3 videos 📅 2025-07-03 09:00:00 US/Eastern
4:43:30
2025-07-03 08:58:27
2:40
2025-07-03 13:54:28
1:44:35
2025-07-03 14:05:41

Visit the Open Source Cyber Intelligence - Introduction Training course recordings page

                WEBVTT

00:00:00.000 --> 00:00:51.260
would be compromised so for example let's say so i'm gonna pay let's say let's see if we do it

00:01:10.220 --> 00:01:14.540
because i want you to be able to see what it looks like when the data is corrupted

00:01:14.540 --> 00:01:17.580
it would be nice to see for you to be able to see the different types of instances but

00:01:28.220 --> 00:01:33.420
so basically for example let's say we we came to google we searched for that and now

00:01:33.980 --> 00:01:53.660
we're left with these logs right so so for example i use the 3xc client that you're looking at

00:01:53.660 --> 00:01:59.580
on your page right and this is what it looks like when you gain data from

00:02:00.220 --> 00:02:18.220
shodan are you able to hear me 3x 3xc web client you may have to click it by his name

00:02:34.690 --> 00:02:43.470
if you want you you could take norm normberg out of it can you back would you yeah i'll say so if

00:02:43.470 --> 00:02:57.760
you just click on 3xc it won't allow you to wow i think it's the internet connection something

00:02:57.760 --> 00:03:06.460
it's the internet is just isn't working great for us and that's fine so see how here we see

00:03:06.460 --> 00:03:12.780
all of that data i was talking about the the domains you see how you can see the product

00:03:12.780 --> 00:03:19.660
you can see basically all of the breakdown for it not only do you see that port but you see

00:03:20.780 --> 00:03:27.180
what that port is communicating with you see is you can see every piece of key identifying

00:03:27.180 --> 00:03:40.400
information on it so what we're looking at now will be public evidence of exposed data of some

00:03:40.400 --> 00:03:44.160
sorts right for the for the for the tents and purposes of what we're talking about

00:03:49.630 --> 00:03:56.510
so in cyber security and open source intelligence we use showdown because sometimes people attempt to

00:03:57.230 --> 00:04:02.830
provide us doctored logs and we can always go behind them and see if it's true based on

00:04:02.830 --> 00:04:12.620
the information we found online so let's say if we stick right here with google right

00:04:13.660 --> 00:04:18.780
so you start with like how we just we enter the name right through a backspace one

00:04:18.780 --> 00:04:28.420
so you enter name and we choose 3cx right so we back at the same place what you'll find is like

00:04:28.420 --> 00:04:36.360
we have our ports that's open right we know that we got our open we know we got our rdp here right

00:04:36.360 --> 00:05:01.910
and that we have some iot to military devices right that's showing http responses so that's

00:05:01.910 --> 00:05:14.150
information we have here and we're seeing how it's done individually for each port see how we have

00:05:14.150 --> 00:05:24.870
their protocol in which they're engaging and communicating on the next thing you would do

00:05:24.870 --> 00:05:30.790
after this is that you would essentially you would filter for risk right because from here you would

00:05:30.790 --> 00:05:36.630
go in and you would search for whatever the key words that was given to you by your client right so

00:05:36.630 --> 00:05:43.190
confidential whomever the person they may have been looking for as the perpetrator anything that

00:05:43.190 --> 00:05:50.550
would give them access to knowing one step closer who that who the person was that did the thing

00:05:52.820 --> 00:05:57.300
so based on the information that we have now right we've come across a device id

00:05:58.020 --> 00:06:03.940
we've come across the ports we've even got geolocation ips right we even got our

00:06:03.940 --> 00:06:10.740
as autonomous service number right so that right there would be what's considered a forensic grade

00:06:10.740 --> 00:06:22.440
open source intelligence search does that make sense does does being able to find this type of

00:06:22.440 --> 00:06:35.640
information help you so now we're going to change your thinking a little bit right so now imagine

00:06:35.640 --> 00:06:42.280
that you're analyzing a breach in eastern europe right there's a suspicion there's a suspicious

00:06:42.280 --> 00:06:49.400
geopolitical uh ip address that just seems to keep on coming keep coming from that area right

00:06:49.960 --> 00:06:55.560
so what you would do is you would use tail net enabled routers right to see if it's still

00:06:55.560 --> 00:07:01.960
responding the reason why you would do that is because it's outside of your country and you

00:07:01.960 --> 00:07:09.160
would want to be able to find out how continuously that that network is communicating outside of this

00:07:09.160 --> 00:07:25.650
space does that make sense did it one more time okay so from there what you will look at is your

00:07:25.650 --> 00:07:31.330
dns naming conventions right you will look at the default usernames and the banners and then you

00:07:31.330 --> 00:07:36.130
will look at the server headers right and that would tell you things like if there's local

00:07:36.130 --> 00:07:41.650
exposure if it's possibly residential it's somebody that's actually here that's just using

00:07:41.650 --> 00:07:47.970
a cloud server in another country or if it's a isp managed router that's just not hard

00:07:48.690 --> 00:07:53.970
right but we really end up finding out is that the attack surface for social engineering

00:07:53.970 --> 00:07:58.690
and then potentially what's considered what's a c2 foothold for ongoing surveillance right so

00:07:59.410 --> 00:08:05.490
the reason that we got to that is because it's something that's outside of our outside of our

00:08:05.490 --> 00:08:13.170
country right and is using an attack surface to gain it's using attack service to basically to

00:08:13.170 --> 00:08:19.810
communicate false information back to us right and that c2 foothold is what's used for surveillance

00:08:23.030 --> 00:08:27.590
so it's basically one of the things that they say in cyber security is every banner is a

00:08:27.590 --> 00:08:44.560
breadcrime and every part of the story so for the next five minutes right i want you to work on a

00:08:44.560 --> 00:08:51.520
prompt and i want you to reflect on it right so the next five minutes i want you to search for

00:08:51.520 --> 00:09:07.700
publicly exposed elastic search server in our country you think you can do that okay i'm ready

00:09:07.700 --> 00:09:27.190
when you are yeah yep that's yeah that's gonna be that you probably have about another 30 minutes

00:09:27.190 --> 00:09:39.320
before you get there so the reason why we go through all of this data here i'm sorry social

00:09:39.320 --> 00:09:57.110
media is the only thing that you're looking for so once you get the information off of social media

00:09:57.110 --> 00:10:23.440
what would be your expectations from there so you want to so you want to are you so you're looking

00:10:23.440 --> 00:10:31.640
to be able to use open source intelligence with social media the information that you would gain

00:10:31.640 --> 00:10:38.870
would still have to be put into these systems in order to be able to understand them because i'm

00:10:38.870 --> 00:10:45.350
not sure i'm not sure what this class was pitched as because like when we think about open source

00:10:45.350 --> 00:10:50.150
intelligence is more so using the public information but more of the public information

00:10:50.150 --> 00:10:55.830
information labs outside of social media than within social media right so within like let's say

00:10:56.870 --> 00:11:02.390
after going through these systems the final part is social media because well we all use social

00:11:02.390 --> 00:11:07.030
media we know how we use social media but these systems are what you put the information you get

00:11:07.030 --> 00:11:12.550
out of social media into to get the information that you're looking for right so there's there's

00:11:12.550 --> 00:11:18.230
nothing directly in facebook so there's nothing directly in facebook that's going to give you the

00:11:18.230 --> 00:11:23.990
geo location of a person you're still gonna have to come take that data away from facebook and put

00:11:23.990 --> 00:11:29.670
it into one of these instances that we're talking about now to get the location or the server or

00:11:29.670 --> 00:11:40.400
the ip address does that make sense but if there's something specific you're looking for like i said

00:11:40.400 --> 00:11:47.440
i don't mind changing course we have roughly an hour and 45 minutes i'm more than willing to give

00:11:47.440 --> 00:11:52.560
that directly to whatever it is you would need so if you want to learn open source intelligence

00:11:52.560 --> 00:12:20.210
directly regarding social media we can do that is that what you're looking for what information are

00:12:20.210 --> 00:12:25.800
you looking to acquire from social media you just want to be able to protect yourself are you looking

00:12:25.800 --> 00:12:50.280
to be able to so you want to use open source so you want to use social media so this is this is

00:12:50.280 --> 00:12:55.560
how i would imagine social intelligence would be used in school right this is how my my oldest son

00:12:55.560 --> 00:13:01.800
uses social or social intelligence right so he just graduated with a mechanical engineering degree

00:13:01.800 --> 00:13:08.280
from north carolina ant what he would do is let's say his professor gave him a subject matter to work

00:13:08.280 --> 00:13:14.440
on he would use google dorks right by going into google he would isolate everything away from google

00:13:14.440 --> 00:13:19.240
they had anything they didn't have anything to do with mechanical engineering and then he would he

00:13:19.240 --> 00:13:23.560
would he would conditionally break it down right so once he had all of that information about

00:13:23.560 --> 00:13:29.320
mechanical engineering isolated then he would break it down based on the curriculums that they

00:13:29.320 --> 00:13:33.800
provided right he would break it down based on like all these different all these different

00:13:33.800 --> 00:13:39.400
indicators that he was specifically looking for right but when it comes to school and education

00:13:39.400 --> 00:13:45.000
it's it's kind of different right when you talk about facebook and instagram and things like that

00:13:45.880 --> 00:13:53.720
because it's more so in the context of there's nothing to reference right like say for example

00:13:54.600 --> 00:14:01.320
it would be illegal for you to go into facebook and then use facebook information to try to track

00:14:01.320 --> 00:14:07.800
someone right outside of legal and law purposes so that's a lot of times like in cyber security

00:14:07.800 --> 00:14:13.160
before we begin even navigating certain things we get what's called a scope right we have to

00:14:13.160 --> 00:14:25.890
have permission to touch that network does that make sense so i guess to get a better understanding

00:14:27.970 --> 00:14:35.490
in regards to open source intelligence and social media would you are you looking to protect

00:14:35.490 --> 00:14:40.610
yourself are you looking to understand how you can use social media and open source intelligence

00:14:40.610 --> 00:15:00.550
specifically so in regards to social media it's it's multiple different things you can do with it

