SlideShare a Scribd company logo
1 of 7
Download to read offline
Feb1 , 2021
OSINT
OSINT
OSINT
- by KRISTINA PARKER
INTRODUCTION
INTRODUCTION
INTRODUCTION
Open Source Intelligence (OSINT) is a sub-type
of threat intelligence that includes human,
signals, and geospatial intelligence, however,
unlike the other three sub-types, OSINT
intelligence is only gathered from free, public
sources.
PHASES OF THE
PHASES OF THE
PHASES OF THE
OSINT PROCESS;
OSINT PROCESS;
OSINT PROCESS;
1
1
1 Source Identification:
2
2
2 Data Analysis
3
3
3 Data Harvesting
4
4
4
Data Processing and
Integration
Results Delivery
5
5
5
1 - SOURCE IDENTIFICATION: - AS THE
1 - SOURCE IDENTIFICATION: - AS THE
1 - SOURCE IDENTIFICATION: - AS THE
STARTING POINT, IN THIS INITIAL
STARTING POINT, IN THIS INITIAL
STARTING POINT, IN THIS INITIAL
PHASE THE ATTACKER IDENTIFIES
PHASE THE ATTACKER IDENTIFIES
PHASE THE ATTACKER IDENTIFIES
POTENTIAL SOURCES FROM WHICH
POTENTIAL SOURCES FROM WHICH
POTENTIAL SOURCES FROM WHICH
INFORMATION MAY BE GATHERED
INFORMATION MAY BE GATHERED
INFORMATION MAY BE GATHERED
FROM. SOURCES ARE INTERNALLY
FROM. SOURCES ARE INTERNALLY
FROM. SOURCES ARE INTERNALLY
DOCUMENTED THROUGHOUT THE
DOCUMENTED THROUGHOUT THE
DOCUMENTED THROUGHOUT THE
PROCESS IN DETAILED NOTES TO
PROCESS IN DETAILED NOTES TO
PROCESS IN DETAILED NOTES TO
COME BACK TO LATER IF
COME BACK TO LATER IF
COME BACK TO LATER IF
NECESSARY.
NECESSARY.
NECESSARY.
DATA HARVESTING: - IN THIS PHASE, THE
DATA HARVESTING: - IN THIS PHASE, THE
DATA HARVESTING: - IN THIS PHASE, THE
ATTACKER COLLECTS AND HARVESTS
ATTACKER COLLECTS AND HARVESTS
ATTACKER COLLECTS AND HARVESTS
INFORMATION FROM THE SELECTED
INFORMATION FROM THE SELECTED
INFORMATION FROM THE SELECTED
SOURCES AND OTHER SOURCES THAT ARE
SOURCES AND OTHER SOURCES THAT ARE
SOURCES AND OTHER SOURCES THAT ARE
DISCOVERED THROUGHOUT THIS PHASE.
DISCOVERED THROUGHOUT THIS PHASE.
DISCOVERED THROUGHOUT THIS PHASE.
DATA PROCESSING AND INTEGRATION: -
DATA PROCESSING AND INTEGRATION: -
DATA PROCESSING AND INTEGRATION: -
DURING THIS PHASE, THE ATTACKER
DURING THIS PHASE, THE ATTACKER
DURING THIS PHASE, THE ATTACKER
PROCESSES THE HARVESTED
PROCESSES THE HARVESTED
PROCESSES THE HARVESTED
INFORMATION FOR ACTIONABLE
INFORMATION FOR ACTIONABLE
INFORMATION FOR ACTIONABLE
INTELLIGENCE BY SEARCHING FOR
INTELLIGENCE BY SEARCHING FOR
INTELLIGENCE BY SEARCHING FOR
INFORMATION THAT MAY ASSIST IN THE
INFORMATION THAT MAY ASSIST IN THE
INFORMATION THAT MAY ASSIST IN THE
INVESTIGATION
INVESTIGATION
INVESTIGATION
DATA ANALYSIS: - IN THIS PHASE, THE
DATA ANALYSIS: - IN THIS PHASE, THE
DATA ANALYSIS: - IN THIS PHASE, THE
ATTACKER PERFORMS DATA ANALYSIS
ATTACKER PERFORMS DATA ANALYSIS
ATTACKER PERFORMS DATA ANALYSIS
OF THE PROCESSED INFORMATION USING
OF THE PROCESSED INFORMATION USING
OF THE PROCESSED INFORMATION USING
OSINT ANALYSIS TOOLS.
OSINT ANALYSIS TOOLS.
OSINT ANALYSIS TOOLS.
RESULTS DELIVERY: - IN THE FINAL PHASE,
RESULTS DELIVERY: - IN THE FINAL PHASE,
RESULTS DELIVERY: - IN THE FINAL PHASE,
OSINT ANALYSIS IS COMPLETE AND THE
OSINT ANALYSIS IS COMPLETE AND THE
OSINT ANALYSIS IS COMPLETE AND THE
FINDINGS ARE PRESENTED/REPORTED TO
FINDINGS ARE PRESENTED/REPORTED TO
FINDINGS ARE PRESENTED/REPORTED TO
OTHER MEMBERS OF THE RED TEA
OTHER MEMBERS OF THE RED TEA
OTHER MEMBERS OF THE RED TEA
https://gist.github.com/h4x0rl4dy/b32511c29ef72700fbe5
7c90e5e857ac

