Cyber Security Strategy

Wednesday, 17 March 2021

Open Source Inteligence (OSINT)

Good content to understand and learn OSINT

An Introduction to Open Source Intelligence (OSINT) Gathering
  1. https://www.secjuice.com/introduction-to-open-source-intelligence-osint
 
What is OSINT? How can I make use of it?
  1. https://securitytrails.com/blog/what-is-osint-how-can-i-make-use-of-it
 
OSINT is a State of Mind
  1. https://medium.com/secjuice/osint-as-a-mindset-7d42ad72113d
 
Online investigations with Open Source Information
  1. https://firstdraftnews.org/how-to-get-started-in-online-investigations-with-open-source-intelligence-osint
 
How to find Information on Anyone
  1. https://medium.com/@Peter_UXer/osint-how-to-find-information-on-anyone-5029a3c7fd56
 
2019 OSINT Guide
  1. https://www.randhome.io/blog/2019/01/05/2019-osint-guide
 
Open-Source Intelligence (OSINT) Reconnaissance
  1. https://medium.com/@z3roTrust/open-source-intelligence-osint-reconnaissance-75edd7f7dada
 
Google Hacking Techniques
  1. https://securitytrails.com/blog/google-hacking-techniques
 
OSINT Frameworks:
  1. technisette.com
  2. osintcurio.us
  3. osintframework.com
  4. osintframework.de
  5. https://github.com/jivoi/awesome-osint
  6. Https://docs.google.com/document/d/1BfLPJpRtyq4RFtHJoNpvWQjmGnyVkfE2HYoICKOGguA  

Above information is taken from: https://www.osinttechniques.com/blog  
at March 17, 2021
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: OSINT
Newer Post Older Post Home

Rajdeep's Profile

Rajdeep has around 17 years of rich experience as a Cyber Security Program Leader working on high visibility programs such as Red Teaming, Advance Penetration Testing, Threat Hunting, Threat Intelligence, Social Engineering, Threat & Vulnerability Mitigation, Malware Analysis, Secure SDLC, Application Security etc. Some of his eminence activities include:

    - Winner of Global Cyberlympics, Middle East and India Regional Championship (a UNO and EC-Council initiative - October 2011); Joint 3rd place winner at Global Cyberlympics finals, held at Virginia, USA
    - Microsoft Most Valuable Professional (MVP) - Consumer Security (2009, 2010, 2011, 2012)

LinkedIn Profile
Malware Analysis Group

Search This Blog

Labels

Infographics Strategy Cyber Attack Ransomware Phishing Privacy Threat Intelligence Threat Report CVE Cloud Security Zero Trust Arificial Intelligence Authentication CISSP Cryptography DevSecOps Encryption Forrester OSINT Tools

Blog Archive

  • ▼  2021 (57)
    • ►  June (19)
    • ►  May (9)
    • ►  April (15)
    • ▼  March (14)
      • Reduce the Risk of Ransomware
      • Risk Management Frameworks
      • Effective Red Teaming or Adversary Emulation
      • Scantron - A Distributed Nmap Scanner
      • Microsoft Defender Antivirus and System Center End...
      • A pragmatic approach to improve an Organization’s ...
      • A quick snapshot of an Cyber Security Domains
      • Strategic Paths to Cyber Security
      • Open Source Inteligence (OSINT)
      • Exchange On-prem Mitigation Tool For ProxyLogon Ex...
      • The 2021 CrowdStrike®️ Global Threat Report
      • Top Phishing Email Subjects
      • Cryptography at a glance
      • The Zero Trust Mindset
  • ►  2011 (1)
    • ►  April (1)
  • ►  2010 (14)
    • ►  December (1)
    • ►  November (1)
    • ►  October (1)
    • ►  September (7)
    • ►  May (2)
    • ►  April (1)
    • ►  February (1)
  • ►  2009 (4)
    • ►  November (2)
    • ►  October (1)
    • ►  September (1)
Travel theme. Theme images by A330Pilot. Powered by Blogger.