00:15:00.550 --> 00:15:09.030
right it's about us staying within legal realms right so what you can't do is is is have a

00:15:10.870 --> 00:15:15.430
situation where someone's stalking someone on social media right that's a crime

00:15:16.150 --> 00:15:19.670
so that's why i guess i'm trying to understand i'm kind of trying to understand

00:15:20.550 --> 00:15:27.350
what what spaces in which we're looking to navigate this regarding social media because

00:15:27.350 --> 00:15:32.150
social media becomes a gray area when you're talking about infringing on other people's

00:15:32.150 --> 00:15:45.910
personal spaces does that make sense so uh i guess i just need a better understanding for

00:15:45.910 --> 00:15:49.750
what specifically you want to know because i have no problem going over it it's just that i don't

00:15:49.750 --> 00:15:54.070
want to put you i don't want to put you in a compromising position right where i'm communicating

00:15:54.070 --> 00:15:59.110
these steps to you but the end result is that you gain this information show it to someone and then

00:15:59.110 --> 00:16:10.070
it becomes a legal issue does that make sense so for example right i'm a i'm a i'm a cyber security

00:16:10.070 --> 00:16:18.950
professional right uh my best friend isn't my best friend could be nosy and not thinking

00:16:18.950 --> 00:16:23.510
anything about it he could pick my phone up and start going through my photos or going through my

00:16:23.510 --> 00:16:29.910
emails which doesn't sound like a big deal until you realize that there's a law called ecma that

00:16:29.910 --> 00:16:36.710
federally prohibits that right so even in a world where people cyberstalk even in a world where

00:16:36.710 --> 00:16:42.790
people go online and they copy paste people's pictures even in a world where we do these things

00:16:43.430 --> 00:16:49.510
they're actually illegal right there's actually there's actually laws against these things

00:16:49.510 --> 00:16:53.190
right that's the reason why i guess i'm trying to better understand the

00:16:53.750 --> 00:17:24.230
open source intelligence of social media aspects you still with me so we want to go over facebook

00:17:24.230 --> 00:17:29.720
twitter and instagram you can spend the last hour on that that's not it's not an issue i have

00:17:29.720 --> 00:17:45.460
a problem with just want to get one of a senate other understanding if you want to use osin with

00:17:45.460 --> 00:17:50.500
twitter what that's probably going to be best for is real-time location and event tracking right just

00:17:50.500 --> 00:17:55.700
based on how people use twitter right you can have sentiment analysis and grievance monitoring

00:17:55.700 --> 00:18:00.660
right with certain things go on you can use open source intelligence to be able to see

00:18:00.660 --> 00:18:05.220
how that thing is affecting different places in the world you can use it for identifying

00:18:05.220 --> 00:18:12.500
affiliations threat actors and protest groups right you can look and see if there's a campaign

00:18:12.500 --> 00:18:21.140
going on for uh spca in one region of the country versus another region of the country you can

00:18:21.140 --> 00:18:26.420
collect data in all kinds of ways right you can track leaks you can track whistleblowers you can

00:18:26.420 --> 00:18:34.150
check uh hacktivist chatter does that make sense or is that is that going in the direction that

00:18:34.150 --> 00:18:44.200
you're looking for are you sure because it doesn't sound like it's what you're looking for

00:18:47.380 --> 00:18:56.600
you sure i i don't i don't want you to feel like you're not getting your money's worth so

00:18:56.600 --> 00:19:01.160
i want to be able to assist you however which way you need like it's not a it's not a conflict

00:19:01.160 --> 00:19:06.680
for me to go over like twitter or facebook and stuff like that but i also have to i have to warn

00:19:06.680 --> 00:19:12.040
you beforehand right that this is just an introductory course right this this is no way

00:19:12.040 --> 00:19:16.920
that it could go over all the legalities that you got to stay within when using social media

00:19:16.920 --> 00:19:22.120
right for osman so as there's no way it could go through like all of the metrics that you need to

00:19:22.120 --> 00:19:26.600
be within right that's it would be unfair to say that someone would tell you that they could do

00:19:26.600 --> 00:19:35.910
that in eight hours does that make sense so it's like for example i can show you how to do things

00:19:35.910 --> 00:19:41.190
for a company i can't show you how to do things specifically for a person could you see how they're

00:19:41.190 --> 00:19:49.380
different like a company can hire me and say hey junius we have a competitor that we want to do

00:19:49.380 --> 00:19:55.860
a market analysis against right that i can do that but a person can't hire me and say hey junius i

00:19:55.860 --> 00:20:00.100
want you to do an analysis against this person right because like now i'm infringing on these

00:20:00.100 --> 00:20:05.780
per this person's rights at that point like for example you wouldn't want someone to be able to

00:20:05.780 --> 00:20:11.380
come to me and say hey i want to i want to be able to investigate evelyn and then there not be

00:20:11.380 --> 00:20:34.760
an actual like reason or a scope or something behind it does that make sense i guess you gotta

00:20:34.760 --> 00:20:40.760
to help me you gotta help me here because it doesn't sound like you're liking this training

00:20:40.760 --> 00:20:48.550
so i just need to know how you want me to course correct you want to go over open source for social

00:20:48.550 --> 00:21:08.510
media in what realms are you looking to act using showdown we're going to basically create a model

00:21:08.510 --> 00:21:15.970
right now what i can say is this everything i'm showing you for companies can be used for people

00:21:16.530 --> 00:22:00.600
and that's about as far as i can go with that if that doesn't if that makes sense 11 30. i'll give

00:22:00.600 --> 00:22:05.720
you an hour and a half of facebook and twitter and social media so just to give you a quick

00:22:05.720 --> 00:22:10.520
breakdown right for the information we're going to cover here now none of this right here is going to

00:22:10.520 --> 00:22:15.480
be on the slideshow and it's not going to be in your training manual so if you want to take notes

00:22:15.480 --> 00:22:27.970
on this part it's probably going to have to be written down does that work for you so we're going

00:22:27.970 --> 00:22:39.830
to start with facebook all right so in regards to using oh so this is what we're going to start

00:22:39.830 --> 00:22:47.270
with these are the things that facebook would be good for for or osa right so your identity

00:22:47.270 --> 00:22:52.470
confirmation right you can cross check aliases there you can look at real names you can look at

00:22:52.470 --> 00:22:58.070
usernames right you got relationship mapping right you can see who are friends who are families

00:22:58.070 --> 00:23:04.790
who's co-workers right it creates what's considered an exposure net you get to see who has devices

00:23:04.790 --> 00:23:11.590
that potentially could interconnect you can see who has maybe access to another person's password

00:23:11.590 --> 00:23:18.150
which device may have someone else's wi-fi access the source right you also get your timeline

00:23:18.150 --> 00:23:22.870
reconstruction right you got your posts you got your photos you got your check-ins like this right

00:23:22.870 --> 00:23:28.470
here will be give you what's considered a behavioral timeline is this more so stuff

00:23:28.470 --> 00:23:38.870
what you're looking for all right so example of identity confirmation right let's say that

00:23:39.510 --> 00:23:46.230
someone sent you a weird message it didn't have a name but it did have a face you could take that

00:23:46.230 --> 00:23:50.310
picture you could cross you could cross reference that picture on facebook and if there's a

00:23:50.310 --> 00:23:56.390
similarity between the two faces it would give you an identity right identity confirmation right

00:23:56.390 --> 00:24:02.150
let's say now you have this identity you have a name but you don't really know who and how you

00:24:02.150 --> 00:24:06.550
might know this person right so the next thing you would do is you would click on that person's

00:24:06.550 --> 00:24:12.710
friends families co-workers right that would create a further exposure next right

00:24:14.470 --> 00:24:18.870
the people look familiar but you really don't know where or when you know them from so you

00:24:18.870 --> 00:24:26.230
start looking through your posts and the photos and their check-ins right so from from there you

00:24:26.230 --> 00:24:30.310
begin getting what's considered a behavioral timeline right so that's your timeline reconstruction

00:24:31.030 --> 00:24:37.350
right so then from there you get your pretexting data right so that's where you find like birthdays

00:24:37.350 --> 00:24:41.910
pets hobbies right your pretexting data is the things that's the logic psychologically going

00:24:41.910 --> 00:24:46.230
to be in the back of a person's mind that could potentially be like password clues or like phishing

00:24:46.230 --> 00:24:53.510
vectors right then you're going to have like basically like your a breach investigation right

00:24:53.510 --> 00:24:57.990
so let's say you didn't found out this person's birthday you know that they got a pet you know

00:24:57.990 --> 00:25:04.710
they got certain types of hobbies it still ain't clicking right so you would then try to figure out

00:25:04.710 --> 00:25:09.190
who were friends in your group versus who are friends in their group right you would start

00:25:09.190 --> 00:25:13.350
taking the information that you've you've compiled on them and you will cross-reference

00:25:13.350 --> 00:25:17.910
against yours right and you would do in our industry what's considered a breach investigation

00:25:17.910 --> 00:25:22.950
right you're going to try to figure out who know what who knew when who knows who and who shares

00:25:22.950 --> 00:25:27.350
internal information externally right and then from there you're going to have what's considered

00:25:27.350 --> 00:25:32.870
your inside threat discovery right in the commission of asking all of these people who

00:25:32.870 --> 00:25:39.510
know what in the commission of all of these things you're going to get enough information beforehand

00:25:39.510 --> 00:25:44.950
to know one how you know the gentleman that was in the picture that sent you the information

00:25:44.950 --> 00:25:47.990
and you're going to know how to approach it does that make sense

00:25:47.990 --> 00:25:55.430
all right so like that's those forms of open source intelligence is what

00:25:56.230 --> 00:26:01.670
facebook could be good for right so again it's going to be identity confirmation relationship

00:26:01.670 --> 00:26:09.190
mapping timeline reconstruction pretext and data breach investigation and inside the insider

00:26:09.190 --> 00:26:15.990
threat discovery right so facebook osin is just not about spying it's also about correlating

00:26:15.990 --> 00:26:20.790
digital behavior with the text the technical exposure right every post is a clue every

