being said - anyone can use OSINT tools to try and corroborate theories. It'd be better if they used the output of this though to get a smoking gun directly from inside their infrastructure...
TY for insight.