3
Most read
4
Most read
6
Most read
Open Source
Intelligence - Tools
and Techniques
Session by Gowdhaman (CISO - LatentView Analytics)
2
Topics covered
▪ What is Open Source Intelligence (OSINT)
▪ How Is Open Source Intelligence Used?
▪ The Dark Side of Open Source Intelligence
▪ Open Source Intelligence Techniques
▪ Identifying Sensitive/Confidential information –
Github, Google and websites.
3
What is Open Source Intelligence (OSINT)
▪ Open-source intelligence (OSINT) is data collected
from publicly available sources to be used in an
intelligence context.
▪ According to U.S. public law, open source
intelligence:
▪ Is produced from publicly available information
▪ Is collected, analyzed, and disseminated in a timely
manner to an appropriate audience
▪ Addresses a specific intelligence requirement
▪ “Publicly Available” No Intrusion.
6 Categories of OSINT Sources
▪ Media, print newspapers, magazines, radio, and television from across and
between countries.
▪ Internet, online publications, blogs, discussion groups, citizen media
▪ Public Government Data, public government reports, budgets, hearings,
telephone directories, press conferences, websites, and speeches.
▪ Professional and Academic Publications, information acquired from journals,
conferences, symposia, academic papers, dissertations, and theses.
▪ Commercial Data, commercial imagery, financial and industrial assessments,
and databases.
▪ Grey literature, technical reports, preprints, patents, working papers, business
documents, unpublished works, and newsletters.
4
How It can be used
Security Professionals
▪ Most of the tools and techniques are used by security
professionals to conduct open source intelligence
initiatives.
▪ Accidental leaks of sensitive information, like through
social media
▪ Open ports or unsecured internet-connected devices
▪ Unpatched software, such as websites running old
versions of common CMS products
▪ Leaked or exposed assets, such as proprietary code on
paste bins
Identifying External Threats
▪ Open source intelligence enables security professionals to prioritize their
activities
▪ Threat actors continue to exploit older vulnerabilities, Focus Area is only on :
Zero Day Vulnerability
▪ Report Says - 19 % of exploited vulnerabilities Year Old
▪ With the growing use of smart devices like mobile phones and the various
products - Vulnerabilities are exploited
▪ It can help us to understand what is the awareness level of the organization or
the members.
▪ Having a clear strategy and framework in place for open source intelligence
gathering is
▪ Simple and cost effective and unbiased report
5
Dark Side of Open Source Intelligence
▪ Anything that can be found by security professionals can also be found (and used) by threat
actors.
▪ Threat actors use open source intelligence tools and techniques to identify potential targets and
exploit weaknesses in target networks.
▪ Once a vulnerability is identified, it is often an extremely quick and simple process to exploit it
and achieve a variety of malicious objectives.
▪ This process is the main reason why so many small and medium-sized enterprises get hacked
each year.
▪ Threat actors also seek out information about individuals and organizations that can be used to
inform sophisticated social engineering campaigns using phishing (email), vishing (phone or
voicemail), and SMiShing (SMS).
▪ Often, seemingly innocuous information shared through social networks and blogs can be used
to develop highly convincing social engineering campaigns, which in turn are used to trick well-
meaning users into compromising their organization’s network or assets. Ransomware.
▪ This is why using open source intelligence for security purposes is so important — It gives you
an opportunity to find and fix weaknesses in your organization’s network and remove sensitive
information before a threat actor uses the same tools and techniques to exploit them.
6
Open Source Intelligence - Tools and Techniques
▪ Tools - Excel Spreadsheet
▪ OSINT Framework https://osintframework.com/
7
Github Search
Kindly create a Github account and try using these commands.
▪ “example.com” API_key
▪ “example.com” secret_key
▪ “example.com” aws_key
▪ “example.com” Password
▪ “example.com” FTP
▪ “example.com” login
▪ “example.com” github_token
“Company.com" API_Key
Demo
8
Google Misconfiguration
Use the below script and you can identify the mis configuration in
Google groups and sites
● https://groups.google.com/forum/#!overview
● https://sites.google.com/a/company.com
Automated script
▪ https://github.com/tutorgeeks/G-Audit
9
Website Technologies
● https://www.wappalyzer.com/
● https://web.archive.org
10
Why this is important - Recent incidents
Capital One AWS data
was compromised by
a ex-employer
Attunity (Acquired by Qlik) - How a
Vendor for Half the Fortune 100
Exposed a Terabyte of Backups
British Airways faces a
$230m fine over a data
breach
Zomato Data breach – Git Hub
account compromised – 2FA was
not enabled.
Ubuntu maker’s GitHub
account hacked
11
Reference
▪ https://securitytrails.com/
▪ https://www.recordedfuture.com/
▪ https://inteltechniques.com/menu.html
Thank you!

