Cyber Security Strategy

Showing posts with label OSINT. Show all posts
Showing posts with label OSINT. Show all posts

Wednesday, 17 March 2021

Open Source Inteligence (OSINT)

Good content to understand and learn OSINT

An Introduction to Open Source Intelligence (OSINT) Gathering
  1. https://www.secjuice.com/introduction-to-open-source-intelligence-osint
 
What is OSINT? How can I make use of it?
  1. https://securitytrails.com/blog/what-is-osint-how-can-i-make-use-of-it
 
OSINT is a State of Mind
  1. https://medium.com/secjuice/osint-as-a-mindset-7d42ad72113d
 
Online investigations with Open Source Information
  1. https://firstdraftnews.org/how-to-get-started-in-online-investigations-with-open-source-intelligence-osint
 
How to find Information on Anyone
  1. https://medium.com/@Peter_UXer/osint-how-to-find-information-on-anyone-5029a3c7fd56
 
2019 OSINT Guide
  1. https://www.randhome.io/blog/2019/01/05/2019-osint-guide
 
Open-Source Intelligence (OSINT) Reconnaissance
  1. https://medium.com/@z3roTrust/open-source-intelligence-osint-reconnaissance-75edd7f7dada
 
Google Hacking Techniques
  1. https://securitytrails.com/blog/google-hacking-techniques
 
OSINT Frameworks:
  1. technisette.com
  2. osintcurio.us
  3. osintframework.com
  4. osintframework.de
  5. https://github.com/jivoi/awesome-osint
  6. Https://docs.google.com/document/d/1BfLPJpRtyq4RFtHJoNpvWQjmGnyVkfE2HYoICKOGguA  

Above information is taken from: https://www.osinttechniques.com/blog  
at March 17, 2021
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: OSINT
Older Posts Home
Subscribe to: Posts (Atom)

Rajdeep's Profile

Rajdeep has around 17 years of rich experience as a Cyber Security Program Leader working on high visibility programs such as Red Teaming, Advance Penetration Testing, Threat Hunting, Threat Intelligence, Social Engineering, Threat & Vulnerability Mitigation, Malware Analysis, Secure SDLC, Application Security etc. Some of his eminence activities include:

    - Winner of Global Cyberlympics, Middle East and India Regional Championship (a UNO and EC-Council initiative - October 2011); Joint 3rd place winner at Global Cyberlympics finals, held at Virginia, USA
    - Microsoft Most Valuable Professional (MVP) - Consumer Security (2009, 2010, 2011, 2012)

LinkedIn Profile
Malware Analysis Group

Search This Blog

Labels

Infographics Strategy Cyber Attack Ransomware Phishing Privacy Threat Intelligence Threat Report CVE Cloud Security Zero Trust Arificial Intelligence Authentication CISSP Cryptography DevSecOps Encryption Forrester OSINT Tools

Blog Archive

  • ▼  2021 (57)
    • ▼  June (19)
      • Protect Business from Cyber Attacks
      • Cyber ATtack Types
      • Anatomy of a Supply Chain Attack
      • Human Operated Ransomware Attacks
      • Preparedness to Cyber Attacks
      • Biggest Business Risks of 2021
      • State of the SOC
      • Stages of Ransomware Infection
      • Security Transformation
      • Azure Security - Defend across attack chains
      • Risk of Insider Threats
      • GDPR in a Nutshell
      • Docker Cheat Sheet
      • Cyber Security Priorities
      • How to be Security Conscious
      • Categories of Personal Information
      • External Digital Footprint
      • 10 Blind Spots in your Security Posture
      • 10 Steps to Cyber Security
    • ►  May (9)
    • ►  April (15)
    • ►  March (14)
  • ►  2011 (1)
    • ►  April (1)
  • ►  2010 (14)
    • ►  December (1)
    • ►  November (1)
    • ►  October (1)
    • ►  September (7)
    • ►  May (2)
    • ►  April (1)
    • ►  February (1)
  • ►  2009 (4)
    • ►  November (2)
    • ►  October (1)
    • ►  September (1)
Travel theme. Theme images by A330Pilot. Powered by Blogger.