SlideShare a Scribd company logo
4
Most read
5
Most read
6
Most read
Open Source
Intelligence - Tools
and Techniques
Session by Gowdhaman (CISO - LatentView Analytics)
2
Topics covered
▪ What is Open Source Intelligence (OSINT)
▪ How Is Open Source Intelligence Used?
▪ The Dark Side of Open Source Intelligence
▪ Open Source Intelligence Techniques
▪ Identifying Sensitive/Confidential information –
Github, Google and websites.
3
What is Open Source Intelligence (OSINT)
▪ Open-source intelligence (OSINT) is data collected
from publicly available sources to be used in an
intelligence context.
▪ According to U.S. public law, open source
intelligence:
▪ Is produced from publicly available information
▪ Is collected, analyzed, and disseminated in a timely
manner to an appropriate audience
▪ Addresses a specific intelligence requirement
▪ “Publicly Available” No Intrusion.
6 Categories of OSINT Sources
▪ Media, print newspapers, magazines, radio, and television from across and
between countries.
▪ Internet, online publications, blogs, discussion groups, citizen media
▪ Public Government Data, public government reports, budgets, hearings,
telephone directories, press conferences, websites, and speeches.
▪ Professional and Academic Publications, information acquired from journals,
conferences, symposia, academic papers, dissertations, and theses.
▪ Commercial Data, commercial imagery, financial and industrial assessments,
and databases.
▪ Grey literature, technical reports, preprints, patents, working papers, business
documents, unpublished works, and newsletters.
4
How It can be used
Security Professionals
▪ Most of the tools and techniques are used by security
professionals to conduct open source intelligence
initiatives.
▪ Accidental leaks of sensitive information, like through
social media
▪ Open ports or unsecured internet-connected devices
▪ Unpatched software, such as websites running old
versions of common CMS products
▪ Leaked or exposed assets, such as proprietary code on
paste bins
Identifying External Threats
▪ Open source intelligence enables security professionals to prioritize their
activities
▪ Threat actors continue to exploit older vulnerabilities, Focus Area is only on :
Zero Day Vulnerability
▪ Report Says - 19 % of exploited vulnerabilities Year Old
▪ With the growing use of smart devices like mobile phones and the various
products - Vulnerabilities are exploited
▪ It can help us to understand what is the awareness level of the organization or
the members.
▪ Having a clear strategy and framework in place for open source intelligence
gathering is
▪ Simple and cost effective and unbiased report
5
Dark Side of Open Source Intelligence
▪ Anything that can be found by security professionals can also be found (and used) by threat
actors.
▪ Threat actors use open source intelligence tools and techniques to identify potential targets and
exploit weaknesses in target networks.
▪ Once a vulnerability is identified, it is often an extremely quick and simple process to exploit it
and achieve a variety of malicious objectives.
▪ This process is the main reason why so many small and medium-sized enterprises get hacked
each year.
▪ Threat actors also seek out information about individuals and organizations that can be used to
inform sophisticated social engineering campaigns using phishing (email), vishing (phone or
voicemail), and SMiShing (SMS).
▪ Often, seemingly innocuous information shared through social networks and blogs can be used
to develop highly convincing social engineering campaigns, which in turn are used to trick well-
meaning users into compromising their organization’s network or assets. Ransomware.
▪ This is why using open source intelligence for security purposes is so important — It gives you
an opportunity to find and fix weaknesses in your organization’s network and remove sensitive
information before a threat actor uses the same tools and techniques to exploit them.
6
Open Source Intelligence - Tools and Techniques
▪ Tools - Excel Spreadsheet
▪ OSINT Framework https://osintframework.com/
7
Github Search
Kindly create a Github account and try using these commands.
▪ “example.com” API_key
▪ “example.com” secret_key
▪ “example.com” aws_key
▪ “example.com” Password
▪ “example.com” FTP
▪ “example.com” login
▪ “example.com” github_token
“Company.com" API_Key
Demo
8
Google Misconfiguration
Use the below script and you can identify the mis configuration in
Google groups and sites
● https://groups.google.com/forum/#!overview
● https://sites.google.com/a/company.com
Automated script
▪ https://github.com/tutorgeeks/G-Audit
9
Website Technologies
● https://www.wappalyzer.com/
● https://web.archive.org
10
Why this is important - Recent incidents
Capital One AWS data
was compromised by
a ex-employer
Attunity (Acquired by Qlik) - How a
Vendor for Half the Fortune 100
Exposed a Terabyte of Backups
British Airways faces a
$230m fine over a data
breach
Zomato Data breach – Git Hub
account compromised – 2FA was
not enabled.
Ubuntu maker’s GitHub
account hacked
11
Reference
▪ https://securitytrails.com/
▪ https://www.recordedfuture.com/
▪ https://inteltechniques.com/menu.html
Thank you!

