OSINT Sharad Kumar @sk_security.

Slides:



Advertisements
Similar presentations
Surrey Libraries Computer Learning Centres January 2012 Internet Searching Teaching Script Totally New to Computers Internet Searching.
Advertisements

Let's say we want to access domain - reliablescribe.com First we need to buy a computer We need to subscribe to an Internet Service Provider (ISP) The.
Cybercrime, Cyber Intelligence, Web 2.0
SEO PACKAGES. Types of Plans Starter Plan Business Plan Enterprises Plan.
Norman SecureSurf Protect your users when surfing the Internet.
Over My Shoulder Training Session 4. Over My Shoulder Training Week 3 – Fulfillment – Search Engines and Citations Setting client expectations – More.
SCRAPING BUSINESS ADDRESSES Anisha S. Agenda When business URLs are present When business URLs are not present; What is present is a list of keywords.
Online Search Marketing OMI Certification Course – Discovery Documentation.
The Internet. The World’s largest computer network A world wide collection of networks that connects millions of businesses, government agencies, educational.
GOOGLE HACKING FOR PENETRATION TESTERS Chris Chromiak SentryMetrics March 27 th, 2007.
TAG-Org Websites 1. Why Websites ? Branding: Since it's our website, we can set the design and build the awareness of our brand. To create our own Online.
3.4 Internet Strand 3 Sara Liquori. 3.4 Internet  A global computer network providing a variety of information and communication facilities, consisting.
Digital Literacy Concepts and basic vocabulary. Digital Literacy Knowledge, skills, and behaviors used in digital devices (computers, tablets, smartphones)
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Website Design:. Once you have created a website on your hard drive you need to get it up on to the Web. This is called "uploading“ or “publishing” or.
WHAT IS INTERNET?.  Today the internet offers the opportunity to access to any information, to correspond with someone who has an account, or.
Week-6 (Lecture-1) Publishing and Browsing the Web: Publishing: 1. upload the following items on the web Google documents Spreadsheets Presentations drawings.
ANONYMIZING / WEB PRIVACY. TOOLS: STAYING ANONYMOUS ON THE INTERNET Proxy Server Tor.
Quality and Reasonable SEO/SMO services
Modern information gathering Dave van Stein 9 april 2009.
The Web Web Design. 3.2 The Web Focus on Reading Main Ideas A URL is an address that identifies a specific Web page. Web browsers have varying capabilities.
For Teachers Microsoft Educator Community: Access over 1.5 million educators globally, professional development courses and thousands of inspiring.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
HOW TO USE GOOGLE WEBMASTER TOOLS TO IMPROVE SEO ? GOOGLE WEBMASTEER.
Penetration Testing Reconnaissance 2
Introduction to Networking
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Social Network.
Chapter 10: Web Basics.
IS1500: Introduction to Web Development
Search Engine Optimization(S.E.O)
Barracuda Web Security Flex
C IBM Security QRadar SIEM V7.2.6 Associate Analyst
Footprinting and Scanning
Introducing the Internet
Search Engine Optimization (SEO)
CISC103 Web Development Basics: Web site:
CCT356: Online Advertising and Marketing
Software Applications for end-users
Battalion: Automating Recon
One OSINT Tool to Rule Them All
Warm up Activity: As you walk in, take your IP address. DO NOT share it with your classmates. For the next 5 minutes, your goal is to complete an accurate.
Jim Barton Librarian Glenside Public Library District
Application of the Internet
Track and measure Social Media and Darknet through
Electronic Resources and the WWW
Navigating the Internet
Electronic Resources and the WWW
Web Traffic Analysis Script PHP Web Traffic Analysis Script PHP Web Traffic Analysis Software.
Getting Started with LANGuardian
Evaluating Web Resources
Man-in-the-Middle Attacks
Instructor Name Instructor Title Library Name
2018 Latest Eccouncil Exam Questions Answers - Eccouncil Dumps PDF
FootPrinting CS391.
Jose Ortiz Cosme Ozuna FOCA Pro Jose Ortiz Cosme Ozuna
Objectives To understand the about types of computer network
Unit# 5: Internet and Worldwide Web
Agenda What is SEO ? How Do Search Engines Work? Measuring SEO success ? On Page SEO – Basic Practices? Technical SEO - Source Code. Off Page SEO – Social.
A worldwide system of interconnected computer networks.
Acknowledgement Content from the book:
Operations Security (OPSEC): A Force Multiplier
The Internet: Encryption & Public Keys
Web Browsers Sarah Bradley.
Read this to find out how the internet works!
Internet Vocabulary Terms
COMPUTER NETWORKS AND THE INTERNET Chapter 6
The Internet and Electronic mail
Getting to the Top of.
Lesson 2: Gathering and Organizing Information Using ICT KEY QUESTION: HOW DO YOU GATHER AND ORGANIZE INFORMATION USING THE COMPUTER AND INTERNET?
Presentation transcript:

