The Dark Arts of OSINT - Layerone 2013
The proliferation and availability of public information has increased with the evolution of its dissemination—from print, radio, and TV, to networked communications of the Internet Age. With the constant creation of digital document archives and the migration towards a paperless society, vast databases of information are continuously being generated. Collectively, these publicly available databases contain enough specific information to pose certain vulnerabilities. The actionable intelligence ascertained from these data sources is known as Open Source Intelligence (OSINT).
Numerous search techniques and applications exist to harvest data for OSINT purposes. Advanced operator use, social network searches, geospatial data aggregation, network traffic graphs, image specific searches, metadata extractors, and government databases, provide a wealth of useful data. Furthermore, applications such as FOCA, Maltego, and SearchDiggity, in addition to custom site API integration, yield powerful search queries with organized results.
Fluency in OSINT methodologies is essential for effective online reconnaissance, although a true mastery requires further mathematical investigation. The use of statistical correlation can often reveal hidden data relationships. Linkage attacks, inferential analysis, and deductive disclosure can exploit improperly sanitized data sets. These techniques can ultimately lead to data re-identification and de-anonymization, thus exposing personal information for exploitation.
About the speakers:
An IT industry veteran, with 20+ years of experience, Dr. Noah Schiffman is a former black-hat hacker turned security consultant. He spent almost a decade as a career computer hacker, performing penetration testing, social engineering, corporate espionage, digital surveillance, and other ethically questionable projects. Subsequently, he worked as a security consultant, teaching network defense, giving talks, and writing about information security. His past clients have consisted of Fortune 500 companies and various government agencies. For the past several years, his R&D efforts in the commercial and defense sectors have covered areas of data analysis and pattern recognition for security applications. With 20+ years of experience in network security and computer science, Trevor possesses a unique skillset of technological diversity and depth. His accomplishments range from the design and support of enterprise level system architectures, to developing custom security products and solutions. As an industry leader in the hacker community, his expertise in vulnerability assessment and exploitation, provide him with valuable insight for developing security strategies. He is responsible for establishing and running several Information Security conferences, including Outerz0ne and SkyDogCon. Working for Vanderbilt University, he spends his time researching security, performing data recovery services, and managing 100+ terabytes of storage.
Видео The Dark Arts of OSINT - Layerone 2013 канала blak angel
Numerous search techniques and applications exist to harvest data for OSINT purposes. Advanced operator use, social network searches, geospatial data aggregation, network traffic graphs, image specific searches, metadata extractors, and government databases, provide a wealth of useful data. Furthermore, applications such as FOCA, Maltego, and SearchDiggity, in addition to custom site API integration, yield powerful search queries with organized results.
Fluency in OSINT methodologies is essential for effective online reconnaissance, although a true mastery requires further mathematical investigation. The use of statistical correlation can often reveal hidden data relationships. Linkage attacks, inferential analysis, and deductive disclosure can exploit improperly sanitized data sets. These techniques can ultimately lead to data re-identification and de-anonymization, thus exposing personal information for exploitation.
About the speakers:
An IT industry veteran, with 20+ years of experience, Dr. Noah Schiffman is a former black-hat hacker turned security consultant. He spent almost a decade as a career computer hacker, performing penetration testing, social engineering, corporate espionage, digital surveillance, and other ethically questionable projects. Subsequently, he worked as a security consultant, teaching network defense, giving talks, and writing about information security. His past clients have consisted of Fortune 500 companies and various government agencies. For the past several years, his R&D efforts in the commercial and defense sectors have covered areas of data analysis and pattern recognition for security applications. With 20+ years of experience in network security and computer science, Trevor possesses a unique skillset of technological diversity and depth. His accomplishments range from the design and support of enterprise level system architectures, to developing custom security products and solutions. As an industry leader in the hacker community, his expertise in vulnerability assessment and exploitation, provide him with valuable insight for developing security strategies. He is responsible for establishing and running several Information Security conferences, including Outerz0ne and SkyDogCon. Working for Vanderbilt University, he spends his time researching security, performing data recovery services, and managing 100+ terabytes of storage.
Видео The Dark Arts of OSINT - Layerone 2013 канала blak angel
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Improving Social Engineering Campaigns with Narrative Construction - Layerone 2013](https://i.ytimg.com/vi/J_kRdr6G0JE/default.jpg)
![You've been DDoSed- it's not a joke anymore! - LayerOne 2014](https://i.ytimg.com/vi/Yx7rEAeIXwI/default.jpg)
![Long Lost Locks: The X-Patents - Layerone 2013](https://i.ytimg.com/vi/5BmxvnHUTTY/default.jpg)
![Data Evaporation on SSDs (plus DoS) - Layerone 2013](https://i.ytimg.com/vi/gtZvV-IX6PQ/default.jpg)
![Violent Python & the Antivirus Scam - LayerOne 2014](https://i.ytimg.com/vi/cpGGNAMTJNU/default.jpg)
![3D Printing Our Way to Skynet - LayerOne 2014](https://i.ytimg.com/vi/xURwBvatF_Y/default.jpg)
![Detecting and Defending Against State Actor Surveillance - LayerOne 2014](https://i.ytimg.com/vi/mz8qyd8oA9Y/default.jpg)
![Reverse Engineering 101 - LayerOne 2014](https://i.ytimg.com/vi/gvtcmttqjvc/default.jpg)
![Lockpicking In Popular Media - LayerOne 2014](https://i.ytimg.com/vi/cg5UiOdNkQw/default.jpg)
![You're HIPAA certified and Bob just killed someone from the parking lot - LayerOne 2014](https://i.ytimg.com/vi/QDAOogn-RV8/default.jpg)
![Cognitive Enhancement: Drugs, Electricity and Bullsh*t - Layerone 2013](https://i.ytimg.com/vi/nCy9FPnKPWU/default.jpg)
![Differential Cryptanalysis for Dummies - Layerone 2013](https://i.ytimg.com/vi/Epb5h13S6-Q/default.jpg)
![Hardware Reverse Engineering 101 - Layerone 2013](https://i.ytimg.com/vi/eYN4rHUfISg/default.jpg)
![Making of the 2014 L1 badge - LayerOne 2014](https://i.ytimg.com/vi/Bv_oi2IYAxs/default.jpg)
![Lockpicking Village - Intro to Lockpicking - Layerone 2013](https://i.ytimg.com/vi/hvTy545q04c/default.jpg)
![Closing Remarks - LayerOne 2014](https://i.ytimg.com/vi/2p2D9zd5ROM/default.jpg)
![Privacy and Policy - LayerOne 2014](https://i.ytimg.com/vi/Z1KqbeLVkP0/default.jpg)
![Bug Bounty Extortion - LayerOne 2014](https://i.ytimg.com/vi/k_Vvdi_vjQY/default.jpg)
![Are You A Janitor Or A Cleaner - LayerOne 2014](https://i.ytimg.com/vi/y8Y_tI-CWYs/default.jpg)
![Teaching your WAF new tricks - Layerone 2013](https://i.ytimg.com/vi/fZfbkq6fy0I/default.jpg)