More Related Content

What's hot

Owasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudiniOwasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudiniAdam Nurudini
 
Osint presentation nov 2019
Osint presentation nov 2019Osint presentation nov 2019
Osint presentation nov 2019Priyanka Aash
 
OSINT 2.0 - Past, present and future
OSINT 2.0  - Past, present and futureOSINT 2.0  - Past, present and future
OSINT 2.0 - Past, present and futureChristian Martorella
 
Osint 2ool-kit-on the-go-bag-o-tradecraft
Osint 2ool-kit-on the-go-bag-o-tradecraftOsint 2ool-kit-on the-go-bag-o-tradecraft
Osint 2ool-kit-on the-go-bag-o-tradecraftSteph Cliche
 
How to Use Open Source Intelligence (OSINT) in Investigations
How to Use Open Source Intelligence (OSINT) in InvestigationsHow to Use Open Source Intelligence (OSINT) in Investigations
How to Use Open Source Intelligence (OSINT) in InvestigationsCase IQ
 
osint - open source Intelligence
osint - open source Intelligenceosint - open source Intelligence
osint - open source IntelligenceOsama Ellahi
 
OSINT with Practical: Real Life Examples
OSINT with Practical: Real Life ExamplesOSINT with Practical: Real Life Examples
OSINT with Practical: Real Life ExamplesSyedAmoz
 
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceDeep Shankar Yadav
 
Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsSloan Carne
 
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...Falgun Rathod
 
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...EENA (European Emergency Number Association)
 
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 Weaponizing OSINT – Hacker Halted 2019 – Michael James  Weaponizing OSINT – Hacker Halted 2019 – Michael James
Weaponizing OSINT – Hacker Halted 2019 – Michael James EC-Council
 
OSINT x UCCU Workshop on Open Source Intelligence
OSINT x UCCU Workshop on Open Source IntelligenceOSINT x UCCU Workshop on Open Source Intelligence
OSINT x UCCU Workshop on Open Source IntelligencePhilippe Lin
 
OSINT mindset to protect your organization - Null monthly meet version
OSINT mindset to protect your organization - Null monthly meet versionOSINT mindset to protect your organization - Null monthly meet version
OSINT mindset to protect your organization - Null monthly meet versionChandrapal Badshah
 

What's hot (20)

Owasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudiniOwasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudini
 
Osint presentation nov 2019
Osint presentation nov 2019Osint presentation nov 2019
Osint presentation nov 2019
 
OSINT - Open Source Intelligence
OSINT - Open Source IntelligenceOSINT - Open Source Intelligence
OSINT - Open Source Intelligence
 
OSINT 2.0 - Past, present and future
OSINT 2.0  - Past, present and futureOSINT 2.0  - Past, present and future
OSINT 2.0 - Past, present and future
 
