Video description
If you have ever wondered how somebody is able to find that much information or data about you or your organization, then this is the course for you.
Since Open-Source Intelligence is one of the most crucial phases in any cyberattack, you will find out what the bad guys can learn about you or your company.
Information and data have never been more accessible in human history than today. As good as this sounds, it is also a rabbit hole in which you can easily fall into.
Here is where Open-Source Intelligence or OSINT comes to play. OSINT means many different things to many different people, because of its versatile framework. For most people, it merely means publicly available data from the internet, but it is much more.
In this course, we will go over Open-Source Intelligence from the basics to intermediate things with which you can easily transition yourself into more advanced investigations and upgrade your cybersecurity career.
You will understand what Open-Source Intelligence is and how you can use it to your advantage and protection in a virtual Linux environment. Also, you will learn about exciting tools like theHarvester and Spiderfoot, where to find breach information, what is the structure of the internet, and much more. More often, all that will give you a scare of how much information is exposed on the internet.
Table of Contents
Chapter 1: OSINT Introduction
Course Overview
OSINT Demystification
Open Source Intelligence Cycle
OSINT Threats and Countermeasures
Chapter 2: Environment Preparation
Configuring OSINT Virtual Machine
Configuring OSINT Operating System (Ubuntu)
Chapter 3: Notes and Password Managers
Notes
Password Managers (KeePassXC)
Chapter 4: Search Engines
Google Hacking (Search Operators, exploit-db.com)
Google Custom Search Engine
Google Additional Tips (Google Images, isearchfrom.com, WayBack Machine)
FTP Search
Chapter 5: Social Media Intelligence
Facebook
Twitter
LinkedIn, Pastebin, and Other Social Networks
Sock Puppet
Chapter 6: Email Addresses, Usernames, and Images
Email Addresses, Usernames, and Images
Chapter 7: OSINT and IT Systems
IP Addresses and DNS
IoT Search Engines
Reconnaissance Tools
Chapter 8: Data Breaches and Leaks
Internet Structure
Online Breach Data and Leak Resources
TOR
Chapter 9: Final Thoughts
Conclusion