From the course: Deep Dive into Open-Source Intelligence

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Where to go with the OSINT data you collect

Where to go with the OSINT data you collect

From the course: Deep Dive into Open-Source Intelligence

Start my 1-month free trial

Where to go with the OSINT data you collect

- [Michael] We've reached the end of the course. By now you have an understanding of the difference between active and passive reconnaissance, ways of tracking organizations and employees that work there, and some of the tools and methods to gather OSINT from different sources, like social media, web archives, and image metadata. But let's take a step back and look at where OSINT sits in the hacking life cycle. This is the very beginning of an offensive security engagement. What you gather using OSINT isn't necessarily going to get you access or let you complete your objective, It's how you use that information. You might have a targeted objective, like getting a specific C-suite email credential to look for patent information. But most of the security engagements I do involve collecting and looking for the easy way in. Whether that's phishing, physically breaking into a building, or getting information to socially…

Contents