00:26:20.790 --> 00:26:27.750
friend is a connection every tag is a tap tap right so your step-by-step process using facebook

00:26:27.750 --> 00:26:34.150
would be one you want to one you want to locate the facebook profile now neither one of us are

00:26:34.150 --> 00:26:38.230
going to be able to do this because we're one having an issue with this virtual machine but

00:26:38.230 --> 00:26:43.590
then also too we probably don't want to log into facebook right so the first thing you could do is

00:26:43.590 --> 00:26:48.630
once you find the profile that you're looking for you could do like say for example you could go into

00:26:48.630 --> 00:27:05.330
google that's like i'll show you on google now right so you go to google and then let's say

00:27:05.330 --> 00:27:14.820
remember we did site facebook instead we do facebook.com right and then you could go

00:27:15.460 --> 00:27:37.250
what we want to do uh and then you'll see it's going to pull up all the information

00:27:39.250 --> 00:27:43.650
on whatever that search you're looking for is right so you could go up here you could put

00:27:43.650 --> 00:27:57.920
it is going to give you every John Doe identified on Facebook so it's it's really no sim it's no

00:27:57.920 --> 00:28:03.980
different than what I was showing you before it's just now you're just doing it using the name

00:28:03.980 --> 00:28:09.200
Facebook does that make sense so let's say for example if somebody did something you didn't

00:28:09.200 --> 00:28:27.240
have a name but you had an email you could go we just want to throw something right in my bed

00:28:27.240 --> 00:28:47.360
let's use facebook let's use twitter and now it showed you every page that references twitter

00:28:47.360 --> 00:29:12.100
on facebook right so yeah you said that one time yep uh-huh so because of how it uh indexes pages

00:29:12.100 --> 00:29:16.400
you can have pages that are still stored from 15 20 years ago that still references that's twitter

00:29:20.280 --> 00:29:26.840
the ad symbol oh so i put the at.com because that's going to reference any user using the

00:29:26.840 --> 00:29:38.670
twitter.com domain yeah so it could be like yeah so think about it like this right

00:29:40.350 --> 00:29:44.750
yeah so think about it like this right when you set up your you set up your facebook when

00:29:44.750 --> 00:29:49.070
you set up your facebook profile you use an email that email is usually stored within your facebook

00:29:49.070 --> 00:29:55.710
profile so if you do this google dork search for all of the email addresses that use google.com

00:29:55.710 --> 00:30:00.430
for example right it's going to show you all the emails that she uses that's using

00:30:01.230 --> 00:30:23.840
uh without google.com in their account like for example and now it shows you

00:30:25.440 --> 00:30:31.440
each one is referencing google in the demo on facebook see how it's see how it's just

00:30:31.440 --> 00:30:36.000
it's just indexing right so it's just isolating all the information the way that's going to

00:30:36.000 --> 00:30:40.240
reference the thing you're looking for so let's say for example if you were looking for a name

00:30:40.240 --> 00:30:51.710
right so let's say that's a very peculiar name vernon troy right just throw a random name out

00:30:51.710 --> 00:31:06.300
there it'll show you all the random troys on facebook uh-huh so let's say if their actual

00:31:06.300 --> 00:31:11.740
name is vernon troy or their facebook page is profile is referencing vernon troy then that's

00:31:11.740 --> 00:31:24.860
what is going to rank you but it's the same way don't matter what site you are using right so

00:31:24.860 --> 00:31:29.340
the tools that i use you all the tools i've been using you all day they're the same thing right so

00:31:30.620 --> 00:31:43.920
even if we do x.com right there's only one vernon troy on x right if you want to do instagram

00:31:43.920 --> 00:32:04.260
so the steps and the tools that i've been showing you throughout the throughout the course

00:32:04.260 --> 00:32:10.820
it's it's it's all it's just i'm showing you the format and the structure it's it's on you have to

00:32:10.820 --> 00:32:20.650
go in and put whichever sites you want to use does that make sense okay but like let's say if for

00:32:20.650 --> 00:32:25.370
example you were let's say you had a case and you were looking for someone right there's there's way

00:32:25.370 --> 00:32:33.370
more stuff that you can use in that right you have you have people yeah yeah this is what you

00:32:33.370 --> 00:32:49.010
want to use for identification right so you got people that's an option right you have social

00:32:49.010 --> 00:33:35.950
searcher you got Intel X and another one that people don't think to use are the email to email

00:33:35.950 --> 00:33:57.840
the facebook id but that would show you like to figure out which one is facing towards facebook

00:33:58.400 --> 00:34:15.600
right so let's say for example you could go to say site facebook.com icloud.com

00:34:19.330 --> 00:34:31.020
and it's going to show you every time icloud has been referenced somewhere in this sea of of

00:34:31.020 --> 00:34:35.260
directories in the sea of directories there's going to be something that's going to have a list of

00:34:35.260 --> 00:34:42.700
every person that uses at icloud.com on there for their uh icloud log i mean for that facebook login

00:34:49.600 --> 00:34:54.320
the way that we use validation in this is like we look for email reuse and username collisions

00:34:54.320 --> 00:35:04.560
across like linkedin twitter github facebook does that help you so now the next thing i always

00:35:04.560 --> 00:35:10.080
communicate to people are or i communicate to clients is extract publicly available info from

00:35:10.080 --> 00:35:15.040
the pro they're from the profile right so we're gonna find uh see what kind of profile let me

00:35:15.040 --> 00:35:41.710
matter we're gonna run with we're gonna run with uh vernon troy all right so we're gonna run with

00:35:41.710 --> 00:35:49.470
vernon troy you can you can look for my page if you want to so we're gonna run vernon troy right so

00:35:49.470 --> 00:35:54.590
the next thing we want to do is we want to extract all publicly available information on

00:35:54.590 --> 00:36:00.350
vernon right so we want to go look at his about tab let's say that he had a job let's say he

00:36:00.350 --> 00:36:08.430
have photos and videos he had posts he had check-ins tags friends lists right so then about tab is

00:36:08.430 --> 00:36:12.990
always going to show you like your birthday your family your workplace the city relationship

00:36:13.630 --> 00:36:17.230
these things can be used for what we consider password vectors right they're usually the

00:36:17.230 --> 00:36:23.550
things that people look back to to say it's just easy reference for a number or space right

00:36:23.550 --> 00:36:28.430
your photos and your videos are going to show you the backgrounds of sometimes internal offices

00:36:28.430 --> 00:36:33.790
security badges devices on a business level on a personal level it might be access to credit card

00:36:33.790 --> 00:36:39.070
numbers it might give you access to a location where a person may be it might give you any

00:36:39.070 --> 00:36:43.470
pertinent information to get you one step closer than knowing who that entity is what they're doing

00:36:43.470 --> 00:36:48.990
whatever the source are right your check-ins are going to give you your like geolocation evidence

00:36:48.990 --> 00:36:53.630
right that's how you're going to know that it's not a person just lying and saying they're somewhere

00:36:53.630 --> 00:36:59.070
they really aren't there's going to actually be a a piece of metadata that's going to indicate where

00:36:59.070 --> 00:37:04.910
what server i mean what cell tower that that ping came from right depending on the people

00:37:04.910 --> 00:37:08.910
that's tagged in certain posts you can tell if they're like actually close friends if they're

00:37:08.910 --> 00:37:13.630
work associates if they're just people who hang out for certain events or that's the person that

00:37:13.630 --> 00:37:23.230
you could use as a pawn in the social engineering aspects of it right then you have your friends list

00:37:23.230 --> 00:37:27.470
right if that's visible it helps you create a social map of like how they're influenced or

00:37:27.470 --> 00:37:34.190
what their risks are so from there the next thing we would do is we would scroll down and we would

00:37:34.190 --> 00:37:42.830
see troy's timeline right and toys timeline toys toy toy's timeline will help us reconstruct like

00:37:42.830 --> 00:37:49.150
from his post history like the dates the frequency of how much he posed the subject matter

00:37:49.150 --> 00:37:52.590
right things like that that will help us give us a better understanding of how he

00:37:53.390 --> 00:37:58.190
navigates and how he moves right that's going to tell you if there's any more insider threats

00:37:58.190 --> 00:38:02.190
that's going to validate any alabas you might need to be able to check out

00:38:02.190 --> 00:38:06.430
it's going to give you an understanding in the state of mind before and after the incident right

00:38:07.950 --> 00:38:12.990
and then it's going to help you build out a pretext profile for like red team engagements

00:38:12.990 --> 00:38:17.550
so this is where you're going to build your profile before you begin to use

00:38:17.550 --> 00:38:22.670
red team contact in context right so you're going to learn about the person you're going to learn

00:38:22.670 --> 00:38:26.750
about their job you're going to learn about what they do at their job you're going to learn about

00:38:26.750 --> 00:38:29.950
them going to school where they went to school at you're going to learn about their friends

00:38:29.950 --> 00:38:34.990
you're going to learn everything that you could put together to get a basically a psychological

00:38:34.990 --> 00:38:39.070
profile of how this person is moving and interacts in the world without you even communicating with

00:38:39.070 --> 00:38:47.070
thing right so let's say we will just throw for an example let's say that troy is a contractor

00:38:47.070 --> 00:38:53.310
at a federal government agency right and his pattern is november 2023 he posts photos in

00:38:53.310 --> 00:38:58.750
the server room with new gig big responsibilities right like he's showing the people that he got a

00:38:58.750 --> 00:39:06.270
new job right then we see him in january 2024 so we're talking about less than three months later

00:39:06.270 --> 00:39:13.390
he says i'm out no more overtime for peanuts right now in february he's posting again and

00:39:13.390 --> 00:39:19.310
it says client sees unexplained data access and logs tied to that exact system right so

00:39:19.870 --> 00:39:26.750
this timeline right here will show us to connect motive access and timing to support that forensics

00:39:26.750 --> 00:39:32.350
timeline right so we know in november he was excited about his job we know in january he got

00:39:32.350 --> 00:39:36.990
fired and then in february all of a sudden now they're having breaches right that would be

00:39:36.990 --> 00:39:45.950
circumstantial evidence in the case makes sense on the opposite side let's say you got a person

