From the course: Advanced Cyber Threat Intelligence

Unlock this course with a free trial

Join today to access over 24,900 courses taught by industry experts.

Leveraging OSINT part 2

Leveraging OSINT part 2

- [Instructor] Every day, we hear about leaks and breaches, so it's no longer a question of if this going to happen. Now it's a question of when is it going to happen? Companies may be victims of successful intrusion or successful credential staffing attack. For example, attack of validation of certain dump of emails and passwords against a certain website. This attack is based on password reuse. For instance, you can easily verify if an email is compromised in one or more breaches using tools like Have I Been Pwned, GhostProject, DeHashed, but also some of the threat actors may publish their dumps in Pastebin website or other paste websites. So monitoring your accounts through these platforms can help you stay alerted so that you can update your passwords before being abused. Another example of OSINT that I believe is worth mentioning is called Google Dorks. Google offers hacks or most appropriately called Dorks that are…

Contents