More Related Content

PPTX
Osint {open source intelligence }
AkshayJha40
 
PPTX
OSINT: Open Source Intelligence gathering
Jeremiah Tillman
 
PDF
What is Open Source Intelligence (OSINT)
Molfar
 
PDF
Open Source Intelligence (OSINT)
festival ICT 2016
 
PPTX
Tools for Open Source Intelligence (OSINT)
Sudhanshu Chauhan
 
PPTX
OpenSourceIntelligence-OSINT.pptx
anonymousanonymous428352
 
PDF
OSINT- Leveraging data into intelligence
Deep Shankar Yadav
 
Osint {open source intelligence }
AkshayJha40
 
OSINT: Open Source Intelligence gathering
Jeremiah Tillman
 
What is Open Source Intelligence (OSINT)
Molfar
 
Open Source Intelligence (OSINT)
festival ICT 2016
 
Tools for Open Source Intelligence (OSINT)
Sudhanshu Chauhan
 
OpenSourceIntelligence-OSINT.pptx
anonymousanonymous428352
 
OSINT- Leveraging data into intelligence
Deep Shankar Yadav
 

What's hot (20)

PPTX
osint - open source Intelligence
Osama Ellahi
 
PDF
Osint
Kamal Rathaur
 
PDF
Open source intelligence information gathering (OSINT)
phexcom1
 
PDF
OSINT: Open Source Intelligence - Rohan Braganza
NSConclave
 
PPTX
Introduction to penetration testing
Nezar Alazzabi
 
PDF
OSINT for Attack and Defense
Andrew McNicol
 
PPT
Open source intelligence
balakumaran779
 
PDF
Offensive OSINT
Christian Martorella
 
PPTX
Bsides Knoxville - OSINT
Adam Compton
 
PPTX
Malware ppt final.pptx
LakshayNRReddy
 
PPTX
Cyber Threat Hunting with Phirelight
Hostway|HOSTING
 
PDF
Threat Intelligence 101 - Steve Lodin - Submitted
Steve Lodin
 
PDF
Cyber Threat Intelligence
Marlabs
 
PDF
Threat Intelligence
Deepak Kumar (D3)
 
PDF
From OSINT to Phishing presentation
Jesse Ratcliffe, OSCP
 
PPTX
Basics of Maltego
Yash Diwakar
 
PPT
Owasp osint presentation - by adam nurudini
Adam Nurudini
 
PPTX
Autopsy Digital forensics tool
Sreekanth Narendran
 
PDF
OSINT with Practical: Real Life Examples
SyedAmoz
 
PPTX
Malware analysis
Prakashchand Suthar
 
osint - open source Intelligence
Osama Ellahi
 
Open source intelligence information gathering (OSINT)
phexcom1
 
OSINT: Open Source Intelligence - Rohan Braganza
NSConclave
 
Introduction to penetration testing
Nezar Alazzabi
 
OSINT for Attack and Defense
Andrew McNicol
 
Open source intelligence
balakumaran779
 
Offensive OSINT
Christian Martorella
 
Bsides Knoxville - OSINT
Adam Compton
 
Malware ppt final.pptx
LakshayNRReddy
 
Cyber Threat Hunting with Phirelight
Hostway|HOSTING
 
Threat Intelligence 101 - Steve Lodin - Submitted
Steve Lodin
 
Cyber Threat Intelligence
Marlabs
 
Threat Intelligence
Deepak Kumar (D3)
 
From OSINT to Phishing presentation
Jesse Ratcliffe, OSCP
 
Basics of Maltego
Yash Diwakar
 
Owasp osint presentation - by adam nurudini
Adam Nurudini
 
Autopsy Digital forensics tool
Sreekanth Narendran
 
OSINT with Practical: Real Life Examples
SyedAmoz
 
Malware analysis
Prakashchand Suthar
 
Ad

Similar to Osint presentation nov 2019 (20)

PDF
Tools and Techniques Used in Open Source Intelligence.pdf
CyberPro Magazine
 
PPTX
Are you aware of the threat intelligence platform open source?
securaa
 
PDF
OWASP_OSINT_Presentation.pdf
netisBin
 
PPTX
Let’s hunt the target using OSINT
Chandrapal Badshah
 
PDF
Are you aware of the threat intelligence platform open source?
securaa
 
PPTX
CYB205-1 Evolving Threat Landscapes_01.pptx
ssuser4db968
 
PDF
CYB205-1 Evolving Threat Landscapes_01.pdf
ssuser4db968
 
PDF
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
Falgun Rathod
 
PPTX
Open Source Intelligence
Napier University
 
PDF
2015 Global Threat Intelligence Report - an analysis of global security trends
DImension Data
 