00:39:45.950 --> 00:39:51.630
that tells you they've been single for the last three years right you really really like them

00:39:51.630 --> 00:39:56.030
you feel like things are going somewhere and then you look back for some odd reason it's a

00:39:56.030 --> 00:40:00.510
random day you just find you have a free time and then you look back 18 months and you realize

00:40:00.510 --> 00:40:06.830
oh he was dating someone right that would be seen as like a breach wouldn't you agree

00:40:15.650 --> 00:40:21.940
makes sense all right so once you gather that information the next thing you want to work

00:40:21.940 --> 00:40:26.820
towards is building like your relationship and your network mapping right so let's say for example

00:40:27.380 --> 00:40:32.420
you would manually if you go do it manually like you would click through each friend you would click

00:40:32.420 --> 00:40:36.180
through their mutual friends you would click through their tag post right you would get

00:40:36.180 --> 00:40:42.260
relationships with spouses same names work in the same organizations you would get employer

00:40:42.260 --> 00:40:47.060
crossovers the people that's on their timeline that work together their travel campaigns your

00:40:47.060 --> 00:40:52.260
patterns stuff like that and then let's say for example you could use more ego and social links

00:40:52.260 --> 00:40:57.060
or you could use your spider foot by yourself to automate like the relationship graphs does that

00:40:57.060 --> 00:41:05.140
make sense so you could essentially go into more ego and it would it would give you the ability to

00:41:05.140 --> 00:41:08.740
it would map out all this out for you automatically based on just that profile

00:41:10.580 --> 00:41:16.020
another one that's good to use is called hunchly right and hunchly um can you use that for like

00:41:16.020 --> 00:41:40.540
document trails and stuff like that so and using these right you will learn that like when no like

00:41:40.540 --> 00:41:47.340
when one no post five others gonna react right so what you'll happen to see is for each post

00:41:47.340 --> 00:41:51.580
if it's a person that's generally active they're gonna i mean yeah you're gonna have like four or

00:41:51.580 --> 00:41:55.740
five comments right as you continue to go through those comments you're going to start seeing the

00:41:55.740 --> 00:41:58.860
people who comment the most you're going to start seeing them show up in a certain type of way it's

00:41:58.860 --> 00:42:05.580
going to give you a fabric about this person's relationship online right so from there that's

00:42:05.580 --> 00:42:09.420
when you want to start into like looking for your wrist flags right you'll look for your

00:42:09.420 --> 00:42:13.580
indicators of hey this may or may not be the way to go with this thing right so

00:42:15.180 --> 00:42:18.860
some of the risk flags that you should look for like in the open source intelligence when using

00:42:18.860 --> 00:42:24.620
social media is like a public friend list right no one's friendly should be public in 2025

00:42:24.620 --> 00:42:28.220
right that's network exposure and that's great for like fishing and social engineering which are

00:42:28.220 --> 00:42:32.940
the things we're talking about now right you really don't want your real-time check-ins to be

00:42:33.580 --> 00:42:37.020
you don't want those to be available because those give you like what's considered location

00:42:37.020 --> 00:42:41.980
vulnerability right so what you don't want to do is have the person that's watching you on facebook

00:42:42.780 --> 00:42:48.220
see your check-ins saying you're out of the state or you're out of whatever and now they have full

00:42:48.220 --> 00:42:55.340
access to your system right another thing that would be a risk is complaints right like complaints

00:42:55.340 --> 00:43:00.460
always lead to potential insider threat or a burnout risk right so when you start seeing

00:43:00.460 --> 00:43:04.220
people get online they start complaining about their relationship or they start complaining about

00:43:04.220 --> 00:43:09.260
their job those can be insider threats right because now you're exposing information that

00:43:09.260 --> 00:43:16.620
shouldn't be made known publicly right another thing you can look for is visible family information

00:43:16.620 --> 00:43:21.580
right that's the that's the thing that's always going to be fell back to when it comes to the

00:43:21.580 --> 00:43:30.460
password reset right private photos with internal system views right so like let's say i gotta i have

00:43:30.460 --> 00:43:35.660
private photos but my private photo can't be seen but it can show how many times i've looked at it

00:43:35.660 --> 00:43:39.980
or the people who are allowed to look at it have been able to view it right that'll show you like

00:43:39.980 --> 00:43:46.700
a leak of sensitive data so maybe sometimes you're not trying to gain access to one person right but

00:43:46.700 --> 00:43:51.740
you're trying to gain access to another person through them right so your private photos and

00:43:51.740 --> 00:43:57.660
your internal system views would be a weakness in that right and then surprisingly how people

00:43:57.660 --> 00:44:03.100
share external links like that's also a big thing too because you can always pass back and forth

00:44:03.100 --> 00:44:13.010
malware and malicious campaigns that's all i mean does that help what you're trying to find

00:44:13.010 --> 00:44:16.850
or do you want like the actual like the cheat codes that's what you're trying to get me to give

00:44:16.850 --> 00:44:30.000
you i mean how how well are you with uh how well are you with code i can give you a few things

00:44:41.150 --> 00:44:50.270
on a scale of one to ten what would you say is your level of comfortability with with uh with

00:44:51.230 --> 00:45:01.890
programming uh-huh well i'm thinking for the things that you're looking for you would have

00:45:01.890 --> 00:45:08.210
to build individual scripts so like for example uh let's say basic identification on facebook

00:45:08.210 --> 00:45:14.530
right the cheat sheet really would be you going to google and going to site colon facebook.com

00:45:14.530 --> 00:45:20.930
and then putting that first and last name in right because like facebook security isn't going to give

00:45:20.930 --> 00:45:26.610
you enough access to get the things you're looking for in open source intelligence on the

00:45:26.610 --> 00:45:32.210
on the front end right but you can gain access to these things on the back end so it's like

00:45:32.930 --> 00:45:38.530
it's way easier to find a link through google that'll give you broken access than it is to

00:45:38.530 --> 00:45:43.650
give you a to find a broken link through facebook that gives you gives you access does that make

00:45:43.650 --> 00:45:49.170
sense so like when you go to the page like your basic identification information is going to be

00:45:49.170 --> 00:45:53.730
like your full name right if you're going to google you can always do like i said the site

00:45:53.730 --> 00:45:59.570
facebook.com then first name last name you could also go in and you could type like

00:46:00.610 --> 00:46:05.730
you could find what the email address is right same concept you could do phone number the same

00:46:05.730 --> 00:46:11.170
way you could do a username the same way you could do name check and location right if you

00:46:11.170 --> 00:46:16.690
were looking to find like profile information to extract right that would just be your about

00:46:16.690 --> 00:46:20.930
information your about section which would be again your birthday your school your workplace

00:46:21.490 --> 00:46:26.610
your friends that would be your mutuals your frequency stuff like that right it's just your

00:46:26.610 --> 00:46:33.330
the profile space is what you would you would extract right and then from there you would

00:46:33.330 --> 00:46:37.250
usually just you would try to find like the information that you would collect you then

00:46:37.250 --> 00:46:40.610
would just go back to google and then you would do your searches right you would do your search

00:46:40.610 --> 00:46:46.530
for the e based on the email address the person the photos the pages that they've liked or the

00:46:46.530 --> 00:46:51.890
information that they've liked their hobbies stuff like that as well as like the posts from like their

00:46:51.890 --> 00:46:58.690
locations and stuff like that right so from there i think i went through a few of the tools with you

00:46:58.690 --> 00:47:04.450
you could use intelex right and that would just be able to search like the facebook coaches the

00:47:04.450 --> 00:47:10.210
facebook post images in the metadata for you you could also do more ego and the social links right

00:47:10.210 --> 00:47:15.970
because that would give you graphical relationships and extract profile data metadata right you could

00:47:15.970 --> 00:47:21.490
then use hunchly right and that would give you the evidence capture like with the full audit trail

00:47:21.490 --> 00:47:27.010
right so let's say if you knew that person is complete like you knew their entire link for their

00:47:27.010 --> 00:47:30.770
facebook page you could put that in hunchly and hunter is going to break everything down for you

00:47:30.770 --> 00:47:36.370
about that right so another tool would be your exit tool right and that's the tool that you

00:47:36.370 --> 00:47:42.930
would use to scrub or inspect the photo metadata right and then as i showed you people and scope now

00:47:42.930 --> 00:47:47.810
like that'll show you like the names the phones the emails social accounts for people that

00:47:48.690 --> 00:47:53.330
is also along that would give you additional information alongside the information that

00:47:53.330 --> 00:47:58.450
you you provided right and then you have name checking what's my name right and that's just

00:47:58.450 --> 00:48:12.530
reverse engineering for usernames across social media platforms make sense so like the defenses

00:48:12.530 --> 00:48:16.930
that you could have against these things because i feel like you need to know those as well right is

00:48:16.930 --> 00:48:23.650
that you can set your friend list to only me you just you would remove the birthday and location

00:48:23.650 --> 00:48:29.730
from your public profile you instead of doing real life the real-time check-ins if you must

00:48:29.730 --> 00:48:32.850
if you must do a check-in do it after you leave the location that you're at

00:48:33.490 --> 00:48:38.690
like any unused accounts that you have deactivate or just purge those old old profiles

00:48:40.130 --> 00:48:44.210
any any sensitive work photos that you have delete or blur any information that could be

00:48:44.210 --> 00:48:49.330
critical to your workspace and then just with your password clues and your post just avoid posting

00:48:49.330 --> 00:48:58.850
anything that you know that you would reference as a password so i guess now we can move to instagram

00:48:59.970 --> 00:49:07.500
does that work for you is this better is this information better for you you sure

00:49:09.180 --> 00:49:14.770
okay because i don't want to have to drive down the street and come give you a personal tutorial now

00:49:14.770 --> 00:50:06.760
so let's see site again site you could do instagram.com and then we'll say Adam

00:50:06.760 --> 00:50:57.770
Scott I believe the network is blocking it but let's just say for example right

00:50:57.770 --> 00:51:02.870
when the purpose of Instagram open source intelligence would be like your

00:51:02.870 --> 00:51:07.730
identity linkage right the same kind of similar to how we did with Facebook you