More Related Content

PPT
7. Key-Value Databases: In Depth
PPTX
Osint {open source intelligence }
PDF
OSINT- Leveraging data into intelligence
PPTX
Tools for Open Source Intelligence (OSINT)
PPTX
OpenSourceIntelligence-OSINT.pptx
PDF
Rapport de Stage PFE - Développement d'un Projet ALTEN MAROC Concernant le Sy...
PDF
Demystifying Prisma Access
PPTX
Security Information Event Management - nullhyd
7. Key-Value Databases: In Depth
Osint {open source intelligence }
OSINT- Leveraging data into intelligence
Tools for Open Source Intelligence (OSINT)
OpenSourceIntelligence-OSINT.pptx
Rapport de Stage PFE - Développement d'un Projet ALTEN MAROC Concernant le Sy...
Demystifying Prisma Access
Security Information Event Management - nullhyd

What's hot (20)

PPT
Open source intelligence
PPTX
OSINT: Open Source Intelligence gathering
PDF
PDF
Open Source Intelligence (OSINT)
PDF
Open source intelligence information gathering (OSINT)
PDF
OSINT with Practical: Real Life Examples
PDF
OSINT for Attack and Defense
PPTX
Effective Threat Hunting with Tactical Threat Intelligence
PDF
Offensive OSINT
PDF
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
PPTX
Cyber Threat Intelligence: Building and maturing an intelligence program that...
PPTX
osint - open source Intelligence
PDF
OSINT 2.0 - Past, present and future
PPT
Owasp osint presentation - by adam nurudini
PDF
From OSINT to Phishing presentation
PPTX
Investigating Using the Dark Web
PPTX
Research in the deep web
PDF
Threat Intelligence Workshop
Open source intelligence
OSINT: Open Source Intelligence gathering
Open Source Intelligence (OSINT)
Open source intelligence information gathering (OSINT)
OSINT with Practical: Real Life Examples
OSINT for Attack and Defense
Effective Threat Hunting with Tactical Threat Intelligence
Offensive OSINT
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
Cyber Threat Intelligence: Building and maturing an intelligence program that...
osint - open source Intelligence
OSINT 2.0 - Past, present and future
Owasp osint presentation - by adam nurudini
From OSINT to Phishing presentation
Investigating Using the Dark Web
Research in the deep web
Threat Intelligence Workshop
Ad

Similar to Osint presentation nov 2019 (20)