PPT
Mark Arena - Cyber Threat Intelligence #uisgcon9
UISGCON
 
PPTX
Hacktoberfest'24 _ GDG on Campus BU.pptx
nilaygupta3003
 
PDF
Metodos_y_herramientas_OSINT-Methods-Tools.pdf
calvillografics
 
PPT
1482734.ppt
DorcusSitali
 
PDF
Information Security Intelligence
guest08b1e6
 
PDF
ISSA France Chapter Meeting Supporting Slides November 2013
ISSA France Security Tuesday
 
PPTX
#W7PE1.pptx
immanuelrobin1
 
PDF
6528 opensource intelligence as the new introduction in the graduate cybersec...
Damir Delija
 
PPTX
Osint - null chennai meetup
Akash Thakur
 
PDF
Transforming Expectations for Treat-Intelligence Sharing
EMC
 
Tools and Techniques Used in Open Source Intelligence.pdf
CyberPro Magazine
 
Are you aware of the threat intelligence platform open source?
securaa
 
OWASP_OSINT_Presentation.pdf
netisBin
 
Let’s hunt the target using OSINT
Chandrapal Badshah
 
Are you aware of the threat intelligence platform open source?
securaa
 
CYB205-1 Evolving Threat Landscapes_01.pptx
ssuser4db968
 
CYB205-1 Evolving Threat Landscapes_01.pdf
ssuser4db968
 
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
Falgun Rathod
 
Open Source Intelligence
Napier University
 
2015 Global Threat Intelligence Report - an analysis of global security trends
DImension Data
 
Mark Arena - Cyber Threat Intelligence #uisgcon9
UISGCON
 
Hacktoberfest'24 _ GDG on Campus BU.pptx
nilaygupta3003
 
Metodos_y_herramientas_OSINT-Methods-Tools.pdf
calvillografics
 
1482734.ppt
DorcusSitali
 
Information Security Intelligence
guest08b1e6
 
ISSA France Chapter Meeting Supporting Slides November 2013
ISSA France Security Tuesday
 
#W7PE1.pptx
immanuelrobin1
 
6528 opensource intelligence as the new introduction in the graduate cybersec...
Damir Delija
 
Osint - null chennai meetup
Akash Thakur
 
Transforming Expectations for Treat-Intelligence Sharing
EMC
 
Ad

More from Priyanka Aash (20)

PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
Priyanka Aash
 
PDF
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Priyanka Aash
 
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Priyanka Aash
 
PDF
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Priyanka Aash
 
PDF
Lessons Learned from Developing Secure AI Workflows.pdf
Priyanka Aash
 
PDF
Cyber Defense Matrix Workshop - RSA Conference
Priyanka Aash
 
PDF
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Priyanka Aash
 
PDF
Securing AI - There Is No Try, Only Do!.pdf
Priyanka Aash
 
PDF
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Priyanka Aash
 
PDF
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Priyanka Aash
 
PDF
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Priyanka Aash
 
PDF
Techniques for Automatic Device Identification and Network Assignment.pdf
Priyanka Aash
 
PDF
Keynote : Presentation on SASE Technology
Priyanka Aash
 
PDF
Keynote : AI & Future Of Offensive Security
Priyanka Aash
 
PDF
Redefining Cybersecurity with AI Capabilities
Priyanka Aash
 
PDF
Demystifying Neural Networks And Building Cybersecurity Applications
Priyanka Aash
 
PDF
Finetuning GenAI For Hacking and Defending
Priyanka Aash
 
PDF
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
Priyanka Aash
 
PDF
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
Priyanka Aash
 
PDF
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
Priyanka Aash
 
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
Priyanka Aash
 
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Priyanka Aash
 
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Priyanka Aash
 
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Priyanka Aash
 
Lessons Learned from Developing Secure AI Workflows.pdf
Priyanka Aash
 
Cyber Defense Matrix Workshop - RSA Conference
Priyanka Aash
 
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Priyanka Aash
 
Securing AI - There Is No Try, Only Do!.pdf
Priyanka Aash
 
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Priyanka Aash
 
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Priyanka Aash
 
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Priyanka Aash
 
Techniques for Automatic Device Identification and Network Assignment.pdf
Priyanka Aash
 
Keynote : Presentation on SASE Technology
Priyanka Aash
 
Keynote : AI & Future Of Offensive Security
Priyanka Aash
 
Redefining Cybersecurity with AI Capabilities
Priyanka Aash
 
Demystifying Neural Networks And Building Cybersecurity Applications
Priyanka Aash
 
Finetuning GenAI For Hacking and Defending
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
Priyanka Aash
 

Recently uploaded (20)

PDF
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PPTX
Simple and concise overview about Quantum computing..pptx
mughal641
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PDF
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PDF
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
Software Development Methodologies in 2025
KodekX
 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
Simple and concise overview about Quantum computing..pptx
mughal641
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
Software Development Methodologies in 2025
KodekX
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 

