Submit Search
Upload
OSINT
•
Download as PPTX, PDF
•
0 likes
•
200 views
Avradeep Bhattacharya
Follow
Tools for Open Source INTelligence
Read less
Read more
Technology
Report
Share
Report
Share
1 of 22
Download now
Recommended
Kyle ludwick powerpoint
Kyle ludwick powerpoint
lbrese
анализ больших данных
анализ больших данных
OlgaGlot
содержание образования
содержание образования
OlgaGlot
Trabajos chelsey
Trabajos chelsey
Chelsey Palos
CV Airat N Shakirov2015.R (3)
CV Airat N Shakirov2015.R (3)
Ayrat Shakirov
Apuntes.docx
Apuntes.docx
fernandasalasespinoza
CV Imtiaz khan
CV Imtiaz khan
Muhammad Imtiaz Khan
Actividades (2° parcial)
Actividades (2° parcial)
JADSM11
Recommended
Kyle ludwick powerpoint
Kyle ludwick powerpoint
lbrese
анализ больших данных
анализ больших данных
OlgaGlot
содержание образования
содержание образования
OlgaGlot
Trabajos chelsey
Trabajos chelsey
Chelsey Palos
CV Airat N Shakirov2015.R (3)
CV Airat N Shakirov2015.R (3)
Ayrat Shakirov
Apuntes.docx
Apuntes.docx
fernandasalasespinoza
CV Imtiaz khan
CV Imtiaz khan
Muhammad Imtiaz Khan
Actividades (2° parcial)
Actividades (2° parcial)
JADSM11
Informatica @ Unicam
Informatica @ Unicam
unicamcs
Shakirov ayrat 2016
Shakirov ayrat 2016
Ayrat Shakirov
Presentazione corsi di Informatica UniCam
Presentazione corsi di Informatica UniCam
unicamcs
C-Academy 3차 모집안내
C-Academy 3차 모집안내
대구창조경제혁신센터 C-Academy
Chelsey actividades
Chelsey actividades
Chelsey Palos
CV-DrMLS(I)
CV-DrMLS(I)
Motilal Sharma
SHAKIROV Ayrat 2015
SHAKIROV Ayrat 2015
Ayrat Shakirov
Основатели финансового менеджмента
Основатели финансового менеджмента
OlgaGlot
IT Application Support Analyst Job Spec
IT Application Support Analyst Job Spec
Lorraine Hodder
What is a VLAN and DMZ
What is a VLAN and DMZ
Avradeep Bhattacharya
Automating Buzz Through the Power of Social Influence
Automating Buzz Through the Power of Social Influence
Buzzoole LTD
Dalla Brand Reputation all’Influencer Marketing: l’impatto delle conversazion...
Dalla Brand Reputation all’Influencer Marketing: l’impatto delle conversazion...
Buzzoole LTD
OSINT for Attack and Defense
OSINT for Attack and Defense
Andrew McNicol
OSINT - Open Source Intelligence
OSINT - Open Source Intelligence
c0c0n - International Cyber Security and Policing Conference
Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)
festival ICT 2016
Security Analyst Workshop - 20200212
Security Analyst Workshop - 20200212
Florian Roth
Experiments in Data Portability 2
Experiments in Data Portability 2
Glenn Jones
Security Analyst Workshop - 20190314
Security Analyst Workshop - 20190314
Florian Roth
Red Team: Emulating Advanced Adversaries in Cyberspace
Red Team: Emulating Advanced Adversaries in Cyberspace
Don Anto
Open Source Information Gathering Brucon Edition
Open Source Information Gathering Brucon Edition
Chris Gates
Rugged Driven Development with Gauntlt
Rugged Driven Development with Gauntlt
James Wickett
Putting Rugged Into your DevOps Toolchain
Putting Rugged Into your DevOps Toolchain
James Wickett
More Related Content
Viewers also liked
Informatica @ Unicam
Informatica @ Unicam
unicamcs
Shakirov ayrat 2016
Shakirov ayrat 2016
Ayrat Shakirov
Presentazione corsi di Informatica UniCam
Presentazione corsi di Informatica UniCam
unicamcs
C-Academy 3차 모집안내
C-Academy 3차 모집안내
대구창조경제혁신센터 C-Academy
Chelsey actividades
Chelsey actividades
Chelsey Palos
CV-DrMLS(I)
CV-DrMLS(I)
Motilal Sharma
SHAKIROV Ayrat 2015
SHAKIROV Ayrat 2015
Ayrat Shakirov
Основатели финансового менеджмента
Основатели финансового менеджмента
OlgaGlot
IT Application Support Analyst Job Spec
IT Application Support Analyst Job Spec
Lorraine Hodder
What is a VLAN and DMZ
What is a VLAN and DMZ
Avradeep Bhattacharya
Automating Buzz Through the Power of Social Influence
Automating Buzz Through the Power of Social Influence
Buzzoole LTD
Dalla Brand Reputation all’Influencer Marketing: l’impatto delle conversazion...