PDF
Top 6 Sources for Identifying Threat Actor TTPs
PPTX
A brief of Osint and its uses in cyber crime.pptx
PDF
What makes OSINT Methodologies Vital for Penetration Testing?
PPTX
EthicalHack{aksdladlsfsamnookfmnakoasjd}.pptx
PDF
IRJET- Ethical Hacking
PDF
OSINT: Open Source Intelligence - Rohan Braganza
PDF
Tools and Techniques Used in Open Source Intelligence.pdf
PPTX
Cyberattacks.pptx
PDF
3i mind-open mind-web
PDF
3i mind-open mind-web
PPT
001.itsecurity bcp v1
PDF
Wfh security risks - Ed Adams, President, Security Innovation
PPTX
Web hacking 1.0
PPT
Footprintig (Haching)
PPT
Footprintig(Haching)
PPTX
Cybersecurity: Malware & Protecting Your Business From Cyberthreats
PPTX
Information security - what is going on 2016
PDF
Internet of Things With Privacy in Mind
PDF
Digital Self Defense (RRLC version)
PPTX
Online privacy & security
Top 6 Sources for Identifying Threat Actor TTPs
A brief of Osint and its uses in cyber crime.pptx
What makes OSINT Methodologies Vital for Penetration Testing?
EthicalHack{aksdladlsfsamnookfmnakoasjd}.pptx
IRJET- Ethical Hacking
OSINT: Open Source Intelligence - Rohan Braganza
Tools and Techniques Used in Open Source Intelligence.pdf
Cyberattacks.pptx
3i mind-open mind-web
3i mind-open mind-web
001.itsecurity bcp v1
Wfh security risks - Ed Adams, President, Security Innovation
Web hacking 1.0
Footprintig (Haching)
Footprintig(Haching)
Cybersecurity: Malware & Protecting Your Business From Cyberthreats
Information security - what is going on 2016
Internet of Things With Privacy in Mind
Digital Self Defense (RRLC version)
Online privacy & security
Ad

More from Priyanka Aash (20)

PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
PDF
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
PDF
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
PDF
Lessons Learned from Developing Secure AI Workflows.pdf
PDF
Cyber Defense Matrix Workshop - RSA Conference
PDF
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
PDF
Securing AI - There Is No Try, Only Do!.pdf
PDF
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
PDF
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
PDF
10 Key Challenges for AI within the EU Data Protection Framework.pdf
PDF
Techniques for Automatic Device Identification and Network Assignment.pdf
PDF
Keynote : Presentation on SASE Technology
PDF
Keynote : AI & Future Of Offensive Security
PDF
Redefining Cybersecurity with AI Capabilities
PDF
Demystifying Neural Networks And Building Cybersecurity Applications
PDF
Finetuning GenAI For Hacking and Defending
PDF
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
PDF
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
PDF
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Cyber Defense Matrix Workshop - RSA Conference
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Securing AI - There Is No Try, Only Do!.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Keynote : Presentation on SASE Technology
Keynote : AI & Future Of Offensive Security
Redefining Cybersecurity with AI Capabilities
Demystifying Neural Networks And Building Cybersecurity Applications
Finetuning GenAI For Hacking and Defending
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf

Recently uploaded (20)

PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
DOCX
search engine optimization ppt fir known well about this
PPTX
Chapter 5: Probability Theory and Statistics
PDF
STKI Israel Market Study 2025 version august
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Getting started with AI Agents and Multi-Agent Systems
PPT
What is a Computer? Input Devices /output devices
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
The various Industrial Revolutions .pptx
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPTX
Tartificialntelligence_presentation.pptx
PDF
Hybrid model detection and classification of lung cancer
PDF
Getting Started with Data Integration: FME Form 101
PDF
August Patch Tuesday
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
search engine optimization ppt fir known well about this
Chapter 5: Probability Theory and Statistics
STKI Israel Market Study 2025 version august
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Getting started with AI Agents and Multi-Agent Systems
What is a Computer? Input Devices /output devices
NewMind AI Weekly Chronicles – August ’25 Week III
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Benefits of Physical activity for teenagers.pptx
1 - Historical Antecedents, Social Consideration.pdf
Group 1 Presentation -Planning and Decision Making .pptx
The various Industrial Revolutions .pptx
A contest of sentiment analysis: k-nearest neighbor versus neural network
Tartificialntelligence_presentation.pptx
Hybrid model detection and classification of lung cancer
Getting Started with Data Integration: FME Form 101
August Patch Tuesday

