Let’s hunt the target using OSINT

Nov. 19, 2017
Let’s hunt the target using OSINT
Let’s hunt the target using OSINT
Let’s hunt the target using OSINT
Let’s hunt the target using OSINT
Let’s hunt the target using OSINT
Let’s hunt the target using OSINT
Let’s hunt the target using OSINT
Let’s hunt the target using OSINT
Let’s hunt the target using OSINT
Let’s hunt the target using OSINT
Let’s hunt the target using OSINT
Let’s hunt the target using OSINT
Let’s hunt the target using OSINT
Let’s hunt the target using OSINT
Let’s hunt the target using OSINT
Let’s hunt the target using OSINT
Let’s hunt the target using OSINT
Let’s hunt the target using OSINT
Let’s hunt the target using OSINT
Let’s hunt the target using OSINT
Let’s hunt the target using OSINT
Let’s hunt the target using OSINT
Let’s hunt the target using OSINT
Let’s hunt the target using OSINT
Let’s hunt the target using OSINT
Let’s hunt the target using OSINT
Let’s hunt the target using OSINT
Let’s hunt the target using OSINT
Let’s hunt the target using OSINT
Let’s hunt the target using OSINT
Let’s hunt the target using OSINT
Let’s hunt the target using OSINT
Let’s hunt the target using OSINT
1 of 33

More Related Content

What's hot

Getting started with using the Dark Web for OSINT investigationsGetting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigationsOlakanmi Oluwole
Open source intelligence information gathering (OSINT)Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)phexcom1
OSINTOSINT
OSINTApurv Singh Gautam
Osint {open source intelligence }Osint {open source intelligence }
Osint {open source intelligence }AkshayJha40
Tools for Open Source Intelligence (OSINT)Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)Sudhanshu Chauhan
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...Falgun Rathod

Similar to Let’s hunt the target using OSINT

OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityMohammed Adam
OSINT mindset to protect your organization - Null monthly meet versionOSINT mindset to protect your organization - Null monthly meet version
OSINT mindset to protect your organization - Null monthly meet versionChandrapal Badshah
Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful ...Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful ...
Phishing: It’s Not Just for Pentesters Using Phishing to Build a Successful ...EC-Council
Blackmagic Open Source Intelligence OSINTBlackmagic Open Source Intelligence OSINT
Blackmagic Open Source Intelligence OSINTSudhanshu Chauhan
OSINT Black Magic: Listen who whispers your name in the dark!!!OSINT Black Magic: Listen who whispers your name in the dark!!!
OSINT Black Magic: Listen who whispers your name in the dark!!!Nutan Kumar Panda
Artificial Intelligence: Beyond Machine LearningArtificial Intelligence: Beyond Machine Learning
Artificial Intelligence: Beyond Machine LearningGordon Haff

Similar to Let’s hunt the target using OSINT(20)

More from Chandrapal Badshah

Dangling DNS records takeover at scaleDangling DNS records takeover at scale
Dangling DNS records takeover at scaleChandrapal Badshah
Detecting secrets in code committed to gitlab (in real time)Detecting secrets in code committed to gitlab (in real time)
Detecting secrets in code committed to gitlab (in real time)Chandrapal Badshah
How to get started in InfoSec ?How to get started in InfoSec ?
How to get started in InfoSec ?Chandrapal Badshah
OSINT Mindset to protect your OrganizationOSINT Mindset to protect your Organization
OSINT Mindset to protect your OrganizationChandrapal Badshah
Solving OWASP MSTG CrackMe using FridaSolving OWASP MSTG CrackMe using Frida
Solving OWASP MSTG CrackMe using FridaChandrapal Badshah
OWASP Serverless Top 10OWASP Serverless Top 10
OWASP Serverless Top 10Chandrapal Badshah

Recently uploaded

"Stateful app as an efficient way to build dispatching for riders and drivers..."Stateful app as an efficient way to build dispatching for riders and drivers...
"Stateful app as an efficient way to build dispatching for riders and drivers...Fwdays
Google cloud Study Jam 2023.pptxGoogle cloud Study Jam 2023.pptx
Google cloud Study Jam 2023.pptxGDSCNiT
CamundaCon NYC 2023 Keynote - Shifting into overdrive with process orchestrationCamundaCon NYC 2023 Keynote - Shifting into overdrive with process orchestration
CamundaCon NYC 2023 Keynote - Shifting into overdrive with process orchestrationBernd Ruecker
Mastering Automation Quality: Exploring UiPath's Test Suite for Seamless Test...Mastering Automation Quality: Exploring UiPath's Test Suite for Seamless Test...
Mastering Automation Quality: Exploring UiPath's Test Suite for Seamless Test...DianaGray10
Product Listing Presentation-Maidy Veloso.pptxProduct Listing Presentation-Maidy Veloso.pptx
Product Listing Presentation-Maidy Veloso.pptxMaidyVeloso
"Exploring MACH Principles", Nikita Galkin"Exploring MACH Principles", Nikita Galkin
"Exploring MACH Principles", Nikita GalkinFwdays

Let’s hunt the target using OSINT

Editor's Notes

  1. HUMINT - intelligence gathered by means of interpersonal contact GEOINT - analysis of imagery and geospatial information to gather information SIGINT - intelligence-gathering by interception of signals
  2. WhoIS - query and response protocol that queries DB that stores the details of the registerd domains
  3. Certificate transparency - https://transparencyreport.google.com/https/certificates