00:51:07.730 --> 00:51:14.130
be able to match aliases usernames bios and profile pictures across platforms right you could

00:51:14.130 --> 00:51:19.570
also use your geolag your geolocation mapping your geolocation mapping right which will give

00:51:19.570 --> 00:51:25.570
you your real-time historical travel and post locations right you can do routine prediction

00:51:25.570 --> 00:51:29.810
based on the time of day a person posts the habits that they have and their behavior cycles

00:51:30.450 --> 00:51:35.890
right you can instead extend your social media your social network mapping right now you see

00:51:35.890 --> 00:51:40.450
which friends do they have across multiple platforms you get to see how these friends

00:51:40.450 --> 00:51:46.770
interact like and communicate you get to see if their comments change between the two spaces and

00:51:46.770 --> 00:51:51.250
then you start to reveal like what type of relationships people have right you then again

00:51:51.250 --> 00:51:56.050
also you have your image analysis which is like your screens your locations your stickers your

00:51:56.050 --> 00:52:04.290
uniforms and backgrounds it could be a street sign it could be a store location the source right

00:52:04.290 --> 00:52:10.610
and based on these things right you didn't also find your like the behavioral aspects of like

00:52:10.610 --> 00:52:15.410
risk detection right when you start finding people who brag or they dress a certain type

00:52:15.410 --> 00:52:20.530
of way online they're very very flashy or bamboyant even on the opposite side right

00:52:20.530 --> 00:52:27.410
people tired of their job tired of relationship emotional cues things like that right instagram

00:52:27.410 --> 00:52:31.570
reveals the rhythm of life where people go who they what they value and when they're the most

00:52:31.570 --> 00:52:36.530
vulnerable ocean is here about it's here mostly here is about connecting the visible with the

00:52:36.530 --> 00:52:44.370
behavioral does that make sense so the elements of recon and open source intelligence that would

00:52:44.370 --> 00:52:50.290
be most important and pertinent and so and instagram would be your username right because

00:52:50.290 --> 00:52:56.290
then you can again cross match those your bio is going to give your email aliases jobs

00:52:56.290 --> 00:53:00.530
hashtags pronouns and some of your hidden domains that you might not be wanting to provide

00:53:00.530 --> 00:53:06.290
to people right your profile photo can be reversed social reverse search to see if there's any

00:53:06.290 --> 00:53:10.610
cross-platform matches right so you can take a profile picture you can load it into google how

00:53:10.610 --> 00:53:15.810
i showed you earlier it's going to show you every other instance of that photo when that photo

00:53:15.810 --> 00:53:20.050
showed up and how long it's lived there right you could also take that photo put it into the

00:53:20.050 --> 00:53:25.410
internet archive and see if it's shown up anytime in history as well right so it just gives you an

00:53:25.410 --> 00:53:34.020
opportunity to get a a much larger a much stronger fabric in your threat in your threat model so like

00:53:34.020 --> 00:53:39.380
some of your search techniques for example right let's say you wanted to know if a username had

00:53:39.380 --> 00:53:43.700
been reused certain amount of times or how long a person has hold that held that name then what you

00:53:43.700 --> 00:53:49.060
could do is you could use like namecheck.com right or you could do what's my name.com right

00:53:49.060 --> 00:53:53.540
and what they'll do is they'll do a reverse engineering the name and they'll tell you how

00:53:53.540 --> 00:54:00.740
long each space has held that name right the next space that you could do is the email adjustments

00:54:00.740 --> 00:54:04.740
provided to your instagram to the instagram account could be used for an email lookup

00:54:04.740 --> 00:54:10.020
which would allow you to you could use uh remember i showed you intellix and pimple you could use

00:54:10.020 --> 00:54:17.220
those two for reverse engineering email lookups um again location-based recon which is going to allow

00:54:17.220 --> 00:54:22.340
you to use the hashtags this go around versus with facebook right so depending on the type of

00:54:22.340 --> 00:54:27.940
hashtags a person's using how consistent they're using them they could be building for a brand

00:54:27.940 --> 00:54:34.020
they could be so they could be just self-reflecting it would be anything that would give you the upper

00:54:34.020 --> 00:54:40.260
edge and knowing and understanding information that being provided to you right so image-based

00:54:40.260 --> 00:54:45.460
intelligence right because of the way that the way that instagram is used and the way that we

00:54:45.460 --> 00:54:49.540
navigate it right it's going to be what's considered image-based intelligence right so

00:54:49.540 --> 00:54:54.500
your image elements is going to are going to be like for example your background objects and the

00:54:54.500 --> 00:55:00.260
thing you're going to be looking for like screens id badges whiteboards brand logos on the business

00:55:00.260 --> 00:55:09.620
side but on the personal side you're going to be looking for uh addresses uh magazines in the

00:55:09.620 --> 00:55:18.500
background any any piece of pertinent information that would give you an idea of how to model this

00:55:18.500 --> 00:55:27.620
person or this idea right so from there right tattoos stars type of shoes right it might sound

00:55:27.620 --> 00:55:33.220
strange and it might sound odd but with the amount of biometric identifiers that are across the world

00:55:33.220 --> 00:55:39.220
right now it's very easy to like attach these i could find these type of things pulled out of

00:55:39.220 --> 00:55:46.660
metadata on instagram so then another thing you can look out for is like visible screens right

00:55:46.660 --> 00:55:52.500
what type of software are on these screens what is a person watching is this person chatting can

00:55:52.500 --> 00:55:57.620
we see any internal tools whatever the case might be right and then the one of the most important

00:55:57.620 --> 00:56:03.060
ones to me are clocks and watches right a clock and a watch is going to specifically give you a

00:56:03.060 --> 00:56:09.380
piece of time in history with that right like these screenshots and label photos like screenshot

00:56:09.380 --> 00:56:14.340
when you when you're collecting this information you don't want to do anything with it you just

00:56:14.340 --> 00:56:20.180
want a screenshot and you want a time stamp right because that's how you're going to present that

00:56:20.180 --> 00:56:26.510
data in your chain of custody so another thing you would look out with what you would you would

00:56:26.510 --> 00:56:34.510
engage with when trying to do osin on on instagram would be geolocation and routine mapping right so

00:56:34.510 --> 00:56:38.270
you're gonna have your geotech post that's gonna tell you what person is you're gonna have your

00:56:38.270 --> 00:56:44.590
consistent venues right like your your gyms your bars you're gonna have your libraries things like

00:56:44.590 --> 00:56:51.070
that you're going to pick up on when this person is going to the the coffee shop to go and get

00:56:51.070 --> 00:56:55.390
work done you're going to know when this person is going to feed the pets on the weekend it's all

00:56:55.390 --> 00:57:00.510
going to be shown to you based on how they navigate social media right you're going to also

00:57:00.510 --> 00:57:04.190
again be able to use those check-ins with the stories and you're going to be able to

00:57:05.150 --> 00:57:10.750
essentially create behavioral heat maps right because the things people place in their stories

00:57:10.750 --> 00:57:16.510
and the bubbles above their posts usually indicate what's the importance to them or what things

00:57:16.510 --> 00:57:22.190
they're willing to share with the world right usually these posts and these pieces of information

00:57:22.190 --> 00:57:28.510
are going to be attached to hashtags right so the worst thing you could ever do is have a hashtag

00:57:28.510 --> 00:57:36.270
like hashtag lax or hashtag delta airlines or hashtag spirit right because now the person knows

00:57:36.270 --> 00:57:43.870
based on you posting that tag the location that you're in like a good chance when you're going

00:57:43.870 --> 00:57:53.070
to be back does that make sense so like some of the things behaviorally that we look for

00:57:53.070 --> 00:57:59.310
right when doing a risk assessment with face with facebook with instagram right is like you

00:57:59.310 --> 00:58:05.070
you're usually going to find like emotional venting right you're going to find people bragging

00:58:05.790 --> 00:58:11.310
you're going to find party life you're going to find political and religious tags and then like

00:58:11.310 --> 00:58:14.510
so every now and again you're going to run into that sudden account wife right like you

00:58:14.510 --> 00:58:19.870
was following a person you was you you were you were looking you were gaining access and boom

00:58:19.870 --> 00:58:25.790
they just disappeared right so like those are the things that we need in a risk assessment right

00:58:25.790 --> 00:58:29.470
you could be looking into a person and that account could have been up for three or four

00:58:29.470 --> 00:58:33.790
or five years and now they're looking there's an investigation into them now they delete everything

00:58:34.430 --> 00:58:38.510
so now this is when you get this is when you reach out to facebook and you get them to pull

00:58:38.510 --> 00:58:46.750
the back end data for you make sense all right so like in this space like

00:58:48.670 --> 00:58:54.830
what you want to be looking for is usernames that match the alias or the spaces that you've

00:58:54.830 --> 00:59:00.190
already looked in right so we've already looked at facebook we looked at vernon troy let's say

00:59:00.190 --> 00:59:06.750
now we in instagram and showing up vernon choice here again it's 700 vernon troy profiles however

00:59:06.750 --> 00:59:14.350
this one has the same it has the profile picture of a picture that we found in vernon's facebook

00:59:14.350 --> 00:59:20.470
page right so now we've confirmed that this username and this person is the same person

00:59:20.470 --> 00:59:28.330
right another thing we would look at is like account is private but it still has like tag

00:59:28.330 --> 00:59:33.690
stuff visible right so you ever notice how you come to the account but the account might be

00:59:33.690 --> 00:59:40.810
private on instagram but for some odd reason if you end up coming back out to your like your main

00:59:40.810 --> 00:59:45.130
page and you start scrolling down you will find that instagram will glitch and it'll show you the

00:59:45.130 --> 00:59:51.840
person's information so like that's when you start having data leaks because of your friends

00:59:53.920 --> 00:59:59.920
so let's say for example you and i are in a picture your profile is personal my profile

00:59:59.920 --> 01:00:07.040
is not personal we both have the picture right your picture is no longer private because your

01:00:07.040 --> 01:00:13.520
your picture can be seen from via my page does that make sense all right so another thing to

01:00:13.520 --> 01:00:18.560
look out for is like your real time like i said again before real time posting just like with