Osint 2ool-kit-on the-go-bag-o-tradecraft
Osint 2ool-kit-on the-go-bag-o-tradecraftOsint 2ool-kit-on the-go-bag-o-tradecraft
Osint 2ool-kit-on the-go-bag-o-tradecraft
 
OSINT
OSINTOSINT
OSINT
 
How to Use Open Source Intelligence (OSINT) in Investigations
How to Use Open Source Intelligence (OSINT) in InvestigationsHow to Use Open Source Intelligence (OSINT) in Investigations
How to Use Open Source Intelligence (OSINT) in Investigations
 
osint - open source Intelligence
osint - open source Intelligenceosint - open source Intelligence
osint - open source Intelligence
 
OSINT with Practical: Real Life Examples
OSINT with Practical: Real Life ExamplesOSINT with Practical: Real Life Examples
OSINT with Practical: Real Life Examples
 
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligence
 
Leveraging mobile & wireless technology for Law and Order
Leveraging mobile & wireless technology for Law and OrderLeveraging mobile & wireless technology for Law and Order
Leveraging mobile & wireless technology for Law and Order
 
Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU Investigators
 
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
 
Maltego
MaltegoMaltego
Maltego
 
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
 
From OSINT to Phishing presentation
From OSINT to Phishing presentationFrom OSINT to Phishing presentation
From OSINT to Phishing presentation
 
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 Weaponizing OSINT – Hacker Halted 2019 – Michael James  Weaponizing OSINT – Hacker Halted 2019 – Michael James
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 
Honeypot
HoneypotHoneypot
Honeypot
 
OSINT x UCCU Workshop on Open Source Intelligence
OSINT x UCCU Workshop on Open Source IntelligenceOSINT x UCCU Workshop on Open Source Intelligence
OSINT x UCCU Workshop on Open Source Intelligence
 
OSINT mindset to protect your organization - Null monthly meet version
OSINT mindset to protect your organization - Null monthly meet versionOSINT mindset to protect your organization - Null monthly meet version
OSINT mindset to protect your organization - Null monthly meet version
 

Similar to OSINT Process Explained

OSINT Forum – Week 5For this forum, you are to answer one or mor.docx
OSINT Forum – Week 5For this forum, you are to answer one or mor.docxOSINT Forum – Week 5For this forum, you are to answer one or mor.docx
OSINT Forum – Week 5For this forum, you are to answer one or mor.docxloganta
 
Article research one edward snowdon
Article research one edward snowdonArticle research one edward snowdon
Article research one edward snowdonGrace Crawford
 
Making sense of ICA data : ML and knowledge graphs
Making sense of ICA data : ML and knowledge graphsMaking sense of ICA data : ML and knowledge graphs
Making sense of ICA data : ML and knowledge graphsGaignard Alban
 
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...Maurice Dawson
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...REVULN
 
Graphs in Government
Graphs in GovernmentGraphs in Government
Graphs in GovernmentNeo4j
 
Fine-Grained Censorship Mapping
Fine-Grained Censorship MappingFine-Grained Censorship Mapping
Fine-Grained Censorship MappingJoss Wright
 
IT security panel - moeshesh
IT security panel - moesheshIT security panel - moeshesh
IT security panel - moesheshMohamed Shishtawy
 
The Hitchhiker's Guide to Disinformation, Public Opinion Swinging and False F...
The Hitchhiker's Guide to Disinformation, Public Opinion Swinging and False F...The Hitchhiker's Guide to Disinformation, Public Opinion Swinging and False F...
The Hitchhiker's Guide to Disinformation, Public Opinion Swinging and False F...DefCamp
 
Transparency, Veillance and emotiveillance
Transparency, Veillance and emotiveillance  Transparency, Veillance and emotiveillance
Transparency, Veillance and emotiveillance Andrew_McStay
 
Information Sharing, Dot Connecting and Intelligence Failures.docx
Information Sharing, Dot Connecting and Intelligence Failures.docxInformation Sharing, Dot Connecting and Intelligence Failures.docx
Information Sharing, Dot Connecting and Intelligence Failures.docxannettsparrow
 
