OSINT Essential Training

OSINT Essential Training

English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 1h 08m | 290 MB

If you’ve ever engaged in any sort of internet sleuthing—doing research on a company before an interview, looking up someone on social media before you meet them—then you’ve already engaged in some open-source intelligence, or OSINT. OSINT is, essentially, using publicly available information in an intelligence context. In this course, information security expert Mike Wylie shows how to effectively engage in OSINT, from the value of using it, to methods of gathering information. He covers topics like passive reconnaissance vs. active reconnaissance, methods for tracking organizations and employees, and crafting advanced search queries to find sensitive indexed information. If you’re conducting any kind of penetration test, OSINT provides a good foundation to get you started.

Table of Contents

1 Beginning your penetration test with OSINT
2 Disclaimer
3 OSINT overview
4 Understanding the value of OSINT
5 Introduction to passive reconnaissance
6 Introduction to active reconnaissance
7 Pros and cons of active and passive reconnaissance
8 Introduction to sources of OSINT
9 Introduction to VPN and anonymizers
10 Introduction to locations and addresses fingerprinting
11 Using breach data for OSINT
12 Introduction to using business records for OSINT
13 Using job posts for OSINT
14 Using OSINT to find employees
15 Using OSINT to find phone numbers
16 Using OSINT to find email addresses
17 Using social media sites for OSINT
18 Extracting metadata from images
19 Introducing domain names and DNS discovery
20 Crawling websites to gather OSINT data
21 Finding deleted information in web archives
22 Introduction to using search engines for OSINT
23 Google hacking or dorking for OSINT
24 Discovering OSINT data in the dark web
25 Introduction to RIRs
26 Where to go with the OSINT data you collect