Time
1 hour 56 minutes
Difficulty
Beginner
CEU/CPE
2

Video Transcription

00:00
just before the quick recap.
00:03
We cannot go through all the tools in detail, but I just wanted Teoh provide you with the information where to even start with the tool part. Off open source intelligence performing Olson is about taking little bits and pieces of information that you are able to extrapolate about a particular person or entity
00:21
and pulling the thread on it to buy running that information through, oh, since tools
00:25
to see what more can be discovered about the target. So to sum up in this module, number four called tools and Techniques, we went on a more technical journey through ascent, which included search engines with an emphasis on Google hacking,
00:40
then through social networks and the most popular related tools to them. After that, techniques and tools for exploring user name and e mails.
00:49
Then we moved on to more dangerous area with leaks and data breaches. And finally, we got to my personal favorite topic about tools, which you can use against the I T systems. But in a good way.
01:00
The next module, called sock puppets, is dedicated to truthful impersonation off fake persons.
01:07
Does that make sense?
01:10
Maybe not. Either way, thanks and ceilings. Next video

Up Next

Open Source Intelligence (OSINT) Fundamentals

In this Open Source Intelligence (OSINT) Fundamentals training course, you will gain fundamental knowledge about OSINT, who uses it, and the ethical implications of using it. Upon completion, students will have a solid understanding of OSINT.

Instructed By

Instructor Profile Image
Tino Sokic
CEO at DobarDan
Instructor