How DNA and Criminal Profiling Solve Crimes
How DNA and Criminal Profiling Solve CrimesHow DNA and Criminal Profiling Solve Crimes
How DNA and Criminal Profiling Solve CrimesSam Brandt
 
La Quadrature Du Cercle - The APTs That Weren't
La Quadrature Du Cercle - The APTs That Weren'tLa Quadrature Du Cercle - The APTs That Weren't
La Quadrature Du Cercle - The APTs That Weren'tpinkflawd
 

Similar to OSINT Process Explained (20)

OSINT Forum – Week 5For this forum, you are to answer one or mor.docx
OSINT Forum – Week 5For this forum, you are to answer one or mor.docxOSINT Forum – Week 5For this forum, you are to answer one or mor.docx
OSINT Forum – Week 5For this forum, you are to answer one or mor.docx
 
Article research one edward snowdon
Article research one edward snowdonArticle research one edward snowdon
Article research one edward snowdon
 
Intelligence Collection
Intelligence CollectionIntelligence Collection
Intelligence Collection
 
Making sense of ICA data : ML and knowledge graphs
Making sense of ICA data : ML and knowledge graphsMaking sense of ICA data : ML and knowledge graphs
Making sense of ICA data : ML and knowledge graphs
 
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
 
Polinter09
Polinter09Polinter09
Polinter09
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
 
Graphs in Government
Graphs in GovernmentGraphs in Government
Graphs in Government
 
Polinter09
Polinter09Polinter09
Polinter09
 
Fine-Grained Censorship Mapping
Fine-Grained Censorship MappingFine-Grained Censorship Mapping
Fine-Grained Censorship Mapping
 
IT security panel - moeshesh
IT security panel - moesheshIT security panel - moeshesh
IT security panel - moeshesh
 
Uddin
UddinUddin
Uddin
 
The Hitchhiker's Guide to Disinformation, Public Opinion Swinging and False F...
The Hitchhiker's Guide to Disinformation, Public Opinion Swinging and False F...The Hitchhiker's Guide to Disinformation, Public Opinion Swinging and False F...
The Hitchhiker's Guide to Disinformation, Public Opinion Swinging and False F...
 
Transparency, Veillance and emotiveillance
Transparency, Veillance and emotiveillance  Transparency, Veillance and emotiveillance
Transparency, Veillance and emotiveillance
 
Information Sharing, Dot Connecting and Intelligence Failures.docx
Information Sharing, Dot Connecting and Intelligence Failures.docxInformation Sharing, Dot Connecting and Intelligence Failures.docx
Information Sharing, Dot Connecting and Intelligence Failures.docx
 
1482734.ppt
1482734.ppt1482734.ppt
1482734.ppt
 
How DNA and Criminal Profiling Solve Crimes
How DNA and Criminal Profiling Solve CrimesHow DNA and Criminal Profiling Solve Crimes
How DNA and Criminal Profiling Solve Crimes
 
La Quadrature Du Cercle - The APTs That Weren't
La Quadrature Du Cercle - The APTs That Weren'tLa Quadrature Du Cercle - The APTs That Weren't
La Quadrature Du Cercle - The APTs That Weren't
 
Fdsag
FdsagFdsag
Fdsag
 
Fbi anonymous
Fbi anonymousFbi anonymous
Fbi anonymous
 

Recently uploaded

(南达科他州立大学毕业证学位证成绩单-永久存档)
(南达科他州立大学毕业证学位证成绩单-永久存档)(南达科他州立大学毕业证学位证成绩单-永久存档)
(南达科他州立大学毕业证学位证成绩单-永久存档)oannq
 
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan
 
《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...
《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...
《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...ur8mqw8e
 
办理国外毕业证学位证《原版美国montana文凭》蒙大拿州立大学毕业证制作成绩单修改
办理国外毕业证学位证《原版美国montana文凭》蒙大拿州立大学毕业证制作成绩单修改办理国外毕业证学位证《原版美国montana文凭》蒙大拿州立大学毕业证制作成绩单修改
办理国外毕业证学位证《原版美国montana文凭》蒙大拿州立大学毕业证制作成绩单修改atducpo
 
