SlideShare a Scribd company logo
1 of 24
WEBINAR ON
ETHICAL HACKING &
CYBERSECURITY
WHO AM I ?
Mohammed Adam
Senior Security Consultant at Crossbow Labs
Foss Activist in VGLUG (Villupuram Gnu/Linux Users
group)
Acknowledged by Top 50+ Companies like US Dept
of defense, AT & T, OPPO, Nokia, Honeywell,
Mcafee, Virus total, Mastercard, Bitdefender, Dell
Technologies, Asus, Intel, Carbon black etc in Bug
bounties.
Youtuber – youtube.com/technux0
LITTLE WARMUP BEFORE STARTING THE SESSION
• Are you a hacker ?
• Do you hack your friends Facebook or WhatsApp accounts ?
• Hacking – is it legal or illegal ?
• What type of hacker you are: Black or grey or white ?
• Have you hacked something in your entire life ?
• Is there a career for hacking ?
5 - STAGES OF ETHICAL HACKING
• Reconnaissance - Information gathering
• Scanning & Enumeration
• Exploitation - Gaining Access
• Post Exploitation - Maintaining Access
• Clearing tracks
WILL START WITH RECON !
• What is Intelligence ?
Wikipedia defines Intelligence as:
One's capacity for logic, understanding, self-awareness, learning, emotional
knowledge, planning, creativity, and problem solving
• In other words:
It is the ability to understand and draw a logical conclusion from the available
information
TYPES OF INTELLIGENCE
● Human Intelligence (HUMINT)
● Geospatial Intelligence (GEOINT)
● Signals Intelligence (SIGINT)
● Open-Source Intelligence (OSINT)
OPEN SOURCE INTELLIGENCE (OSINT)
● Art of collecting information which is scattered on publicly available sources
● Open here refers to overt, publicly available sources
● Not completely legal, as it is against the privacy of a person
● Gathering bits to form the big picture
● Depends on sources. Continuously evolving.
● Information sources could be anything not limited to metadata, social media and
blogs
TRADITIONAL METHODS
● Using search engines Eg: Google, Bing etc
● News sites Eg: CNN, BBC, etc
● Corporate Websites
● Government Websites
● Blogs
● Modern Resources - Advanced Search Engines, Social Media sites,
Deepweb/Darkweb, Automated tool
OSINT IN REAL LIFE
We use OSINT in everyday life
● Finding download links for Game of Thrones series
● Finding the best-looking person
● Knowing about the company before applying for a position
● Knowing your ex’s latest crush :P
WHY OSINT HAS BECOME SO IMPORTANT ?
● Humans by nature try to get others attention
● So many post (personal) information on online platforms thinking that only
intended members will look.
● New smartphones have geo-tagging feature enabled by default
● Metadata of those images can give a glimpse of your daily life
WHAT CAN YOU
FIGURE OUT
FROM THIS ?
CAR LICENSE
BANK AND BANK ACCOUNT
CREDIT
CARD AND
DOB
MOBILE NO, PHONE MODEL, MUCH MORE
TINFOLEAK
DEMO -
TWITTER
IMAGES OR PHOTOS HAS
METADATA INFORMATION
OSINT IN PENTEST
●Webapp
Wappalyzer
RetireJS
● Domain-IP lookup
Whois lookup
Reverse IP Lookup
● Find if emails were previously pwned
HaveIBeenPwned lookup
OSINT IN PENTEST
Advanced Search engine searches: site:*.example.org ext:php | ext:txt | ext:log
● Checking robots.txt
● Advanced search: Wolfram Alpha
● Subdomain enumeration
○ Certificate transparency
○ Shodan
○ Censys
EXAMPLES
REFERENCES:
● https://github.com/jivoi/awesome-osint
● https://blog.appsecco.com/open-source-intelligence-gathering-
101d2861d4429e3
● http://www.osintframework.com/
● http://www.automatingosint.com/blog/
● https://intrigue.io
@iam_amdadam
mohammedadam24
THANKS
Any Questions ?

