ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

Moving Past Just Googling It: Harvesting and Using OSINT | SANS@MIC Talk

Автор: SANS Institute

Загружено: 2020-03-17

Просмотров: 33383

Описание: Every single day we use search engines to look for things on the internet. Defenders research a domain or IP that contains malware. Attackers look for email addresses for an upcoming phishing campaign. DFIR people examine locations and usernames that they acquired from a subject's computer. Policy and compliance people examine the risk that employees in their organizations might bring to work. Recruiters scour the internet looking for candidates. And "normal people" shop, date, geolocate, post, tweet, and otherwise send a huge amount of data to the public internet. While search engines harvest, store, and index billions of web site data points every day, there is much they do not contain. These pieces of OSINT data can, when put in perspective and analyzed, reveal target geolocations, friends and associates, alcohol consumption, user passwords, and more. This talk will be a series of hands on, live demos where we put our OSINT skills to work in unconventional places to harvest this unindexed OSINT data. Using free web sites, built in web browser tools, and free python scripts, Micah will show attendees how to harvest data from social media applications, the "whois" system, and from breach data that will not appear in search engine results. Students will gain a better understanding of JSON, APIs, reverse whois, and how to run python tools. Come join Micah as he examines how to move beyond "Googling it" in your personal and professional lives.

Speaker Bio
Micah Hoffman has been active in the information technology field since 1998, working with federal government, commercial, and internal customers to discover and quantify cybersecurity weaknesses within their organizations. As a highly active member of the cybersecurity and OSINT communities, Micah uses his real-world Open-Source Intelligence (OSINT), penetration testing, and incident response experience to provide customized solutions to his customers and comprehensive instruction to his students.

Over the years, Micah has conducted cyber-related tasks like penetration testing, OSINT investigations, APT hunting, and risk assessments for government, internal, and commercial customers. Micah's SANS coursework, cybersecurity expertise, and inherent love of teaching eventually pulled him toward an instructional role, and he's been a SANS Certified Instructor since 2013. He's the author of the SANS course SEC487: Open Source Intelligence Gathering and Analysis, and also teaches both SEC542: Web App Penetration Testing and Ethical Hacking and SEC567: Social Engineering for Penetration Testers.

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
Moving Past Just Googling It: Harvesting and Using OSINT | SANS@MIC Talk

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

Инструменты OSINT для отслеживания вас. Вы не сможете спрятаться.

Инструменты OSINT для отслеживания вас. Вы не сможете спрятаться.

I'm Sorry Dave, I Can't Do That: Practical Machine Learning for Information Security | SANS@MIC Talk

I'm Sorry Dave, I Can't Do That: Practical Machine Learning for Information Security | SANS@MIC Talk

Stealth persistence strategies | SANS@MIC Talk

Stealth persistence strategies | SANS@MIC Talk

Путин решил продать Россию? / Объявлено чрезвычайное положение

Путин решил продать Россию? / Объявлено чрезвычайное положение

PowerShell 2020: State of the Art / Hack / Infection - SANS@Mic Keynote Network Security

PowerShell 2020: State of the Art / Hack / Infection - SANS@Mic Keynote Network Security

OSINT для новичков: найдите всё о юзернейме и фото с Sherlock и Google Dorks!

OSINT для новичков: найдите всё о юзернейме и фото с Sherlock и Google Dorks!

Blue Team | Determining Malice Through Context and Analytics

Blue Team | Determining Malice Through Context and Analytics

Why Tabletop Exercises Make MSPs Indispensable to Their Clients

Why Tabletop Exercises Make MSPs Indispensable to Their Clients

SANS Webcast: OSINT for Pentesters  Finding Targets and Enumerating Systems

SANS Webcast: OSINT for Pentesters Finding Targets and Enumerating Systems

OSINT для начинающих: узнайте всё о ком угодно!

OSINT для начинающих: узнайте всё о ком угодно!

Red Team | Subverting macOS Apps and Security Controls

Red Team | Subverting macOS Apps and Security Controls

OSINT Tools for Diving Deep into the Dark Web

OSINT Tools for Diving Deep into the Dark Web

«Крещение Руси» в Женеве, Залужный открыто выступил против Зеленского Усик намекнул на президентство

«Крещение Руси» в Женеве, Залужный открыто выступил против Зеленского Усик намекнул на президентство

BG - From Email Address to Phone Number: A New OSINT Approach - Martin Vigo

BG - From Email Address to Phone Number: A New OSINT Approach - Martin Vigo

Лекция от легенды ИИ в Стэнфорде

Лекция от легенды ИИ в Стэнфорде

OSINT Google and Social Networks Hacks

OSINT Google and Social Networks Hacks

Using Mobile Apps to Leverage OSINT Investigations

Using Mobile Apps to Leverage OSINT Investigations

Learning OSINT from the BOSS (Joe Gray Interview)

Learning OSINT from the BOSS (Joe Gray Interview)

The 2 AM Call: A Ransomware Negotiator's Playbook with Wade Gettle

The 2 AM Call: A Ransomware Negotiator's Playbook with Wade Gettle

Using the NIST AI Risk Management Framework // Applied AI Meetup October 2023

Using the NIST AI Risk Management Framework // Applied AI Meetup October 2023

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]