OSINT: Open-Source Intelligence
- Descrição
- Currículo
- FAQ
- Revisões
In this course you will be learning about OSINT (Open-source intelligence) from a hacker’s point of view. Tools, techniques, setting up a virtual lab, and how to protect yourself. This is a comprehensive course that will be using free open source tools to investigate people and companies. No matter if you are totally new to the fascinating world of OSINT and hacking or have some experience, this course will walk you through how both hackers and investigators use these tools and why.
This course is designed to be beginner friendly and also help educate experienced individuals alike with a easy to follow and practical approach. Your safety is also important as we explore the use of sock puppets, a Linux virtual machine and more.
Worried about out of date content? I have gone through updating the content as things change, become obsolete, I find new cool tools, or techniques. These updates are free along with the bonus content.
Get stuck or have a question? Always feel free to send me a message and I will do my best to help you out!
FYI, a reminder: I not anyone that is a part of DGS has any affiliation with any of the vendors, software manufactures, or programmers in this course.
-
1IntroductionVídeo Aula
An introduction to the course, myself, and expectations for OSINT
-
2DisclaimerVídeo Aula
- The tools presented in this course are free and open-source
- All of the information that we gather and analyze are from publicly available sources
- While OSINT is also used by hackers, OSINT in itself is not illegal (check with your local laws). We are not exploiting systems or people to obtain this information.
- I am not responsible for misuse of the information or techniques demonstrated in this course.
- I am not responsible for for lost, corrupted, or otherwise altered/damaged files, software or hardware.
- This course is presented on a "As is" basis.
-
3What is OSINT and who is OSINT for?Vídeo Aula
-
4Mental preparationVídeo Aula
-
5Data sheetVídeo Aula
-
6OSINT PathVídeo Aula
-
7What will you need?Vídeo Aula
What will you need for this course?
-
8Your tools will breakVídeo Aula
-
9AskVídeo Aula
-
10Crossing the lineVídeo Aula
-
13VirtualizationVídeo Aula
What is virtualization? We discuss what virtualization is and why you would want to use it.
-
14Installing Virtualbox (Windows host)Vídeo Aula
-
15CSILinux installVídeo Aula
-
16Temp CSI DownloadTexto
-
17Linux Terminal basicsVídeo Aula
In this video we will be going over some basic Linux terminal commands. While knowing terminal commands is not necessary for OSINT per se, it is useful o have a basic understanding of them.
-
18BiasVídeo Aula
-
19Why a sock puppet account and what is it?Vídeo Aula
-
20More sock puppets GmailVídeo Aula
-
21SudoVídeo Aula
There may be times where we need to conceal our real identity or just need a burner telephone number, text message, and/or email. Sudo to the rescue! This is currently a iOS only app.
-
22Temp mailVídeo Aula
Using a temporary email solution instead of your burner email.
-
23Using Text Free for texting updatedVídeo Aula
-
24CSI Linux Sock PuppetsVídeo Aula
-
25Handling dataVídeo Aula
In this video we talk about handling data and some tips on how not to become overwhelmed.
-
26Cherry tree templatesTexto
These are a couple templates for a OSINT report. There is a technical report and a executive report template. Feel free to modify them to fit your needs.
-
27Opening Cherry tree files With audioVídeo Aula
-
28Additional content: How to use Cherrytree templatesVídeo Aula
-
29Keeping your data safeVídeo Aula
In this video we look at some options to keep your data and yourself secure.
-
30Google Advanced OperatorsVídeo Aula
In this video we will be looking at some advanced search techniques using Google.
-
31Google MapsVídeo Aula
In this video we will be looking at Google maps and how it can be used in OSINT
-
32Google ImagesVídeo Aula
In this video we talk about doing a reverse image search with Google.
-
33Exact match Google ImagesVídeo Aula
-
34Google alertsVídeo Aula
Google and Twitter alerts
-
35Other reverse image searchesVídeo Aula
In this video we explore other reverse image options
-
36GeolocationVídeo Aula
-
37GreynoiseVídeo Aula
-
38Reverse emailVídeo Aula
In this video we will be looking at some techniques to perform reverse email searches on our target.
