Social Networks

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
2 hours 26 minutes
Difficulty
Beginner
CEU/CPE
2
Video Transcription
00:00
hello to you all
00:02
in the past video, we went over the search engines with a couple of Google demos, and in this video we will say something about social networks. Actually give you a basic understanding how fast changing they are in the ocean context.
00:17
This is, for me the toughest chapter, because if I mentioned any of the tools and techniques now, tomorrow, maybe they will be unavailable or irrelevant to listen. So I decided to give you some basic understanding about them. I made a list of the most popular social networks out there.
00:33
The only one that I personally like is linked in the first on the list is, of course, Facebook. As the biggest one
00:40
I would like to share with you have fun side effect to illustrate how big it is.
00:45
Did you know that Facebook's removed 3.39 billion fake accounts from October 2018 to March 2019? Ah, fun fact to think about.
00:57
Besides the fake accounts, one of the biggest features for the oath and community that was removed by Facebook in 2019 was the graph search functionality. That feature allows you to find information about your network or friends by using a natural language search. For an example, you could type
01:15
my friends who love skiing
01:17
in the Facebook search box, and you would get a list of people who indicated the day love skiing. Now we're more focused on the available search filters and playing with the you are else to try to acquire those that information. Next, I would like to mention Twitter,
01:34
which is a little better if you look at it from another perspective.
01:38
I would emphasize the ability to get the user's location through a tool like tweet map, which we mentioned in the previous module. Also, Twitter has the ability to do searches via the search operators, so encourage you to check them out. Next. Islington, which is, as I mentioned, my favorite social network
01:57
Onley because it is a business network.
01:59
At least it is designed to be this way, because I see all the time people who put Facebook like content there. Regarding the tools, I'll recommend checking out the scraping kind of tools that are available for Lincoln.
02:12
Those tools literally scrape data from Lincoln and give you the possibility to search the results. As you know, When you are logged into LinkedIn and you view someone's profile, that person will find out who view them. And I would like to share a cool tip how to look at someone's LinkedIn profile anonymously,
02:29
which I have learned from the nose and colleague at austin curious dot com.
02:32
This lengthen information is in regard. Onley toe the publicly available profile details that the target person shared, intentionally or unintentionally.
02:43
Here we are again in our safe browser. We need to access the profile link via Google Search,
02:50
and I will take myself as an example. So go to Google.
02:53
Search for the Tina Shock. It's linked in profile.
03:01
Open it.
03:05
And as you can see, we are unable to look at the profile without linking, bothering us to sign in or to register.
03:12
Then go back to the Google results,
03:16
copy the profile link
03:20
and then go to the Google's mobile friendly Tester Page,
03:23
which is located on the search that
03:28
google dot com slash test
03:31
Flash mobile minus friendly
03:38
based The Link Tins Profile Link
03:45
Click test u R l
03:47
do a little robot test.
03:53
Wait for the results
03:59
on the right side. Take the HTML code off the linked in profile
04:03
copied
04:06
and as a final step, go to the website code.
04:11
Beautify
04:14
dot orig slash html
04:18
You were,
04:20
or to any similar side that enables you to check your HTML code life.
04:25
There are more than a few of them out there,
04:28
as you can see in the Left column, called HTML Input
04:30
based. The previously copied, linked in profile HTML code
04:40
click, run
04:43
and voila!
04:44
In the right column is the linked in profile.
04:48
As you can see, at least on mine,
04:50
you can get all kinds of fearful about me or about your target
05:00
back to our lesson slide after Lincoln. I would like to mention Instagram where you will be forced to do a lot of Google Dorking. But there are some interesting services, like stock fast dot com, which allows you to display followers and friends inside the static. U R l
05:16
or there is an INSTAGRAM service that lets you download instagram stories on stories sick dot com
05:23
and those of you who are familiar with instagram stories. You know that they disappeared 24 hours after they have been posted.
05:30
Next is Snapchat, which, as innocent resource is a bit tricky since its content is set to auto destruct after a specific period of time.
05:41
Here is an interesting tool from Snapchat on the site map dot Snapchat dot com to view the locations off snap content around the world. And also you can always use Google Dorking for your Snapchat research.
05:55
Last on my list is stick talk, which is insanely becoming popular. At this moment. I have encountered a few tools that search for user names or hashtags, but they do not last long. One of the tools is listening this slide.
06:09
In the end, the best bet is on Google Dorking and playing with the Tik TAKS you are else. In this video, we made a quick overview off social networks with some recommendations off tools that you can use for your old sent investigations.
06:23
The best way would be to search for a specific social network with the bird Oh, Sinton Google. And in the next video we will cover emails and user names. So see you there
Up Next
Open Source Intelligence (OSINT) Fundamentals

In this Open Source Intelligence (OSINT) Fundamentals training course, you will gain fundamental knowledge about OSINT, who uses it, and the ethical implications of using it. Upon completion, students will have a solid understanding of OSINT.

Instructed By