Osint presentation nov 2019

  • 1. Open Source Intelligence - Tools and Techniques Session by Gowdhaman (CISO - LatentView Analytics)
  • 2. 2 Topics covered ▪ What is Open Source Intelligence (OSINT) ▪ How Is Open Source Intelligence Used? ▪ The Dark Side of Open Source Intelligence ▪ Open Source Intelligence Techniques ▪ Identifying Sensitive/Confidential information – Github, Google and websites.
  • 3. 3 What is Open Source Intelligence (OSINT) ▪ Open-source intelligence (OSINT) is data collected from publicly available sources to be used in an intelligence context. ▪ According to U.S. public law, open source intelligence: ▪ Is produced from publicly available information ▪ Is collected, analyzed, and disseminated in a timely manner to an appropriate audience ▪ Addresses a specific intelligence requirement ▪ “Publicly Available” No Intrusion. 6 Categories of OSINT Sources ▪ Media, print newspapers, magazines, radio, and television from across and between countries. ▪ Internet, online publications, blogs, discussion groups, citizen media ▪ Public Government Data, public government reports, budgets, hearings, telephone directories, press conferences, websites, and speeches. ▪ Professional and Academic Publications, information acquired from journals, conferences, symposia, academic papers, dissertations, and theses. ▪ Commercial Data, commercial imagery, financial and industrial assessments, and databases. ▪ Grey literature, technical reports, preprints, patents, working papers, business documents, unpublished works, and newsletters.
  • 4. 4 How It can be used Security Professionals ▪ Most of the tools and techniques are used by security professionals to conduct open source intelligence initiatives. ▪ Accidental leaks of sensitive information, like through social media ▪ Open ports or unsecured internet-connected devices ▪ Unpatched software, such as websites running old versions of common CMS products ▪ Leaked or exposed assets, such as proprietary code on paste bins Identifying External Threats ▪ Open source intelligence enables security professionals to prioritize their activities ▪ Threat actors continue to exploit older vulnerabilities, Focus Area is only on : Zero Day Vulnerability ▪ Report Says - 19 % of exploited vulnerabilities Year Old ▪ With the growing use of smart devices like mobile phones and the various products - Vulnerabilities are exploited ▪ It can help us to understand what is the awareness level of the organization or the members. ▪ Having a clear strategy and framework in place for open source intelligence gathering is ▪ Simple and cost effective and unbiased report
  • 5. 5 Dark Side of Open Source Intelligence ▪ Anything that can be found by security professionals can also be found (and used) by threat actors. ▪ Threat actors use open source intelligence tools and techniques to identify potential targets and exploit weaknesses in target networks. ▪ Once a vulnerability is identified, it is often an extremely quick and simple process to exploit it and achieve a variety of malicious objectives. ▪ This process is the main reason why so many small and medium-sized enterprises get hacked each year. ▪ Threat actors also seek out information about individuals and organizations that can be used to inform sophisticated social engineering campaigns using phishing (email), vishing (phone or voicemail), and SMiShing (SMS). ▪ Often, seemingly innocuous information shared through social networks and blogs can be used to develop highly convincing social engineering campaigns, which in turn are used to trick well- meaning users into compromising their organization’s network or assets. Ransomware. ▪ This is why using open source intelligence for security purposes is so important — It gives you an opportunity to find and fix weaknesses in your organization’s network and remove sensitive information before a threat actor uses the same tools and techniques to exploit them.
  • 6. 6 Open Source Intelligence - Tools and Techniques ▪ Tools - Excel Spreadsheet ▪ OSINT Framework https://osintframework.com/
  • 7. 7 Github Search Kindly create a Github account and try using these commands. ▪ “example.com” API_key ▪ “example.com” secret_key ▪ “example.com” aws_key ▪ “example.com” Password ▪ “example.com” FTP ▪ “example.com” login ▪ “example.com” github_token “Company.com" API_Key Demo
  • 8. 8 Google Misconfiguration Use the below script and you can identify the mis configuration in Google groups and sites ● https://groups.google.com/forum/#!overview ● https://sites.google.com/a/company.com Automated script ▪ https://github.com/tutorgeeks/G-Audit
  • 10. 10 Why this is important - Recent incidents Capital One AWS data was compromised by a ex-employer Attunity (Acquired by Qlik) - How a Vendor for Half the Fortune 100 Exposed a Terabyte of Backups British Airways faces a $230m fine over a data breach Zomato Data breach – Git Hub account compromised – 2FA was not enabled. Ubuntu maker’s GitHub account hacked