From the course: Advanced Cyber Threat Intelligence
Unlock this course with a free trial
Join today to access over 24,900 courses taught by industry experts.
Leveraging OSINT part 2
From the course: Advanced Cyber Threat Intelligence
Leveraging OSINT part 2
- [Instructor] Every day, we hear about leaks and breaches, so it's no longer a question of if this going to happen. Now it's a question of when is it going to happen? Companies may be victims of successful intrusion or successful credential staffing attack. For example, attack of validation of certain dump of emails and passwords against a certain website. This attack is based on password reuse. For instance, you can easily verify if an email is compromised in one or more breaches using tools like Have I Been Pwned, GhostProject, DeHashed, but also some of the threat actors may publish their dumps in Pastebin website or other paste websites. So monitoring your accounts through these platforms can help you stay alerted so that you can update your passwords before being abused. Another example of OSINT that I believe is worth mentioning is called Google Dorks. Google offers hacks or most appropriately called Dorks that are…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
Introduction to data collection4m 11s
-
(Locked)
Internal data acquisition6m 38s
-
(Locked)
External data sources7m 7s
-
(Locked)
Private data sources part 18m 37s
-
(Locked)
Private data sources part 23m 42s
-
(Locked)
Community data sources10m 48s
-
(Locked)
Public data sources part 18m
-
(Locked)
Public data sources part 23m 12s
-
(Locked)
Leveraging OSINT part 19m 22s
-
(Locked)
Leveraging OSINT part 26m 50s
-
-
-
-
-
-
-