办理西悉尼大学毕业证成绩单、制作假文凭
办理西悉尼大学毕业证成绩单、制作假文凭办理西悉尼大学毕业证成绩单、制作假文凭
办理西悉尼大学毕业证成绩单、制作假文凭o8wvnojp
 
social media chat application main ppt.pptx
social media chat application main ppt.pptxsocial media chat application main ppt.pptx
social media chat application main ppt.pptxsprasad829829
 
(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts
(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts
(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ EscortsDelhi Escorts Service
 
Call Girls In Dwarka Sub City ☎️7838079806 ✅ 💯Call Girls In Delhi
Call Girls In Dwarka Sub City  ☎️7838079806 ✅ 💯Call Girls In DelhiCall Girls In Dwarka Sub City  ☎️7838079806 ✅ 💯Call Girls In Delhi
Call Girls In Dwarka Sub City ☎️7838079806 ✅ 💯Call Girls In DelhiSoniyaSingh
 
Inspiring Through Words Power of Inspiration.pptx
Inspiring Through Words Power of Inspiration.pptxInspiring Through Words Power of Inspiration.pptx
Inspiring Through Words Power of Inspiration.pptxShubham Rawat
 
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdf
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdfBreath, Brain & Beyond_A Holistic Approach to Peak Performance.pdf
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdfJess Walker
 
Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝soniya singh
 
E J Waggoner against Kellogg's Pantheism 8.pptx
E J Waggoner against Kellogg's Pantheism 8.pptxE J Waggoner against Kellogg's Pantheism 8.pptx
E J Waggoner against Kellogg's Pantheism 8.pptxJackieSparrow3
 
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdf
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdfREFLECTIONS Newsletter Jan-Jul 2024.pdf.pdf
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdfssusere8ea60
 
Call Girls in Govindpuri Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Govindpuri Delhi 💯Call Us 🔝8264348440🔝Call Girls in Govindpuri Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Govindpuri Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Postal Ballot procedure for employees to utilise
Postal Ballot procedure for employees to utilisePostal Ballot procedure for employees to utilise
Postal Ballot procedure for employees to utiliseccsubcollector
 
Call Girls In Karkardooma 83770 87607 Just-Dial Escorts Service 24X7 Avilable
Call Girls In Karkardooma 83770 87607 Just-Dial Escorts Service 24X7 AvilableCall Girls In Karkardooma 83770 87607 Just-Dial Escorts Service 24X7 Avilable
Call Girls In Karkardooma 83770 87607 Just-Dial Escorts Service 24X7 Avilabledollysharma2066
 
西伦敦大学毕业证学位证成绩单-怎么样做
西伦敦大学毕业证学位证成绩单-怎么样做西伦敦大学毕业证学位证成绩单-怎么样做
西伦敦大学毕业证学位证成绩单-怎么样做j5bzwet6
 

Recently uploaded (20)

(南达科他州立大学毕业证学位证成绩单-永久存档)
(南达科他州立大学毕业证学位证成绩单-永久存档)(南达科他州立大学毕业证学位证成绩单-永久存档)
(南达科他州立大学毕业证学位证成绩单-永久存档)
 
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
 
《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...
《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...
《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...
 
办理国外毕业证学位证《原版美国montana文凭》蒙大拿州立大学毕业证制作成绩单修改
办理国外毕业证学位证《原版美国montana文凭》蒙大拿州立大学毕业证制作成绩单修改办理国外毕业证学位证《原版美国montana文凭》蒙大拿州立大学毕业证制作成绩单修改
办理国外毕业证学位证《原版美国montana文凭》蒙大拿州立大学毕业证制作成绩单修改
 
