2. o Gathering data
o Analyzing data
o Identify Threats
o Potential
o Actual
Threat Intelligence
3. o Data that is available to the public
o Company information made public
Open Source Intelligence
4. o Open Source
o Not what you might think!
o Open as in available publicly
Open Source Intelligence
5. o Resource examples
o New media
o Census data
o Conferences/webinars
Open Source Intelligence
6. o Resource examples
o Supplier websites
o Phone number/email searches
Open Source Intelligence
7. o Why use it?
o Information made available
o External threats
o Potential or existing data leaks
o Increase defense strategies
Open Source Intelligence
Think of “With a search engine like Google at my fingertips, what could a search for that is public knowlege
Think of “With a search engine like Google at my fingertips, what could a search for that is public knowlege
Think of “With a search engine like Google at my fingertips, what could a search for that is public knowlege
Think of “With a search engine like Google at my fingertips, what could a search for that is public knowlege
Think of “With a search engine like Google at my fingertips, what could a search for that is public knowlege
Think of “With a search engine like Google at my fingertips, what could a search for that is public knowledge
Determine Information being made available
Identify External Threats
Identify potential or existing data leaks
Increase defense strategies
Think of “With a search engine like Google at my fingertips, what could a search for that is public knowlege
https://osintframework.com/ by Justin Nordine and is on GitHub
https://lookup.icann.org/lookup Facebook ( hey look there are the DNS servers, can we poison it?
Censys – scans Internet for devices exposed to the Internet asnd return a report on how they are configured and deployed
https://tools.kali.org/information-gathering/maltego-teeth