From the course: Deep Dive into Open-Source Intelligence
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Introduction to sources of OSINT
From the course: Deep Dive into Open-Source Intelligence
Introduction to sources of OSINT
- [Narrator] Let's do a little exercise. I want you to pause this video, put on your ethical hacker hat, and write down a few places you'd go to gather intel on a target. This should take about a minute or so. Welcome back. What did you write down? When I did the exercise, I wrote down Google, LinkedIn, the target's website, and Twitter, but you'll likely have your own unique list. There's no right answer to where you find information, as OSINT is a mix of art and science. After years of performing offensive security engagements, I still get surprised by new sources and ways to get intel on a target. Some of the sources I've used in the past that worked well for me are things like forums, classifieds, and blog posts. These types of sources take time to go through, but you can get a really intimate understanding of your target. And honestly, if you're doing offensive security engagements, your stakeholder will often be…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
OSINT overview2m 38s
-
Understanding the value of OSINT2m 23s
-
(Locked)
Introduction to passive reconnaissance3m 8s
-
(Locked)
Introduction to active reconnaissance2m 39s
-
(Locked)
Pros and cons of active and passive reconnaissance2m 26s
-
(Locked)
Introduction to sources of OSINT4m 39s
-
(Locked)
Introduction to VPN and anonymizers2m 49s
-
-
-
-
-