OSINT Sharad Kumar @sk_security

$whoami Security Engineer OSINT Creeper Penetration Tester Server Auditor Author – OSINT-SPY OSINT Trainer BlackHat Arsenal Presenter

Agenda Intelligence Gathering OSINT OSINT-SPY OSINT Investigation & OSINT Workflow

SUN TZU -- Art of War If you know your opponent weaknesses and How to exploit them you will never loose.

Intelligence Gathering Intelligence gathering is a process of collecting intelligence(data) from various sources. Open or closed

What is Espionage ? Use of spies by government to discover military and political secrets of other nation. It’s a subset of Intelligence Gathering

Intelligence Gathering Disciplines HUMINT GEOINT SIGINT TECHINT FININT OSINT Intel gathered from Humans Intel gathered from images, geo location and human activity. Intel gathered from signals, communication Intel gathered about weapons, defense and military affairs. Intel gathered from documents, organizational data and financial affairs.

OSINT ?

What is OSINT? Information available publicly from public sources. Sources might be - Media Internet Social meetings

What kind of data we can gather?

Main OSINT Search Area Email Social Accounts Real Time Monitoring Websites IP Addresses OSINT for Blue Team and Red Team

OSINT Arsenal Search Engines People Search Engines Social Networks Video Sharing Platforms Various public API’s Tools

Search Engines Google Bing Yandex

TOR Search Engines www.torchtorsearch.com https://ahmia.fi https://thehiddenwiki.org/ http://onion.link/ https://tor2web.org/

Twitter Intel Gathering https://moz.com http://ctrlq.org/first/ Google Dork is not a bad option  Geosocialfootprint.com Tweetpaths.com App.echosec.net Onemilliontweetmap.com https://www.allmytweets.net Conweets.com

Social Network Traffic Analysis Social-searcher.com Icerocket.com Socialmention.com Delicious.com stumbleupon.com Topix.com Keyhole.co

Online Maps | GEOINT Flashearth.com Here.com Google.com/maps Panoramio.com

People Search Engines Thatsthem.com Pipl.com Peepdb.com Zabasearch.com Intelius.com Radaris.com Spokeo.com Yasni.com Advancedbackgroundchecks.com

Domain and IP Address Viewdns.info/whois Whoisology.com Domainhistory.net Whoishostingthis.com Whoismind.com Spyonweb.com Sameid.net Pub-db.com Domaincrawler.com Nerdydata.com Semrush.com

OSINT-SPY OSINT-SPY is a powerful Open Source Intelligence tool. Purely written in Python Features -- Email Scan IP Address Scan Domain | URL Scan Bitcoin Scan Device Scan Skype Forensics Remote Malware Analysis Stego Tool Cipher Scan https://github.com/SharadKumar97/OSINT-SPY

OSINT-SPY CLI | WEB www.osint-spy.com @sk_security sharad@osint-spy.com github.com/SharadKumar97/OSINT-SPY

OSINT-SPY In Action Bitcoin Latest Block Information

OSINT-SPY In Action Block info by date

OSINT-SPY In Action Bitcoin Balance

OSINT-SPY In Action Email Account

OSINT-SPY In Action Domain

OSINT-SPY In Action

OSINT-SPY In Action

OSINT-SPY In Action http://www.osint-spy.com/command_line

Is there any standard process for OSINT

Can we develop?

Let’s Try Email Address No Yes Verify Search Engines Social Platforms Username – john234@gmail.com Amazon, GitHub, PGP, Key Base, Breached Data

Let’s Try OSINT search on email Domain (www) whois Email, Country DNS, subdomains Reverse IP check Search engines ( site: ) Robots.txt Analytics and Ad-sense Reverse Ad-sense Check Hidden Pages and Documents Metadata Web Spider and Foca

Thanks Sharad Kumar @sk_security www.osint-spy.com @sk_security sharad@osint-spy.com github.com/SharadKumar97/OSINT-SPY Thanks