办理西悉尼大学毕业证成绩单、制作假文凭
办理西悉尼大学毕业证成绩单、制作假文凭办理西悉尼大学毕业证成绩单、制作假文凭
办理西悉尼大学毕业证成绩单、制作假文凭
 
social media chat application main ppt.pptx
social media chat application main ppt.pptxsocial media chat application main ppt.pptx
social media chat application main ppt.pptx
 
young Call girls in Neb Sarai 🔝 9953056974 🔝 Delhi escort Service
young Call girls in Neb Sarai 🔝 9953056974 🔝 Delhi escort Serviceyoung Call girls in Neb Sarai 🔝 9953056974 🔝 Delhi escort Service
young Call girls in Neb Sarai 🔝 9953056974 🔝 Delhi escort Service
 
(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts
(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts
(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts
 
Call Girls In Dwarka Sub City ☎️7838079806 ✅ 💯Call Girls In Delhi
Call Girls In Dwarka Sub City  ☎️7838079806 ✅ 💯Call Girls In DelhiCall Girls In Dwarka Sub City  ☎️7838079806 ✅ 💯Call Girls In Delhi
Call Girls In Dwarka Sub City ☎️7838079806 ✅ 💯Call Girls In Delhi
 
Inspiring Through Words Power of Inspiration.pptx
Inspiring Through Words Power of Inspiration.pptxInspiring Through Words Power of Inspiration.pptx
Inspiring Through Words Power of Inspiration.pptx
 
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdf
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdfBreath, Brain & Beyond_A Holistic Approach to Peak Performance.pdf
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdf
 
Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝
 
E J Waggoner against Kellogg's Pantheism 8.pptx
E J Waggoner against Kellogg's Pantheism 8.pptxE J Waggoner against Kellogg's Pantheism 8.pptx
E J Waggoner against Kellogg's Pantheism 8.pptx
 
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdf
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdfREFLECTIONS Newsletter Jan-Jul 2024.pdf.pdf
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdf
 
Model Call Girl in Lado Sarai Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Lado Sarai Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Lado Sarai Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Lado Sarai Delhi reach out to us at 🔝9953056974🔝
 
Call Girls in Govindpuri Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Govindpuri Delhi 💯Call Us 🔝8264348440🔝Call Girls in Govindpuri Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Govindpuri Delhi 💯Call Us 🔝8264348440🔝
 
Cheap Rate ➥8448380779 ▻Call Girls In Mg Road Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Mg Road GurgaonCheap Rate ➥8448380779 ▻Call Girls In Mg Road Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Mg Road Gurgaon
 
Postal Ballot procedure for employees to utilise
Postal Ballot procedure for employees to utilisePostal Ballot procedure for employees to utilise
Postal Ballot procedure for employees to utilise
 
Call Girls In Karkardooma 83770 87607 Just-Dial Escorts Service 24X7 Avilable
Call Girls In Karkardooma 83770 87607 Just-Dial Escorts Service 24X7 AvilableCall Girls In Karkardooma 83770 87607 Just-Dial Escorts Service 24X7 Avilable
Call Girls In Karkardooma 83770 87607 Just-Dial Escorts Service 24X7 Avilable
 