More Related Content

What's hot

Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivism
Bilal Ali
 
User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacy
cdunk12
 

What's hot (20)

NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
Information Security Engineering
Information Security EngineeringInformation Security Engineering
Information Security Engineering
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivism
 
Cyber security
Cyber securityCyber security
Cyber security
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacy
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Cyber security; one banker s perspective
Cyber security; one banker s perspectiveCyber security; one banker s perspective
Cyber security; one banker s perspective
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
 
Cyber security
Cyber securityCyber security
Cyber security
 
What happened on October 21
What happened on October 21What happened on October 21
What happened on October 21
 

Similar to OSINT - Open Soure Intelligence - Webinar on CyberSecurity

Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Commonwealth Telecommunications Organisation
 

Similar to OSINT - Open Soure Intelligence - Webinar on CyberSecurity (20)

Let’s hunt the target using OSINT
Let’s hunt the target using OSINTLet’s hunt the target using OSINT
Let’s hunt the target using OSINT
 
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
 
DECEPTICONv2
DECEPTICONv2DECEPTICONv2
DECEPTICONv2
 
Osint presentation nov 2019
Osint presentation nov 2019Osint presentation nov 2019
Osint presentation nov 2019
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
CapTech Talks--OSINT- Dr. Kellup Charles 10--6-22.pptx
CapTech Talks--OSINT- Dr. Kellup Charles 10--6-22.pptxCapTech Talks--OSINT- Dr. Kellup Charles 10--6-22.pptx
CapTech Talks--OSINT- Dr. Kellup Charles 10--6-22.pptx
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSEC
 
Enterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringEnterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence Gathering
 
Social Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More BrainsSocial Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More Brains
 
Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU Investigators
 
Judy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 PresentationJudy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 Presentation
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
 
osint - open source Intelligence
osint - open source Intelligenceosint - open source Intelligence
osint - open source Intelligence
 
Reining in the Data ITAG tech360 Penn State Great Valley 2015
Reining in the Data   ITAG tech360 Penn State Great Valley 2015 Reining in the Data   ITAG tech360 Penn State Great Valley 2015
Reining in the Data ITAG tech360 Penn State Great Valley 2015
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risks
 
Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal system
 

More from Mohammed Adam

More from Mohammed Adam (20)

Android Penetration Testing - Day 3
Android Penetration Testing - Day 3Android Penetration Testing - Day 3
Android Penetration Testing - Day 3
 
Android Penetration testing - Day 2
 Android Penetration testing - Day 2 Android Penetration testing - Day 2
Android Penetration testing - Day 2
 
Android Penetration Testing - Day 1
Android Penetration Testing - Day 1Android Penetration Testing - Day 1
Android Penetration Testing - Day 1
 
Wireless Penetration Testing
Wireless Penetration TestingWireless Penetration Testing
Wireless Penetration Testing
 
Network Penetration Testing
Network Penetration TestingNetwork Penetration Testing
Network Penetration Testing
 
Basic Foundation For Cybersecurity
Basic Foundation For CybersecurityBasic Foundation For Cybersecurity
Basic Foundation For Cybersecurity
 
Golden Ticket Attack - AD - Domain Persistence
Golden Ticket Attack - AD - Domain PersistenceGolden Ticket Attack - AD - Domain Persistence
Golden Ticket Attack - AD - Domain Persistence
 
Evading Antivirus software for fun and profit
Evading Antivirus software for fun and profitEvading Antivirus software for fun and profit
Evading Antivirus software for fun and profit
 
Introduction to Network Fundamentals
Introduction to Network FundamentalsIntroduction to Network Fundamentals
Introduction to Network Fundamentals
 
Breaking out of crypto authentication
Breaking out of crypto authenticationBreaking out of crypto authentication
Breaking out of crypto authentication
 
Career Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed AdamCareer Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed Adam
 
BugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed AdamBugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed Adam
 
Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2
 
Android Application Penetration Testing - Mohammed Adam
Android Application Penetration Testing - Mohammed AdamAndroid Application Penetration Testing - Mohammed Adam
Android Application Penetration Testing - Mohammed Adam
 
Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics
 
What is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolWhat is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) Protocol
 
Network Security
Network SecurityNetwork Security
Network Security
 
Networking in Windows Operating System
Networking in Windows Operating SystemNetworking in Windows Operating System
Networking in Windows Operating System
 