01:00:18.560 --> 01:00:24.240
facebook you really don't want to give a person the idea of how much time they have to respond

01:00:24.240 --> 01:00:31.680
or defend or offend if that makes sense and you always want to watch out just i tell people if

01:00:31.680 --> 01:00:37.600
i'm ever doing anything with technology i try to if it's not work related i keep my phone away from

01:00:37.600 --> 01:00:42.960
it i keep everything personal from that space right because the last thing i wanted to be doing

01:00:42.960 --> 01:00:47.360
the screen record or i'd be recording something for a person and now something that shouldn't

01:00:47.360 --> 01:00:58.030
be out there is out there so the tools just like i gave you tools for facebook i'm gonna give you

01:00:58.030 --> 01:01:05.630
tools for instagram too right so you want to use your name check and what's my name right and those

01:01:05.630 --> 01:01:10.190
are going to help you with your username tracking across platforms right let's say you get to

01:01:10.190 --> 01:01:15.790
instagram and you find the thing that you're looking for you can put that name in name check

01:01:15.790 --> 01:01:19.630
and what's going to happen is it's going to give you all the other publicly facing profiles that

01:01:19.630 --> 01:01:26.430
use that same name right you can go to intelex again and then that would give you the historical

01:01:26.430 --> 01:01:31.150
and hidden ig content search right so that's going to be kind of like what you've seen on

01:01:31.150 --> 01:01:36.270
the wayback machine on the internet archive how it showed you the interaction and activity based

01:01:36.270 --> 01:01:41.870
on the on the on the on the material it's going to be like that again one that we haven't talked

01:01:41.870 --> 01:01:46.830
about is called pym eyes right or you can use what's called yandex reverse engine right both

01:01:46.830 --> 01:01:52.110
of them are facial recognition systems and it's just neck recognition there facial recognition

01:01:52.110 --> 01:01:58.910
system used for photo tracking and what you do is you extract your pictures from instagram right and

01:01:58.910 --> 01:02:03.470
then you would drop them into pym eyes and then pym eyes will give you every piece of information

01:02:03.470 --> 01:02:08.990
available about that person online anytime they was caught on cctv anytime that person

01:02:09.950 --> 01:02:17.790
uh swiped in the way the information is provided publicly the source right then again that

01:02:17.790 --> 01:02:22.430
information can also be put into more ego right and then it'll give you a graphical layout of

01:02:22.430 --> 01:02:29.470
how that person has moved and navigated and again access tools and hunched right so what you

01:02:29.470 --> 01:02:51.760
want to do is so basically you want to target you're going to find your you want to find your

01:02:51.760 --> 01:02:58.080
target profile you want your profile in that bio then archive whether it's by a screenshot

01:02:58.080 --> 01:03:02.640
or using whichever system or software you're going to use you want that username searched

01:03:02.640 --> 01:03:08.560
across other platforms you want your photos review for identify the metadata you want your

01:03:08.560 --> 01:03:14.240
tag posts and your locations to be reviewed you want your posting behavior to be mapped because

01:03:14.240 --> 01:03:17.200
you want to know what the frequency is of a person posting in the day and you want to know

01:03:17.200 --> 01:03:22.800
the time of day they usually post you want your you want their friends and followers to be grabbed

01:03:22.800 --> 01:03:36.410
as well and then you also want your key evidence to be locked does it fit your needs all right

01:03:36.410 --> 01:03:49.480
want to move to x so here's why x matters for osin right so you got your real time incident

01:03:49.480 --> 01:03:55.160
detection right you always have what's considered crisis chatter your breach announcements and your

01:03:55.160 --> 01:04:00.200
protest track and that's always going to happen first on x right another thing that you can use

01:04:00.200 --> 01:04:05.480
on there is your identity resolution right again move back to aliases usernames profile image

01:04:05.480 --> 01:04:11.720
matching right um you have your threat actor monitoring right you got your activist groups

01:04:11.720 --> 01:04:17.240
your disgruntled insiders your exploit discussions you also have your sentiment and motive analysis

01:04:17.240 --> 01:04:22.120
right you got your frustration your whistleblowing your target intentions and then you also that's

01:04:22.120 --> 01:04:26.840
when you get your timeline building right you got your behavior before doing it after certain

01:04:26.840 --> 01:04:32.920
things occur now that's on the business side on the personal side your real-time incident detection

01:04:32.920 --> 01:04:38.520
that's usually when you see things pop off right that's when you see that there's a consistent

01:04:38.520 --> 01:04:43.000
chatter or flow or there's a build up a certain thing in the community and now it's starting to

01:04:43.000 --> 01:04:49.080
spill over into social media specifically x right that's when x is usually where you're going to

01:04:49.080 --> 01:04:53.320
find out that something went wrong first right and that's usually when you're going to start

01:04:53.320 --> 01:04:59.480
being able to see where that thing went wrong builds into enough people that want to act right

01:05:00.040 --> 01:05:07.320
we've already covered identity resolution uh threat actor monitoring right uh sometimes you

01:05:07.320 --> 01:05:13.320
want to be able to keep an eye on a person just in case right so let's say for example you had a

01:05:13.320 --> 01:05:18.120
post you made someone made a joke you really didn't find it funny it wasn't it was offensive

01:05:18.120 --> 01:05:23.880
it just didn't seem like it landed well right you might not want to block that person but you might

01:05:23.880 --> 01:05:30.280
just want to wanted to them differently right so that might go from you seeing that post on

01:05:30.280 --> 01:05:35.240
your page that they responded to that you didn't like to you may be going to their page to see if

01:05:35.240 --> 01:05:40.360
there's a consistency in them posting that way right maybe it's person trolling maybe it's a

01:05:40.360 --> 01:05:45.400
person really feels these views feel these views but that's one of the things that we end up using

01:05:45.400 --> 01:05:52.920
x for a lot right uh sentiment and motivative analysis right uh you can usually kind of tell

01:05:52.920 --> 01:05:57.000
when a per how a person ticks based on their twitter account right you can tell if a person

01:05:57.000 --> 01:06:01.080
is pretty happy-go-lucky you can tell if a person is going to flow you can tell a person

01:06:01.080 --> 01:06:06.760
is high strong based on how they navigate twitter right and based on these things you build a

01:06:06.760 --> 01:06:11.640
timeline that would give you enough information to begin your uh your social your social engineering

01:06:11.640 --> 01:06:19.720
scope so one of the things i tell people all the time is like x is often well truth is often hidden

01:06:19.720 --> 01:06:25.000
between the hashtags and x so you can't just capture tweets you got to capture timelines and

01:06:25.000 --> 01:06:30.200
tint and the digital behavior right like it's so easy to take something out of context there

01:06:30.200 --> 01:06:42.620
like it's just that you got to be hyper aware of it uh maybe if you want to be able to see how this

01:06:42.620 --> 01:06:50.220
works you can pull up your own personal browser and you go to your x account the same way we use

01:06:50.220 --> 01:06:59.420
the google dorking uh google dorking uses is the same thing you could do inside x but if you want we

01:06:59.420 --> 01:07:09.690
can see real time using google just continuing to dork that way so in google right i mean in

01:07:09.690 --> 01:07:16.890
in x for example right you could use the operator from right and it'll show you it'll it'll show you

01:07:16.890 --> 01:07:26.250
the views from that person does that make sense now if you use the to operator in in x then it'll

01:07:26.250 --> 01:07:33.370
show you who is sending messages who's sending tweets to that person right you can also add to

01:07:33.370 --> 01:07:42.090
that into that to or that from a sense or a until right so it that's considered what's called a date

01:07:42.090 --> 01:07:48.570
bound search right so if you put since let's say 2024 right it's going to show you every message

01:07:48.570 --> 01:07:55.210
from the beginning of 2024 up to present day based on that person being sent or receiving messages

01:07:55.770 --> 01:08:02.410
right if you put until it's going to give you everything up to that date and behind it right so

01:08:02.410 --> 01:08:06.650
that's just how date bound searches work does that make sense it's working it's sticking with you

01:08:08.490 --> 01:08:17.050
all right so these operators would go into the search box and twitter i mean x the same way we

01:08:17.050 --> 01:08:28.010
did with google make sense all right so the next one is of course you can use quotations

01:08:28.010 --> 01:08:32.170
and if whatever the exact phrase is it's going to search for that specific phrase or that specific

01:08:32.170 --> 01:08:40.410
topic um you can use near right and you can use near colon and then you can use a state and then

01:08:40.410 --> 01:08:45.850
that'll be what's considered a geo targeted tweet search right so then you could pull all the geo

01:08:45.850 --> 01:08:50.010
you could pull all of the posts from that specific area in a specific time if you wanted to

01:08:50.810 --> 01:08:56.170
right you could also go through and you can say like a boolean logic right so you can say

01:08:56.170 --> 01:09:02.810
this or that right you can say green or blue right and it'll it'll pull everything green

01:09:02.810 --> 01:09:13.720
or blue so like another thing that you can do is consider user enumeration right like

01:09:13.720 --> 01:09:20.680
enumeration is where you go to like information right that's the recon is gathering the information

01:09:20.680 --> 01:09:26.520
and gaining gaining all of the data that you're going to use for your search and then enumeration

01:09:26.520 --> 01:09:48.320
is gaining is is the research that you do to you still there okay all right so user enumeration

01:09:48.320 --> 01:09:53.360
would be the space where like now that we've extracted the data we're beginning to see what

01:09:53.360 --> 01:09:58.080
we can do with it right so let's say for example from your profile scan right you would have

01:09:58.080 --> 01:10:04.320
extracted your bio your your their url their followers and who they follow their join date

01:10:04.320 --> 01:10:09.920
their location right from their username reuse you would have gotten the information that you

01:10:09.920 --> 01:10:15.360
got provided from name check from the reverse image right on the photos you would have got a

01:10:15.360 --> 01:10:22.080
run avatar right you would have ran that avatar through google lens or yandex or pemex or pymaz

01:10:22.080 --> 01:10:27.840
i'm sorry and then you would have done email correlation right if that email was leaked then

01:10:27.840 --> 01:10:32.720
you could search for that account on spaces like have you ever heard of i have been pawned

