From the course: Deep Dive into Open-Source Intelligence

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Introduction to sources of OSINT

Introduction to sources of OSINT

From the course: Deep Dive into Open-Source Intelligence

Start my 1-month free trial

Introduction to sources of OSINT

- [Narrator] Let's do a little exercise. I want you to pause this video, put on your ethical hacker hat, and write down a few places you'd go to gather intel on a target. This should take about a minute or so. Welcome back. What did you write down? When I did the exercise, I wrote down Google, LinkedIn, the target's website, and Twitter, but you'll likely have your own unique list. There's no right answer to where you find information, as OSINT is a mix of art and science. After years of performing offensive security engagements, I still get surprised by new sources and ways to get intel on a target. Some of the sources I've used in the past that worked well for me are things like forums, classifieds, and blog posts. These types of sources take time to go through, but you can get a really intimate understanding of your target. And honestly, if you're doing offensive security engagements, your stakeholder will often be…

Contents