Dalla Brand Reputation all’Influencer Marketing: l’impatto delle conversazion...
Buzzoole LTD
OSINT for Attack and Defense
OSINT for Attack and Defense
Andrew McNicol
OSINT - Open Source Intelligence
OSINT - Open Source Intelligence
c0c0n - International Cyber Security and Policing Conference
Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)
festival ICT 2016
Viewers also liked
(15)
Informatica @ Unicam
Informatica @ Unicam
Shakirov ayrat 2016
Shakirov ayrat 2016
Presentazione corsi di Informatica UniCam
Presentazione corsi di Informatica UniCam
C-Academy 3차 모집안내
C-Academy 3차 모집안내
Chelsey actividades
Chelsey actividades
CV-DrMLS(I)
CV-DrMLS(I)
SHAKIROV Ayrat 2015
SHAKIROV Ayrat 2015
Основатели финансового менеджмента
Основатели финансового менеджмента
IT Application Support Analyst Job Spec
IT Application Support Analyst Job Spec
What is a VLAN and DMZ
What is a VLAN and DMZ
Automating Buzz Through the Power of Social Influence
Automating Buzz Through the Power of Social Influence
Dalla Brand Reputation all’Influencer Marketing: l’impatto delle conversazion...
Dalla Brand Reputation all’Influencer Marketing: l’impatto delle conversazion...
OSINT for Attack and Defense
OSINT for Attack and Defense
OSINT - Open Source Intelligence
OSINT - Open Source Intelligence
Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)
Similar to OSINT
Security Analyst Workshop - 20200212
Security Analyst Workshop - 20200212
Florian Roth
Experiments in Data Portability 2
Experiments in Data Portability 2
Glenn Jones
Security Analyst Workshop - 20190314
Security Analyst Workshop - 20190314
Florian Roth
Red Team: Emulating Advanced Adversaries in Cyberspace
Red Team: Emulating Advanced Adversaries in Cyberspace
Don Anto
Open Source Information Gathering Brucon Edition
Open Source Information Gathering Brucon Edition
Chris Gates
Rugged Driven Development with Gauntlt
Rugged Driven Development with Gauntlt
James Wickett
Putting Rugged Into your DevOps Toolchain
Putting Rugged Into your DevOps Toolchain
James Wickett
Kamailio - SIP Firewall for Carrier Grade Traffic
Kamailio - SIP Firewall for Carrier Grade Traffic
Daniel-Constantin Mierla
Demystify Information Security & Threats for Data-Driven Platforms With Cheta...
Demystify Information Security & Threats for Data-Driven Platforms With Cheta...
Chetan Khatri
Drupal Camp Atlanta 2011 - Drupal Security
Drupal Camp Atlanta 2011 - Drupal Security
Mediacurrent
Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...
Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...