Currently Behindemail is no longer in service.
-
39Phone OSINTVídeo Aula
-
40Additional content: Reverse phone US and EuropeVídeo Aula
-
41Reverse PhoneVídeo Aula
In this video we will be looking at reverse number lookups.
-
42Deepfake detectionVídeo Aula
https://platform.sensity.ai/deepfake-detection
-
43Deepware.aiVídeo Aula
-
45Black Book OnlineVídeo Aula
https://www.blackbookonline.info/index.html
-
46USA Public Data SearchVídeo Aula
Cibib is now xlek, thank you Everand for the heads up.
-
47Dehashed (Updated 2/2/19)Vídeo Aula
In this video we take a look at the breach site Dehashed.
-
48';--have i been pwned?Vídeo Aula
In this video we learn about have i been pwned and how it can help in OSINT
-
49webmiiVídeo Aula
In this video we are looking at webmii.com to search a person's internet footprint.
-
50Resume findersVídeo Aula
In this video we look at some resume finders and how they can be applied to OSINT
-
51Family treesVídeo Aula
In this video we talk a look at how family trees can be applied to OSINT and some sites.
-
52Property ownershipVídeo Aula
-
53HospitalsVídeo Aula
-
54Instant CheckmateVídeo Aula
-
55Unmask Google UsersVídeo Aula
-
56SpiderfootVídeo Aula
In this section we will be looking at Spiderfoot, a program designed to crawl websites and harvest information.
https://sf-1485db5.hx.spiderfoot.net/
-
57wget and HTTrackVídeo Aula
-
58Updated: MetagoofilVídeo Aula
https://github.com/laramies/metagoofil
-
59Webpage CacheVídeo Aula
The internet never forgets... In this video we will be looking at some options to retrieve lost pages from the internet.
-
60Saving to the Internet ArchiveVídeo Aula
-
61The darkwebVídeo Aula
In this video we will be talking about the darkweb, what it is, navigating it, tips and a demonstration.
-
62TorVídeo Aula
What is the dark web, how to get there. Mobile, Onions, and Tor
-
632 VPN or not 2 VPN with TorVídeo Aula
-
64Ahmia.fiVídeo Aula
-
65CSI Tor GatewayVídeo Aula
-
66Filtering fake news with SurfSafeVídeo Aula
In this video we take a look at the tool SafeSurf that can be used to analyze news photos to make sure they are legitimate.
-
67Image CapturingVídeo Aula
In this video we will be looking at different options to save videos and images from our targets.
-
68User agent switcherVídeo Aula
-
69start.meVídeo Aula
-
70Building a Facebook sock puppet accountVídeo Aula
-
71Twitter Mind mapVídeo Aula
-
72TwitterVídeo Aula
In this video we look at Tinfoleak that is preinstalled on CSI Linux for Twitter OSINT
-
73X Part 2Vídeo Aula
-
74Facebook IDVídeo Aula
In this video we talk about getting a user's Facebook ID number
-
75FB DownVídeo Aula
In this video we talk about downloading Facebook videos
-
76Bypassing Youtube login BonusVídeo Aula
In this video we talk about how to bypass a Youtube login to view a video.
-
77Additional content: Using social media to track the Capitol riotsVídeo Aula
https://projects.propublica.org/parler-capitol-videos/
https://intelx.io/?did=814b39fe-ad98-45a1-9f44-0346bc9f9b94
-
78Bonus User searches with MaigretVídeo Aula
https://github.com/soxoj/maigret
-
79Youtube Data ViewerVídeo Aula
https://citizenevidence.amnestyusa.org/
-
80Fixed Bonus: Profil3rVídeo Aula
-
81BlueskyVídeo Aula
-
82internect.infoVídeo Aula
-
83HoaxyVídeo Aula