01:10:37.600 --> 01:10:43.520
so there's a website out there that's named i have been pawned that we use for leaked data sets

01:10:43.520 --> 01:10:46.560
right and you could use that for email correlations right that's what we used to

01:10:46.560 --> 01:10:50.560
get found if you've been breached or if someone's user information and things of the sorts

01:10:51.280 --> 01:10:56.000
right you could also use that twitter id lookup and enumeration to convert the username to ids

01:10:56.000 --> 01:11:03.070
that could be used for like scripting and stuff like that so a few tools you can use with twitter

01:11:03.070 --> 01:11:09.790
or x is for example it's an open source tool that you can kind of create and build your own scripts

01:11:09.790 --> 01:11:16.750
for named twins so twin will allow you to scrape tweets followers bios and you don't even need an

01:11:16.750 --> 01:11:23.150
api to do that right then you got tweet beaver right tweet beaver will extract the followers

01:11:23.150 --> 01:11:27.710
for you and extract the lights the retweets the bio and the history but you do need the ip for that

01:11:27.710 --> 01:11:33.230
api for that so then you have social bearing right that's another tool that you could use

01:11:33.230 --> 01:11:38.910
that analyzes the tweet frequency the engagement and their keyword heat maps you then again of

01:11:38.910 --> 01:11:43.630
course have intel x that's always going to be a go-to hunchly is always going to be a go-to and

01:11:43.630 --> 01:11:50.430
more ego was always going to be a go-to so in intelex for this scenario right you want to search

01:11:50.430 --> 01:11:57.310
old tweets and deactivated accounts in regards to hunchly you want to be able to log your tweet

01:11:57.310 --> 01:12:02.350
threads and their timelines and the metadata with the audit trail that's provided with it

01:12:02.350 --> 01:12:08.510
and you want to use morph ego to be able to correlate to twitter accounts so from there

01:12:08.510 --> 01:12:14.830
right we're gonna go to your imaging your images and your metadata intelligence right so based on

01:12:14.830 --> 01:12:20.510
what in these things are you looking for right so in your posted images you want to be looking for

01:12:20.510 --> 01:12:26.990
again your badges your screens your monitors your internal docs your type of clothing how does a

01:12:26.990 --> 01:12:32.350
person see themselves how have they decorated their home is there a pet is there anything

01:12:32.350 --> 01:12:37.230
that's just laying around anything that you can use to create your map right you're going to use

01:12:37.230 --> 01:12:41.230
your pro you want to take their profile picture you're going to put that into google you're going

01:12:41.230 --> 01:12:57.360
to see if that profile picture matches anything else right you're going to take so let me show you

01:12:57.360 --> 01:13:13.320
through like google dorkman so for example let's say based on the things i communicated to you right

01:13:13.320 --> 01:13:50.780
you go from we'll say vernon choice but now it shows us every time on the instagram site from

01:13:50.780 --> 01:13:58.140
2025 from may 5th 2025 to present day every time that vernon troy is referencing instagram

01:13:59.900 --> 01:14:12.570
is this what you want to see i'm sorry what you mean uh you want me to log into instagram and

01:14:12.570 --> 01:14:29.230
and bitch and bur and action and do this did you put a space in between

01:14:35.000 --> 01:14:47.560
have you refreshed your page try erasing it and placing it again uh it's fight poland

01:14:48.440 --> 01:15:15.340
instagram.com space from colon 2025 that's zero five that's zero five space yes can you attempt to

01:15:15.340 --> 01:15:38.430
use a different tab okay that's odd i'm gonna see if i can if i retype it will it come back site

01:15:39.790 --> 01:15:43.790
instagram dot com from

01:15:59.930 --> 01:16:08.970
came back from me uh we could try a different browser you want to type www.go.com that might

01:16:08.970 --> 01:17:16.000
work as well i don't got that here that's weird that's coming up for you now instagram yeah

01:17:17.600 --> 01:17:24.720
all right so as you've seen before like the four indicator showed us here right and then

01:17:26.240 --> 01:17:45.550
so sometimes depending on your metadata right i mean not your metadata sometimes based on like how

01:17:45.550 --> 01:17:51.630
you how you scour how you search the internet it may not show up the same right so let's say for

01:17:51.630 --> 01:18:03.280
example if we put news for example right news should look different from mass versus yours

01:18:03.280 --> 01:18:19.850
because how we view news is different does that make sense using that same example i want to change

01:18:19.850 --> 01:18:33.560
from to two right and it's going to give you all of those posts up to so now the posts have changed

01:18:34.280 --> 01:18:38.680
due to it being a reverse and the only thing that's still showing at the top is the similar

01:18:38.680 --> 01:19:02.600
is the same one here and we see that based on the date here still making sense you could also do

01:19:16.880 --> 01:19:30.140
you can also search for different types of you can search for users you see each time

01:19:32.510 --> 01:19:52.940
it's on instagram as well as you can see every time something was sent to them

01:19:57.450 --> 01:20:16.750
every time something was sent from them do you see what i mean when i say that the just the

01:20:17.950 --> 01:20:22.590
the ability to google dork doesn't change based on the venue because you can do all

01:20:22.590 --> 01:20:30.830
of these things through google so you can also go in and you can look for

01:20:32.910 --> 01:20:36.270
exact phrases as you've already seen i like to use quotation marks

01:20:36.270 --> 01:20:58.480
right you can go in and you can say near Tomic it'll show you all of the post near the Potomac

01:20:58.480 --> 01:21:35.560
you could do boolean right so you could go apples or just let me go here we'll see whatever picture

01:21:35.560 --> 01:21:39.620
it's going to consist of apples or oranges or we're going to see any post that communicates

01:21:39.620 --> 01:21:53.880
about apples or oranges on its x right we can do and it's going to provide you anything with apple

01:21:53.880 --> 01:22:26.260
and oranges so that's boolean makes sense as well so that what you wanted to see so we were okay

01:22:26.260 --> 01:22:35.060
all right so the same way let's say for example if i can find an image image from x we could take

01:22:35.060 --> 01:22:42.980
this image we can put it here and now i see how google uses that the reference and show us anything

01:22:42.980 --> 01:22:52.870
that's remotely close to it so we see that these are the same so this is the only time that this

01:22:52.870 --> 01:22:58.950
shows up specifically is this all right so now we know that this is the indicator for this piece

01:22:58.950 --> 01:23:23.380
of image right uh let me see if exit tool will work right now so the issue i'm having this is

01:23:23.380 --> 01:23:28.260
not wanting to let me log in anything but let's say for example we would take that picture we would

01:23:28.260 --> 01:23:34.020
put it into xf2 and then it would give us the metadata on the back side so it would tell us

01:23:34.020 --> 01:23:38.740
where it originally came from it would give us the geolocation for where it came from and it

01:23:38.740 --> 01:23:44.820
would also provide us with who the original owner was so you could erase that information

01:23:44.820 --> 01:23:49.700
and then it would just be lost until we found the picture again or you could manipulate the

01:23:49.700 --> 01:23:54.100
information and make it look like somebody that somebody else did it somebody else created and

01:23:54.100 --> 01:24:02.020
center so in that space right we get back to the pictures you want to talk about again the things

01:24:02.020 --> 01:24:08.100
that you can see in the image right because you can have you can hide data and photos right you

01:24:08.100 --> 01:24:14.580
always want to be able to see how many times that picture has been reused you always want to take the

01:24:14.580 --> 01:24:19.300
screenshot and get your times your urls and stuff like that and you also want to be able to

01:24:19.300 --> 01:24:25.940
present this information in a way where like whenever you want to engage with a person based

01:24:25.940 --> 01:24:32.660
on it you can right so now we're going to talk about like timeline analysis right we've talked

01:24:32.660 --> 01:24:39.540
about timeline analysis with facebook instagram with x is slightly different right so you're

01:24:39.540 --> 01:24:44.740
going to have what's like your pre-breach space right that's going to be before you had complaints

01:24:44.740 --> 01:24:47.620
that's going to be before they had issues that's going to be before that's going to be when

01:24:47.620 --> 01:24:52.340
everything was good they had at the height of their lives right then you're gonna have that

01:24:52.340 --> 01:24:57.220
time frame where something changed and things were different right you're going to be able to see

01:24:57.220 --> 01:25:02.740
where now complaints are starting to form you're going to start see now where maybe they dress a

01:25:02.740 --> 01:25:07.540
certain type of way but now they're changing the way that their they dress has changed

01:25:07.540 --> 01:25:12.340
right you're going to see the person go from being happy go lucky to now being stressed right

01:25:12.340 --> 01:25:18.160
right that's going to create a certain type of an analysis right from there you're going to start

01:25:18.160 --> 01:25:23.560
seeing how that person tweets right you're going to see how what type of mass they did that person

01:25:23.560 --> 01:25:29.440
is in and then you're going to also see like what type of patterns they're in right so for example

01:25:29.440 --> 01:25:34.000
sometimes people get anxious in the midst of situations they start deleting things right

01:25:34.000 --> 01:25:38.980
sometimes in the midst of circumstances people start to archive things right but you start to

01:25:38.980 --> 01:25:44.580
see that the page changes based on the feeling of the person and how they respond to it right and

01:25:44.580 --> 01:25:49.460
then you get to a space where if that person is stuck in that loop is what we consider like a

01:25:49.460 --> 01:25:54.340
repeat offender right it's always going to be the same rant they always hang around the same people

01:25:54.340 --> 01:25:59.220
that got the same rants and they only support the things that rant about the same people right so

01:25:59.940 --> 01:26:05.940
you never want to be in a space with your timeline analysis where you get to the point

01:26:05.940 --> 01:26:09.380
where you're looking at the repeat offender stage right where we're talking about like

01:26:09.380 --> 01:26:13.700
the similar rants affiliations and like the different ties or whatnot and

01:26:15.380 --> 01:26:21.940
mistake that for being the the overarching identity of the person right it's only a small

01:26:21.940 --> 01:26:29.620
time frame in that timeline does that make sense so like the things you want to look out for and

01:26:29.620 --> 01:26:36.020
this is like a person bragging about knowing certain things or doing certain things engaging a certain