Osint presentation nov 2019

  • 1. Open Source Intelligence - Tools and Techniques Session by Gowdhaman (CISO - LatentView Analytics)
  • 2. 2 Topics covered ▪ What is Open Source Intelligence (OSINT) ▪ How Is Open Source Intelligence Used? ▪ The Dark Side of Open Source Intelligence ▪ Open Source Intelligence Techniques ▪ Identifying Sensitive/Confidential information – Github, Google and websites.
  • 3. 3 What is Open Source Intelligence (OSINT) ▪ Open-source intelligence (OSINT) is data collected from publicly available sources to be used in an intelligence context. ▪ According to U.S. public law, open source intelligence: ▪ Is produced from publicly available information ▪ Is collected, analyzed, and disseminated in a timely manner to an appropriate audience ▪ Addresses a specific intelligence requirement ▪ “Publicly Available” No Intrusion. 6 Categories of OSINT Sources ▪ Media, print newspapers, magazines, radio, and television from across and between countries. ▪ Internet, online publications, blogs, discussion groups, citizen media ▪ Public Government Data, public government reports, budgets, hearings, telephone directories, press conferences, websites, and speeches. ▪ Professional and Academic Publications, information acquired from journals, conferences, symposia, academic papers, dissertations, and theses. ▪ Commercial Data, commercial imagery, financial and industrial assessments, and databases. ▪ Grey literature, technical reports, preprints, patents, working papers, business documents, unpublished works, and newsletters.
  • 4. 4 How It can be used Security Professionals ▪ Most of the tools and techniques are used by security professionals to conduct open source intelligence initiatives. ▪ Accidental leaks of sensitive information, like through social media ▪ Open ports or unsecured internet-connected devices ▪ Unpatched software, such as websites running old versions of common CMS products ▪ Leaked or exposed assets, such as proprietary code on paste bins Identifying External Threats ▪ Open source intelligence enables security professionals to prioritize their activities ▪ Threat actors continue to exploit older vulnerabilities, Focus Area is only on : Zero Day Vulnerability ▪ Report Says - 19 % of exploited vulnerabilities Year Old ▪ With the growing use of smart devices like mobile phones and the various products - Vulnerabilities are exploited ▪ It can help us to understand what is the awareness level of the organization or the members. ▪ Having a clear strategy and framework in place for open source intelligence gathering is ▪ Simple and cost effective and unbiased report
  • 5. 5 Dark Side of Open Source Intelligence ▪ Anything that can be found by security professionals can also be found (and used) by threat actors. ▪ Threat actors use open source intelligence tools and techniques to identify potential targets and exploit weaknesses in target networks. ▪ Once a vulnerability is identified, it is often an extremely quick and simple process to exploit it and achieve a variety of malicious objectives. ▪ This process is the main reason why so many small and medium-sized enterprises get hacked each year. ▪ Threat actors also seek out information about individuals and organizations that can be used to inform sophisticated social engineering campaigns using phishing (email), vishing (phone or voicemail), and SMiShing (SMS). ▪ Often, seemingly innocuous information shared through social networks and blogs can be used to develop highly convincing social engineering campaigns, which in turn are used to trick well- meaning users into compromising their organization’s network or assets. Ransomware. ▪ This is why using open source intelligence for security purposes is so important — It gives you an opportunity to find and fix weaknesses in your organization’s network and remove sensitive information before a threat actor uses the same tools and techniques to exploit them.
  • 6. 6 Open Source Intelligence - Tools and Techniques ▪ Tools - Excel Spreadsheet ▪ OSINT Framework https://osintframework.com/
  • 7. 7 Github Search Kindly create a Github account and try using these commands. ▪ “example.com” API_key ▪ “example.com” secret_key ▪ “example.com” aws_key ▪ “example.com” Password ▪ “example.com” FTP ▪ “example.com” login ▪ “example.com” github_token “Company.com" API_Key Demo
  • 8. 8 Google Misconfiguration Use the below script and you can identify the mis configuration in Google groups and sites ● https://groups.google.com/forum/#!overview ● https://sites.google.com/a/company.com Automated script ▪ https://github.com/tutorgeeks/G-Audit
  • 9. 9 Website Technologies ● https://www.wappalyzer.com/ ● https://web.archive.org
  • 10. 10 Why this is important - Recent incidents Capital One AWS data was compromised by a ex-employer Attunity (Acquired by Qlik) - How a Vendor for Half the Fortune 100 Exposed a Terabyte of Backups British Airways faces a $230m fine over a data breach Zomato Data breach – Git Hub account compromised – 2FA was not enabled. Ubuntu maker’s GitHub account hacked