Introduction to Networking
Introduction to NetworkingIntroduction to Networking
Introduction to Networking
 
Firewall basics
Firewall basicsFirewall basics
Firewall basics
 

Recently uploaded

Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
chumtiyababu
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 

Recently uploaded (20)

Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 

OSINT - Open Soure Intelligence - Webinar on CyberSecurity

  • 1. WEBINAR ON ETHICAL HACKING & CYBERSECURITY
  • 2. WHO AM I ? Mohammed Adam Senior Security Consultant at Crossbow Labs Foss Activist in VGLUG (Villupuram Gnu/Linux Users group) Acknowledged by Top 50+ Companies like US Dept of defense, AT & T, OPPO, Nokia, Honeywell, Mcafee, Virus total, Mastercard, Bitdefender, Dell Technologies, Asus, Intel, Carbon black etc in Bug bounties. Youtuber – youtube.com/technux0
  • 3. LITTLE WARMUP BEFORE STARTING THE SESSION • Are you a hacker ? • Do you hack your friends Facebook or WhatsApp accounts ? • Hacking – is it legal or illegal ? • What type of hacker you are: Black or grey or white ? • Have you hacked something in your entire life ? • Is there a career for hacking ?
  • 4. 5 - STAGES OF ETHICAL HACKING • Reconnaissance - Information gathering • Scanning & Enumeration • Exploitation - Gaining Access • Post Exploitation - Maintaining Access • Clearing tracks
  • 5. WILL START WITH RECON ! • What is Intelligence ? Wikipedia defines Intelligence as: One's capacity for logic, understanding, self-awareness, learning, emotional knowledge, planning, creativity, and problem solving • In other words: It is the ability to understand and draw a logical conclusion from the available information
  • 6. TYPES OF INTELLIGENCE ● Human Intelligence (HUMINT) ● Geospatial Intelligence (GEOINT) ● Signals Intelligence (SIGINT) ● Open-Source Intelligence (OSINT)
  • 7. OPEN SOURCE INTELLIGENCE (OSINT) ● Art of collecting information which is scattered on publicly available sources ● Open here refers to overt, publicly available sources ● Not completely legal, as it is against the privacy of a person ● Gathering bits to form the big picture ● Depends on sources. Continuously evolving. ● Information sources could be anything not limited to metadata, social media and blogs
  • 8. TRADITIONAL METHODS ● Using search engines Eg: Google, Bing etc ● News sites Eg: CNN, BBC, etc ● Corporate Websites ● Government Websites ● Blogs ● Modern Resources - Advanced Search Engines, Social Media sites, Deepweb/Darkweb, Automated tool
  • 9.
  • 10. OSINT IN REAL LIFE We use OSINT in everyday life ● Finding download links for Game of Thrones series ● Finding the best-looking person ● Knowing about the company before applying for a position ● Knowing your ex’s latest crush :P
  • 11. WHY OSINT HAS BECOME SO IMPORTANT ? ● Humans by nature try to get others attention ● So many post (personal) information on online platforms thinking that only intended members will look. ● New smartphones have geo-tagging feature enabled by default ● Metadata of those images can give a glimpse of your daily life
  • 12. WHAT CAN YOU FIGURE OUT FROM THIS ?
  • 14. BANK AND BANK ACCOUNT
  • 16. MOBILE NO, PHONE MODEL, MUCH MORE
  • 18. IMAGES OR PHOTOS HAS METADATA INFORMATION
  • 19. OSINT IN PENTEST ●Webapp Wappalyzer RetireJS ● Domain-IP lookup Whois lookup Reverse IP Lookup ● Find if emails were previously pwned HaveIBeenPwned lookup
  • 20. OSINT IN PENTEST Advanced Search engine searches: site:*.example.org ext:php | ext:txt | ext:log ● Checking robots.txt ● Advanced search: Wolfram Alpha ● Subdomain enumeration ○ Certificate transparency ○ Shodan ○ Censys
  • 22.
  • 23. REFERENCES: ● https://github.com/jivoi/awesome-osint ● https://blog.appsecco.com/open-source-intelligence-gathering- 101d2861d4429e3 ● http://www.osintframework.com/ ● http://www.automatingosint.com/blog/ ● https://intrigue.io