01:26:36.020 --> 01:26:42.740
way um where x screenshots are always going to be important because that's all more times than that

01:26:42.740 --> 01:26:48.500
that's where your accidental leaks come from right uh always look for disgruntled or aggro

01:26:48.500 --> 01:26:53.460
aggressive tweets you're always going to want to post like you never want to post your work

01:26:53.460 --> 01:26:58.820
travel stuff in real time of course again and then your rapid account deletion right after an

01:26:58.820 --> 01:27:03.380
incident right like if you're trying to prevent a forensic trail that's always going to be the

01:27:03.380 --> 01:27:11.540
biggest red flag in anything so we was to go through let's say for example we go through a

01:27:11.540 --> 01:27:18.660
workflow with how you want to address something with x right you would first thing you want to

01:27:18.660 --> 01:27:24.420
do is archive the profile because things change way too quickly there right in that archive you're

01:27:24.420 --> 01:27:28.580
going to have usernames so you want to search those usernames across the rest of the platforms

01:27:29.700 --> 01:27:35.220
you also then want to turn around and you want to tweet you want that tweet timeline downloaded

01:27:35.220 --> 01:27:41.060
right you can either use twint for that or you can just manually scroll and highlight everything

01:27:41.060 --> 01:27:46.660
you just download it right from next you want to analyze that tweet timeline and you want to flag

01:27:46.660 --> 01:27:52.580
all posts that would be considered like behavioral or a risk or anything that would be uh indicated

01:27:52.580 --> 01:27:59.380
for how that person's behavior this paper is navigating life right so from there you would

01:27:59.380 --> 01:28:03.380
essentially find out who their followers or who they are following and then you would put them in

01:28:03.380 --> 01:28:08.740
these categories based on the affiliation and then from there based on the people you found

01:28:08.740 --> 01:28:12.980
you do your image content cataloging right so you start finding your screen you start taking

01:28:12.980 --> 01:28:17.700
your screenshots you start looking for locations you start going through your metadata and the

01:28:17.700 --> 01:28:24.900
source to get your timeline right and then once your evidence change is maintained just engage

01:28:24.900 --> 01:28:29.220
however you see fit whether that be litigation whether that be confront confrontation of confronting

01:28:29.220 --> 01:28:43.350
the person or just continuous analysis the monitoring does that make sense okay so

01:28:45.190 --> 01:28:49.270
uh i gave you workflow checklist on those two i don't think i gave you one for

01:28:49.270 --> 01:28:55.910
facebook actually so like when using facebook what you want to do is like you want to have your

01:28:55.910 --> 01:29:01.270
profile archived again same concept you want screenshots you want your logs you make sure

01:29:01.270 --> 01:29:06.310
all your names your usernames your facebook ids are recorded you want to make sure that your

01:29:06.310 --> 01:29:11.430
timeline of posts and your events are created you want to make sure that you got an affiliation map

01:29:11.430 --> 01:29:17.430
based on how you've separated and sectionalize section out that person's life you want to make

01:29:17.430 --> 01:29:21.270
sure you can identify all potential risk indicators and then you want to make sure that

01:29:21.270 --> 01:29:34.630
it's packaged in a way where you don't have any loose ends sound good so i was told that i had to

01:29:34.630 --> 01:29:40.230
cut short at the last i think some 30 minutes or whatnot five minutes 15 minutes so that you could

01:29:40.230 --> 01:29:54.710
do a questionnaire you want to do that now okay so you you don't have any questions okay no what i

01:29:54.710 --> 01:30:02.070
was asking was so at some point in time in the next 20 minutes we'll have to stop so you can do

01:30:02.070 --> 01:30:06.150
the questionnaire remember when we first started the gentleman said that he had a questionnaire

01:30:06.150 --> 01:30:13.700
for you to do at the end so at some point you have to you have to we have to start that as well

01:30:16.580 --> 01:30:21.060
but before i guess before we get there would there be any other questions that you have in

01:30:21.060 --> 01:30:38.410
regards to social media open source intelligence is there anything you would like for me to

01:30:38.410 --> 01:30:46.410
specifically show you anything you specifically like to go over anything that you feel like may

01:30:46.410 --> 01:30:59.500
be missing from this anything i can do to help so geopolitical spaces

01:30:59.500 --> 01:31:17.290
mm-hmm okay so for example you could do site you do let's say we'll do X you could say for

01:31:17.290 --> 01:31:37.010
example Palestine breaking news right breaking news is going to give you everything that's

01:31:37.010 --> 01:31:50.900
current on palestine right so you could go also in and you could say from well you could say until

01:31:52.260 --> 01:31:57.220
right we will say 2020

01:31:59.220 --> 01:32:12.820
february second so if you notice when we look at this map we don't see anything about the current

01:32:12.820 --> 01:32:42.850
issues going on in palestine if we do from opposite direction see now how all we see is

01:32:42.850 --> 01:32:51.310
the palestinian israeli war so that would be a way that you could essentially extract uh

01:32:51.310 --> 01:32:57.150
geopolitical information right you could go in you could put this information in you could also

01:32:57.150 --> 01:33:13.440
add at musk right and it's going to show you every time elon has had something to say about

01:33:14.000 --> 01:33:28.180
palestine so this is this would be basically your your reference to

01:33:30.100 --> 01:33:34.420
be able to extract information in a way where you didn't have to just scour across

01:33:34.420 --> 01:33:42.020
hours upon hours of data you could find your you could find a particular artist you could find a

01:33:42.020 --> 01:33:48.740
particular journalist you could find a particular activist leader you could find anything that you

01:33:48.740 --> 01:33:52.820
were looking for and then once you were able to pool all that data together you would be able to

01:33:52.820 --> 01:33:57.870
do the research to get to the centralized information you're looking for does that make

01:33:57.870 --> 01:35:19.360
sense do you want to try one you're amazing the things you see let me see how much i type the same

01:35:19.360 --> 01:36:03.120
thing here i got some good news see how good news comes up different because i assume that

01:36:03.120 --> 01:36:12.580
this is something you've actually personally looked at at some point on x because if you

01:36:12.580 --> 01:36:31.620
notice it's just offset by that one thing if you notice anything else i could show you

01:36:33.860 --> 01:36:38.100
do you feel like you you do you do you understand it a little bit better or

01:36:38.740 --> 01:36:48.340
is anything else i can help you with okay so this is what i tell people it's way easier to learn

01:36:48.340 --> 01:36:54.900
google google dorking and then use the sites that you're looking for via that than it is to

01:36:55.860 --> 01:37:02.420
essentially try to use open source intelligence for that right because your indicators for

01:37:03.060 --> 01:37:08.260
cyber security using open source intelligence using those three platforms it's going to give

01:37:08.260 --> 01:37:14.180
you redundant data right which is is is it's great at recon but as you start getting down the road

01:37:14.180 --> 01:37:23.090
it starts to become tasking if that makes sense so now that we made it to the last 15 minutes

01:37:23.090 --> 01:37:30.930
if you can do me a favor check your email and see if he's provided you with possibly a

01:37:33.090 --> 01:37:36.130
questionnaire i think he may have a questionnaire he wants you to fill out

01:38:19.860 --> 01:38:21.220
i wish food was provided

01:39:41.300 --> 01:39:47.860
and do know if by any chance you have any questions that you want to ask after the training you by

01:39:47.860 --> 01:39:53.860
all means you more than open to you i'm more than open to you communicating with me if you ever in

01:39:53.860 --> 01:39:58.740
dc and you want to just see where the operation looks like then that means reach out to me i'll

01:39:58.740 --> 01:40:13.540
show you a few things let me know once you've completed the questionnaire okay so we have 14

01:40:13.540 --> 01:40:21.220
minutes left now i've gotten to the conclusion we've successfully gone through the introductory

01:40:21.220 --> 01:40:29.540
introduction of open source intelligence um you've seen how much public information can be used to

01:40:30.580 --> 01:40:38.180
gain access to information that people wouldn't think would be accessible you've seen how something

01:40:38.180 --> 01:40:44.740
as simple as posting on social media can become detrimental to your integrity of the information

01:40:44.740 --> 01:40:52.740
around you you've also noticed you've also learned how to use things like google dorking and various

01:40:52.740 --> 01:40:59.620
other osin techniques and tools to be able to um find more information to gather more details about

01:40:59.620 --> 01:41:04.580
a situation and circumstance uh on a scale of one to ten how would you rate the trainer

01:41:07.100 --> 01:41:12.060
honest opinion i said on a scale from one to ten how would you rate the trainer

01:41:12.060 --> 01:41:15.660
no judgment no way

01:41:15.660 --> 01:41:26.060
thank you uh what things do you think i could have done better and what things do you think

01:41:26.060 --> 01:41:55.680
were perfectly fine okay yeah that makes sense um i'm not sure i can reach out to them that may be

01:41:55.680 --> 01:42:04.420
something that's available in the future um what is something you would like to take this

01:42:04.420 --> 01:42:31.670
information you've gained and utilize it for uh yes i believe so so this is what i'll say if you

01:42:31.670 --> 01:42:39.170
can have if you have five people in the dmv area i have no problem uh and leading the class so if

01:42:39.170 --> 01:42:45.010
you want to if you know four other people that will sign up for a course with you then if you want

01:42:45.010 --> 01:42:51.890
to reach out to noble prog and say hey i'd love to do an in-person in-person training i've spoken

01:42:51.890 --> 01:43:10.590
with juniors he said perfectly fine i don't see why there'd be an issue with it but like i said

01:43:10.590 --> 01:43:16.590
if you would like you i'll you can reach me at contact at intelligent securities group.com

01:43:17.230 --> 01:43:28.190
and any questions you have i have no problem with assisting you in whichever way i can

01:43:28.190 --> 01:43:39.580
sound good are you satisfied with the information you've received okay good good good i try to leave

01:43:39.580 --> 01:43:45.180
make sure everyone leaves satisfied so at this point we can pretty much bring this to a close

01:43:45.180 --> 01:43:57.630
if you like no more questions it's been a pleasure being your trainer and i hope that i can hear from

01:43:57.630 --> 01:44:02.960
you again you know if you ever need another training in the future you're welcome