OpenDNS
BSides IR in Heterogeneous Environment
BSides IR in Heterogeneous Environment
Stefano Maccaglia
Reversing Engineering a Web Application - For fun, behavior and detection
Reversing Engineering a Web Application - For fun, behavior and detection
Rodrigo Montoro
Computer security
Computer security
Mohamed Abdo
Adversary tactics config mgmt-&-logs-oh-my
Adversary tactics config mgmt-&-logs-oh-my
Jesse Moore
Approach to find critical vulnerabilities
Approach to find critical vulnerabilities
Ashish Kunwar
Digital Library Federation, Fall 07, Connotea Presentation
Digital Library Federation, Fall 07, Connotea Presentation
Ian Mulvany
Machine Learning, Key to Your Classification Challenges
Machine Learning, Key to Your Classification Challenges
Marc Borowczak
Climbing out from the digital mud with unikernels / Ian Eyberg (DeferPanic)
Climbing out from the digital mud with unikernels / Ian Eyberg (DeferPanic)
Ontico
DrupalCamp London 2017 - Web site insecurity
DrupalCamp London 2017 - Web site insecurity
George Boobyer
Similar to OSINT
(20)
Security Analyst Workshop - 20200212
Security Analyst Workshop - 20200212
Experiments in Data Portability 2
Experiments in Data Portability 2
Security Analyst Workshop - 20190314
Security Analyst Workshop - 20190314
Red Team: Emulating Advanced Adversaries in Cyberspace
Red Team: Emulating Advanced Adversaries in Cyberspace
Open Source Information Gathering Brucon Edition
Open Source Information Gathering Brucon Edition
Rugged Driven Development with Gauntlt
Rugged Driven Development with Gauntlt
Putting Rugged Into your DevOps Toolchain
Putting Rugged Into your DevOps Toolchain
Kamailio - SIP Firewall for Carrier Grade Traffic
Kamailio - SIP Firewall for Carrier Grade Traffic
Demystify Information Security & Threats for Data-Driven Platforms With Cheta...
Demystify Information Security & Threats for Data-Driven Platforms With Cheta...
Drupal Camp Atlanta 2011 - Drupal Security
Drupal Camp Atlanta 2011 - Drupal Security
Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...
Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...
BSides IR in Heterogeneous Environment
BSides IR in Heterogeneous Environment
Reversing Engineering a Web Application - For fun, behavior and detection
Reversing Engineering a Web Application - For fun, behavior and detection
Computer security
Computer security
Adversary tactics config mgmt-&-logs-oh-my
Adversary tactics config mgmt-&-logs-oh-my
Approach to find critical vulnerabilities
Approach to find critical vulnerabilities
Digital Library Federation, Fall 07, Connotea Presentation
Digital Library Federation, Fall 07, Connotea Presentation
Machine Learning, Key to Your Classification Challenges
Machine Learning, Key to Your Classification Challenges
Climbing out from the digital mud with unikernels / Ian Eyberg (DeferPanic)
Climbing out from the digital mud with unikernels / Ian Eyberg (DeferPanic)
DrupalCamp London 2017 - Web site insecurity
DrupalCamp London 2017 - Web site insecurity
Recently uploaded
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
IES VE
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Julian Hyde
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
Syngulon
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering Teams
UXDXConf
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
Patrick Viafore
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAK
UXDXConf
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
Mark Opanasiuk
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
IoTAnalytics
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
shyamraj55
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
FIDO Alliance
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
marcuskenyatta275
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
John Staveley
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
FIDO Alliance
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
ScyllaDB
ECS 2024 Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
Femke de Vroome
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
GDSC PJATK
The Metaverse: Are We There Yet?
The Metaverse: Are We There Yet?
Mark Billinghurst
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
David Michel
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
FIDO Alliance
Recently uploaded
(20)
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering Teams
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAK
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
ECS 2024 Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
The Metaverse: Are We There Yet?
The Metaverse: Are We There Yet?
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
OSINT
1.
Open Source INTelligence
2.
$ who Black Hat
Hackers White Hat Hackers Bounty Hunters
3.
The opinions expressed
in this presentation are those of the speaker and do not reflect those of past, present or future employers, partners or customers $ cat disclaimer.txt
4.
vulnerability assessment vs penetration testing
5.
$ lsof penetration-testing.txt planning
(figuring out the scope) reconnaissance (OSINT, Footprinting etc..) scanning gaining access maintaining access clearing tracks reporting
6.
Active Vs Passive
7.
$ ls /passive https://dnsdumpster.com/
8.
$ ls /passive https://pentest-tools.com/
9.
$ ls /passive https://www.exploit-db.com/google-hacking-database/
10.
$ ls /passive https://archive.org/
11.
$ ls /active https://nmap.org/
12.
https://nmap.org/movies/
13.
https://www.linkedin.com/in/gordonf1/
14.
15.
16.
$ ls /active https://bitbucket.org/LaNMaSteR53/recon-ng/wiki/Home
17.
https://www.linkedin.com/in/lanmaster53/
18.
19.
20.
$ vi exploit https://cve.mitre.org/ https://www.exploit-db.com/ https://www.metasploit.com/ http://beefproject.com/
21.
$ man help https://www.owasp.org/index.php/Main_Page
Download now