Open Source Intelligence Methods (OSINT) Training

Introduction

The OSINT training course provides extensive information relating to surface and deep web searching along with advanced online search techniques & strategies, online privacy / anonymity tools, counterintelligence techniques used by the criminal element, utilize database systems, archiving tools and methods to obtain archived pages & hidden information, search techniques of blogs and social networks, geolocating, image recognition, transfer of large files, screen shot capabilities, and analysis, organization, preparation as well as writing reports for the information developed.

 

Learning Objectives

This open source internet training will give the investigator the knowledge to research individuals, companies, organisations and internet traffic. This specialist training is aimed at:

  • Commercial & Private Investigators
  • Researchers
  • Corporate Security & Intelligence Teams
  • Investigative Journalists
  • Enforcement Officers
  • Close Protection Officers
  • Due Diligence Investigators
  • Professional Witnesses
  • Debt Collectors 

Topics Covered in the 2 Day OSINT workshop

Introduction

  • Introduction to Internet Research, Web Page Elements and Structure.
  • Search Engine and Web Site Mechanics
  • Modern investigation
  • Understanding URLs and Domain Names
  • Tracing Domains and IP addresses
  • Social networks in digital form
  • Introduction to various social networking sites including Face book, Twitter, YouTube
  • Anatomy of online social network
  • Privacy issues
  • Misuse of social network sites
  • Overview of legal issues for law enforcement

Social media Crimes

  • Social Engineering & Phishing
  • Identity Theft
  • Real Time Chat rooms
  • Profile cloning
  • Cyberstalking
  • Hacking accounts
  • Mining unprotected info
  • Scams 

Information Gathering and Mapping

  • Trace Route, WHOIS tools
  • Advance information gathering and techniques
  • Browser Usage, Foreign Language Search and Translation
  • Finding Hidden and Removed Web Pages/Profiles/Blogs
  • Advanced search engine usage & techniques
  • Determine the identity of a profiles’ creator
  • Public and private profile investigation
  • Setup an undercover profile
  • How to use an undercover profile for information gathering
  • Social networking mapping
  • History recovery
  • Status Update
  • Chat
  • GPS

Tools

  • Internet evidence analytical
  • Domain & IP address tracer
  • People and contacts Searching tools
  • Image / Video / Maps Searching tools
  • Online Privacy Tools
  • Visualization Tools
  • Memory analytical
  • Social networking visitor tracker

List of tools to be use during workshop:

  • Search engines – Google / yahoo / MSN
  • Google Translate
  • http://whois.net/ Search engine provide domain owner name and host information
  • Google Trends – See what the popular related topics people are searching for. This will help widen your search scope.
  • KnowEm (www.knowem.com) allows you to check for the use of your brand, product, personal name or username instantly on over 550 popular and emerging social media websites. 
  • Namechk.com was designed to instantly show you if your desired or branded username was available at the majority of the top social networking websites.
  • Spokeo - People search engine and free white pages finds phone, address, email, and photos. Find people by name, email, address, and phone for free.
  • Hoovers - Search over 85 million companies within 900 industry segments; Hoover’s Reports Easy-to-read reports on key competitors, financials, and executives
  • Metagoofil is an information gathering tool designed for extracting metadata of public documents (pdf,doc,xls,ppt,odp,ods) available in the target/victim websites.
  • Nmap Free Security Scanner For Network Exploration & Hacking and foot printing
  • P0f is a versatile passive OS fingerprinting tool. P0f can identify the operating system
  • Creepy is an application that allows you to gather geolocation related information about users from social networking platforms and image hosting services.
  • Loco Citato (www.lococitato.com) has created several Tools to visually map, search & record social networks
  • Kurrently (www.kurrently.com) is a free real-time search engine that combines results from Twitter and Facebook in a simple, blazing fast format
  • TalkBack - Talkback is a web-based system to view trending vulnerability and security research data mined from social-media.
  • WhosTalkin (www.whostalkin.com) is a social media search tool that allows users to search for conversations surrounding the topics that they care about most
  • CheckUsernames - Check for usernames across 160 Social Networking Sites.
  • Pushpin Python script that will identify every tweet, flicker pic and Youtube video within an area of a specific Geo address.
  • FBPwn  A cross-platform Java based Facebook social engineering framework, sends friend requests to a list of Facebook profiles, and polls for the acceptance notification.

 

Schedule of Classes

Day 1

Introduction to Digital Forensics

Introduction to Social Media

  • Search engine
  • Web Page Elements and Structure
  • Social network
  • Blogs
  • Business Professional Network
  • Online Media Network
  • Anatomy of online social network
  • Misuse of social network sites

Search engine & Social Media Network Risk

  • Cyber Identity Theft
  • Privacy
  • Who is looking
  • Phishing
  • Malicious ads / Clickjacking
  • Case Study

User Profile

  • What information is available
  • Public / Private user profile investigation
  • Search strategy & Techniques
  • Case Study

Understanding URLs and Domain Names

  • Domain investigation
  • Domain name title history
  • Tracing IP addresses
  • Whois record
  • Archive record
  • Reverse IP
  • Reverse Whois
  • WhoisGuard
  • Tools & Case Study

Information Gathering Techniques

  • Network Mapping
  • Operation system footprint
  • Port scan
  • Name & site search
  • Social Network Mapping
  • Geolocation Information Gathering
  • Tools & Case Study

 

Day 2

Open-source intelligence (OSINT) Advance

  • Important internet backgrounds and service
  • Understanding the internet search techniques, browser, search engine selection and search syntax
  • Understanding the internet search techniques, browser, search engine selection and search syntax
  • Hiding web documents from search engines and recovering pages that have been removed from web servers
  • Website mapping and archiving techniques tools
  • Multimedia content, Audio, video, maps and satellite imagery
  • Tools for collating an organizing internet source data
  • Tools & Case study

Information Validation

  • Source tools, Domain analysis and Web mapping
  • Network tracing, port scanning and Os fingerprint
  • Media and content analysis, assessing media outlets and news providers

Information analysis and segment

  • Researching forums, discussion board, newsgroups and mailing list
  • Online privacy and anonymity
  • Source reliability

 Instant Messenger Investigation

  • Introduction to Advanced Communication Clients Internet
  • Which IMs are the most popular
  • IM evidence extraction  tools
  • Search for Chat log
  • Storage

 Issues and problems

  • Proxy Server
  • Web anonymizers
  • Onion routing
  • VPN
  • Dummy email
  • Fake Email generator
  • Tools & Case Study

Social media Crimes

  • Social Engineering & Phishing
  • Identity Theft
  • Real Time Chat rooms
  • Profile cloning
  • Cyberstalking
  • Hacking accounts
  • Mining unprotected info
  • Scams
  • Child Exploitation

Social engineering Techniques

  • Human base Social engineering
  • Computer base Social engineering
  • Profile Cloning
  • How to use an undercover profile for information gathering