西伦敦大学毕业证学位证成绩单-怎么样做
西伦敦大学毕业证学位证成绩单-怎么样做西伦敦大学毕业证学位证成绩单-怎么样做
西伦敦大学毕业证学位证成绩单-怎么样做
 

OSINT Process Explained

  • 1. Feb1 , 2021 OSINT OSINT OSINT - by KRISTINA PARKER
  • 2. INTRODUCTION INTRODUCTION INTRODUCTION Open Source Intelligence (OSINT) is a sub-type of threat intelligence that includes human, signals, and geospatial intelligence, however, unlike the other three sub-types, OSINT intelligence is only gathered from free, public sources.
  • 3. PHASES OF THE PHASES OF THE PHASES OF THE OSINT PROCESS; OSINT PROCESS; OSINT PROCESS; 1 1 1 Source Identification: 2 2 2 Data Analysis 3 3 3 Data Harvesting 4 4 4 Data Processing and Integration Results Delivery 5 5 5
  • 4. 1 - SOURCE IDENTIFICATION: - AS THE 1 - SOURCE IDENTIFICATION: - AS THE 1 - SOURCE IDENTIFICATION: - AS THE STARTING POINT, IN THIS INITIAL STARTING POINT, IN THIS INITIAL STARTING POINT, IN THIS INITIAL PHASE THE ATTACKER IDENTIFIES PHASE THE ATTACKER IDENTIFIES PHASE THE ATTACKER IDENTIFIES POTENTIAL SOURCES FROM WHICH POTENTIAL SOURCES FROM WHICH POTENTIAL SOURCES FROM WHICH INFORMATION MAY BE GATHERED INFORMATION MAY BE GATHERED INFORMATION MAY BE GATHERED FROM. SOURCES ARE INTERNALLY FROM. SOURCES ARE INTERNALLY FROM. SOURCES ARE INTERNALLY DOCUMENTED THROUGHOUT THE DOCUMENTED THROUGHOUT THE DOCUMENTED THROUGHOUT THE PROCESS IN DETAILED NOTES TO PROCESS IN DETAILED NOTES TO PROCESS IN DETAILED NOTES TO COME BACK TO LATER IF COME BACK TO LATER IF COME BACK TO LATER IF NECESSARY. NECESSARY. NECESSARY.
  • 5. DATA HARVESTING: - IN THIS PHASE, THE DATA HARVESTING: - IN THIS PHASE, THE DATA HARVESTING: - IN THIS PHASE, THE ATTACKER COLLECTS AND HARVESTS ATTACKER COLLECTS AND HARVESTS ATTACKER COLLECTS AND HARVESTS INFORMATION FROM THE SELECTED INFORMATION FROM THE SELECTED INFORMATION FROM THE SELECTED SOURCES AND OTHER SOURCES THAT ARE SOURCES AND OTHER SOURCES THAT ARE SOURCES AND OTHER SOURCES THAT ARE DISCOVERED THROUGHOUT THIS PHASE. DISCOVERED THROUGHOUT THIS PHASE. DISCOVERED THROUGHOUT THIS PHASE. DATA PROCESSING AND INTEGRATION: - DATA PROCESSING AND INTEGRATION: - DATA PROCESSING AND INTEGRATION: - DURING THIS PHASE, THE ATTACKER DURING THIS PHASE, THE ATTACKER DURING THIS PHASE, THE ATTACKER PROCESSES THE HARVESTED PROCESSES THE HARVESTED PROCESSES THE HARVESTED INFORMATION FOR ACTIONABLE INFORMATION FOR ACTIONABLE INFORMATION FOR ACTIONABLE INTELLIGENCE BY SEARCHING FOR INTELLIGENCE BY SEARCHING FOR INTELLIGENCE BY SEARCHING FOR INFORMATION THAT MAY ASSIST IN THE INFORMATION THAT MAY ASSIST IN THE INFORMATION THAT MAY ASSIST IN THE INVESTIGATION INVESTIGATION INVESTIGATION
  • 6. DATA ANALYSIS: - IN THIS PHASE, THE DATA ANALYSIS: - IN THIS PHASE, THE DATA ANALYSIS: - IN THIS PHASE, THE ATTACKER PERFORMS DATA ANALYSIS ATTACKER PERFORMS DATA ANALYSIS ATTACKER PERFORMS DATA ANALYSIS OF THE PROCESSED INFORMATION USING OF THE PROCESSED INFORMATION USING OF THE PROCESSED INFORMATION USING OSINT ANALYSIS TOOLS. OSINT ANALYSIS TOOLS. OSINT ANALYSIS TOOLS. RESULTS DELIVERY: - IN THE FINAL PHASE, RESULTS DELIVERY: - IN THE FINAL PHASE, RESULTS DELIVERY: - IN THE FINAL PHASE, OSINT ANALYSIS IS COMPLETE AND THE OSINT ANALYSIS IS COMPLETE AND THE OSINT ANALYSIS IS COMPLETE AND THE FINDINGS ARE PRESENTED/REPORTED TO FINDINGS ARE PRESENTED/REPORTED TO FINDINGS ARE PRESENTED/REPORTED TO OTHER MEMBERS OF THE RED TEA OTHER MEMBERS OF THE RED TEA OTHER MEMBERS OF THE RED TEA