Moving Past Just Googling It: Harvesting and Using OSINT | SANS@MIC Talk

Subscribers:
64,000
Published on ● Video Link: https://www.youtube.com/watch?v=BVFhMqktkeE



Category:
Guide
Duration: 1:30:35
27,299 views
554


Every single day we use search engines to look for things on the internet. Defenders research a domain or IP that contains malware. Attackers look for email addresses for an upcoming phishing campaign. DFIR people examine locations and usernames that they acquired from a subject's computer. Policy and compliance people examine the risk that employees in their organizations might bring to work. Recruiters scour the internet looking for candidates. And "normal people" shop, date, geolocate, post, tweet, and otherwise send a huge amount of data to the public internet.

While search engines harvest, store, and index billions of web site data points every day, there is much they do not contain. These pieces of OSINT data can, when put in perspective and analyzed, reveal target geolocations, friends and associates, alcohol consumption, user passwords, and more. This talk will be a series of hands on, live demos where we put our OSINT skills to work in unconventional places to harvest this unindexed OSINT data.

Using free web sites, built in web browser tools, and free python scripts, Micah will show attendees how to harvest data from social media applications, the "whois" system, and from breach data that will not appear in search engine results. Students will gain a better understanding of JSON, APIs, reverse whois, and how to run python tools.

Come join Micah as he examines how to move beyond "Googling it" in your personal and professional lives.

Speaker Bio
Micah Hoffman has been active in the information technology field since 1998, working with federal government, commercial, and internal customers to discover and quantify cybersecurity weaknesses within their organizations. As a highly active member of the cybersecurity and OSINT communities, Micah uses his real-world Open-Source Intelligence (OSINT), penetration testing, and incident response experience to provide customized solutions to his customers and comprehensive instruction to his students.

Over the years, Micah has conducted cyber-related tasks like penetration testing, OSINT investigations, APT hunting, and risk assessments for government, internal, and commercial customers. Micah's SANS coursework, cybersecurity expertise, and inherent love of teaching eventually pulled him toward an instructional role, and he's been a SANS Certified Instructor since 2013. He's the author of the SANS course SEC487: Open Source Intelligence Gathering and Analysis, and also teaches both SEC542: Web App Penetration Testing and Ethical Hacking and SEC567: Social Engineering for Penetration Testers.




Other Videos By SANS Institute


2020-06-09SANS Live Online Interactive Local Lab Demo – FOR508: Advanced Incident Response
2020-06-09SANS Live Online Interactive Live Lab Environment Demo: Slack, Local and Remote Lab Demonstrations
2020-06-09CYA by Using CIA -- Correctly For a Change | SANS@MIC Talk
2020-06-09Remote Forensic Investigations in the Context of COVID-19 | SANS@MIC Talk
2020-06-05Waiting for a cyber range exercise is not enough | SANS@MIC Talk
2020-06-03Case Study: Airbus
2020-06-02WinSCP: Yeah you know me! | SANS@MIC Talk
2020-05-28Prioritizing OT Security Efforts: The Five Tactical Things to Accomplish | SANS@MIC Talk
2020-05-28Introduction to Docker for security work | SANS@MIC Talk
2020-05-27Threat Hunting and the Rise of Targeted eCrime Intrusions | STAR Webcast
2020-05-21Moving Past Just Googling It: Harvesting and Using OSINT | SANS@MIC Talk
2020-05-20Find_Evil - Threat Hunting | SANS@MIC Talk
2020-05-18Tricking modern endpoint security products | SANS@MIC Talk
2020-05-18Modern Domain Deception - The risk, issues and potentiality | SANS@MIC Talk
2020-05-14Cloud Native Payloads: A Matryoshka Doll of Exploits | SANS@MIC Talk
2020-05-14Incident Response in ICS in times of Lockdown | SANS@MIC Talk
2020-05-13SANS – Your Source for Cybersecurity Training – Live Online
2020-05-12Coalfire penetration testers charged with criminal trespass | SANS@MIC Talk
2020-05-12Using the OSINT Mind-State for Better Online Investigations | SANS@MIC Talk
2020-05-11Discovering Vulnerabilities Using IDA Scripting - SANS Pen Test HackFest Summit 2019
2020-05-07The Hackers Apprentice | SANS@MIC Talk



Tags:
sans institute
information security
cyber security
cybersecurity
information security training
cybersecurity training
cyber security training
OSINT
Harvesting